Follow
Bhavesh Borisaniya
Title
Cited by
Cited by
Year
A survey of intrusion detection techniques in cloud
C Modi, D Patel, B Borisaniya, H Patel, A Patel, M Rajarajan
Journal of network and computer applications 36 (1), 42-57, 2013
10482013
A survey on security issues and solutions at different layers of Cloud computing
C Modi, D Patel, B Borisaniya, A Patel, M Rajarajan
The journal of supercomputing 63 (2), 561-592, 2013
5092013
A novel framework for intrusion detection in cloud
C Modi, D Patel, B Borisanya, A Patel, M Rajarajan
Proceedings of the fifth international conference on security of information …, 2012
692012
Collaborative IDS Framework for Cloud
D Sing, D Patel, B Borisaniya, C Modi
International Journal of Network Security 18 (4), 699-709, 2016
612016
Comparative analysis of formal model checking tools for security protocol verification
R Patel, B Borisaniya, A Patel, D Patel, M Rajarajan, A Zisman
International Conference on Network Security and Applications, 152-163, 2010
452010
Evaluation of Modified Vector Space Representation Using ADFA-LD and ADFA-WD Datasets
B Borisaniya, D Patel
Journal of Information Security 6 (03), 250-264, 2015
302015
Data storage security model for cloud computing
HB Patel, DR Patel, B Borisaniya, A Patel
International Conference on Advances in Communication, Network, and …, 2012
182012
Incorporating honeypot for intrusion detection in cloud infrastructure
B Borisaniya, A Patel, DR Patel, H Patel
IFIP International Conference on Trust Management, 84-96, 2012
162012
Towards virtual machine introspection based security framework for cloud
B Borisaniya, D Patel
Sādhanā 44 (2), 1-15, 2019
92019
Evasion Resistant Intrusion Detection Framework at Hypervisor Layer in Cloud
B Borisaniya, D Patel
International Conference on Advances in Communication, Network, and …, 2014
62014
Evaluation of applicability of modified vector space representation for in-VM malicious activity detection in Cloud
B Borisaniya, K Patel, D Patel
2014 Annual IEEE India Conference (INDICON), 1-6, 2014
52014
D-Lotto: the lottery dapp with verifiable randomness
K Sahitya, B Borisaniya
Data Science and Intelligent Applications, 33-41, 2021
22021
Network-based Intrusion Detection in Eucalyptus Private Cloud
B Borisaniya, A Patel, R Patel, D Patel
2010 International Conference on Advances in Communication, Network, and …, 2010
22010
ShoutIMEI: Ultrasound Covert Channel-Based Attack in Android
K Pandya, B Borisaniya, B Buddhadev
Security, Privacy and Data Analytics, 293-301, 2022
12022
Protecting Alexa from Remote Voice Command and Inaudible Voice Command Attacks
P Ahalpara, B Borisaniya
Futuristic Trends in Networks and Computing Technologies, 501-511, 2022
2022
Pay-Per-Byte for Block Reward: A Revised Incentive Mechanism in Bitcoin
K Sahitya, B Borisaniya
Security, Privacy and Data Analytics, 269-281, 2022
2022
Genetic Algorithm based Feature Selection on Malware System Call Datasets
T Devki, B Borisaniya
International Journal of Research in Advent Technology 7 (4), 420-426, 2019
2019
Deriving Meaning of Trending Words for Expanding Thesaurus
B Joshi, B Borisaniya, D Modi
International Journal of Research in Advent Technology 7 (4), 250-253, 2019
2019
An Optimized Task Scheduling Algorithm in Cloud Computing Environment
S Chaudhari, C Thaker, B Borisaniya
2017
Data Storage Security Model using Homomorphic Encryption for Cloud
B Modhiya, C Thaker, B Borisaniya
2017
The system can't perform the operation now. Try again later.
Articles 1–20