Information security risks management framework – A step towards mitigating security risks in university network C Joshi, UK Singh Journal of Information Security and Applications 35, 128–137, 2017 | 147 | 2017 |
A framework for zero-day vulnerabilities detection and prioritization UK Singh, C Joshi, D Kanellopoulos Journal of Information Security and Applications 46, 164-172, 2019 | 54 | 2019 |
Quantitative security risk evaluation using CVSS metrics by estimation of frequency and maturity of exploit UK Singh, C Joshi Proceedings of the World Congress on Engineering and Computer Science 1, 19-21, 2016 | 49 | 2016 |
A review on taxonomies of attacks and vulnerability in computer and network system C Joshi, UK Singh, K Tarey International Journal 5 (1), 742-747, 2015 | 45 | 2015 |
Security Testing and Assessment of Vulnerability Scanners in Quest of Current Information Security Landscape C Joshi, UK Singh International Journal of Computer Application (IJCA, 0975–8887) 145 (2), 1-7, 2016 | 36 | 2016 |
Information security assessment by quantifying risk level of network vulnerabilities UK Singh, C Joshi, N Gaud International Journal of Computer Applications 156 (2), 37-44, 2016 | 34 | 2016 |
Performance evaluation of web application security scanners for more effective defense C Joshi, UK Singh International Journal of Scientific and Research Publications (IJSRP) 6 (6 …, 2016 | 33 | 2016 |
Information Security Risk Management Framework for University Computing Environment. UK Singh, C Joshi Int. J. Netw. Secur. 19 (5), 742-751, 2017 | 27 | 2017 |
Admit-A five dimensional approach towards standardization of network and computer attack taxonomies C Joshi, UK Singh International Journal of Computer Applications 100 (5), 30-36, 2014 | 27 | 2014 |
Measurement of security dangers in university network UK Singh, C Joshi, N Gaud International Journal of Computer Applications 155 (1), 6-10, 2016 | 24 | 2016 |
Quantifying security risk by critical network vulnerabilities assessment UK Singh, C Joshi International Journal of Computer Applications 156 (13), 26-33, 2016 | 19 | 2016 |
Scalable Approach Towards Discovery of Unknown Vulnerabilities. UK Singh, C Joshi Int. J. Netw. Secur. 20 (5), 827-835, 2018 | 10 | 2018 |
Zero day attacks defense technique for protecting system against unknown vulnerabilities UK Singh, C Joshi, SK Singh International Journal of Scientific Research in Computer Science and …, 2017 | 10 | 2017 |
ZDAR system: Defending against the unknown UK Singh, C Joshi, SK Singh International Journal of Computer Science and Mobile Computing 5 (12), 143-149, 2016 | 10 | 2016 |
Quantitative information security risk assessment model for university computing environment C Joshi, UK Singh 2016 International Conference on Information Technology (ICIT), 69-74, 2016 | 9 | 2016 |
An enhanced framework for identification and risks assessment of zero-day vulnerabilities C Joshi, UK Singh, D Kanellopoulos International Journal of Applied Engineering Research 13 (12), 10861-10870, 2018 | 8 | 2018 |
Comparative Study of Information Security Risk Assessment Frameworks UK Singh, C Joshi International Journal of Computer Application 2 (8), 2250-1797, 2018 | 6 | 2018 |
An overview study of personalized web search C Joshi, T Jaiswal, H Gaur International Journal of Scientific and Research Publications 3 (1), 2013 | 6 | 2013 |
A Framework for Security Risk Level Measures Using CVSS for Vulnerability Categories UK Singh, C Joshi Accepted in ICCCNS 2016: 18th International Conference on Computer …, 2016 | 5 | 2016 |
A novel approach towards integration of semantic web mining with link analysis to improve the effectiveness of the personalized web C Joshi, UK Singh International Journal of Computer Applications 975, 8887, 2015 | 5 | 2015 |