Brij Gupta

According to our database1, Brij Gupta authored at least 169 papers between 2008 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2020
Deep Learning Based Multi-Channel Intelligent Attack Detection for Data Security.
IEEE Trans. Sustain. Comput., 2020

Visual saliency guided complex image retrieval.
Pattern Recognit. Lett., 2020

Parallel implementation for 3D medical volume fuzzy segmentation.
Pattern Recognit. Lett., 2020

Phishing Attack Detection using a Search Engine and Heuristics-based Technique.
J. Inf. Technol. Res., 2020

Taxonomy of Payment Structures and Economic Incentive Schemes in Internet.
J. Inf. Technol. Res., 2020

Fake profile detection in multimedia big data on online social networks.
IJICS, 2020

Nested context-aware sanitisation and feature injection in clustered templates of JavaScript worms on the cloud-based OSN.
IJICS, 2020

Decentralised control-based interaction framework for secure data transmission in internet of automated vehicles.
IJES, 2020

An internet-of-things-based security scheme for healthcare environment for robust location privacy.
IJCSE, 2020

A crowdsourcing method for online social networks security assessment based on human-centric computing.
HCIS, 2020

Security, privacy and trust of different layers in Internet-of-Things (IoTs) framework.
Future Gener. Comput. Syst., 2020

Live forensics of software attacks on cyber-physical systems.
Future Gener. Comput. Syst., 2020

Classification of spammer and nonspammer content in online social network using genetic algorithm-based feature selection.
Enterprise IS, 2020

Cloud-based Federated Boosting for Mobile Crowdsensing.
CoRR, 2020

Multi attribute auction based incentivized solution against DDoS attacks.
Comput. Secur., 2020

An Analysis of Provable Security Frameworks for RFID Security.
Proceedings of the Handbook of Computer Networks and Cyber Security, 2020

Secure Machine Learning Scenario from Big Data in Cloud Computing via Internet of Things Network.
Proceedings of the Handbook of Computer Networks and Cyber Security, 2020

Cooperative Mechanisms for Defending Distributed Denial of Service (DDoS) Attacks.
Proceedings of the Handbook of Computer Networks and Cyber Security, 2020

2019
Advanced Media-Based Smart Big Data on Intelligent Cloud Systems.
IEEE Trans. Sustain. Comput., 2019

Soft Computing-Based EEG Classification by Optimal Feature Selection and Neural Networks.
IEEE Trans. Ind. Informatics, 2019

A novel coverless information hiding method based on the average pixel value of the sub-images.
Multim. Tools Appl., 2019

Medical image resolution enhancement for healthcare using nonlocal self-similarity and low-rank prior.
Multim. Tools Appl., 2019

Improving the performance of the needleman-wunsch algorithm using parallelization and vectorization techniques.
Multim. Tools Appl., 2019

Network flow analysis for detection and mitigation of Fraudulent Resource Consumption (FRC) attacks in multimedia cloud computing.
Multim. Tools Appl., 2019

Impact of digital fingerprint image quality on the fingerprint recognition accuracy.
Multim. Tools Appl., 2019

Multi-orientation geometric medical volumes segmentation using 3D multiresolution analysis.
Multim. Tools Appl., 2019

An efficient employment of internet of multimedia things in smart and future agriculture.
Multim. Tools Appl., 2019

Collaboration networks of arab biomedical researchers.
Multim. Tools Appl., 2019

An Identity-Based Signcryption on Lattice without Trapdoor.
J. UCS, 2019

Feature Based Approach for Detection of Smishing Messages in the Mobile Environment.
J. Inf. Technol. Res., 2019

ISEkFT: An IBE-Based Searchable Encryption Scheme With k-Keyword Fuzzy Search Trapdoor.
J. Inf. Technol. Res., 2019

A machine learning based approach for phishing detection using hyperlinks information.
J. Ambient Intell. Humaniz. Comput., 2019

Evaluation and monitoring of XSS defensive solutions: a survey, open research issues and future directions.
J. Ambient Intell. Humaniz. Comput., 2019

Deep learning models for human centered computing in fog and mobile edge networks.
J. Ambient Intell. Humaniz. Comput., 2019

