default search action
Rajendra Patil
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j9]Amruta Shelar, Sanyukta Salve, Harshali Shende, Deepak Mehta, Manohar Chaskar, Shivraj Hariram Nile, Rajendra Patil:
Recent advances on highly sensitive plasmonic nanomaterial enabled sensors for the detection of agrotoxins: Current progress and future perspective. Comput. Electron. Agric. 227: 109545 (2024) - 2023
- [j8]Rajendra Patil, Sivaanandh Muneeswaran, Vinay Sachidananda, Mohan Gurusamy:
E-Audit: Distinguishing and investigating suspicious events for APTs attack detection. J. Syst. Archit. 144: 102988 (2023) - 2022
- [j7]Rajendra Patil, Vinay Sachidananda, Hongyi Peng, Akshay Sachdeva, Mohan Gurusamy:
MARK: Fill in the blanks through a JointGAN based data augmentation for network anomaly detection. Comput. Secur. 119: 102759 (2022) - 2021
- [j6]Ambresh P. Ambalgi, Sujata S. Kamalapurkar, P. V. Hunagund, Rajendra Patil:
Design, Modeling and Experimental Study of GHz Patch Antenna Coated with Conductive Layer of Nanomaterial for Enhanced Characteristics with Defected Ground Structure in Communication Network Applications. SN Comput. Sci. 2(3): 152 (2021) - 2020
- [j5]Rajendra Patil, Harsha Dudeja, Chirag Modi:
Designing in-VM-assisted lightweight agent-based malware detection framework for securing virtual machines in cloud computing. Int. J. Inf. Sec. 19(2): 147-162 (2020) - 2019
- [j4]Rajendra Patil, Harsha Dudeja, Chirag Modi:
Designing an efficient security framework for detecting intrusions in virtual network of cloud computing. Comput. Secur. 85: 402-422 (2019) - [j3]Rajendra Patil, Chirag Modi:
An Exhaustive Survey on Security Concerns and Solutions at Different Components of Virtualization. ACM Comput. Surv. 52(1): 12:1-12:38 (2019) - [j2]Rajendra Patil, Chirag Modi:
Designing an efficient framework for vulnerability assessment and patching (VAP) in virtual environment of cloud computing. J. Supercomput. 75(5): 2862-2889 (2019) - 2017
- [j1]Sujata Ingle, Santosh Kodgire, Asha Shiradhone, Rajendra Patil, Gajanan Zore:
Chlamydospore Specific Proteins of Candida albicans. Data 2(3): 26 (2017)
Conference and Workshop Papers
- 2023
- [c10]Vinay Sachidananda, Rajendra Patil, Akshay Sachdeva, Kwok-Yan Lam, Yang Liu:
APTer: Towards the Investigation of APT Attribution. DSC 2023: 1-10 - [c9]Tian Zixu, Rajendra Patil, Mohan Gurusamy, Joshua McCloud:
ADSeq-5GCN: Anomaly Detection from Network Traffic Sequences in 5G Core Network Control Plane. HPSR 2023: 75-82 - [c8]Rajendra Patil, Viktoria Fodor, Mathias Ekstedt:
Mean Value Analysis of Critical Attack Paths with Multiple Parameters. NordSec 2023: 126-143 - [c7]Vinay Sachidananda, Rajendra Patil, Hongyi Peng, Yang Liu, Kwok-Yan Lam:
ThreatLand: Extracting Intelligence from Audit Logs via NLP methods. PST 2023: 1-6 - 2022
- [c6]Hongyi Peng, Vinay Sachidananda, Teng Joon Lim, Rajendra Patil, Mingchang Liu, Sivaanandh Muneeswaran, Mohan Gurusamy:
ODDITY: An Ensemble Framework Leverages Contrastive Representation Learning for Superior Anomaly Detection. ICICS 2022: 417-437 - [c5]Mingchang Liu, Vinay Sachidananda, Hongyi Peng, Rajendra Patil, Sivaanandh Muneeswaran, Mohan Gurusamy:
Peekaboo: Hide and Seek with Malware Through Lightweight Multi-feature Based Lenient Hybrid Approach. ICICS 2022: 525-545 - [c4]Mingchang Liu, Vinay Sachidananda, Hongyi Peng, Rajendra Patil, Sivaanandh Muneeswaran, Mohan Gurusamy:
LOG-OFF: A Novel Behavior Based Authentication Compromise Detection Approach. PST 2022: 1-10 - [c3]Sivaanandh Muneeswaran, Vinay Sachidananda, Rajendra Patil, Hongyi Peng, Mingchang Liu, Mohan Gurusamy:
Hiatus: Unsupervised Generative Approach for Detection of DoS and DDoS Attacks. SecureComm 2022: 529-546 - 2018
- [c2]Rajendra Patil, Harsha Dudeja, Snehal Gawade, Chirag Modi:
Protocol Specific Multi-Threaded Network Intrusion Detection System (PM-NIDS) for DoS/DDoS Attack Detection in Cloud. ICCCNT 2018: 1-7 - 2016
- [c1]Rajendra Patil, Chirag Modi:
A novel approach to detect extraneous network traffic from the compromised router. RAIT 2016: 352-358
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-31 20:18 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint