A survey of intrusion detection techniques in cloud C Modi, D Patel, B Borisaniya, H Patel, A Patel, M Rajarajan Journal of network and computer applications 36 (1), 42-57, 2013 | 1229 | 2013 |
A survey on security issues and solutions at different layers of Cloud computing C Modi, D Patel, B Borisaniya, A Patel, M Rajarajan The journal of supercomputing 63, 561-592, 2013 | 596 | 2013 |
A novel framework for intrusion detection in cloud C Modi, D Patel, B Borisanya, A Patel, M Rajarajan Proceedings of the fifth international conference on security of information …, 2012 | 78 | 2012 |
Collaborative IDS Framework for Cloud D Sing, D Patel, B Borisaniya, C Modi International Journal of Network Security 18 (4), 699-709, 2016 | 66 | 2016 |
Comparative analysis of formal model checking tools for security protocol verification R Patel, B Borisaniya, A Patel, D Patel, M Rajarajan, A Zisman Recent Trends in Network Security and Applications: Third International …, 2010 | 50 | 2010 |
Evaluation of Modified Vector Space Representation Using ADFA-LD and ADFA-WD Datasets B Borisaniya, D Patel Journal of Information Security 6 (03), 250-264, 2015 | 47 | 2015 |
Incorporating honeypot for intrusion detection in cloud infrastructure B Borisaniya, A Patel, DR Patel, H Patel Trust Management VI: 6th IFIP WG 11.11 International Conference, IFIPTM 2012 …, 2012 | 21 | 2012 |
Towards virtual machine introspection based security framework for cloud B Borisaniya, D Patel Sādhanā 44 (2), 34, 2019 | 20 | 2019 |
Data storage security model for cloud computing HB Patel, DR Patel, B Borisaniya, A Patel Advances in Communication, Network, and Computing: Third International …, 2012 | 17 | 2012 |
Evasion Resistant Intrusion Detection Framework at Hypervisor Layer in Cloud B Borisaniya, D Patel International Conference on Advances in Communication, Network, and …, 2014 | 6 | 2014 |
Evaluation of applicability of modified vector space representation for in-VM malicious activity detection in Cloud B Borisaniya, K Patel, D Patel 2014 Annual IEEE India Conference (INDICON), 1-6, 2014 | 5 | 2014 |
ShoutIMEI: Ultrasound Covert Channel-Based Attack in Android K Pandya, B Borisaniya, B Buddhadev Security, Privacy and Data Analytics: Select Proceedings of ISPDA 2021, 293-301, 2022 | 3 | 2022 |
D-lotto: the lottery dapp with verifiable randomness K Sahitya, B Borisaniya Data Science and Intelligent Applications: Proceedings of ICDSIA 2020, 33-41, 2021 | 3 | 2021 |
Network-based Intrusion Detection in Eucalyptus Private Cloud B Borisaniya, A Patel, R Patel, D Patel 2010 International Conference on Advances in Communication, Network, and …, 2010 | 3 | 2010 |
Pay-Per-Byte for Block Reward: A Revised Incentive Mechanism in Bitcoin K Sahitya, B Borisaniya Security, Privacy and Data Analytics: Select Proceedings of ISPDA 2021, 269-281, 2022 | 2 | 2022 |
IoT Network Used in Fog and Cloud Computing B Borisaniya, S Kumar Big Data, Cloud Computing and IoT, 181-200, 2023 | 1 | 2023 |
A Review on DDoS Attack in Controller Environment of Software Defined Network G Vaghela, N Sanghani, B Borisaniya EAI Endorsed Transactions on Scalable Information Systems 11, 2024 | | 2024 |
A Survey on Leveraging Blockchain for IoT Security NS Sanghani, B Borisaniya International Journal of Computing and Digital Systems 15 (1), 371-391, 2024 | | 2024 |
Protecting Alexa from Remote Voice Command and Inaudible Voice Command Attacks P Ahalpara, B Borisaniya Futuristic Trends in Networks and Computing Technologies: Select Proceedings …, 2022 | | 2022 |
Genetic Algorithm based Feature Selection on Malware System Call Datasets T Devki, B Borisaniya International Journal of Research in Advent Technology 7 (4), 420-426, 2019 | | 2019 |