Distributed denial of service (DDoS) attack mitigation in software defined network (SDN)-based cloud computing environment.
J. Ambient Intell. Humaniz. Comput., 2019

Efficient fingerprint matching on smart cards for high security and privacy in smart systems.
Inf. Sci., 2019

A novel CNN based security guaranteed image watermarking generation scenario for smart city applications.
Inf. Sci., 2019

Compressive Sensing of Medical Images With Confidentially Homomorphic Aggregations.
IEEE Internet Things J., 2019

A Framework for Preserving the Privacy of Online Users Against XSS Worms on Online Social Network.
IJITWE, 2019

A novel ECC-based lightweight authentication protocol for internet of things devices.
IJHPCN, 2019

Towards Privacy Risk Analysis in Android Applications Using Machine Learning Approaches.
IJESMA, 2019

Dynamic Policy Attribute Based Encryption and its Application in Generic Construction of Multi-Keyword Search.
IJESMA, 2019

Classification of various attacks and their defence mechanism in online social networks: a survey.
Enterprise IS, 2019

A client-server JavaScript code rewriting-based framework to detect the XSS worms from online social network.
Concurr. Comput. Pract. Exp., 2019

An optimized service broker routing policy based on differential evolution algorithm in fog/cloud environment.
Cluster Computing, 2019

Hybrid approach for detection of malicious profiles in twitter.
Comput. Electr. Eng., 2019

Improving fuzzy C-mean-based community detection in social networks using dynamic parallelism.
Comput. Electr. Eng., 2019

IEEE Access Special Section Editorial: Recent Advances in Computational Intelligence Paradigms for Security and Privacy for Fog and Mobile Edge Computing.
IEEE Access, 2019

MQTT-driven Remote Temperature Monitoring System for IoT-based Smart Homes.
Proceedings of the IEEE 8th Global Conference on Consumer Electronics, 2019

Secure Fine-Grained Multi-Keyword Search with Protection from Key Abusers in the Cloud.
Proceedings of the IEEE 8th Global Conference on Consumer Electronics, 2019

PBNM and Economic Incentive Based Framework for Protection Against DDoS Attacks.
Proceedings of the IEEE 8th Global Conference on Consumer Electronics, 2019

DDoS Detection Framework in Resource Constrained Internet of Things Domain.
Proceedings of the IEEE 8th Global Conference on Consumer Electronics, 2019

2018
Recent Advances in Mobile Cloud Computing.
Wireless Communications and Mobile Computing, 2018

Guest Editorial Deep Learning Models for Industry Informatics.
IEEE Trans. Ind. Informatics, 2018

Towards detection of phishing websites on client-side using machine learning based approach.
Telecommunication Systems, 2018

Defending against phishing attacks: taxonomy of methods, current issues and future directions.
Telecommunication Systems, 2018

Security in Internet of Things: issues, challenges, taxonomy, and architecture.
Telecommunication Systems, 2018

Security, privacy & efficiency of sustainable Cloud Computing for Big Data & IoT.
Sustain. Comput. Informatics Syst., 2018

Introduction to special issue on recent advances on sustainability for green cloud and fog computing.
Sustain. Comput. Informatics Syst., 2018

Advances in applying soft computing techniques for big data and cloud computing.
Soft Comput., 2018

Four-image encryption scheme based on quaternion Fresnel transform, chaos and computer generated hologram.
Multim. Tools Appl., 2018

Collusion attacks mitigation in internet of things: a fog based model.
Multim. Tools Appl., 2018

Visual data mining for crowd anomaly detection using artificial bacteria colony.
Multim. Tools Appl., 2018

Color image watermarking scheme based on quaternion Hadamard transform and Schur decomposition.
Multim. Tools Appl., 2018

Guest Editorial: Recent Advances on Security and Privacy of Multimedia Big Data in the Critical Infrastructure.
Multim. Tools Appl., 2018

Advances in Security and Privacy of Multimedia Big Data in Mobile and Cloud Computing.
Multim. Tools Appl., 2018

XSS-secure as a service for the platforms of online social network-based multimedia web applications in cloud.
Multim. Tools Appl., 2018

A novel approach to defend multimedia flash crowd in cloud environment.
Multim. Tools Appl., 2018

