||Vaishali Latke, Thaksen Parvat & Vaibhav Narawade, “Detection and Classification of Dental Caries using Artificial Intelligence: A review. Intelligent Computing in Information Technology for Engg. System, CICITES, Chapter 36, CRC Press Taylor & Francis Group, 25-26 June 2021, ISBN 9781032270807.
||Thakur M.A., Parvat T.J., Walunj V.S. (2021) Data Security Using Directory Server in Identity and Access Management System. In: Fong S., Dey N., Joshi A. (eds) ICT Analysis and Applications. Lecture Notes in Networks and Systems, vol 154. Springer, Singapore. https://doi.org/10.1007/978-981-15-8354-4_8
|| T. J. Parvat and U. L. Kulkarni, "Analysis and Prediction of Electric Supply on Home Usage," 2018 IEEE Global Conference on Wireless Computing and Networking (GCWCN), Lonavala, India, 2018, pp. 70-74.
||T. J. Parvat, R. S. Badodekar and D. D. Badgujar, "Dynamic Simulation of Human Action Perception Through the Medium of SPREF," 2018 IEEE Global Conference on Wireless Computing and Networking (GCWCN), Lonavala, India, 2018, pp. 114-118. doi: 10.1109/GCWCN.2018.8668623
||T. J. Parvat, T.Bari and R. Badodekar, "Novel Genetic Algorithm for Association Rule Mining with Multi-Objective Extraction for Bakery Database," 2018 2nd International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), 2018 2nd International Conference on, Palladam, India, 2018, pp. 755-759.
||R. Kusat, U. Kulkarni and T. J. Parvat, "Proposed method of Pseudo intelligence implemented on home usage electric supply," 2017 International conference of Electronics, Communication and Aerospace Technology (ICECA), Coimbatore, 2017, pp. 716-720. doi: 10.1109/ICECA.2017.8203635
||S. A. Maske and T. J. Parvat, "Advanced anomaly intrusion detection technique for host based system using system call patterns," 2016 International Conference on Inventive Computation Technologies (ICICT), Coimbatore, 2016, pp. 1-4.
||Y. Danane and T. Parvat, "Intrusion detection system using fuzzy genetic algorithm," 2015 International Conference on Pervasive Computing (ICPC), Pune, 2015, pp. 1-5.
||N. N. Jagadale and T. J. Parvat, "A secured key issuing protocol for peer-to-peer network," 2014 IEEE Global Conference on Wireless Computing & Networking (GCWCN), Lonavala, 2014, pp. 213-218. doi: 10.1109/GCWCN.2014.7030881
||T. J. Parvat and P. Chandra, "Performance improvement of deep packet inspection for Intrusion Detection," 2014 IEEE Global Conference on Wireless Computing & Networking (GCWCN), Lonavala, 2014, pp. 224-228.
||Aniket G. Bombatkar and T. J. Parvat, “Efficient Method for Intrusion Detection and Classification and Compression of Data,” IEEE ICICN 2015 Pages: 1085 - 1090, DOI: 10.1109/CICN.2015.213
||Yogesh Kalmegh, Vijay Deshmukh, Trimbak Shirke and T. J. Parvat, “Smart Web Crawler: A Survey,” International Conference MULTICON-W 2016, 978-0-9884925-6-1, 2015.
||Preeti Sharma and T. J. Parvat, “A Heuristic Approach for Network Data Clustering”, International Conference CIIT-2013, Springer Publication. 2013
||Preeti Sharma and T. J. Parvat, “Network Log Clustering Using K-means Algorithm,” LNEE Springer, 978-1-4614-3362-0. 2012
||T.J. Parvat, Yogesh Singh, Pravin Chandra, “Network Analyzers and Device Management”, International Conference on Computer Networks and Security, VIT Pune, pp 238-240. ICCNS 2008
||T. J. Parvat and D. B. Kulkarni, “ Network Security Analysis,” International Conference CSIP-2006.