Network forensic investigation protocol to identify true origin of cyber crime RY Patil, SR Devane Journal of King Saud University-Computer and Information Sciences 34 (5 …, 2022 | 43 | 2022 |
Formal verification of secure evidence collection protocol using BAN logic and AVISPA PR Yogesh Procedia Computer Science 167, 1334-1344, 2020 | 42 | 2020 |
Unmasking of source identity, a step beyond in cyber forensic RY Patil, SR Devane Proceedings of the 10th international conference on security of information …, 2017 | 26 | 2017 |
Intelligent transportation system for smartcity using VANET CM Raut, SR Devane 2017 International Conference on Communication and Signal Processing (ICCSP …, 2017 | 25 | 2017 |
Survey and analysis of mobility management protocols for handover in wireless network KN Ashraf, V Amarsinh, D Satish 2013 3rd IEEE International Advance Computing Conference (IACC), 413-420, 2013 | 22 | 2013 |
Diagnosis & classification of brain hemorrhage V Davis, S Devane 2017 international conference on advances in computing, communication and …, 2017 | 21 | 2017 |
Primordial fingerprinting techniques from the perspective of digital forensic requirements PR Yogesh, SR Devane 2018 9th international conference on computing, communication and networking …, 2018 | 18 | 2018 |
High sensitivity universal Lifi receiver for enhance data communication ZP Choudhari, SR Devane 2016 Online International Conference on Green Engineering and Technologies …, 2016 | 17 | 2016 |
Hash tree-based device fingerprinting technique for network forensic investigation RY Patil, SR Devane Advances in Electrical and Computer Technologies: Select Proceedings of …, 2020 | 12 | 2020 |
Formal verification of payment protocol using AVISPA R Shaikh, S Devane International Journal for Infonomics 3 (3), 326-337, 2010 | 11 | 2010 |
Improved latency handover in fast mipv6 for streaming video V Amarsinh, S Devane International Conference on Advances in Computing, Communication and Control …, 2013 | 9 | 2013 |
Secure E-commerce protocol for purchase of e-goods-using smart card S Devane, M Chatterjee, D Phatak Third International Symposium on Information Assurance and Security, 9-14, 2007 | 9 | 2007 |
An efficient proxy signature–based authority delegation scheme for medical cyber physical systems A Bannore, RY Patil, SR Devane Cyber Security Threats and Challenges Facing Human Life, 13-23, 2022 | 7 | 2022 |
QoS Enhancement using intelligent cluster head selection routing technique in vehicular ad hoc networks in case of RSU failure CM Raut, SR Devane 2018 IEEE International Conference on Advanced Networks and …, 2018 | 7 | 2018 |
Study and analysis of different TCP variants AP Pande, SR Devane 2018 Fourth International Conference on Computing Communication Control and …, 2018 | 7 | 2018 |
Anomaly detection in VoIP system using neural network and fuzzy logic N Shekokar, S Devane International Conference on Computational Intelligence and Information …, 2011 | 7 | 2011 |
Performance evaluation of vehicular ad hoc networks in case of road side unit failure CM Raut, SR Devane Cognitive Informatics and Soft Computing: Proceeding of CISC 2019, 295-305, 2020 | 6 | 2020 |
Recommendation systems: past, present and future SP Nehete, SR Devane 2018 Eleventh international conference on contemporary computing (IC3), 1-7, 2018 | 6 | 2018 |
Diagnosis of brain hemorrhage using artificial neural network V Davis, S Devane International Journal of Scientific Research in Network Security and …, 2017 | 6 | 2017 |
Seamless video streaming using improved handover prediction and session handover in mobile networks V Amarsinh, D Satish International Journal of Computer Engineering & Technology (IJCET) 5 (4 …, 2014 | 6 | 2014 |