Accelerating 3D medical volume segmentation using GPUs.
Multim. Tools Appl., 2018

Socially-conforming cooperative computation in cloud networks.
J. Parallel Distributed Comput., 2018

The convergence of new computing paradigms and big data analytics methodologies for online social networks.
J. Comput. Sci., 2018

Big data driven outlier detection for soybean straw near infrared spectroscopy.
J. Comput. Sci., 2018

Deep Recurrent neural network vs. support vector machine for aspect-based sentiment analysis of Arabic hotels' reviews.
J. Comput. Sci., 2018

Deep learning for Arabic NLP: A survey.
J. Comput. Sci., 2018

Two-level authentication approach to protect from phishing attacks in real time.
J. Ambient Intell. Humaniz. Comput., 2018

Plague of cross-site scripting on web applications: a review, taxonomy and challenges.
IJWBC, 2018

A lightweight mutual authentication approach for RFID tags in IoT devices.
Int. J. Netw. Virtual Organisations, 2018

Intelligent phishing detection system using similarity matching algorithms.
IJICT, 2018

Detection of phishing attacks in financial and e-banking websites using link and visual similarity relation.
IJICS, 2018

Robust injection point-based framework for modern applications against XSS vulnerabilities in online social networks.
IJICS, 2018

Survey on DDoS Attacks and Defense Mechanisms in Cloud and Fog Computing.
IJESMA, 2018

Taxonomy of Distributed Denial of Service (DDoS) Attacks and Defense Mechanisms in Present Era of Smartphone Devices.
IJESMA, 2018

Petri net-based verification of security protocol implementation in software evolution.
IJES, 2018

Assessment of Honeypots: Issues, Challenges and Future Directions.
Int. J. Cloud Appl. Comput., 2018

Social media security and trustworthiness: Overview and new direction.
Future Gener. Comput. Syst., 2018

Flexible data access control in D2D communications.
Future Gener. Comput. Syst., 2018

Secure integration of IoT and Cloud Computing.
Future Gener. Comput. Syst., 2018

Efficient IoT-based sensor BIG Data collection-processing and analysis in smart buildings.
Future Gener. Comput. Syst., 2018

An Efficient Algorithm for Media-based Surveillance System (EAMSuS) in IoT Smart City Framework.
Future Gener. Comput. Syst., 2018

Cloud-assisted secure video transmission and sharing framework for smart cities.
Future Gener. Comput. Syst., 2018

Recent research in computational intelligence paradigms into security and privacy for online social networks (OSNs).
Future Gener. Comput. Syst., 2018

Hunting for DOM-Based XSS vulnerabilities in mobile cloud-based online social network.
Future Gener. Comput. Syst., 2018

An efficient key agreement protocol for Sybil-precaution in online social networks.
Future Gener. Comput. Syst., 2018

Recent advances in fog and mobile edge computing.
Trans. Emerg. Telecommun. Technol., 2018

SybilTrap: A graph-based semi-supervised Sybil defense scheme for online social networks.
Concurr. Comput. Pract. Exp., 2018

Edge Computing with Cloud for Voice Disorder Assessment and Treatment.
IEEE Communications Magazine, 2018

Medical Image Forgery Detection for Smart Healthcare.
IEEE Communications Magazine, 2018

Mitigation and risk factor analysis of android applications.
Comput. Electr. Eng., 2018

Crowdsourcing based scientific issue tracking with topic analysis.
Appl. Soft Comput., 2018

Studying the controversy in online crowds' interactions.
Appl. Soft Comput., 2018

A Lightweight Authenticated Encryption Scheme Based on Chaotic SCML for Railway Cloud Service.
IEEE Access, 2018

Efficient Compressed Ciphertext Length Scheme Using Multi-Authority CP-ABE for Hierarchical Attributes.
IEEE Access, 2018

A Practical Public Key Encryption Scheme Based on Learning Parity With Noise.
IEEE Access, 2018

A Study on the Collusion Security of LUT-Based Client-Side Watermark Embedding.
IEEE Access, 2018

Variable Selection and Optimization in Rapid Detection of Soybean Straw Biomass Based on CARS.
IEEE Access, 2018

Cognitive Privacy Middleware for Deep Learning Mashup in Environmental IoT.
IEEE Access, 2018

