Karuna Pande Joshi
Cited by
Cited by
On mining web access logs
A Joshi, K Joshi, R Krishnapuram
UMBC Computer Science and Electrical Engineering Department, 1999
Automating cloud services life cycle through semantic technologies
KP Joshi, Y Yesha, T Finin
IEEE Transactions on Services Computing 7 (1), 109-122, 2014
Warehousing and mining web logs
KP Joshi, A Joshi, Y Yesha, R Krishnapuram
Proceedings of the 2nd international workshop on Web information and data …, 1999
A semantic approach to cloud security and compliance
A Hendre, KP Joshi
2015 IEEE 8th International Conference on Cloud Computing, 1081-1084, 2015
On using a warehouse to analyze web logs
KP Joshi, A Joshi, Y Yesha
Distributed and Parallel Databases 13 (2), 161-180, 2003
Generating Digital Twin models using Knowledge Graphs for Industrial Production Lines
A Banerjee, R Dalal, S Mittal, KP Joshi
Workshop on Industrial Knowledge Graphs, co-located with the 9th …, 2017
Attribute Based Encryption for Secure Access to Cloud Based EHR Systems
MP Joshi, KP Joshi, T Finin
International Conference on Cloud Computing, 2018
Integrated Lifecycle of IT Services in a Cloud Environment (Detailed paper)
KP Joshi, T Finin, Y Yesha
In proceedings of The Third International Conference on the Virtual …, 2010
Analysis of data mining algorithms
KP Joshi
University of Maryland, Baltimore County 25, 2005, 1997
Automating cloud service level agreements using semantic technologies
KP Joshi, C Pearce
2015 IEEE International Conference on Cloud Engineering, 416-421, 2015
Early Detection of Cybersecurity Threats Using Collaborative Cognition
SN Narayanan, A Ganesan, K Joshi, T Oates, A Joshi, T Finin
2018 IEEE 4th International Conference on Collaboration and Internet …, 2018
Automatic extraction of metrics from slas for cloud service management
S Mittal, KP Joshi, C Pearce, A Joshi
2016 IEEE International Conference on Cloud Engineering (IC2E), 139-142, 2016
Anomaly Detection Models for Smart Home Security
S Ramapatruni, SN Narayanan, S Mittal, A Joshi, K Joshi
2019 IEEE 5th Intl Conference on Big Data Security on Cloud (BigDataSecurity …, 2019
Semantic Approach to Automating Management of Big Data Privacy Policies
KP Joshi, A Gupta, S Mittal, C Pearce, A Joshi, T Finin
IEEE BigData 2016, 10, 2016
Context-sensitive policy based security in internet of things
PK Das, S Narayanan, NK Sharma, A Joshi, K Joshi, T Finin
2016 IEEE International Conference on Smart Computing (SMARTCOMP), 1-6, 2016
Managing the quality of virtualized services
KP Joshi, A Joshi, Y Yesha
2011 Annual SRII Global Conference, 300-307, 2011
Framework for Cloud Usability
B Stanton, M Theofanos, KP Joshi
NISTIR 6400 (201), 379-405, 2014
Semantically Rich, Oblivious Access Control Using ABAC for Secure Cloud Storage
M Joshi, S Mittal, KP Joshi, T Finin
Proceedings of the First IEEE International Conference on Edge Computing, 2017
Link Before You Share: Managing Privacy Policies through Blockchain
A Banerjee, KP Joshi
4th International Workshop on Privacy and Security of Big Data (PSBD 2017 …, 2017
ALDA: Cognitive Assistant for Legal Document Analytics
KP Joshi, A Gupta, S Mittal, C Pearce, A Joshi, T Finin
AAAI Fall Symposium 2016, 2016
The system can't perform the operation now. Try again later.
Articles 1–20