Securing cloud computing environment against DDoS attacks B Joshi, AS Vijayan, BK Joshi 2012 International Conference on Computer Communication and Informatics, 1-5, 2012 | 198 | 2012 |
A Comparative Study of Privacy-Preserving Homomorphic Encryption Techniques in Cloud Computing B Joshi, B Joshi, A Mishra, V Arya, A Kumar Gupta, D Peraković International Journal of Cloud Applications and Computing 12 (1), 1-11, 2022 | 33 | 2022 |
Security issues in internet of things LS Sayana, BK Joshi Glob. Challenges – Role Sci. Technol. Imparting their Solut. TIT&S Bhiwani,India, 2016 | 20 | 2016 |
Security threats and their mitigation in infrastructure as a service BK Joshi, MK Shrivastava, B Joshi Perspectives in Science 8, 462-464, 2016 | 16 | 2016 |
Detection of distributed denial of service (ddos) attacks using computational intelligence and majority vote-based ensemble approach A Mishra, BK Joshi, V Arya, AK Gupta, KT Chui International Journal of Software Science and Computational Intelligence …, 2022 | 14 | 2022 |
Early Detection of Distributed Denial of Service Attack in Era of Software-Defined Network BK Joshi, N Joshi, MC Joshi 2018 Eleventh International Conference on Contemporary Computing (IC3), 1-3, 2018 | 14 | 2018 |
Mitigating data segregation and privacy issues in cloud computing B Joshi, B Joshi, K Rani Proceedings of International Conference on Communication and Networks, 175-182, 2017 | 13 | 2017 |
A study of distributed denial of service attack in cloud computing (DDoS) A Sagar, BK Joshi, N Mathur Edition on Cloud and Distributed Computing: Advances and Applications 2, 1-7, 2013 | 12 | 2013 |
Link Analysis of Mobile Nodes in Ad Hoc Network Using Ricean Fading Channel Model BK Joshi, N Mishra International Journal of Mod. and Opt. 3 (1), 84-86, 2013 | 2 | 2013 |
A Road To Cloud Computing H Dhawan, BK Joshi National seminar on Innovations and Application in Engineering and Applied …, 2011 | 2 | 2011 |
Cloud computing Environment against DDoS Attacks B Joshi, AS Vijayan, BK Joshi Securing 5, 1, 2011 | 2 | 2011 |
DDoS Attack Mitigation Using Random and Flow-Based Scheme B Joshi, B Joshi, K Rani Data, Engineering and Applications 2, 119-128, 2019 | 1 | 2019 |
Performance analysis of mobile nodes in ad hoc network using different wireless communication channel models BK Joshi, B Joshi Electronics Computer Technology (ICECT), 2011 3rd International Conference …, 2011 | 1 | 2011 |
A Novel Deep Learning Based Gender Classification, Expression Recognition and Emoticon Generation BK Joshi, B Joshi, S Kumar 2024 IEEE International Conference on Computing, Power and Communication …, 2024 | | 2024 |
Comparative study of dynamic threshold based distributed denial of services attack detection techniques in software defined network BK Joshi, MC Joshi ADVANCES AND APPLICATIONS IN MATHEMATICAL SCIENCES 22 (5), 1013-1023, 2023 | | 2023 |
COMPARISON OF BIG DATA TOOLS AND FRAMEWORKS BK Joshi, B Joshi, L Sayana Global Challenges – Role of Sciences & Technology in Imparting their …, 2016 | | 2016 |
Security Threats and Their Mitigation in Infrastructure BKJMK Shrivastava | | 2016 |
Analyzing Link Stability and Throughput in Ad Hoc Network for Ricean Channel by Varying Pause Time BK Joshi, B Joshi Proceedings of the International Congress on Information and Communication …, 2016 | | 2016 |
A Comprehensive Study of Performance of Manet in Ricean Channel Model, An Analytical Approach BK Joshi LAP Lambert Academic Publishing, 2013 | | 2013 |
Role of Probabilistic Modeling in Performance Analysis of Wireless Adhoc Networks BK Joshi, R Agrawal International conference on Advance in Mathematics: Historical Development …, 2007 | | 2007 |