Link to the University of Pittsburgh Homepage
Link to the University Library System Homepage Link to the Contact Us Form

Items where Author is "Joshi, J"

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Item Type | No Grouping
Number of items: 7.

Article

Karimi, Maryam and Krishnamurthy, PV and Joshi, J and Tipper, David (2017) Mining Historical Data towards Interference Management in Wireless SDNs. Q2SWinet '17: Proceedings of the 13th ACM Symposium on QoS and Security for Wireless and Mobile Networks.

Baracaldo, N and Palanisamy, B and Joshi, J (2014) Geo-social-rbac: A location-based socially aware access control framework. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 8792. 501 - 509. ISSN 0302-9743

Zargar, ST and Joshi, J and Tipper, D (2013) A survey of defense mechanisms against distributed denial of service (DDOS) flooding attacks. IEEE Communications Surveys and Tutorials, 15 (4). 2046 - 2069.

Joshi, J and Carminati, B (2011) Guest editorial SACMAT 2009 and 2010. ACM Transactions on Information and System Security, 14 (3). ISSN 1094-9224

Conference or Workshop Item

Li, C and Palanisamy, B and Joshi, J (2017) Differentially Private Trajectory Analysis for Points-of-Interest Recommendation. In: UNSPECIFIED.

Baracaldo, N and Masoumzadeh, A and Joshi, J (2011) A secure, constraint-aware role-based access control interoperation framework. In: UNSPECIFIED.

Masoumzadeh, A and Joshi, J (2011) An alternative approach to k-anonymity for location-based services. In: UNSPECIFIED.

This list was generated on Fri May 9 23:31:32 2025 EDT.