Potential use of artificial neural network in data mining S Nirkhi 2010 The 2nd International Conference on Computer and Automation Engineering …, 2010 | 53 | 2010 |
Comparative study of authorship identification techniques for cyber forensics analysis S Nirkhi, RV Dharaskar arXiv preprint arXiv:1401.6118, 2013 | 52 | 2013 |
Authorship verification of online messages for forensic investigation S Nirkhi, RV Dharaskar, VM Thakare Procedia Computer Science 78, 640-645, 2016 | 40 | 2016 |
Data mining: A prospective approach for digital forensics SM Nirkhi, RV Dharaskar, VM Thakre International Journal of Data Mining & Knowledge Management Process 2 (6), 41, 2012 | 24 | 2012 |
Analysis of online messages for identity tracing in cybercrime investigation SM Nirkhi, RV Dharaskar, VM Thakre Proceedings Title: 2012 International Conference on Cyber Security, Cyber …, 2012 | 21 | 2012 |
Feature extraction of product from customer feedback through blog SV Vinchurkar, SM Nirkhi International Journal of Emerging Technology and Advanced Engineering 2 (1 …, 2012 | 21 | 2012 |
Authorship identification using generalized features and analysis of computational method SM Nirkhi, RV Dharaskar, VM Thakare Transactions on Machine Learning and Artificial Intelligence 3 (2), 41, 2015 | 18 | 2015 |
Detecting Intrusion on AODV based Mobile Ad Hoc Networks by k-means Clustering method of Data Mining PK Karmore, SM Nirkhi International journal of computer science and information technologies 2 (4 …, 2011 | 17 | 2011 |
Visualization techniques for digital forensics: a survey S Chavhan, SM Nirkhi International journal of advanced computer research 2 (4), 74, 2012 | 13 | 2012 |
A survey paper on cross-domain sentiment analysis P Jambhulkar, S Nirkhi International Journal of Advanced research in computer and communication …, 2014 | 12 | 2014 |
Author identification for E-mail forensic SR Khan, SM Nirkhi, RV Dharaskar National Conference on Recent Trends in Computing NCRTC, 29-32, 2012 | 11 | 2012 |
E-mail data analysis for application to cyber forensic investigation using data mining SR Khan, SM Nirkhi, RV Dharaskar Proceedings of the 2nd National Conference on Innovative Paradigms in …, 2013 | 10 | 2013 |
Brain computer interface using eeg signals A Bhattacharya, DNG Bawane, SM Nirkhi GHRCE, Nagpur 17 (11), 2015 | 9 | 2015 |
A Fuzzy approach for forensic analysis of DDoS attack in manet S Ahmed, SM Nirkhi International Conference on Computer Science and Information Technology 10, 1-5, 2013 | 9 | 2013 |
A review of network forensics techniques for the analysis of web based attack S Parate, SM Nirkhi International Journal of Advanced Computer Research 2 (4), 114, 2012 | 8 | 2012 |
Comparative study of tomato crop disease detection system using deep learning techniques P Ujawe, S Nirkhi Intelligent Communication Technologies and Virtual Mobile Networks …, 2022 | 6 | 2022 |
Stylometric approach for author identification of online messages MS Nirkhi, RV Dharaskar, VM Thakre Int J Comput Sci Inf Technol 5 (5), 6158-6159, 2014 | 6 | 2014 |
A Survey on Clustering Algorithms for web Applications. S Nirkhi, K Hande SWWS, 124-129, 2008 | 6 | 2008 |
An experimental study on authorship identification for cyber forensics S Nirkhi, RV Dharaskar, VM Thakare International Journal of Computer Science And Network (IJCSN) 4 (5), 756-760, 2015 | 4 | 2015 |
E-mail Mining for Cyber Crime Investigation SR Khan, SM Nirkhi, RV Dharaskar Proceedings of International Conference on Advances in Computer and …, 2012 | 4 | 2012 |