Comparative study between cryptographic and hybrid techniques for implementation of security in cloud computing S Chaudhary, F Suthar, NK Joshi Performance Management of Integrated Systems and its Applications in …, 2020 | 14 | 2020 |
A signature-based botnet (emotet) detection mechanism F Suthar, N Patel, S Khanna Int. J. Eng. Trends Technol 70 (5), 185-193, 2022 | 12 | 2022 |
A survey on cloud security issues F Suthar, S Khanna, J Patel International Journal of Computer Sciences and Engineering (IJCSE) 7 (3 …, 2019 | 8 | 2019 |
A critical analysis on encryption techniques used for data security in cloud computing and IOT (internet of things) based smart cloud storage system: a survey J Patel, F Suthar, SVO Khanna International Journal of Scientific Research in Network Security and …, 2019 | 3 | 2019 |
Securing Application Layer Protocol For IOT G Raval, F Suthar International Journal of Computer Science & Communication 7 (Issue-2), 7, 2016 | 2 | 2016 |
A Novel Technique for Secure Communication in Cryptography P Bhadauriya, F Suthar, S Chaudhary International Journal of Advanced Research in Computer and Communication …, 2007 | 2 | 2007 |
Analysis of Network Vulnerability through Pen Testing F Suthar, S Khanna Indian Journal of Cryptography and Network Security (IJCNS) 1 (1), 2582-9238, 2021 | 1 | 2021 |
Comparative Study Between Cryptographic and Hybrid Techniques for Implementation of Security in Cloud. S Chaudhary, F Suthar, NK Joshi Performance Management of Integrated Systems and its Applications in …, 2019 | 1 | 2019 |
SURVEY ON SECURITY PROVISIONS FOR IoT LAYERS F Suthar, G Raval, S Valivet | | |