Ramesh Chandra Joshi
Orcid: 0000-0002-4120-948XAffiliations:
- Indian Institute of Technology Roorkee, Department of Electronics and Computer Engineering, India
- Graphic Era University (GEU), Dehradun, India
According to our database1,
Ramesh Chandra Joshi
authored at least 103 papers
between 1988 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
A comprehensive survey on RPL routing-based attacks, defences and future directions in Internet of Things.
Comput. Electr. Eng., 2025
2023
HyperGuard: on designing out-VM malware analysis approach to detect intrusions from hypervisor in cloud environment.
Int. J. Grid Util. Comput., 2023
2021
Sustain. Comput. Informatics Syst., 2021
BSS: a brokering model for service selection using integrated weighting approach in cloud environment.
J. Cloud Comput., 2021
Machine Learning Classifier Approach with Gaussian Process, Ensemble boosted Trees, SVM, and Linear Regression for 5G Signal Coverage Mapping.
Int. J. Interact. Multim. Artif. Intell., 2021
2019
J. Parallel Distributed Comput., 2019
VMProtector: Malign Process Detection for Protecting Virtual Machines in Cloud Environment.
Proceedings of the Advances in Computing and Data Sciences, 2019
2018
UPB: User Preference based Brokering for Service Ranking and Selection in Federated Cloud.
Proceedings of the IEEE International Conference on Advanced Networks and Telecommunications Systems, 2018
2016
Computer Communications and Networks, Springer, ISBN: 978-1-4471-7299-4, 2016
2015
Proceedings of the 2nd IEEE World Forum on Internet of Things, 2015
2014
Minimum mutable checkpoint-based coordinated checkpointing protocol for mobile distributed systems.
Int. J. Commun. Networks Distributed Syst., 2014
2013
2012
Int. J. Netw. Secur., 2012
Dynamic and Auto Responsive Solution for Distributed Denial-of-Service Attacks Detection in ISP Network
CoRR, 2012
An ISP Level Solution to Combat DDoS Attacks using Combined Statistical Based Approach
CoRR, 2012
Proceedings of 9th IEEE International Conference on Networking, Sensing and Control, 2012
Secret information display based authentication technique towards preventing phishing attacks.
Proceedings of the 2012 International Conference on Advances in Computing, 2012
Personal Secret Information Based Authentication towards Preventing Phishing Attacks.
Proceedings of the Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology (ACITY) July 13-15, 2012, Chennai, India, 2012
2011
J. Medical Syst., 2011
Dual-Level Attack Detection, Characterization and Response for Networks Under DDoS Attacks.
Int. J. Mob. Comput. Multim. Commun., 2011
Int. J. Mob. Comput. Multim. Commun., 2011
Int. J. Comput. Vis. Robotics, 2011
Repeater insertion in crosstalk-aware inductively and capacitively coupled interconnects.
Int. J. Circuit Theory Appl., 2011
Proceedings of the Advances in Digital Forensics VII - 7th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA, January 31, 2011
Data reduction by identification and correlation of TCP/IP attack attributes for network forensics.
Proceedings of the ICWET '11 International Conference & Workshop on Emerging Trends in Technology, Mumbai, Maharashtra, India, February 25, 2011
A genetic: algorithm approach to cost-based multi-QoS job scheduling in cloud computing environment.
Proceedings of the ICWET '11 International Conference & Workshop on Emerging Trends in Technology, Mumbai, Maharashtra, India, February 25, 2011
Proceedings of the 2011 International Conference on Communication, 2011
Proceedings of the Contemporary Computing - 4th International Conference, 2011
Proceedings of the Contemporary Computing - 4th International Conference, 2011
A Comparative Study of Distributed Denial of Service Attacks, Intrusion Tolerance and Mitigation Techniques.
Proceedings of the European Intelligence and Security Informatics Conference, 2011
2010
ACM SIGSOFT Softw. Eng. Notes, 2010
Microelectron. J., 2010
Deciding optimal entropic thresholds to calibrate the detection mechanism for variable rate DDoS attacks in ISP domain: honeypot based approach.
J. Intell. Manuf., 2010
Int. J. Multim. Intell. Secur., 2010
Effective framework for prediction of disease outcome using medical datasets: clustering and classification.
Int. J. Comput. Intell. Stud., 2010
Int. J. Ad Hoc Ubiquitous Comput., 2010
Data filtering and dynamic sensing for continuous monitoring in wireless sensor networks.
Int. J. Auton. Adapt. Commun. Syst., 2010
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010
Proceedings of the Information and Communication Technologies - International Conference, 2010
Proceedings of the Information and Communication Technologies - International Conference, 2010
Proceedings of the Information and Communication Technologies - International Conference, 2010
Proceedings of the Digital Forensics and Cyber Crime, 2010
Proceedings of the Contemporary Computing - Third International Conference, 2010
Proceedings of the Contemporary Computing - Third International Conference, 2010
Proceedings of the Contemporary Computing - Third International Conference, 2010
A Robust Trust Mechanism Algorithm for Secure Power Aware AODV Routing in Mobile Ad Hoc Networks.
