Items where Author is "Joshi, J"
Group by: Item Type | No Grouping Jump to: Article | Conference or Workshop Item Number of items: 7. ArticleKarimi, Maryam and Krishnamurthy, PV and Joshi, J and Tipper, David (2017) Mining Historical Data towards Interference Management in Wireless SDNs. Q2SWinet '17: Proceedings of the 13th ACM Symposium on QoS and Security for Wireless and Mobile Networks. Baracaldo, N and Palanisamy, B and Joshi, J (2014) Geo-social-rbac: A location-based socially aware access control framework. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 8792. 501 - 509. ISSN 0302-9743 Zargar, ST and Joshi, J and Tipper, D (2013) A survey of defense mechanisms against distributed denial of service (DDOS) flooding attacks. IEEE Communications Surveys and Tutorials, 15 (4). 2046 - 2069. Joshi, J and Carminati, B (2011) Guest editorial SACMAT 2009 and 2010. ACM Transactions on Information and System Security, 14 (3). ISSN 1094-9224 Conference or Workshop ItemLi, C and Palanisamy, B and Joshi, J (2017) Differentially Private Trajectory Analysis for Points-of-Interest Recommendation. In: UNSPECIFIED. Baracaldo, N and Masoumzadeh, A and Joshi, J (2011) A secure, constraint-aware role-based access control interoperation framework. In: UNSPECIFIED. Masoumzadeh, A and Joshi, J (2011) An alternative approach to k-anonymity for location-based services. In: UNSPECIFIED. |