Ramesh Chandra Joshi

Orcid: 0000-0002-4120-948X

Affiliations:
  • Indian Institute of Technology Roorkee, Department of Electronics and Computer Engineering, India
  • Graphic Era University (GEU), Dehradun, India


According to our database1, Ramesh Chandra Joshi authored at least 102 papers between 1988 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
HyperGuard: on designing out-VM malware analysis approach to detect intrusions from hypervisor in cloud environment.
Int. J. Grid Util. Comput., 2023

2021
BGSA: Broker Guided Service Allocation in Federated Cloud.
Sustain. Comput. Informatics Syst., 2021

BSS: a brokering model for service selection using integrated weighting approach in cloud environment.
J. Cloud Comput., 2021

Machine Learning Classifier Approach with Gaussian Process, Ensemble boosted Trees, SVM, and Linear Regression for 5G Signal Coverage Mapping.
Int. J. Interact. Multim. Artif. Intell., 2021

2019
Brokering in interconnected cloud computing environments: A survey.
J. Parallel Distributed Comput., 2019

VMProtector: Malign Process Detection for Protecting Virtual Machines in Cloud Environment.
Proceedings of the Advances in Computing and Data Sciences, 2019

2018
Survey of Peer-to-Peer Botnets and Detection Frameworks.
Int. J. Netw. Secur., 2018

CLINIQA: A Machine Intelligence Based Clinical Question Answering System.
CoRR, 2018

UPB: User Preference based Brokering for Service Ranking and Selection in Federated Cloud.
Proceedings of the IEEE International Conference on Advanced Networks and Telecommunications Systems, 2018

2016
Fundamentals of Network Forensics - A Research Perspective
Computer Communications and Networks, Springer, ISBN: 978-1-4471-7299-4, 2016

2015
Forensics of Random-UDP Flooding Attacks.
J. Networks, 2015

A Secure Hybrid Cloud Enabled architecture for Internet of Things.
Proceedings of the 2nd IEEE World Forum on Internet of Things, 2015

2014
Minimum mutable checkpoint-based coordinated checkpointing protocol for mobile distributed systems.
Int. J. Commun. Networks Distributed Syst., 2014

2013
Wireless Honeypot: Framework, Architectures and Tools.
Int. J. Netw. Secur., 2013

2012
ANN Based Scheme to Predict Number of Zombies in a DDoS Attack.
Int. J. Netw. Secur., 2012

Parallel Misuse and Anomaly Detection Model.
Int. J. Netw. Secur., 2012

Distributed Denial of Service Prevention Techniques
CoRR, 2012

Dynamic and Auto Responsive Solution for Distributed Denial-of-Service Attacks Detection in ISP Network
CoRR, 2012

An Efficient Analytical Solution to Thwart DDoS Attacks in Public Domain
CoRR, 2012

An ISP Level Solution to Combat DDoS Attacks using Combined Statistical Based Approach
CoRR, 2012

A system for mobile assisted living.
Proceedings of 9th IEEE International Conference on Networking, Sensing and Control, 2012

Secret information display based authentication technique towards preventing phishing attacks.
Proceedings of the 2012 International Conference on Advances in Computing, 2012

Personal Secret Information Based Authentication towards Preventing Phishing Attacks.
Proceedings of the Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology (ACITY) July 13-15, 2012, Chennai, India, 2012

2011
A New Approach: Role of Data Mining in Prediction of Survival of Burn Patients.
J. Medical Syst., 2011

Dual-Level Attack Detection, Characterization and Response for Networks Under DDoS Attacks.
Int. J. Mob. Comput. Multim. Commun., 2011

Cooperative Caching in Mobile Ad Hoc Networks.
Int. J. Mob. Comput. Multim. Commun., 2011

Classification of type-2 diabetic patients by using Apriori and predictive Apriori.
Int. J. Comput. Vis. Robotics, 2011

Repeater insertion in crosstalk-aware inductively and capacitively coupled interconnects.
Int. J. Circuit Theory Appl., 2011

Router and Interface Marking for Network Forensics.
Proceedings of the Advances in Digital Forensics VII - 7th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA, January 31, 2011

Data reduction by identification and correlation of TCP/IP attack attributes for network forensics.
Proceedings of the ICWET '11 International Conference & Workshop on Emerging Trends in Technology, Mumbai, Maharashtra, India, February 25, 2011

A genetic: algorithm approach to cost-based multi-QoS job scheduling in cloud computing environment.
Proceedings of the ICWET '11 International Conference & Workshop on Emerging Trends in Technology, Mumbai, Maharashtra, India, February 25, 2011

A cooperative caching strategy in mobile ad hoc networks based on clusters.
Proceedings of the 2011 International Conference on Communication, 2011

Unified Modeling Technique for Threat Cause Ranking, Mitigation and Testing.
Proceedings of the Contemporary Computing - 4th International Conference, 2011

