A survey of intrusion detection techniques in cloud C Modi, D Patel, B Borisaniya, H Patel, A Patel, M Rajarajan Journal of network and computer applications 36 (1), 42-57, 2013 | 1014 | 2013 |
A survey on security issues and solutions at different layers of Cloud computing C Modi, D Patel, B Borisaniya, A Patel, M Rajarajan The journal of supercomputing 63 (2), 561-592, 2013 | 493 | 2013 |
A novel framework for intrusion detection in cloud C Modi, D Patel, B Borisanya, A Patel, M Rajarajan Proceedings of the fifth international conference on security of information …, 2012 | 66 | 2012 |
Collaborative IDS Framework for Cloud D Sing, D Patel, B Borisaniya, C Modi International Journal of Network Security 18 (4), 699-709, 2016 | 56 | 2016 |
Comparative analysis of formal model checking tools for security protocol verification R Patel, B Borisaniya, A Patel, D Patel, M Rajarajan, A Zisman International Conference on Network Security and Applications, 152-163, 2010 | 45 | 2010 |
Evaluation of Modified Vector Space Representation Using ADFA-LD and ADFA-WD Datasets B Borisaniya, D Patel Journal of Information Security 6 (03), 250-264, 2015 | 27 | 2015 |
Data storage security model for cloud computing HB Patel, DR Patel, B Borisaniya, A Patel International Conference on Advances in Communication, Network, and …, 2012 | 18 | 2012 |
Incorporating honeypot for intrusion detection in cloud infrastructure B Borisaniya, A Patel, DR Patel, H Patel IFIP International Conference on Trust Management, 84-96, 2012 | 16 | 2012 |
Towards virtual machine introspection based security framework for cloud B Borisaniya, D Patel Sādhanā 44 (2), 1-15, 2019 | 7 | 2019 |
Evasion Resistant Intrusion Detection Framework at Hypervisor Layer in Cloud B Borisaniya, D Patel International Conference on Advances in Communication, Network, and …, 2014 | 6 | 2014 |
Evaluation of applicability of modified vector space representation for in-VM malicious activity detection in Cloud B Borisaniya, K Patel, D Patel 2014 Annual IEEE India Conference (INDICON), 1-6, 2014 | 5 | 2014 |
Network-based Intrusion Detection in Eucalyptus Private Cloud B Borisaniya, A Patel, R Patel, D Patel 2010 International Conference on Advances in Communication, Network, and …, 2010 | 2 | 2010 |
D-Lotto: the lottery dapp with verifiable randomness K Sahitya, B Borisaniya Data Science and Intelligent Applications, 33-41, 2021 | 1 | 2021 |
Pay-Per-Byte for Block Reward: A Revised Incentive Mechanism in Bitcoin K Sahitya, B Borisaniya Security, Privacy and Data Analytics, 269-281, 2022 | | 2022 |
ShoutIMEI: Ultrasound Covert Channel-Based Attack in Android K Pandya, B Borisaniya, B Buddhadev Security, Privacy and Data Analytics, 293-301, 2022 | | 2022 |
Genetic Algorithm based Feature Selection on Malware System Call Datasets T Devki, B Borisaniya International Journal of Research in Advent Technology 7 (4), 420-426, 2019 | | 2019 |
Deriving Meaning of Trending Words for Expanding Thesaurus B Joshi, B Borisaniya, D Modi International Journal of Research in Advent Technology 7 (4), 250-253, 2019 | | 2019 |
An Optimized Task Scheduling Algorithm in Cloud Computing Environment S Chaudhari, C Thaker, B Borisaniya | | 2017 |
Data Storage Security Model using Homomorphic Encryption for Cloud B Modhiya, C Thaker, B Borisaniya | | 2017 |