Efficient Quantum Information Hiding for Remote Medical Image Sharing.
IEEE Access, 2018

Self-Adaptive Scheduling of Base Transceiver Stations in Green 5G Networks.
IEEE Access, 2018

Service Orchestration of Optimizing Continuous Features in Industrial Surveillance Using Big Data Based Fog-Enabled Internet of Things.
IEEE Access, 2018

Evaluation Models for the Nearest Closer Routing Protocol in Wireless Sensor Networks.
IEEE Access, 2018

Vulnerability Analysis for the Authentication Protocols in Trusted Computing Platforms and a Proposed Enhancement of the OffPAD Protocol.
IEEE Access, 2018

Security and privacy of big data for social networking services in cloud.
Proceedings of the IEEE INFOCOM 2018, 2018

A robust anonymity preserving authentication protocol for IoT devices.
Proceedings of the IEEE International Conference on Consumer Electronics, 2018

Malware propagation effects on SCADA system and smart power grid.
Proceedings of the IEEE International Conference on Consumer Electronics, 2018

Economic incentive based solution against distributed denial of service attacks for IoT customers.
Proceedings of the IEEE International Conference on Consumer Electronics, 2018

A Dynamic Security Policies Generation Model for Access Control in Smart Card Based Applications.
Proceedings of the Cyberspace Safety and Security - 10th International Symposium, 2018

2017
Cryptanalysis of a novel ultra-lightweight mutual authentication protocol for IoT devices using RFID tags.
J. Supercomput., 2017

Internet of surveillance: a cloud supported large-scale wireless surveillance system.
J. Supercomput., 2017

Phishing Detection: Analysis of Visual Similarity Based Approaches.
Security and Communication Networks, 2017

Cross-Site Scripting (XSS) attacks and defense mechanisms: classification and state-of-the-art.
Int. J. Syst. Assur. Eng. Manag., 2017

Fighting against phishing attacks: state of the art and future challenges.
Neural Computing and Applications, 2017

Taxonomy of DoS and DDoS attacks and desirable defense mechanism in a Cloud computing environment.
Neural Computing and Applications, 2017

CyVOD: a novel trinity multimedia social network scheme.
Multim. Tools Appl., 2017

Secure and imperceptible digital image steganographic algorithm based on diamond encoding in DWT domain.
Multim. Tools Appl., 2017

Accelerating compute intensive medical imaging segmentation algorithms using hybrid CPU-GPU implementations.
Multim. Tools Appl., 2017

Smart XSS Attack Surveillance System for OSN in Virtualized Intelligence Network of Nodes of Fog Computing.
Int. J. Web Serv. Res., 2017

Automated wireless video surveillance: an evaluation framework.
J. Real Time Image Process., 2017

GARCH and ANN-based DDoS detection and filtering in cloud computing environment.
IJES, 2017

Enhancing the Browser-Side Context-Aware Sanitization of Suspicious HTML5 Code for Halting the DOM-Based XSS Vulnerabilities in Cloud.
Int. J. Cloud Appl. Comput., 2017

Detection, Avoidance, and Attack Pattern Mechanisms in Modern Web Application Vulnerabilities: Present and Future Challenges.
Int. J. Cloud Appl. Comput., 2017

Security challenges in cloud computing: state-of-art.
Int. J. Big Data Intell., 2017

A lightweight mutual authentication protocol based on elliptic curve cryptography for IoT devices.
Int. J. Adv. Intell. Paradigms, 2017

Efficient yet robust biometric iris matching on smart cards for data high security and privacy.
Future Gener. Comput. Syst., 2017

Security Strength Indicator in Fallback Authentication: Nudging Users for Better Answers in Secret Questions.
CoRR, 2017

Software-Defined System Support for Enabling Ubiquitous Mobile Edge Computing.
Comput. J., 2017

Editorial security, privacy, and forensics in the critical infrastructure: advances and future directions.
Ann. des Télécommunications, 2017

A survey on smart power grid: frameworks, tools, security issues, and solutions.
Ann. des Télécommunications, 2017

A Comparative Evaluation of Atrial Fibrillation Detection Methods in Koreans Based on Optical Recordings Using a Smartphone.
IEEE Access, 2017