Efficient Regular Expression Pattern Matching on Graphics Processing Units.
Proceedings of the Contemporary Computing - 4th International Conference, 2011

A Comparative Study of Distributed Denial of Service Attacks, Intrusion Tolerance and Mitigation Techniques.
Proceedings of the European Intelligence and Security Informatics Conference, 2011

2010
Ant colony based rule generation for reusable software component retrieval.
ACM SIGSOFT Softw. Eng. Notes, 2010

An analytical approach to dynamic crosstalk in coupled interconnects.
Microelectron. J., 2010

Deciding optimal entropic thresholds to calibrate the detection mechanism for variable rate DDoS attacks in ISP domain: honeypot based approach.
J. Intell. Manuf., 2010

Estimating strength of DDoS attack using various regression models.
Int. J. Multim. Intell. Secur., 2010

Effective framework for prediction of disease outcome using medical datasets: clustering and classification.
Int. J. Comput. Intell. Stud., 2010

A weighted checkpointing protocol for mobile distributed systems.
Int. J. Ad Hoc Ubiquitous Comput., 2010

Data filtering and dynamic sensing for continuous monitoring in wireless sensor networks.
Int. J. Auton. Adapt. Commun. Syst., 2010

Hybrid prediction model for Type-2 diabetic patients.
Expert Syst. Appl., 2010

Network forensic frameworks: Survey and research challenges.
Digit. Investig., 2010

Dual-level defense for networks under DDoS attacks.
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010

A Framework for Network Forensic Analysis.
Proceedings of the Information and Communication Technologies - International Conference, 2010

Network Forensic Analysis by Correlation of Attacks with Network Attributes.
Proceedings of the Information and Communication Technologies - International Conference, 2010

Multiple QoS Guided Heuristic for Independent Task Scheduling in Grid.
Proceedings of the Information and Communication Technologies - International Conference, 2010

An IP Traceback Model for Network Forensics.
Proceedings of the Digital Forensics and Cyber Crime, 2010

Missing Value Imputation Based on K-Mean Clustering with Weighted Distance.
Proceedings of the Contemporary Computing - Third International Conference, 2010

Impact of K-Means on the Performance of Classifiers for Labeled Data.
Proceedings of the Contemporary Computing - Third International Conference, 2010

An Efficient Intrusion Detection System Using Clustering Combined with Fuzzy Logic.
Proceedings of the Contemporary Computing - Third International Conference, 2010

A Robust Trust Mechanism Algorithm for Secure Power Aware AODV Routing in Mobile Ad Hoc Networks.
Proceedings of the Contemporary Computing - Third International Conference, 2010

Dual-Level Attack Detection and Characterization for Networks under DDoS.
Proceedings of the ARES 2010, 2010

2009
Defending against Distributed Denial of Service Attacks: Issues and Challenges.
Inf. Secur. J. A Glob. Perspect., 2009

An auto-responsive honeypot architecture for dynamic resource allocation and QoS adaptation in DDoS attacked networks.
Comput. Commun., 2009

Hiding Fuzzy Association Rules Set.
Proceedings of the 4th Indian International Conference on Artificial Intelligence, 2009

Classification of Phylogenetic Profiles for Protein Function Prediction: An SVM Approach.
Proceedings of the Contemporary Computing - Second International Conference, 2009

2008
Combating the bloated state problem in mobile agents based network monitoring applications.
Comput. Networks, 2008

An Efficient Coding Method for Teleconferencing Video and Confocal Microscopic Image Sequences.
J. Comput. Inf. Technol., 2008

Honeypot Based Routing to Mitigate DDoS Attacks on Servers at ISP Level.
Proceedings of the International Symposium on Information Processing, 2008

Tuning Data Reporting and Sensing for Continuous Monitoring in Wireless Sensor Networks.
Proceedings of the 2008 IEEE International Performance, 2008

Dual radio based cooperative caching for wireless sensor networks.
Proceedings of the 16th International Conference on Networks, 2008

Autonomous dynamic honeypot routing mechanism for mitigating DDoS attacks in DMZ.
Proceedings of the 16th International Conference on Networks, 2008

Probability based routing for Ad Hoc networks in a building.
Proceedings of the 16th International Conference on Networks, 2008

FVBA: A combined statistical approach for low rate degrading and high bandwidth disruptive DDoS attacks detection in ISP domain.
Proceedings of the 16th International Conference on Networks, 2008

FTEP: A fault tolerant election protocol for multi-level clustering in homogeneous wireless sensor networks.
Proceedings of the 16th International Conference on Networks, 2008

Reducing the Effect of Distributed Directory Harvest Attack and Load of Mail Server.
Proceedings of the IEEE Reglon 10 Colloquium and Third International Conference on Industrial and Information Systems, 2008

E-CAP: An Extended Capability Based Mechanism to Limit Distributed Denial of Service Attacks.
Proceedings of the First International Conference on Emerging Trends in Engineering and Technology, 2008

