default search action
Dhiren R. Patel
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j10]Bhavesh N. Gohil, Dhiren R. Patel:
Load balancing in cloud using improved gray wolf optimizer. Concurr. Comput. Pract. Exp. 34(11) (2022) - [j9]Ajay Kumar, Kumar Abhishek, Muhammad Rukunuddin Ghalib, Pranav Nerurkar, Kunjal Shah, Madhav Chandane, Sunil Bhirud, Dhiren R. Patel, Yann Busnel:
Towards cough sound analysis using the Internet of things and deep learning for pulmonary disease prediction. Trans. Emerg. Telecommun. Technol. 33(10) (2022) - 2021
- [j8]Pranav Nerurkar, Sunil Bhirud, Dhiren R. Patel, Romaric Ludinard, Yann Busnel, Saru Kumari:
Supervised learning model for identifying illegal activities in Bitcoin. Appl. Intell. 51(6): 3824-3843 (2021) - [j7]Ajay Kumar, Kumar Abhishek, Amit Kumar Singh, Pranav Nerurkar, Madhav Chandane, Sunil Bhirud, Dhiren R. Patel, Yann Busnel:
Multilabel classification of remote sensed satellite imagery. Trans. Emerg. Telecommun. Technol. 32(7) (2021) - [j6]Pranav Nerurkar, Dhiren R. Patel, Yann Busnel, Romaric Ludinard, Saru Kumari, Muhammad Khurram Khan:
Dissecting bitcoin blockchain: Empirical analysis of bitcoin network (2009-2020). J. Netw. Comput. Appl. 177: 102940 (2021) - 2020
- [c21]Aman Framewala, Sarvesh Harale, Shreya Khatal, Dhiren R. Patel, Yann Busnel, Muttukrishnan Rajarajan:
Blockchain Analysis Tool For Monitoring Coin Flow. SDS 2020: 196-201
2010 – 2019
- 2018
- [c20]Bhavesh N. Gohil, Dhiren R. Patel:
An improved Grey Wolf Optimizer (iGWO) for Load Balancing in Cloud Computing Environment. ICA3PP (Workshops) 2018: 3-9 - 2017
- [j5]Dipen Contractor, Dhiren R. Patel:
Accountability in Cloud Computing by Means of Chain of Trust. Int. J. Netw. Secur. 19(2): 251-259 (2017) - 2016
- [c19]Himanshu B. Patel, Devesh C. Jinwala, Dhiren R. Patel:
Baseline Intrusion Detection Framework for 6LoWPAN Devices. MobiQuitous (Adjunct Proceedings) 2016: 72-76 - 2015
- [c18]Reema Patel, Kevin Patel, Dhiren R. Patel:
On-the-Fly Symmetry Reduction of Explicitly Represented Probabilistic Models. ICDCIT 2015: 203-206 - [c17]Reema Patel, Kevin Patel, Dhiren R. Patel:
ExplicitPRISMSymm: Symmetry Reduction Technique for Explicit Models in PRISM. TAMC 2015: 400-412 - [i4]Harsh Thakkar, Dhiren R. Patel:
Approaches for Sentiment Analysis on Twitter: A State-of-Art study. CoRR abs/1512.01043 (2015) - 2014
- [c16]Surabhi Mour, Priyansh Srivastava, Payal Patel, Hari Ram, Bhavesh N. Gohil, Dhiren R. Patel:
Load management model for cloud computing. ICITST 2014: 178-184 - [c15]Dipen Contractor, Dhiren R. Patel:
Analyzing trustworthiness of virtual machines in data-intensive cloud computing. PST 2014: 403-406 - 2013
- [j4]Udai Pratap Rao, Dhiren R. Patel:
Incorporation of Application Specific Information for Recovery in Database from Malicious Transactions. Inf. Secur. J. A Glob. Perspect. 22(1): 35-45 (2013) - [j3]Chirag Modi, Dhiren R. Patel, Bhavesh Borisaniya, Hiren Patel, Avi Patel, Muttukrishnan Rajarajan:
A survey of intrusion detection techniques in Cloud. J. Netw. Comput. Appl. 36(1): 42-57 (2013) - [j2]Chirag Modi, Dhiren R. Patel, Bhavesh Borisaniya, Avi Patel, Muttukrishnan Rajarajan:
A survey on security issues and solutions at different layers of Cloud computing. J. Supercomput. 63(2): 561-592 (2013) - [c14]Chirag Modi, Dhiren R. Patel:
