B. B. Gupta

According to our database1, B. B. Gupta
  • authored at least 48 papers between 2008 and 2018.
  • has a "Dijkstra number"2 of four.



In proceedings 
PhD thesis 


On csauthors.net:


Defending against phishing attacks: taxonomy of methods, current issues and future directions.
Telecommunication Systems, 2018

Security in Internet of Things: issues, challenges, taxonomy, and architecture.
Telecommunication Systems, 2018

Four-image encryption scheme based on quaternion Fresnel transform, chaos and computer generated hologram.
Multimedia Tools Appl., 2018

Color image watermarking scheme based on quaternion Hadamard transform and Schur decomposition.
Multimedia Tools Appl., 2018

A novel approach to defend multimedia flash crowd in cloud environment.
Multimedia Tools Appl., 2018

Intelligent phishing detection system using similarity matching algorithms.
IJICT, 2018

Assessment of Honeypots: Issues, Challenges and Future Directions.
IJCAC, 2018

Cloud-assisted secure video transmission and sharing framework for smart cities.
Future Generation Comp. Syst., 2018

SybilTrap: A graph-based semi-supervised Sybil defense scheme for online social networks.
Concurrency and Computation: Practice and Experience, 2018

Crowdsourcing based scientific issue tracking with topic analysis.
Appl. Soft Comput., 2018

A Lightweight Authenticated Encryption Scheme Based on Chaotic SCML for Railway Cloud Service.
IEEE Access, 2018

Variable Selection and Optimization in Rapid Detection of Soybean Straw Biomass Based on CARS.
IEEE Access, 2018

Self-Adaptive Scheduling of Base Transceiver Stations in Green 5G Networks.
IEEE Access, 2018

Vulnerability Analysis for the Authentication Protocols in Trusted Computing Platforms and a Proposed Enhancement of the OffPAD Protocol.
IEEE Access, 2018

Cryptanalysis of a novel ultra-lightweight mutual authentication protocol for IoT devices using RFID tags.
The Journal of Supercomputing, 2017

Taxonomy of DoS and DDoS attacks and desirable defense mechanism in a Cloud computing environment.
Neural Computing and Applications, 2017

Secure and imperceptible digital image steganographic algorithm based on diamond encoding in DWT domain.
Multimedia Tools Appl., 2017

GARCH and ANN-based DDoS detection and filtering in cloud computing environment.
IJES, 2017

Security challenges in cloud computing: state-of-art.
IJBDI, 2017

A lightweight mutual authentication protocol based on elliptic curve cryptography for IoT devices.
IJAIP, 2017

Efficient yet robust biometric iris matching on smart cards for data high security and privacy.
Future Generation Comp. Syst., 2017

Security Strength Indicator in Fallback Authentication: Nudging Users for Better Answers in Secret Questions.
CoRR, 2017

Defending against Phishing Attacks: Taxonomy of Methods, Current Issues and Future Directions.
CoRR, 2017

Editorial security, privacy, and forensics in the critical infrastructure: advances and future directions.
Annales des Télécommunications, 2017

A survey on smart power grid: frameworks, tools, security issues, and solutions.
Annales des Télécommunications, 2017

Guest editorial special issues on security trends in mobile cloud computing, web, and social networking.
EURASIP J. Information Security, 2016

On privacy verification in the IoT service based on PN2.
Proceedings of the IEEE 5th Global Conference on Consumer Electronics, 2016

XSS detection with automatic view isolation on online social network.
Proceedings of the IEEE 5th Global Conference on Consumer Electronics, 2016

DDoS detection and filtering technique in cloud environment using GARCH model.
Proceedings of the IEEE 4th Global Conference on Consumer Electronics, 2015

An Encapsulated Approach of Forensic Model for digital investigation.
Proceedings of the IEEE 3rd Global Conference on Consumer Electronics, 2014

Predicting Number of Zombies in a DDoS Attacks Using Isotonic Regression.
Proceedings of the Mining Social Networks and Security Informatics, 2013

Enhanced CBF Packet Filtering Method to Detect DDoS Attack in Cloud Computing Environment
CoRR, 2013

Phishing Dynamic Evolving Neural Fuzzy Framework for Online Detection Zero-day Phishing Email
CoRR, 2013

A Survey of Phishing Email Filtering Techniques.
IEEE Communications Surveys and Tutorials, 2013

ANN Based Scheme to Predict Number of Zombies in a DDoS Attack.
I. J. Network Security, 2012

Distributed Denial of Service Prevention Techniques
CoRR, 2012

Botnet-based Distributed Denial of Service (DDoS) Attacks on Web Servers: Classification and Art
CoRR, 2012

Dynamic and Auto Responsive Solution for Distributed Denial-of-Service Attacks Detection in ISP Network
CoRR, 2012

An Efficient Analytical Solution to Thwart DDoS Attacks in Public Domain
CoRR, 2012

An ISP Level Solution to Combat DDoS Attacks using Combined Statistical Based Approach
CoRR, 2012

Estimating strength of DDoS attack using various regression models
CoRR, 2012

Predicting Number of Zombies in DDoS Attacks Using Pace Regression Model.
CIT, 2012

A Comparative Study of Distributed Denial of Service Attacks, Intrusion Tolerance and Mitigation Techniques.
Proceedings of the European Intelligence and Security Informatics Conference, 2011

SVM Based Scheme for Predicting Number of Zombies in a DDoS Attack.
Proceedings of the European Intelligence and Security Informatics Conference, 2011

On Estimating Strength of a DDoS Attack Using Polynomial Regression Model.
Proceedings of the Advances in Computing and Communications, 2011

Estimating strength of DDoS attack using various regression models.
IJMIS, 2010

Defending against Distributed Denial of Service Attacks: Issues and Challenges.
Information Security Journal: A Global Perspective, 2009

FVBA: A combined statistical approach for low rate degrading and high bandwidth disruptive DDoS attacks detection in ISP domain.
Proceedings of the 16th International Conference on Networks, 2008