On mining web access logs A Joshi, K Joshi, R Krishnapuram UMBC Computer Science and Electrical Engineering Department, 1999 | 202 | 1999 |
Generating Digital Twin models using Knowledge Graphs for Industrial Production Lines A Banerjee, R Dalal, S Mittal, KP Joshi Workshop on Industrial Knowledge Graphs, co-located with the 9th …, 2017 | 123 | 2017 |
Attribute Based Encryption for Secure Access to Cloud Based EHR Systems MP Joshi, KP Joshi, T Finin International Conference on Cloud Computing, 2018 | 104 | 2018 |
A semantic approach to cloud security and compliance A Hendre, KP Joshi 2015 IEEE 8th International Conference on Cloud Computing, 1081-1084, 2015 | 101 | 2015 |
Automating cloud services life cycle through semantic technologies KP Joshi, Y Yesha, T Finin IEEE Transactions on Services Computing 7 (1), 109-122, 2014 | 95 | 2014 |
Anomaly Detection Models for Smart Home Security S Ramapatruni, SN Narayanan, S Mittal, A Joshi, K Joshi 2019 IEEE 5th Intl Conference on Big Data Security on Cloud (BigDataSecurity …, 2019 | 87 | 2019 |
Ontologies and Artificial Intelligence Systems for the Cooperative Smart Farming Ecosystem SSL Chukkapalli, S Mittal, M Gupta, M Abdelsalam, A Joshi, R Sandhu, ... IEEE Access 8, 164045-164064, 2020 | 86 | 2020 |
Early Detection of Cybersecurity Threats Using Collaborative Cognition SN Narayanan, A Ganesan, K Joshi, T Oates, A Joshi, T Finin 2018 IEEE 4th International Conference on Collaboration and Internet …, 2018 | 86 | 2018 |
Warehousing and mining web logs KP Joshi, A Joshi, Y Yesha, R Krishnapuram Proceedings of the 2nd international workshop on Web information and data …, 1999 | 85 | 1999 |
On using a warehouse to analyze web logs KP Joshi, A Joshi, Y Yesha Distributed and Parallel Databases 13, 161-180, 2003 | 69 | 2003 |
Blockchains for Government: Use Cases and Challenges J Clavin, S Duan, H Zhang, VP Janeja, KP Joshi, Y Yesha, LC Erickson, ... Digital Government: Research and Practice 1 (3), 1-21, 2020 | 60 | 2020 |
An Integrated Knowledge Graph to Automate GDPR and PCI DSS Compliance L Elluri, A Nagar, KP Joshi IEEE International Conference on Big Data 2018, 2018 | 46 | 2018 |
Automating cloud service level agreements using semantic technologies KP Joshi, C Pearce 2015 IEEE International Conference on Cloud Engineering, 416-421, 2015 | 40 | 2015 |
Integrated Lifecycle of IT Services in a Cloud Environment (Detailed paper) KP Joshi, T Finin, Y Yesha In proceedings of The Third International Conference on the Virtual …, 2010 | 40 | 2010 |
Semantic Approach to Automating Management of Big Data Privacy Policies KP Joshi, A Gupta, S Mittal, C Pearce, A Joshi, T Finin IEEE BigData 2016, 10, 2016 | 39 | 2016 |
Automatic extraction of metrics from slas for cloud service management S Mittal, KP Joshi, C Pearce, A Joshi 2016 IEEE International Conference on Cloud Engineering (IC2E), 139-142, 2016 | 38 | 2016 |
Analysis of data mining algorithms KP Joshi University of Maryland, Baltimore County 25, 2005, 1997 | 37 | 1997 |
Context-sensitive policy based security in internet of things PK Das, S Narayanan, NK Sharma, A Joshi, K Joshi, T Finin 2016 IEEE International Conference on Smart Computing (SMARTCOMP), 1-6, 2016 | 35 | 2016 |
A Knowledge Representation of Cloud Data controls for EU GDPR Compliance L Elluri, KP Joshi 11th IEEE International Conference on Cloud Computing (CLOUD), 2018 | 34 | 2018 |
Delegated authorization framework for EHR services using attribute-based encryption M Joshi, KP Joshi, T Finin IEEE transactions on services computing 14 (6), 1612-1623, 2019 | 33 | 2019 |