A novel hybrid-network intrusion detection system (H-NIDS) in cloud computing. CICS 2013: 23-30 - [c13]Manoj Singh Gaur, Dhiren R. Patel, Anil Saini:
Insecurities within browser: issues and challenges. SIN 2013: 458 - 2012
- [c12]Hiren B. Patel, Dhiren R. Patel, Jagdish Chaudhari, Sachin Patel, Kaushik Prajapati:
Tradeoffs between performance and security of cryptographic primitives used in storage as a service for cloud computing. CUBE 2012: 557-560 - [c11]Bhavesh Borisaniya, Avi Patel, Dhiren R. Patel, Hiren Patel:
Incorporating Honeypot for Intrusion Detection in Cloud Infrastructure. IFIPTM 2012: 84-96 - [c10]Dipen Contractor, Dhiren R. Patel:
Trust Management Framework for Attenuation of Application Layer DDoS Attack in Cloud Computing. IFIPTM 2012: 201-208 - [c9]Jitendra B. Gurubani, Harsh Thakkar, Dhiren R. Patel:
Improvements over Extended LMAP+: RFID Authentication Protocol. IFIPTM 2012: 225-231 - [c8]Chirag Modi, Dhiren R. Patel, Bhavesh Borisaniya, Avi Patel, Muttukrishnan Rajarajan:
A novel framework for intrusion detection in cloud. SIN 2012: 67-74 - [e1]Theo Dimitrakos, Rajat Moona, Dhiren R. Patel, D. Harrison McKnight:
Trust Management VI - 6th IFIP WG 11.11 International Conference, IFIPTM 2012, Surat, India, May 21-25, 2012. Proceedings. IFIP Advances in Information and Communication Technology 374, Springer 2012, ISBN 978-3-642-29851-6 [contents] - [i3]Devesh C. Jinwala, Dhiren R. Patel, Sankita J. Patel, Kankar S. Dasgupta:
Optimizing the Replay Protection at the Link Layer Security Framework in Wireless Sensor Networks. CoRR abs/1203.4694 (2012) - [i2]Devesh Jinwala, Dhiren R. Patel, Kankar S. Dasgupta:
FlexiSec: A Configurable Link Layer Security Architecture for Wireless Sensor Networks. CoRR abs/1203.4697 (2012) - 2011
- [c7]Fei Li, Dasun Weerasinghe, Dhiren R. Patel, Muttukrishnan Rajarajan:
An User-Centric Attribute Based Access Control Model for Ubuquitous Environments. MobiCASE 2011: 361-367 - 2010
- [c6]Chirag Modi, Udai Pratap Rao, Dhiren R. Patel:
A Survey on Preserving Privacy for Sensitive Association Rules in Databases. BAIP 2010: 538-544 - [c5]Reema Patel, Bhavesh Borisaniya, Avi Patel, Dhiren R. Patel, Muttukrishnan Rajarajan, Andrea Zisman:
Comparative Analysis of Formal Model Checking Tools for Security Protocol Verification. CNSA 2010: 152-163 - [c4]Chirag Modi, Udai Pratap Rao, Dhiren R. Patel:
An Efficient Approach for Preventing Disclosure of Sensitive Association Rules in Databases. IKE 2010: 303-309
2000 – 2009
- 2009
- [j1]Deven Shah, Dhiren R. Patel:
Architecture Framework Proposal for Dynamic and Ubiquitous Security in Global SOA. Int. J. Comput. Sci. Appl. 6(1): 40-52 (2009) - [c3]Devesh C. Jinwala, Dhiren R. Patel, Sankita J. Patel, Kankar S. Dasgupta:
Replay Protection at the Link Layer Security in Wireless Sensor Networks. CSIE (1) 2009: 160-165 - [c2]Deven Shah, Ashish Mangal, Mayank Agarwal, Mahendra Mehra, Tushar Dave, Dhiren R. Patel:
Protecting Global SOA from DoS and Other Security Threats. ISA 2009: 652-661 - [i1]Dhiren R. Patel, Sidheshwar A. Khuba:
Realization of Semantic Atom Blog. CoRR abs/0912.3957 (2009) - 2008
- [c1]Devesh C. Jinwala, Dhiren R. Patel, Kankar S. Dasgupta:
Optimizing the Block Cipher and Modes of Operations Overhead at the Link Layer Security Framework in the Wireless Sensor Networks. ICISS 2008: 258-272
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:15 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint