Systematic investigation and performance study of authentication and authorization techniques of Internet of Things T Senthil Murugan, VV Jog International Journal of Knowledge-Based and Intelligent Engineering Systems …, 2019 | 10 | 2019 |
A Critical Analysis on the Security Architectures of Internet of Things: The Road Ahead VV Jog, TS Murugan Journal of Intelligent Systems 10 (1515), 2016 | 7 | 2016 |
Advanced security model for detecting frauds in ATM transaction VV Jog, NR Pardeshi International Journal of Computer Applications 95 (15), 47-50, 2014 | 7 | 2014 |
2013 IEEE conference on information & communication technologies VV Jog, D Jain, R Arora, B Bhat IEEE, 2013 | 7 | 2013 |
Memory and machine attributes-based profiling and elliptic curve cryptography based multi-level authentication for the security of Internet of Things SMT Vivek V. Jog International Journal of Intelligent Computing and Cybernetics 10 (2), 241-256, 2017 | 6 | 2017 |
Survey on providing security and authentication for devices to achieve QOS in IOT MM Shaikh, V Jog Int. J. Sci. Res 5 (6), 342-344, 2016 | 6 | 2016 |
Enhancing Security of outsourced data in cloud using Dynamic Auditing MD Pande, VV Jog | 6* | 2014 |
Theft prevention ATM model using dormant monitoring for transactions VV Jog, D Jain, R Arora, B Bhat 2013 IEEE Conference on Information & Communication Technologies, 1156-1159, 2013 | 6 | 2013 |
Data importance and feedback based adaptive level of authorization for the security of Internet of Things VV Jog Journal of Engineering Research 7 (3), 2019 | 5 | 2019 |
QoS control in FiWi access network NN Mali, VV Jog International Journal 53, 2015 | 2 | 2015 |
Podcast Hosting Using Spectral Gating and Speech Recognition Methodology S Lotliker, G Bhatikar, A Almeida, U Gaude, S Naik, V Jog 2021 International Conference on Recent Trends on Electronics, Information …, 2021 | 1 | 2021 |
Survey on Integrated Fiber-Wireless (FiWi) Access Network Architectures NN Mali, VV Jog International Journal of Science And Research IJSR 4 (1), 2015 | 1 | 2015 |
Study of Security Problem in Cloud D Pande, V Jog International Journal of Engineering Trends & Technology, 34-36, 2014 | 1 | 2014 |
HMM Based Enhanced Security System for ATM Payments VV Jog, MJ Chouhan, A Mangla Advanced Materials Research 403, 1014-1021, 2012 | 1 | 2012 |
A Survey on Integrity Checking for Outsourced Data in Cloud using TPA K Shinde, VV Jog International Journal of Computer Applications 975, 8887, 0 | 1 | |
Multi-Attribute Network Selection Scheme using Analytic Hierarchy Processing and Entropy Weighting in Heterogeneous Wireless Network N Chaudhari, V Jog | | 2015 |
Pattern Discovery For Text Mining Using Pattern Taxonomy H Ponkiya, VV Jog | | 2014 |
Third Party Auditing (TPA) For Data Storage Security of Outsourced Data in Cloud with Dynamic Auditing DV Pande, VV Jog | | 2014 |
Intelligent Multilevel Authentication and Authorization Protocol IMAAP with Modified Hashing Technique for IoT VV JOG Chennai, 0 | | |
Survey of Network Selection Approaches in Heterogeneous Wireless Network NA Chaudhari, VV Jog | | |