Follow
Bhavesh Borisaniya
Title
Cited by
Cited by
Year
A survey of intrusion detection techniques in cloud
C Modi, D Patel, B Borisaniya, H Patel, A Patel, M Rajarajan
Journal of network and computer applications 36 (1), 42-57, 2013
10652013
A survey on security issues and solutions at different layers of Cloud computing
C Modi, D Patel, B Borisaniya, A Patel, M Rajarajan
The journal of supercomputing 63, 561-592, 2013
5212013
A novel framework for intrusion detection in cloud
C Modi, D Patel, B Borisanya, A Patel, M Rajarajan
Proceedings of the fifth international conference on security of information …, 2012
702012
Collaborative IDS Framework for Cloud
D Sing, D Patel, B Borisaniya, C Modi
International Journal of Network Security 18 (4), 699-709, 2016
652016
Comparative analysis of formal model checking tools for security protocol verification
R Patel, B Borisaniya, A Patel, D Patel, M Rajarajan, A Zisman
Recent Trends in Network Security and Applications: Third International …, 2010
472010
Evaluation of Modified Vector Space Representation Using ADFA-LD and ADFA-WD Datasets
B Borisaniya, D Patel
Journal of Information Security 6 (03), 250-264, 2015
322015
Data storage security model for cloud computing
HB Patel, DR Patel, B Borisaniya, A Patel
Advances in Communication, Network, and Computing: Third International …, 2012
172012
Incorporating honeypot for intrusion detection in cloud infrastructure
B Borisaniya, A Patel, DR Patel, H Patel
Trust Management VI: 6th IFIP WG 11.11 International Conference, IFIPTM 2012 …, 2012
172012
Towards virtual machine introspection based security framework for cloud
B Borisaniya, D Patel
Sādhanā 44, 1-15, 2019
102019
Evasion Resistant Intrusion Detection Framework at Hypervisor Layer in Cloud
B Borisaniya, D Patel
International Conference on Advances in Communication, Network, and …, 2014
62014
Evaluation of applicability of modified vector space representation for in-VM malicious activity detection in Cloud
B Borisaniya, K Patel, D Patel
2014 Annual IEEE India Conference (INDICON), 1-6, 2014
52014
Network-based Intrusion Detection in Eucalyptus Private Cloud
B Borisaniya, A Patel, R Patel, D Patel
2010 International Conference on Advances in Communication, Network, and …, 2010
32010
D-Lotto: the lottery dapp with verifiable randomness
K Sahitya, B Borisaniya
Data Science and Intelligent Applications: Proceedings of ICDSIA 2020, 33-41, 2021
22021
ShoutIMEI: Ultrasound Covert Channel-Based Attack in Android
K Pandya, B Borisaniya, B Buddhadev
Security, Privacy and Data Analytics: Select Proceedings of ISPDA 2021, 293-301, 2022
12022
Protecting Alexa from Remote Voice Command and Inaudible Voice Command Attacks
P Ahalpara, B Borisaniya
Futuristic Trends in Networks and Computing Technologies: Select Proceedings …, 2022
2022
Pay-Per-Byte for Block Reward: A Revised Incentive Mechanism in Bitcoin
K Sahitya, B Borisaniya
Security, Privacy and Data Analytics: Select Proceedings of ISPDA 2021, 269-281, 2022
2022
Genetic Algorithm based Feature Selection on Malware System Call Datasets
T Devki, B Borisaniya
International Journal of Research in Advent Technology 7 (4), 420-426, 2019
2019
Deriving Meaning of Trending Words for Expanding Thesaurus
B Joshi, B Borisaniya, D Modi
International Journal of Research in Advent Technology 7 (4), 250-253, 2019
2019
An Optimized Task Scheduling Algorithm in Cloud Computing Environment
S Chaudhari, C Thaker, B Borisaniya
2017
Data Storage Security Model using Homomorphic Encryption for Cloud
B Modhiya, C Thaker, B Borisaniya
2017
The system can't perform the operation now. Try again later.
Articles 1–20