{"id":24114,"date":"2026-01-04T06:46:07","date_gmt":"2026-01-04T06:46:07","guid":{"rendered":"https:\/\/gist.edu.in\/gist\/?page_id=24114"},"modified":"2026-01-04T06:46:07","modified_gmt":"2026-01-04T06:46:07","slug":"cse-apeksha","status":"publish","type":"page","link":"https:\/\/gist.edu.in\/gist\/cse-apeksha\/","title":{"rendered":"cse-Apeksha"},"content":{"rendered":"<h2 style=\"text-align: center;\"><span style=\"color: #ff6600;\">Profile<\/span><\/h2>\n<div style=\"overflow-x: auto;\">\n<table align=\"center\">\n<tbody>\n<tr>\n<td width=\"103\">Name of the Faculty<\/td>\n<td width=\"896\">Ms. Apeksha Bhimrao Dhakde<\/td>\n<\/tr>\n<tr>\n<td width=\"103\">Photo<\/td>\n<td width=\"896\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-24037 size-thumbnail alignleft\" src=\"https:\/\/gist.edu.in\/gist\/wp-content\/uploads\/2026\/01\/26.Apeksha-150x150.png\" alt=\"\" width=\"150\" height=\"150\" \/><\/td>\n<\/tr>\n<tr>\n<td width=\"103\">Designation<\/td>\n<td width=\"896\">Assistant Professor<\/td>\n<\/tr>\n<tr>\n<td width=\"103\">Department<\/td>\n<td width=\"896\">CSE<\/td>\n<\/tr>\n<tr>\n<td width=\"103\">Experience<\/td>\n<td width=\"896\">10 Years<\/td>\n<\/tr>\n<tr>\n<td width=\"103\">Educational Details<\/td>\n<td width=\"896\">University Name \/ Graduated Year<\/p>\n<p>M.Tech\u00a0\u00a0\u00a0 \u00a0:Rashtrasant Tukadoji Maharaj Nagpur University(RTMNU)\/2014<\/p>\n<p>B.E(CSE) : Rashtrasant Tukadoji Maharaj Nagpur University(RTMNU)\/2009<\/td>\n<\/tr>\n<tr>\n<td width=\"103\">Research Details<\/td>\n<td width=\"896\">Areas of Specialization: Distributed Detection Methods for Network Attacks<\/p>\n<p>Paste Links :<\/p>\n<p>1<span style=\"color: #0000ff;\">.<a style=\"color: #0000ff;\" href=\"https:\/\/www.researchgate.net\/publication\/286583267_Survey_on_distributed_detection_mechanism_for_Byzantine_attack_in_tree-based_topology\" target=\"_blank\" rel=\"noopener\">https:\/\/www.researchgate.net\/publication\/286583267_Survey_on_distributed_detection_mechanism_for_Byzantine_attack_in_tree-based_topology<\/a><\/span><\/p>\n<p>2. <span style=\"color: #0000ff;\"><a style=\"color: #0000ff;\" href=\"https:\/\/research.ijcaonline.org\/volume90\/number18\/pxc3894238.pdf\" target=\"_blank\" rel=\"noopener\">https:\/\/research.ijcaonline.org\/volume90\/number18\/pxc3894238.pdf<\/a><\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"103\">Patents Published\/<\/p>\n<p>Granted<\/td>\n<td width=\"896\">1) Survey on Distributed Detection Mechanism for Byzantine attack in Tree-Based Topology;<\/p>\n<p>\u201cIEEE sponsored 3rd International Conference on Computing of Power, Energy &amp;<\/p>\n<p>Communication\u201d ICCPEIC -2014 (ISBN: 978-1-4799-3826-1\/14\/$31.00\u00a92014 IEEE).<\/p>\n<p>2) Distributed Detection Methods for Byzantine Attack in Tree Topology;<\/p>\n<p>International Journal of Computer Applications \u201cIJCA\u201dMarch2014(ISBN<strong>: <\/strong>973-93-80880-88-3).<\/td>\n<\/tr>\n<tr>\n<td width=\"103\">Professional Membership<\/td>\n<td width=\"896\">&#8212;<\/td>\n<\/tr>\n<tr>\n<td width=\"103\">Any Other Information<\/td>\n<td width=\"896\">1. Certificate of Workshop on Artificial Intelligence at IIT, Farmagudi,Ponda, Goa.<\/p>\n<p>2. Certificate of STTP on cloud computing and big data analytics, KJSIEIT, Sion, Mumbai<\/p>\n<p>3.Certificate of Training completion\u00a0 from Faculty Development progam on digital Marketing,<\/p>\n<p>Gen-AI-RAG (Retrievel-Augmented Generation), Augumented reality\/Virtual Reality in collaboration with ExcelR Edtech Pvt Ltd<\/p>\n<p>4.Advanced Certification in Microsoft Excel.<\/p>\n<p>5.Microsoft SQL Certification Training from Intellipaat.<\/p>\n<p>6.Certificate of Completion on Python Certificate Courses from Intellipaat.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Profile Name of the Faculty Ms. Apeksha Bhimrao Dhakde Photo Designation Assistant Professor Department CSE Experience 10 Years Educational Details University Name \/ Graduated Year M.Tech\u00a0\u00a0\u00a0 \u00a0:Rashtrasant Tukadoji Maharaj Nagpur University(RTMNU)\/2014 B.E(CSE) : Rashtrasant Tukadoji Maharaj Nagpur University(RTMNU)\/2009 Research Details Areas of Specialization: Distributed Detection Methods for Network Attacks Paste Links : 1.https:\/\/www.researchgate.net\/publication\/286583267_Survey_on_distributed_detection_mechanism_for_Byzantine_attack_in_tree-based_topology 2. https:\/\/research.ijcaonline.org\/volume90\/number18\/pxc3894238.pdf [&hellip;]<\/p>\n","protected":false},"author":10,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-24114","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/gist.edu.in\/gist\/wp-json\/wp\/v2\/pages\/24114","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gist.edu.in\/gist\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/gist.edu.in\/gist\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/gist.edu.in\/gist\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/gist.edu.in\/gist\/wp-json\/wp\/v2\/comments?post=24114"}],"version-history":[{"count":1,"href":"https:\/\/gist.edu.in\/gist\/wp-json\/wp\/v2\/pages\/24114\/revisions"}],"predecessor-version":[{"id":24115,"href":"https:\/\/gist.edu.in\/gist\/wp-json\/wp\/v2\/pages\/24114\/revisions\/24115"}],"wp:attachment":[{"href":"https:\/\/gist.edu.in\/gist\/wp-json\/wp\/v2\/media?parent=24114"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}