Dhiren R. Patel

According to our database1, Dhiren R. Patel authored at least 35 papers between 2008 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Towards cough sound analysis using the Internet of things and deep learning for pulmonary disease prediction.
Trans. Emerg. Telecommun. Technol., 2022

Load balancing in cloud using improved gray wolf optimizer.
Concurr. Comput. Pract. Exp., 2022

2021
Dissecting bitcoin blockchain: Empirical analysis of bitcoin network (2009-2020).
J. Netw. Comput. Appl., 2021

Multilabel classification of remote sensed satellite imagery.
Trans. Emerg. Telecommun. Technol., 2021

Supervised learning model for identifying illegal activities in Bitcoin.
Appl. Intell., 2021

2020
Blockchain Analysis Tool For Monitoring Coin Flow.
Proceedings of the 2020 Seventh International Conference on Software Defined Systems, 2020

2018
An improved Grey Wolf Optimizer (iGWO) for Load Balancing in Cloud Computing Environment.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

2017
Accountability in Cloud Computing by Means of Chain of Trust.
Int. J. Netw. Secur., 2017

2016
Baseline Intrusion Detection Framework for 6LoWPAN Devices.
Proceedings of the Adjunct Proceedings of the 13th International Conference on Mobile and Ubiquitous Systems: Computing Networking and Services, 2016

2015
Approaches for Sentiment Analysis on Twitter: A State-of-Art study.
CoRR, 2015

ExplicitPRISMSymm: Symmetry Reduction Technique for Explicit Models in PRISM.
Proceedings of the Theory and Applications of Models of Computation, 2015

On-the-Fly Symmetry Reduction of Explicitly Represented Probabilistic Models.
Proceedings of the Distributed Computing and Internet Technology, 2015

2014
Analyzing trustworthiness of virtual machines in data-intensive cloud computing.
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014

Load management model for cloud computing.
Proceedings of the 9th International Conference for Internet Technology and Secured Transactions, 2014

2013
A survey on security issues and solutions at different layers of Cloud computing.
J. Supercomput., 2013

A survey of intrusion detection techniques in Cloud.
J. Netw. Comput. Appl., 2013

Incorporation of Application Specific Information for Recovery in Database from Malicious Transactions.
Inf. Secur. J. A Glob. Perspect., 2013

Insecurities within browser: issues and challenges.
Proceedings of the 6th International Conference on Security of Information and Networks, 2013

A novel hybrid-network intrusion detection system (H-NIDS) in cloud computing.
Proceedings of the 2013 IEEE Symposium on Computational Intelligence in Cyber Security, 2013

2012
FlexiSec: A Configurable Link Layer Security Architecture for Wireless Sensor Networks
CoRR, 2012

Optimizing the Replay Protection at the Link Layer Security Framework in Wireless Sensor Networks
CoRR, 2012

A novel framework for intrusion detection in cloud.
Proceedings of the 5th International Conference of Security of Information and Networks, 2012

Improvements over Extended LMAP+: RFID Authentication Protocol.
Proceedings of the Trust Management VI - 6th IFIP WG 11.11 International Conference, 2012

Trust Management Framework for Attenuation of Application Layer DDoS Attack in Cloud Computing.
Proceedings of the Trust Management VI - 6th IFIP WG 11.11 International Conference, 2012

Incorporating Honeypot for Intrusion Detection in Cloud Infrastructure.
Proceedings of the Trust Management VI - 6th IFIP WG 11.11 International Conference, 2012

Tradeoffs between performance and security of cryptographic primitives used in storage as a service for cloud computing.
Proceedings of the CUBE International IT Conference & Exhibition, 2012

2011
An User-Centric Attribute Based Access Control Model for Ubuquitous Environments.
Proceedings of the Mobile Computing, Applications, and Services, 2011

2010
An Efficient Approach for Preventing Disclosure of Sensitive Association Rules in Databases.
Proceedings of the 2010 International Conference on Information & Knowledge Engineering, 2010

Comparative Analysis of Formal Model Checking Tools for Security Protocol Verification.
Proceedings of the Recent Trends in Network Security and Applications, 2010

A Survey on Preserving Privacy for Sensitive Association Rules in Databases.
Proceedings of the Information Processing and Management, 2010

2009
Architecture Framework Proposal for Dynamic and Ubiquitous Security in Global SOA.
Int. J. Comput. Sci. Appl., 2009

Realization of Semantic Atom Blog
CoRR, 2009

Protecting Global SOA from DoS and Other Security Threats.
Proceedings of the Advances in Information Security and Assurance, 2009

Replay Protection at the Link Layer Security in Wireless Sensor Networks.
Proceedings of the CSIE 2009, 2009 WRI World Congress on Computer Science and Information Engineering, March 31, 2009

2008
Optimizing the Block Cipher and Modes of Operations Overhead at the Link Layer Security Framework in the Wireless Sensor Networks.
Proceedings of the Information Systems Security, 4th International Conference, 2008


  Loading...