Karuna Pande Joshi
Title
Cited by
Cited by
Year
On mining web access logs
A Joshi, K Joshi, R Krishnapuram
UMBC Computer Science and Electrical Engineering Department, 1999
1931999
Automating cloud services life cycle through semantic technologies
KP Joshi, Y Yesha, T Finin
IEEE Transactions on Services Computing 7 (1), 109-122, 2014
872014
Warehousing and mining web logs
KP Joshi, A Joshi, Y Yesha, R Krishnapuram
Proceedings of the 2nd international workshop on Web information and data …, 1999
861999
A semantic approach to cloud security and compliance
A Hendre, KP Joshi
2015 IEEE 8th International Conference on Cloud Computing, 1081-1084, 2015
672015
On using a warehouse to analyze web logs
KP Joshi, A Joshi, Y Yesha
Distributed and Parallel Databases 13 (2), 161-180, 2003
642003
Generating Digital Twin models using Knowledge Graphs for Industrial Production Lines
A Banerjee, R Dalal, S Mittal, KP Joshi
Workshop on Industrial Knowledge Graphs, co-located with the 9th …, 2017
472017
Attribute Based Encryption for Secure Access to Cloud Based EHR Systems
MP Joshi, KP Joshi, T Finin
International Conference on Cloud Computing, 2018
432018
Integrated Lifecycle of IT Services in a Cloud Environment (Detailed paper)
KP Joshi, T Finin, Y Yesha
In proceedings of The Third International Conference on the Virtual …, 2010
392010
Analysis of data mining algorithms
KP Joshi
University of Maryland, Baltimore County 25, 2005, 1997
381997
Automating cloud service level agreements using semantic technologies
KP Joshi, C Pearce
2015 IEEE International Conference on Cloud Engineering, 416-421, 2015
332015
Early Detection of Cybersecurity Threats Using Collaborative Cognition
SN Narayanan, A Ganesan, K Joshi, T Oates, A Joshi, T Finin
2018 IEEE 4th International Conference on Collaboration and Internet …, 2018
322018
Automatic extraction of metrics from slas for cloud service management
S Mittal, KP Joshi, C Pearce, A Joshi
2016 IEEE International Conference on Cloud Engineering (IC2E), 139-142, 2016
322016
Anomaly Detection Models for Smart Home Security
S Ramapatruni, SN Narayanan, S Mittal, A Joshi, K Joshi
2019 IEEE 5th Intl Conference on Big Data Security on Cloud (BigDataSecurity …, 2019
292019
Semantic Approach to Automating Management of Big Data Privacy Policies
KP Joshi, A Gupta, S Mittal, C Pearce, A Joshi, T Finin
IEEE BigData 2016, 10, 2016
262016
Context-sensitive policy based security in internet of things
PK Das, S Narayanan, NK Sharma, A Joshi, K Joshi, T Finin
2016 IEEE International Conference on Smart Computing (SMARTCOMP), 1-6, 2016
262016
Managing the quality of virtualized services
KP Joshi, A Joshi, Y Yesha
2011 Annual SRII Global Conference, 300-307, 2011
252011
Framework for Cloud Usability
B Stanton, M Theofanos, KP Joshi
NISTIR 6400 (201), 379-405, 2014
232014
Semantically Rich, Oblivious Access Control Using ABAC for Secure Cloud Storage
M Joshi, S Mittal, KP Joshi, T Finin
Proceedings of the First IEEE International Conference on Edge Computing, 2017
212017
Link Before You Share: Managing Privacy Policies through Blockchain
A Banerjee, KP Joshi
4th International Workshop on Privacy and Security of Big Data (PSBD 2017 …, 2017
202017
ALDA: Cognitive Assistant for Legal Document Analytics
KP Joshi, A Gupta, S Mittal, C Pearce, A Joshi, T Finin
AAAI Fall Symposium 2016, 2016
202016
The system can't perform the operation now. Try again later.
Articles 1–20