Proceedings of the Contemporary Computing - Third International Conference, 2010
Proceedings of the ARES 2010, 2010
2009
Inf. Secur. J. A Glob. Perspect., 2009
An auto-responsive honeypot architecture for dynamic resource allocation and QoS adaptation in DDoS attacked networks.
Comput. Commun., 2009
Hiding Fuzzy Association Rules Set.
Proceedings of the 4th Indian International Conference on Artificial Intelligence, 2009
Classification of Phylogenetic Profiles for Protein Function Prediction: An SVM Approach.
Proceedings of the Contemporary Computing - Second International Conference, 2009
2008
Combating the bloated state problem in mobile agents based network monitoring applications.
Comput. Networks, 2008
An Efficient Coding Method for Teleconferencing Video and Confocal Microscopic Image Sequences.
J. Comput. Inf. Technol., 2008
Proceedings of the International Symposium on Information Processing, 2008
Tuning Data Reporting and Sensing for Continuous Monitoring in Wireless Sensor Networks.
Proceedings of the 2008 IEEE International Performance, 2008
Proceedings of the 16th International Conference on Networks, 2008
Proceedings of the 16th International Conference on Networks, 2008
Proceedings of the 16th International Conference on Networks, 2008
FVBA: A combined statistical approach for low rate degrading and high bandwidth disruptive DDoS attacks detection in ISP domain.
Proceedings of the 16th International Conference on Networks, 2008
FTEP: A fault tolerant election protocol for multi-level clustering in homogeneous wireless sensor networks.
Proceedings of the 16th International Conference on Networks, 2008
Proceedings of the IEEE Reglon 10 Colloquium and Third International Conference on Industrial and Information Systems, 2008
E-CAP: An Extended Capability Based Mechanism to Limit Distributed Denial of Service Attacks.
Proceedings of the First International Conference on Emerging Trends in Engineering and Technology, 2008
Proceedings of the 41st Hawaii International International Conference on Systems Science (HICSS-41 2008), 2008
2007
Wirel. Pers. Commun., 2007
Wirel. Commun. Mob. Comput., 2007
Mob. Inf. Syst., 2007
Int. J. Ad Hoc Ubiquitous Comput., 2007
Int. J. Ad Hoc Ubiquitous Comput., 2007
Simulation of Dynamic Honeypot Based Redirection to Counter Service Level DDoS Attacks.
Proceedings of the Information Systems Security, Third International Conference, 2007
Finding Associations in Time Series Data Using Centroids.
Proceedings of the 2007 International Conference on Data Mining, 2007
Crosstalk Analysis of an Inductively and Capacitively Coupled Interconnect Driven by a CMOS Gate.
Proceedings of the 10th International Conference on Information Technology, 2007
Proceedings of the Third International Symposium on Information Assurance and Security, 2007
2006
A pattern recognition-based approach for phylogenetic network construction with constrained recombination.
Pattern Recognit., 2006
Int. J. Commun. Syst., 2006
Retrieval of Most Relevant Reusable Component Using Genetic Algorithms.
Proceedings of the International Conference on Software Engineering Research and Practice & Conference on Programming Languages and Compilers, 2006
Proceedings of the 12th International Conference on Parallel and Distributed Systems, 2006
Proceedings of the Fifth International Conference on Networking and the International Conference on Systems (ICN / ICONS / MCL 2006), 2006
Out-of-core construction and 3D visualization of level-of-detail terrains populated with large collection of heterogeneous objects.
Proceedings of the GRAPP 2006: Proceedings of the First International Conference on Computer Graphics Theory and Applications, 2006
Proceedings of the First International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2006), 2006
2005
J. Digit. Inf. Manag., 2005
Informatica (Slovenia), 2005
Proceedings of the Distributed Computing, 2005
A Classification Based Approach for Root Unknown Phylogenetic Networks Under Constrained Recombination.
Proceedings of the Distributed Computing and Internet Technology, 2005
Proceedings of the Database Technologies 2005, 2005
2004
Proceedings of the Advances in Multimedia Information Processing - PCM 2004, 5th Pacific Rim Conference on Multimedia, Tokyo, Japan, November 30, 2004
Proceedings of the 2004 International Conference on Machine Learning and Applications, 2004
Proceedings of the Distributed Computing and Internet Technology, 2004
Proceedings of the High Performance Computing, 2004
Proceedings of the Database Systems for Advances Applications, 2004
2003
Proceedings of the 19th International Conference on Data Engineering, 2003
2002
Proceedings of the First European Conference on Colour in Graphics, Imaging, and Vision, 2002
1994
Proceedings of the 1994 International Conference on Parallel Processing, 1994
1992
Proceedings of the Proceedings IEEE INFOCOM '92, 1992
1991
Proceedings of the Proceedings IEEE INFOCOM '91, 1991
1988
Comput. Graph., 1988