Follow
Dr. Bineet Kumar Joshi
Dr. Bineet Kumar Joshi
Other namesBineet Joshi, B K Joshi
Swami Rama Himalayan University
Verified email at srhu.edu.in
Title
Cited by
Cited by
Year
Securing cloud computing environment against DDoS attacks
B Joshi, AS Vijayan, BK Joshi
2012 International Conference on Computer Communication and Informatics, 1-5, 2012
1972012
A Comparative Study of Privacy-Preserving Homomorphic Encryption Techniques in Cloud Computing
B Joshi, B Joshi, A Mishra, V Arya, A Kumar Gupta, D Peraković
International Journal of Cloud Applications and Computing 12 (1), 1-11, 2022
322022
Security issues in internet of things
LS Sayana, BK Joshi
Glob. Challenges – Role Sci. Technol. Imparting their Solut. TIT&S Bhiwani,India, 2016
202016
Security threats and their mitigation in infrastructure as a service
BK Joshi, MK Shrivastava, B Joshi
Perspectives in Science 8, 462-464, 2016
162016
Early Detection of Distributed Denial of Service Attack in Era of Software-Defined Network
BK Joshi, N Joshi, MC Joshi
2018 Eleventh International Conference on Contemporary Computing (IC3), 1-3, 2018
142018
Detection of distributed denial of service (ddos) attacks using computational intelligence and majority vote-based ensemble approach
A Mishra, BK Joshi, V Arya, AK Gupta, KT Chui
International Journal of Software Science and Computational Intelligence …, 2022
132022
Mitigating data segregation and privacy issues in cloud computing
B Joshi, B Joshi, K Rani
Proceedings of International Conference on Communication and Networks, 175-182, 2017
132017
A study of distributed denial of service attack in cloud computing (DDoS)
A Sagar, BK Joshi, N Mathur
Edition on Cloud and Distributed Computing: Advances and Applications 2, 1-7, 2013
122013
Link Analysis of Mobile Nodes in Ad Hoc Network Using Ricean Fading Channel Model
BK Joshi, N Mishra
International Journal of Mod. and Opt. 3 (1), 84-86, 2013
22013
A Road To Cloud Computing
H Dhawan, BK Joshi
National seminar on Innovations and Application in Engineering and Applied …, 2011
22011
Cloud computing Environment against DDoS Attacks
B Joshi, AS Vijayan, BK Joshi
Securing 5, 1, 2011
22011
DDoS Attack Mitigation Using Random and Flow-Based Scheme
B Joshi, B Joshi, K Rani
Data, Engineering and Applications 2, 119-128, 2019
12019
Performance analysis of mobile nodes in ad hoc network using different wireless communication channel models
BK Joshi, B Joshi
Electronics Computer Technology (ICECT), 2011 3rd International Conference …, 2011
12011
A Novel Deep Learning Based Gender Classification, Expression Recognition and Emoticon Generation
BK Joshi, B Joshi, S Kumar
2024 IEEE International Conference on Computing, Power and Communication …, 2024
2024
Comparative study of dynamic threshold based distributed denial of services attack detection techniques in software defined network
BK Joshi, MC Joshi
ADVANCES AND APPLICATIONS IN MATHEMATICAL SCIENCES 22 (5), 1013-1023, 2023
2023
COMPARISON OF BIG DATA TOOLS AND FRAMEWORKS
BK Joshi, B Joshi, L Sayana
Global Challenges – Role of Sciences & Technology in Imparting their …, 2016
2016
Security Threats and Their Mitigation in Infrastructure
BKJMK Shrivastava
2016
Analyzing Link Stability and Throughput in Ad Hoc Network for Ricean Channel by Varying Pause Time
BK Joshi, B Joshi
Proceedings of the International Congress on Information and Communication …, 2016
2016
A Comprehensive Study of Performance of Manet in Ricean Channel Model, An Analytical Approach
BK Joshi
LAP Lambert Academic Publishing, 2013
2013
Role of Probabilistic Modeling in Performance Analysis of Wireless Adhoc Networks
BK Joshi, R Agrawal
International conference on Advance in Mathematics: Historical Development …, 2007
2007
The system can't perform the operation now. Try again later.
Articles 1–20