B. B. Gupta

According to our database1, B. B. Gupta authored at least 48 papers between 2008 and 2018.

Collaborative distances:



In proceedings 
PhD thesis 


On csauthors.net:


Defending against phishing attacks: taxonomy of methods, current issues and future directions.
Telecommunication Systems, 2018

Security in Internet of Things: issues, challenges, taxonomy, and architecture.
Telecommunication Systems, 2018

Four-image encryption scheme based on quaternion Fresnel transform, chaos and computer generated hologram.
Multimedia Tools Appl., 2018

Color image watermarking scheme based on quaternion Hadamard transform and Schur decomposition.
Multimedia Tools Appl., 2018

A novel approach to defend multimedia flash crowd in cloud environment.
Multimedia Tools Appl., 2018

Intelligent phishing detection system using similarity matching algorithms.
IJICT, 2018

Survey on DDoS Attacks and Defense Mechanisms in Cloud and Fog Computing.
IJESMA, 2018

Taxonomy of Distributed Denial of Service (DDoS) Attacks and Defense Mechanisms in Present Era of Smartphone Devices.
IJESMA, 2018

Assessment of Honeypots: Issues, Challenges and Future Directions.
IJCAC, 2018

Cloud-assisted secure video transmission and sharing framework for smart cities.
Future Generation Comp. Syst., 2018

Recent research in computational intelligence paradigms into security and privacy for online social networks (OSNs).
Future Generation Comp. Syst., 2018

An efficient key agreement protocol for Sybil-precaution in online social networks.
Future Generation Comp. Syst., 2018

SybilTrap: A graph-based semi-supervised Sybil defense scheme for online social networks.
Concurrency and Computation: Practice and Experience, 2018

Mitigation and risk factor analysis of android applications.
Computers & Electrical Engineering, 2018

Crowdsourcing based scientific issue tracking with topic analysis.
Appl. Soft Comput., 2018

A Lightweight Authenticated Encryption Scheme Based on Chaotic SCML for Railway Cloud Service.
IEEE Access, 2018

Variable Selection and Optimization in Rapid Detection of Soybean Straw Biomass Based on CARS.
IEEE Access, 2018

Efficient Quantum Information Hiding for Remote Medical Image Sharing.
IEEE Access, 2018

Self-Adaptive Scheduling of Base Transceiver Stations in Green 5G Networks.
IEEE Access, 2018

Service Orchestration of Optimizing Continuous Features in Industrial Surveillance Using Big Data Based Fog-Enabled Internet of Things.
IEEE Access, 2018

Vulnerability Analysis for the Authentication Protocols in Trusted Computing Platforms and a Proposed Enhancement of the OffPAD Protocol.
IEEE Access, 2018

A robust anonymity preserving authentication protocol for IoT devices.
Proceedings of the IEEE International Conference on Consumer Electronics, 2018

Malware propagation effects on SCADA system and smart power grid.
Proceedings of the IEEE International Conference on Consumer Electronics, 2018

Economic incentive based solution against distributed denial of service attacks for IoT customers.
Proceedings of the IEEE International Conference on Consumer Electronics, 2018

A Dynamic Security Policies Generation Model for Access Control in Smart Card Based Applications.
Proceedings of the Cyberspace Safety and Security - 10th International Symposium, 2018

Cryptanalysis of a novel ultra-lightweight mutual authentication protocol for IoT devices using RFID tags.
The Journal of Supercomputing, 2017

Taxonomy of DoS and DDoS attacks and desirable defense mechanism in a Cloud computing environment.
Neural Computing and Applications, 2017

Secure and imperceptible digital image steganographic algorithm based on diamond encoding in DWT domain.
Multimedia Tools Appl., 2017

GARCH and ANN-based DDoS detection and filtering in cloud computing environment.
IJES, 2017

Security challenges in cloud computing: state-of-art.
IJBDI, 2017

A lightweight mutual authentication protocol based on elliptic curve cryptography for IoT devices.
IJAIP, 2017

Efficient yet robust biometric iris matching on smart cards for data high security and privacy.
Future Generation Comp. Syst., 2017

Editorial security, privacy, and forensics in the critical infrastructure: advances and future directions.
Annales des Télécommunications, 2017

A survey on smart power grid: frameworks, tools, security issues, and solutions.
Annales des Télécommunications, 2017

Guest editorial special issues on security trends in mobile cloud computing, web, and social networking.
EURASIP J. Information Security, 2016

On privacy verification in the IoT service based on PN2.
Proceedings of the IEEE 5th Global Conference on Consumer Electronics, 2016

DDoS detection and filtering technique in cloud environment using GARCH model.
Proceedings of the IEEE 4th Global Conference on Consumer Electronics, 2015

An Encapsulated Approach of Forensic Model for digital investigation.
Proceedings of the IEEE 3rd Global Conference on Consumer Electronics, 2014

Predicting Number of Zombies in a DDoS Attacks Using Isotonic Regression.
Proceedings of the Mining Social Networks and Security Informatics, 2013

A Survey of Phishing Email Filtering Techniques.
IEEE Communications Surveys and Tutorials, 2013

ANN Based Scheme to Predict Number of Zombies in a DDoS Attack.
I. J. Network Security, 2012

Predicting Number of Zombies in DDoS Attacks Using Pace Regression Model.
CIT, 2012

A Comparative Study of Distributed Denial of Service Attacks, Intrusion Tolerance and Mitigation Techniques.
Proceedings of the European Intelligence and Security Informatics Conference, 2011

SVM Based Scheme for Predicting Number of Zombies in a DDoS Attack.
Proceedings of the European Intelligence and Security Informatics Conference, 2011

On Estimating Strength of a DDoS Attack Using Polynomial Regression Model.
Proceedings of the Advances in Computing and Communications, 2011

Estimating strength of DDoS attack using various regression models.
IJMIS, 2010

Defending against Distributed Denial of Service Attacks: Issues and Challenges.
Information Security Journal: A Global Perspective, 2009

FVBA: A combined statistical approach for low rate degrading and high bandwidth disruptive DDoS attacks detection in ISP domain.
Proceedings of the 16th International Conference on Networks, 2008