Follow
Deepak Upadhyay
Title
Cited by
Cited by
Year
Routing algorithms for MANET: A comparative study
DS Banwari, D Upadhyay
International Journal of Engineering and Innovative Technology (IJEIT) 2 (9), 2013
102013
A Review on Classification of Tor-Nontor Traffic and Forensic Analysis of Tor Browser
SD Mehta, D Upadhyay
International Journal of Engineering Research & Technology (IJERT) 9 (4), 3, 2020
52020
Performance Evolution of Machine Learning Algorithms for Network Intrusion Detection System
K Jani, P Lalwani, D Upadhyay, DMB Potdar
International Journal of Computer Engineering and Technology 9 (5), 181-189, 2018
22018
Analysis and Modification of IoT Packets
N Kumar, D Upadhyay
Journal of emerging technologies and innovative Research - an international …, 2019
12019
Software project health analysis: prediction of outcome at initial stage
D Sharma, DU Banwari
International Journal of Engineering and Advanced Technology 2 (4), 241-244, 2013
12013
Survey of Networking Protocol for IoT
TPD Upadhyay
International Journal of Emerging Technologies and Innovative Research 8 (4), 4, 2021
2021
A Survey on various Detection Technique of Sinkhole Attack in WSN
JP Deepak Upadhyay
International Research Journal of Engineering and Technology(IRJET) 7 (11), 2020, 2020
2020
A Survey on Routing Attacks in Internet of Things (IOT)
RV Deepak Upadhyay
International Research Journal of Engineering and Technology 7 (11), 2020, 2020
2020
Internet of Things-Ecosystem, Architecture, Protocols: A Survey
PU Deepak Upadhyay
International Research Journal of Engineering and Technology 7 (10), 7, 2020
2020
Review on Phishing Sites Detection Techniques
OPP Deepak Upadhyay
International Journal of Engineering Research & Technology (IJERT) 9 (4), 3, 2020
2020
A Review on Network Intrusion Detection and Prevention System
RG Prof. Deepak Upadhyay
Compliance Engineering Journal 11 (6), 5, 2020
2020
Analysis of DDOS Attack Isolation Techniques for WSN
DU Sunitkumar Chaudhari
Compliance Engineering Journal 11 (5), 6, 2020
2020
Cyber Defence: A Hybrid Approach for Information Gathering and Vulnerability Assessment of Web Application (Cyberdrone)
DV Prajapati, D Upadhyay
International journal of computer sciences and engineering, 2019
2019
A hybrid approach for phishing detection in web application through machine learning
MKB Pradip Maliwad, Prof. Deepak Upadhyay
Journal of Emerging Technologies and Innovative Research 6 (6), 6, 2019
2019
Enhancing Security Against Data Injection Vulnerability in Serverless Application
DU Keyur Patel, Hiteishi Diwanji, Shreeraj Shah
Journal of Applied Science and Computations 6 (6), 5, 2019
2019
Enhancing Security: Vulnerability Detection of an API
DU Bhumi Gor
Journal of Applied Science and Computations 6 (4), 5, 2019
2019
Network Intrusion Detection System using Threat Intelligence and Deep Learning Approach
MBP Deepak Upadhyay,Kushal Jani, Punit Lalwani
International Journal of Computer Sciences and Engineering 7 (4), 6, 2019
2019
Review paper: Internet of Things environment
DU Hiteshkumar Parmar, Dr. Shailesh. D. Panchal
International Journal of Engineering Research & Technology 6 (6), 8, 2019
2019
A Comparitive Study of IP Spoofing with Other Types of Network Attacks
DU Kelvin kalariya, Jay Chapla, Tushar Lakhani
Journal of Basics and Applied Engineering Research 1 (11), 5, 2014
2014
The system can't perform the operation now. Try again later.
Articles 1–19