Bhushan Trivedi

According to our database1, Bhushan Trivedi authored at least 14 papers between 2011 and 2021.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
AndroHealthCheck Dataset.
Dataset, August, 2021

2020
Simulation Experiment of Key Exchange Protocol in Mobile Devices With E-Commerce Application.
Int. J. Inf. Secur. Priv., 2020

2016
A Comparison of Existing Tools for Evaluation of Programming Exercises.
ICTCS, 2016

Feasibility assessment of neural network based expert system prototype for evaluating motivational strategies.
Proceedings of the 2016 International Conference on Advances in Computing, 2016

2015
Hybrid intelligent access control framework to protect data privacy and theft.
Proceedings of the 2015 International Conference on Advances in Computing, 2015

2014
SQL FILTER - SQL Injection Prevention and Logging Using Dynamic Network Filter.
Proceedings of the Security in Computing and Communications, 2014

Detection of Active Attacks on Wireless IMDs Using Proxy Device and Localization Information.
Proceedings of the Security in Computing and Communications, 2014

Emergency Aware, Non-invasive, Personalized Access Control Framework for IMDs.
Proceedings of the Recent Trends in Computer Networks and Distributed Systems Security, 2014

2013
Efficacy of Attack detection capability of IDPS based on it's deployment in wired and wireless environment
CoRR, 2013

Decision Support System Using DMAIC for Academic Scheduling: ICT in Education Support Activities.
Proceedings of the 2013 IEEE Fifth International Conference on Technology for Education, 2013

2012
Optimisation of welding mechanisms using analytic hierarchy process, technique for order preference by similarity to ideal solution and graph theory and matrix approach.
Int. J. Manuf. Technol. Manag., 2012

Secure Leader Election Algorithm Optimized for Power Saving Using Mobile Agents for Intrusion Detection in MANET.
Proceedings of the Recent Trends in Computer Networks and Distributed Systems Security, 2012

2011
Correlation in Distributed Intrusion Detection System Using Mobile Agent.
Proceedings of the Advanced Computing, Networking and Security - International Conference, 2011

Security policy implementation using connection and event log to achieve network access control.
Proceedings of the International Conference on Advances in Computing and Artificial Intelligence, 2011


  Loading...