Author:
Bhaisare Abhijeet,Kashid Ajit
Reference15 articles.
1. Proxy Base Station based Authentication Protocol for Broadband Wireless Network;Fuden Tshering;International Journal of Computer Applications,2013
2. HIDS: A host based intrusion detection system for cloud computing environment;P Deshpande;Int J Syst Assur Eng Manag,2018
3. Research directions in the Internet of Every Things(IoET);P Deshpande;2017 International Conference on Computing, Communication and Automation (ICCCA),2017
4. Taxonomy of load balancing practices in the cloud computing paradigm;Mukund Kulkarni;International Journal of Information Retrieval Research,2022
5. Predictive and Prescriptive Analytics in Big-data Era;P S Deshpande;Security and Data Storage Aspect in Cloud Computing. Studies in Big Data,2019