Efficient Large-scale Medical Data (eHealth Big Data) Analytics in Internet of Things.
Proceedings of the 19th IEEE Conference on Business Informatics, 2017

Risk transfer mechanism to defend DDoS attacks in IoT scenario.
Proceedings of the IEEE International Symposium on Consumer Electronics, 2017

Solutions for inter-connectivity and security in a smart hospital building.
Proceedings of the 15th IEEE International Conference on Industrial Informatics, 2017

2016
XSS-immune: a Google chrome extension-based XSS defensive framework for contemporary platforms of web applications.
Security and Communication Networks, 2016

JS-SAN: defense mechanism for HTML5-based web applications against javascript code injection vulnerabilities.
Security and Communication Networks, 2016

A novel approach to protect against phishing attacks at client side using auto-updated white-list.
EURASIP J. Inf. Secur., 2016

Guest editorial special issues on security trends in mobile cloud computing, web, and social networking.
EURASIP J. Inf. Secur., 2016

An Infrastructure-Based Framework for the Alleviation of JavaScript Worms from OSN in Mobile Cloud Platforms.
Proceedings of the Network and System Security - 10th International Conference, 2016

On privacy verification in the IoT service based on PN2.
Proceedings of the IEEE 5th Global Conference on Consumer Electronics, 2016

XSS detection with automatic view isolation on online social network.
Proceedings of the IEEE 5th Global Conference on Consumer Electronics, 2016

2015
A Petri net-based framework of intrusion detection systems.
Proceedings of the IEEE 4th Global Conference on Consumer Electronics, 2015

DDoS detection and filtering technique in cloud environment using GARCH model.
Proceedings of the IEEE 4th Global Conference on Consumer Electronics, 2015

PHP-sensor: a prototype method to discover workflow violation and XSS vulnerabilities in PHP web applications.
Proceedings of the 12th ACM International Conference on Computing Frontiers, 2015

2014
An Encapsulated Approach of Forensic Model for digital investigation.
Proceedings of the IEEE 3rd Global Conference on Consumer Electronics, 2014

2013
Predicting Number of Zombies in a DDoS Attacks Using Isotonic Regression.
Proceedings of the Mining Social Networks and Security Informatics, 2013

Enhanced CBF Packet Filtering Method to Detect DDoS Attack in Cloud Computing Environment
CoRR, 2013

Phishing Dynamic Evolving Neural Fuzzy Framework for Online Detection Zero-day Phishing Email
CoRR, 2013

A Survey of Phishing Email Filtering Techniques.
IEEE Commun. Surv. Tutorials, 2013

2012
ANN Based Scheme to Predict Number of Zombies in a DDoS Attack.
I. J. Network Security, 2012

Distributed Denial of Service Prevention Techniques
CoRR, 2012

Botnet-based Distributed Denial of Service (DDoS) Attacks on Web Servers: Classification and Art
CoRR, 2012

Dynamic and Auto Responsive Solution for Distributed Denial-of-Service Attacks Detection in ISP Network
CoRR, 2012

An Efficient Analytical Solution to Thwart DDoS Attacks in Public Domain
CoRR, 2012

An ISP Level Solution to Combat DDoS Attacks using Combined Statistical Based Approach
CoRR, 2012

Predicting Number of Zombies in DDoS Attacks Using Pace Regression Model.
CIT, 2012

2011
A Comparative Study of Distributed Denial of Service Attacks, Intrusion Tolerance and Mitigation Techniques.
Proceedings of the European Intelligence and Security Informatics Conference, 2011

SVM Based Scheme for Predicting Number of Zombies in a DDoS Attack.
Proceedings of the European Intelligence and Security Informatics Conference, 2011

On Estimating Strength of a DDoS Attack Using Polynomial Regression Model.
Proceedings of the Advances in Computing and Communications, 2011

2010
Estimating strength of DDoS attack using various regression models.
IJMIS, 2010

2009
Defending against Distributed Denial of Service Attacks: Issues and Challenges.
Inf. Secur. J. A Glob. Perspect., 2009

2008
FVBA: A combined statistical approach for low rate degrading and high bandwidth disruptive DDoS attacks detection in ISP domain.
Proceedings of the 16th International Conference on Networks, 2008


  Loading...