Satish Devane

Orcid: 0000-0002-0799-4736

According to our database1, Satish Devane authored at least 15 papers between 2007 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Priority-based security-aware virtual machine allocation policy.
Int. J. Inf. Comput. Secur., 2024

2022
Network Forensic Investigation Protocol to Identify True Origin of Cyber Crime.
J. King Saud Univ. Comput. Inf. Sci., 2022

Improved Framework using Rider Optimization Algorithm for Precise Image Caption Generation.
Int. J. Image Graph., 2022

Confirmed quality aware recommendations using collaborative filtering and review analysis.
Int. J. Comput. Appl. Technol., 2022

2018
Extensive Simulation Analysis of TCP Variants for Wireless Communication.
Proceedings of the Security in Computing and Communications - 6th International Symposium, 2018

Primordial Fingerprinting Techniques from the Perspective of Digital Forensic Requirements.
Proceedings of the 9th International Conference on Computing, 2018

An Innovative Open Framework for Multilingual Translation with Ambiguity Resolution.
Proceedings of the 2018 International Conference on Advances in Computing, 2018

Recommendation Systems: Past, Present and Future.
Proceedings of the 2018 Eleventh International Conference on Contemporary Computing, 2018

QoS Enhancement using Intelligent Cluster Head Selection Routing Technique in Vehicular Ad Hoc Networks in case of RSU failure.
Proceedings of the IEEE International Conference on Advanced Networks and Telecommunications Systems, 2018

2017
Unmasking of source identity, a step beyond in cyber forensic.
Proceedings of the 10th International Conference on Security of Information and Networks, 2017

2016
Use of Proxy Signature in e-Governance.
ICTCS, 2016

2009
Verification of security properties of payment protocol using AVISPA.
Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, 2009

Secure Transaction Protocol for CEPS Compliant EPS in Limited Connectivity Environment.
Proceedings of the E-Commerce and Web Technologies, 10th International Conference, 2009

2008
Improved agent based explicit path computation algorithm for MPLS-TE.
Proceedings of the 16th International Conference on Networks, 2008

2007
Secure E-Commerce Protocol for Purchase of e-Goods - Using Smart Card.
Proceedings of the Third International Symposium on Information Assurance and Security, 2007


  Loading...