Routing algorithms for MANET: A comparative study DS Banwari, D Upadhyay International Journal of Engineering and Innovative Technology (IJEIT) 2 (9), 2013 | 10 | 2013 |
A Review on Classification of Tor-Nontor Traffic and Forensic Analysis of Tor Browser SD Mehta, D Upadhyay International Journal of Engineering Research & Technology (IJERT) 9 (4), 3, 2020 | 5 | 2020 |
Performance Evolution of Machine Learning Algorithms for Network Intrusion Detection System K Jani, P Lalwani, D Upadhyay, DMB Potdar International Journal of Computer Engineering and Technology 9 (5), 181-189, 2018 | 2 | 2018 |
Analysis and Modification of IoT Packets N Kumar, D Upadhyay Journal of emerging technologies and innovative Research - an international …, 2019 | 1 | 2019 |
Software project health analysis: prediction of outcome at initial stage D Sharma, DU Banwari International Journal of Engineering and Advanced Technology 2 (4), 241-244, 2013 | 1 | 2013 |
Survey of Networking Protocol for IoT TPD Upadhyay International Journal of Emerging Technologies and Innovative Research 8 (4), 4, 2021 | | 2021 |
A Survey on various Detection Technique of Sinkhole Attack in WSN JP Deepak Upadhyay International Research Journal of Engineering and Technology(IRJET) 7 (11), 2020, 2020 | | 2020 |
A Survey on Routing Attacks in Internet of Things (IOT) RV Deepak Upadhyay International Research Journal of Engineering and Technology 7 (11), 2020, 2020 | | 2020 |
Internet of Things-Ecosystem, Architecture, Protocols: A Survey PU Deepak Upadhyay International Research Journal of Engineering and Technology 7 (10), 7, 2020 | | 2020 |
Review on Phishing Sites Detection Techniques OPP Deepak Upadhyay International Journal of Engineering Research & Technology (IJERT) 9 (4), 3, 2020 | | 2020 |
A Review on Network Intrusion Detection and Prevention System RG Prof. Deepak Upadhyay Compliance Engineering Journal 11 (6), 5, 2020 | | 2020 |
Analysis of DDOS Attack Isolation Techniques for WSN DU Sunitkumar Chaudhari Compliance Engineering Journal 11 (5), 6, 2020 | | 2020 |
Cyber Defence: A Hybrid Approach for Information Gathering and Vulnerability Assessment of Web Application (Cyberdrone) DV Prajapati, D Upadhyay International journal of computer sciences and engineering, 2019 | | 2019 |
A hybrid approach for phishing detection in web application through machine learning MKB Pradip Maliwad, Prof. Deepak Upadhyay Journal of Emerging Technologies and Innovative Research 6 (6), 6, 2019 | | 2019 |
Enhancing Security Against Data Injection Vulnerability in Serverless Application DU Keyur Patel, Hiteishi Diwanji, Shreeraj Shah Journal of Applied Science and Computations 6 (6), 5, 2019 | | 2019 |
Enhancing Security: Vulnerability Detection of an API DU Bhumi Gor Journal of Applied Science and Computations 6 (4), 5, 2019 | | 2019 |
Network Intrusion Detection System using Threat Intelligence and Deep Learning Approach MBP Deepak Upadhyay,Kushal Jani, Punit Lalwani International Journal of Computer Sciences and Engineering 7 (4), 6, 2019 | | 2019 |
Review paper: Internet of Things environment DU Hiteshkumar Parmar, Dr. Shailesh. D. Panchal International Journal of Engineering Research & Technology 6 (6), 8, 2019 | | 2019 |
A Comparitive Study of IP Spoofing with Other Types of Network Attacks DU Kelvin kalariya, Jay Chapla, Tushar Lakhani Journal of Basics and Applied Engineering Research 1 (11), 5, 2014 | | 2014 |