Video Content Description Using Fuzzy Spatio-temporal Relations.
Proceedings of the 41st Hawaii International International Conference on Systems Science (HICSS-41 2008), 2008

2007
Cooperative Caching Strategy in Mobile Ad Hoc Networks Based on Clusters.
Wirel. Pers. Commun., 2007

Exploiting caching in heterogeneous mobile environment.
Wirel. Commun. Mob. Comput., 2007

Cooperative caching in mobile ad hoc networks based on data utility.
Mob. Inf. Syst., 2007

Energy efficient cache invalidation in a disconnected wireless mobile environment.
Int. J. Ad Hoc Ubiquitous Comput., 2007

Supporting cooperative caching in mobile ad hoc networks using clusters.
Int. J. Ad Hoc Ubiquitous Comput., 2007

Simulation of Dynamic Honeypot Based Redirection to Counter Service Level DDoS Attacks.
Proceedings of the Information Systems Security, Third International Conference, 2007

Finding Associations in Time Series Data Using Centroids.
Proceedings of the 2007 International Conference on Data Mining, 2007

Crosstalk Analysis of an Inductively and Capacitively Coupled Interconnect Driven by a CMOS Gate.
Proceedings of the 10th International Conference on Information Technology, 2007

Detection and Honeypot Based Redirection to Counter DDoS Attacks in ISP Domain.
Proceedings of the Third International Symposium on Information Assurance and Security, 2007

2006
A pattern recognition-based approach for phylogenetic network construction with constrained recombination.
Pattern Recognit., 2006

A zone co-operation approach for efficient caching in mobile ad hoc networks.
Int. J. Commun. Syst., 2006

Retrieval of Most Relevant Reusable Component Using Genetic Algorithms.
Proceedings of the International Conference on Software Engineering Research and Practice & Conference on Programming Languages and Compilers, 2006

Efficient Cache Replacement in Mobile Environment Using Data Profit.
Proceedings of the 12th International Conference on Parallel and Distributed Systems, 2006

An Application Dependent Communication Protocol for Wireless Sensor Networks.
Proceedings of the Fifth International Conference on Networking and the International Conference on Systems (ICN / ICONS / MCL 2006), 2006

Out-of-core construction and 3D visualization of level-of-detail terrains populated with large collection of heterogeneous objects.
Proceedings of the GRAPP 2006: Proceedings of the First International Conference on Computer Graphics Theory and Applications, 2006

Efficient cooperative caching in ad hoc networks.
Proceedings of the First International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2006), 2006

2005
Energy Efficient Cache Invalidation in a Mobile Environment.
J. Digit. Inf. Manag., 2005

Similarity Search in Time Series Data Using Time Weighted Slopes.
Informatica (Slovenia), 2005

Efficient Mobility Management for Cache Invalidation in Wireless Mobile Environment.
Proceedings of the Distributed Computing, 2005

A Classification Based Approach for Root Unknown Phylogenetic Networks Under Constrained Recombination.
Proceedings of the Distributed Computing and Internet Technology, 2005

Finding Similarity in Time Series Data by Method of Time Weighted Moments.
Proceedings of the Database Technologies 2005, 2005

2004
An Evolutionary Computing Approach for Mining of Bio-medical Images.
Proceedings of the Advances in Multimedia Information Processing - PCM 2004, 5th Pacific Rim Conference on Multimedia, Tokyo, Japan, November 30, 2004

Similarity search in time series databases using moments.
Proceedings of the 2004 International Conference on Machine Learning and Applications, 2004

Energy Efficient Cache Invalidation in a Disconnected Mobile Environment.
Proceedings of the Distributed Computing and Internet Technology, 2004

Broadcast Based Cache Invalidation and Prefetching in Mobile Environment.
Proceedings of the High Performance Computing, 2004

Classification of Bio-medical Images Using Neuro Fuzzy Approach.
Proceedings of the Database Systems for Advances Applications, 2004

2003
Low Overhead Optimal Checkpointing for Mobile Distributed Systems.
Proceedings of the 19th International Conference on Data Engineering, 2003

2002
Retrieval of Image Databases Using Supervised Learning Approach.
Proceedings of the First European Conference on Colour in Graphics, Imaging, and Vision, 2002

1994
Message-Task Scheduling in Object-Oriented Heterogeneous GURU Distributed DBMS.
Proceedings of the 1994 International Conference on Parallel Processing, 1994

1992
Quad Tree: A Cost-Effective Fault-Tolerant Multistage Interconnection Network.
Proceedings of the Proceedings IEEE INFOCOM '92, 1992

1991
Fault Tolerant Double Tree Multistage Interconnection Network.
Proceedings of the Proceedings IEEE INFOCOM '91, 1991

1988
A hierarchical Hex-tree representational technique for solid modelling.
Comput. Graph., 1988


  Loading...