On mining web access logs A Joshi, K Joshi, R Krishnapuram UMBC Computer Science and Electrical Engineering Department, 1999 | 189 | 1999 |
Warehousing and mining web logs KP Joshi, A Joshi, Y Yesha, R Krishnapuram Proceedings of the 2nd international workshop on Web information and data …, 1999 | 86 | 1999 |
Automating cloud services life cycle through semantic technologies KP Joshi, Y Yesha, T Finin IEEE Transactions on Services Computing 7 (1), 109-122, 2014 | 81 | 2014 |
On using a warehouse to analyze web logs KP Joshi, A Joshi, Y Yesha Distributed and Parallel Databases 13 (2), 161-180, 2003 | 65 | 2003 |
A semantic approach to cloud security and compliance A Hendre, KP Joshi 2015 IEEE 8th International Conference on Cloud Computing, 1081-1084, 2015 | 62 | 2015 |
Analysis of data mining algorithms KP Joshi University of Maryland, Baltimore County 25, 2005, 1997 | 39 | 1997 |
Integrated Lifecycle of IT Services in a Cloud Environment (Detailed paper) KP Joshi, T Finin, Y Yesha In proceedings of The Third International Conference on the Virtual …, 2010 | 37 | 2010 |
Attribute Based Encryption for Secure Access to Cloud Based EHR Systems MP Joshi, KP Joshi, T Finin International Conference on Cloud Computing, 2018 | 34 | 2018 |
Generating Digital Twin models using Knowledge Graphs for Industrial Production Lines A Banerjee, R Dalal, S Mittal, KP Joshi Workshop on Industrial Knowledge Graphs, co-located with the 9th …, 2017 | 34 | 2017 |
Automating cloud service level agreements using semantic technologies KP Joshi, C Pearce 2015 IEEE International Conference on Cloud Engineering, 416-421, 2015 | 32 | 2015 |
Automatic extraction of metrics from slas for cloud service management S Mittal, KP Joshi, C Pearce, A Joshi 2016 IEEE International Conference on Cloud Engineering (IC2E), 139-142, 2016 | 30 | 2016 |
Context-sensitive policy based security in internet of things PK Das, S Narayanan, NK Sharma, A Joshi, K Joshi, T Finin 2016 IEEE International Conference on Smart Computing (SMARTCOMP), 1-6, 2016 | 25 | 2016 |
Managing the quality of virtualized services KP Joshi, A Joshi, Y Yesha 2011 Annual SRII Global Conference, 300-307, 2011 | 24 | 2011 |
Semantic Approach to Automating Management of Big Data Privacy Policies KP Joshi, A Gupta, S Mittal, C Pearce, A Joshi, T Finin IEEE BigData 2016, 10, 2016 | 23 | 2016 |
Early Detection of Cybersecurity Threats Using Collaborative Cognition SN Narayanan, A Ganesan, K Joshi, T Oates, A Joshi, T Finin 2018 IEEE 4th International Conference on Collaboration and Internet …, 2018 | 22 | 2018 |
Framework for Cloud Usability B Stanton, M Theofanos, KP Joshi NISTIR 6400 (201), 379-405, 2014 | 22 | 2014 |
Semantically Rich, Oblivious Access Control Using ABAC for Secure Cloud Storage M Joshi, S Mittal, KP Joshi, T Finin Proceedings of the First IEEE International Conference on Edge Computing, 2017 | 19 | 2017 |
ALDA: Cognitive Assistant for Legal Document Analytics KP Joshi, A Gupta, S Mittal, C Pearce, A Joshi, T Finin AAAI Fall Symposium 2016, 2016 | 19 | 2016 |
Link Before You Share: Managing Privacy Policies through Blockchain A Banerjee, KP Joshi 4th International Workshop on Privacy and Security of Big Data (PSBD 2017 …, 2017 | 18 | 2017 |
Anomaly Detection Models for Smart Home Security S Ramapatruni, SN Narayanan, S Mittal, A Joshi, K Joshi 2019 IEEE 5th Intl Conference on Big Data Security on Cloud (BigDataSecurity …, 2019 | 17 | 2019 |