Key management for cloud data storage: Methods and comparisons A Buchade, R Ingle Advanced Computing & Communication Technologies (ACCT), 2014 Fourth …, 2014 | 26 | 2014 |
MapReduce based log file analysis for system threats and problem identification SS Vernekar, A Buchade 2013 3rd IEEE International Advance Computing Conference (IACC), 831-835, 2013 | 23 | 2013 |
Modified quine-mccluskey method V Jadhav, A Buchade arXiv preprint arXiv:1203.2289, 2012 | 7 | 2012 |
De-centralized voting system using blockchain A Jangada, N Dadlani, S Raina, VS Sooraj, AR Buchade 2022 IEEE International Conference on Blockchain and Distributed Systems …, 2022 | 5 | 2022 |
Review and study of real time video collaboration framework WebRTC H Patil, A Buchade International Journal of Computer Science and Information Technologies 5 (1 …, 2014 | 4 | 2014 |
Feature-based Intrusion Detection System with Support Vector Machine M Khodaskar, D Medhane, R Ingle, A Buchade, A Khodaskar 2022 IEEE International Conference on Blockchain and Distributed Systems …, 2022 | 3 | 2022 |
Homomorphic encryption approach for cloud data security SS Gaikwad, AR Buchade Int Res J Eng Tech (IRJET) 3 (09), 105-111, 2016 | 3 | 2016 |
Analytics: Building mobile game-users insights using parameter MR Astonkar, A Buchade International Journal of Computer Science and Mobile Computing 4 (6), 844-853, 2015 | 3 | 2015 |
Exploring Mobile Analytics for Business Intelligence M Astonkar, A Buchade International Journal of Computer Science and Mobile Computing 3 (12), 603, 2014 | 3 | 2014 |
TCP-P: A new approach in wireless environment to solve issues currently TCP facing RV Bidwe, AR Buchade Second International Conference on Computational Intelligence and …, 2012 | 3 | 2012 |
Time series segmentation using two-stage clustering approach KC Shete, A Buchade International Journal of Scientific and Technology Research 8 (9), 2210-2215, 2019 | 2 | 2019 |
Key trees combining algorithm for overlapping resource access members A Buchade, R Ingle International Journal of Network Security 2 (R1), R2, 2016 | 2 | 2016 |
Study On Secure Data Deduplication System With Application Awareness Over Cloud Storage Systems D Bansode, A Buchade International Journal of Advance Computational Engineering and Networking 3 …, 2015 | 2* | 2015 |
Non-communicable disease prediction system using machine learning P Kadu, A Buchade International Journal of Scientific & Technology Research 8 (9), 1307, 2019 | 1 | 2019 |
Ternary Tree Based Approach For Accessing the Resources by Overlapping Members in Cloud Computing A Buchade, R Ingle International Journal of Electrical and Computer Engineering (IJECE) 7 (6 …, 2017 | 1 | 2017 |
Performance analysis of key splitting algorithms for Cloud computing A Buchade, R Ingle 2016 International Conference on Computing, Analytics and Security Trends …, 2016 | 1 | 2016 |
Analysis of Algorithms for Overlapping Resource Access Members in Cloud Computing. A Buchade, R Ingle Int. J. Netw. Secur. 18 (5), 978-986, 2016 | 1 | 2016 |
Survey on Privacy Preserving and Data Security Techniques P Kharat, A Buchade International Journal of Science and Research (IJSR) 4 (7), 1912-1916, 2015 | 1 | 2015 |
Improving Performance of TCP in Wireless Environment using TCP-P RV Bidwe, A Buchade International Journal on Communication 4 (1), 48, 2013 | 1 | 2013 |
Predictive Analysis of Stock Market Trends: A Machine Learning Approach A Ruke, S Gaikwad, G Yadav, A Buchade, S Nimbarkar, A Sonawane 2024 4th International Conference on Data Engineering and Communication …, 2024 | | 2024 |