Search Results - "Gupta, B.B."
-
1
A novel framework for risk assessment and resilience of critical infrastructure towards climate change
Published in Technological forecasting & social change (01-04-2021)“…•A robust review to understand the impact of climate extremes on critical infrastructure.•Bivariate assessment of precipitation extremes using copula for 621…”
Get full text
Journal Article -
2
Efficient IoT-based sensor BIG Data collection–processing and analysis in smart buildings
Published in Future generation computer systems (01-05-2018)“…Internet of Things (IoT) provides to everyone new types of services in order to improve everyday life. Through this new technology, other recently developed…”
Get full text
Journal Article -
3
A combination of clustering-based under-sampling with ensemble methods for solving imbalanced class problem in intelligent systems
Published in Technological forecasting & social change (01-08-2021)“…•This paper introduces undersampling approach based on cluster under-sampling method.•Our method uses Mahalanobis distance to preserve data distribution in…”
Get full text
Journal Article -
4
Crowdsourcing based scientific issue tracking with topic analysis
Published in Applied soft computing (01-05-2018)“…[Display omitted] With the advancement of web technologies, many people are participating in the information production and distribution process in the Web…”
Get full text
Journal Article -
5
Security, privacy and trust of different layers in Internet-of-Things (IoTs) framework
Published in Future generation computer systems (01-07-2020)“…Internet of Things (IoT) is playing an important role after its showing up, it covers from traditional equipment to general household objects such as WSNs and…”
Get full text
Journal Article -
6
Critical flux concept for microfiltration fouling
Published in Journal of membrane science (28-04-1995)“…Several constant-flux filtration experiments for yeast cell suspensions, yeast cell debris, and dodecane-water emulsion were performed at various operating…”
Get full text
Journal Article -
7
Multiple features based approach for automatic fake news detection on social networks using deep learning
Published in Applied soft computing (01-03-2021)“…In recent years, the rise of Online Social Networks has led to proliferation of social news such as product advertisement, political news, celebrity’s…”
Get full text
Journal Article -
8
An overview of Internet of Things (IoT): Architectural aspects, challenges, and protocols
Published in Concurrency and computation (10-11-2020)“…Summary Understanding of any computing environment requires familiarity with its underlying technologies. Internet of Things (IoT), being a new era of…”
Get full text
Journal Article -
9
A survey of phishing attack techniques, defence mechanisms and open research challenges
Published in Enterprise information systems (03-04-2022)“…Phishing is an identity theft, which deceives Internet users into revealing their sensitive data, e.g., login information, credit/debit card details, and so…”
Get full text
Journal Article -
10
Visual saliency guided complex image retrieval
Published in Pattern recognition letters (01-02-2020)“…•This paper proposes a novel visual saliency guided complex image retrieval model.•The overall saliency map is generated by the integration of direction,…”
Get full text
Journal Article -
11
A helical baffle for cross-flow microfiltration
Published in Journal of membrane science (15-06-1995)“…The use of a helical-shape baffle in a mineral (Carbosep) membrane provided an increase of more than 50% in permeate flux compared with that obtained without a…”
Get full text
Journal Article Conference Proceeding -
12
An Efficient Algorithm for Media-based Surveillance System (EAMSuS) in IoT Smart City Framework
Published in Future generation computer systems (01-06-2018)“…Internet of Things (IoT) is the new technological revolution that aspires to connect all the everyday physical objects to the Internet, making a huge global…”
Get full text
Journal Article -
13
Cloud-assisted secure video transmission and sharing framework for smart cities
Published in Future generation computer systems (01-06-2018)“…With the innovations and increasing popularity of smart cities, video analytics (e.g., from social media, entertainment, surveillance, smart health monitoring,…”
Get full text
Journal Article -
14
PBNM and Economic Incentive Based Framework for Protection Against DDoS Attacks
Published in 2019 IEEE 8th Global Conference on Consumer Electronics (GCCE) (01-10-2019)“…DDoS attacks need to be handled by a technological solution built on mechanisms based on cooperation among different Internet entities by using economic…”
Get full text
Conference Proceeding -
15
Anomaly based Mitigation of Volumetric DDoS Attack Using Client Puzzle as Proof-of-Work
Published in 2018 3rd IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT) (01-05-2018)“…Increasing use of Internet has made its users vulnerable to various types of attacks like Distributed Denial of Service (DDoS) attack which makes the resources…”
Get full text
Conference Proceeding -
16
Secure blockchain enabled Cyber–physical systems in healthcare using deep belief network with ResNet model
Published in Journal of parallel and distributed computing (01-07-2021)“…Cyber–physical system (CPS) is the incorporation of physical processes with processing and data transmission. Cybersecurity is a primary and challenging issue…”
Get full text
Journal Article -
17
Drought occurrence in Different River Basins of India and blockchain technology based framework for disaster management
Published in Journal of cleaner production (20-08-2021)“…Drought assessment is crucial to mitigate its adverse impact, especially in India, where risk is more due to an increase in population and climate change…”
Get full text
Journal Article -
18
An efficient KP design framework of attribute‐based searchable encryption for user level revocation in cloud
Published in Concurrency and computation (25-09-2020)“…Summary Attribute‐based searchable encryption (ABSE) is the combination of attribute‐based encryption (ABE) and searchable encryption with the inherent…”
Get full text
Journal Article -
19
Smart defense against distributed Denial of service attack in IoT networks using supervised learning classifiers
Published in Computers & electrical engineering (01-03-2022)“…•Design an approach to detect DDoS attack in consumer IoT networks.•Prepare a dataset containing relevant IoT network features for enhanced attack…”
Get full text
Journal Article -
20
Multi attribute auction based incentivized solution against DDoS attacks
Published in Computers & security (01-05-2020)“…Complexity and severity of DDoS attacks is increasing day by day. Internet has highly inconsistent structure in terms of resource distribution. Numerous…”
Get full text
Journal Article