Narendra M. Shekokar

Orcid: 0000-0002-2507-4140

According to our database1, Narendra M. Shekokar authored at least 14 papers between 2010 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
TheraGen: Therapy for Every Generation.
CoRR, 2024

2023
A comprehensive dual-layer architecture for phishing and spam email detection.
Comput. Secur., October, 2023

Audio Based Facial Expression Generation On Ar Applications.
Proceedings of the 14th International Conference on Computing Communication and Networking Technologies, 2023

Analysis of Dataset balancing Techniques for Phishing Dataset.
Proceedings of the 14th International Conference on Computing Communication and Networking Technologies, 2023

An Innovative Model For Soil Testing With Intelligent Crop Recommendation System.
Proceedings of the 14th International Conference on Computing Communication and Networking Technologies, 2023

Identifying the Optimal Deep Learning Based Image Recognition Technique for Dog Breed Detection.
Proceedings of the 14th International Conference on Computing Communication and Networking Technologies, 2023

2020
Design of Machine Learning and Rule Based Access Control System with Respect to Adaptability and Genuineness of the Requester.
EAI Endorsed Trans. Pervasive Health Technol., 2020

2019
An Architecture for Analysis of Mobile Botnet Detection Using Machine Learning.
Proceedings of the Advances in Computing and Data Sciences, 2019

2018
Lightweight Cipher Using GRP Bit Permutation and Tweak.
Proceedings of the Intelligent Systems Design and Applications, 2018

2017
Cued click authentication.
Proceedings of the Fourteenth International Conference on Wireless and Optical Communications Networks, 2017

Lightweight Secure RPL: A Need in IoT.
Proceedings of the 2017 International Conference on Information Technology, 2017

2016
A Solution to Detect Phishing in Android Devices.
Proceedings of the Information Systems Security - 12th International Conference, 2016

2015
At a Glance of Sybil Detection in OSN.
Proceedings of the IEEE International Symposium on Nanoelectronic and Information Systems, 2015

2010
Virtual Keyboard Using Shadow Analysis.
Proceedings of the 3rd International Conference on Emerging Trends in Engineering and Technology, 2010


  Loading...