Skip to main content

Showing 1–6 of 6 results for author: Joshi, R C

Searching in archive cs. Search in all archives.
.
  1. arXiv:1805.05927  [pdf

    cs.CL

    CLINIQA: A Machine Intelligence Based Clinical Question Answering System

    Authors: M A H Zahid, Ankush Mittal, R. C. Joshi, G. Atluri

    Abstract: The recent developments in the field of biomedicine have made large volumes of biomedical literature available to the medical practitioners. Due to the large size and lack of efficient searching strategies, medical practitioners struggle to obtain necessary information available in the biomedical literature. Moreover, the most sophisticated search engines of age are not intelligent enough to inter… ▽ More

    Submitted 15 May, 2018; originally announced May 2018.

    Comments: This manuscript was submitted to IEEE Transactions on Information Technology in Biomedicine in 2007 and was in second revision when it was withdrawn. As I moved to industry and could not get enough time to revise it. I am uploading it here for anyone interested in conventional ML based approach to NLP

    MSC Class: 68T50

  2. arXiv:1208.3557  [pdf

    cs.CR

    Distributed Denial of Service Prevention Techniques

    Authors: B. B. Gupta, R. C. Joshi, Manoj Misra

    Abstract: The significance of the DDoS problem and the increased occurrence, sophistication and strength of attacks has led to the dawn of numerous prevention mechanisms. Each proposed prevention mechanism has some unique advantages and disadvantages over the others. In this paper, we present a classification of available mechanisms that are proposed in literature on preventing Internet services from possib… ▽ More

    Submitted 17 August, 2012; originally announced August 2012.

    Comments: ISSN: 1793-8198

    Journal ref: International Journal of Computer and Electrical Engineering (IJCEE), vol. 2, number 2, pp. 268-276, 2010

  3. arXiv:1204.5592  [pdf

    cs.CR

    Dynamic and Auto Responsive Solution for Distributed Denial-of-Service Attacks Detection in ISP Network

    Authors: B. B. Gupta, R. C. Joshi, Manoj Misra

    Abstract: Denial of service (DoS) attacks and more particularly the distributed ones (DDoS) are one of the latest threat and pose a grave danger to users, organizations and infrastructures of the Internet. Several schemes have been proposed on how to detect some of these attacks, but they suffer from a range of problems, some of them being impractical and others not being effective against these attacks. Th… ▽ More

    Submitted 25 April, 2012; originally announced April 2012.

    Comments: arXiv admin note: substantial text overlap with arXiv:1203.2400

    Journal ref: International Journal of Computer Theory and Engineering, Vol. 1, No. 1, April 2009 1793-821X

  4. An Efficient Analytical Solution to Thwart DDoS Attacks in Public Domain

    Authors: B. B. Gupta, R. C. Joshi, Manoj Misra

    Abstract: In this paper, an analytical model for DDoS attacks detection is proposed, in which propagation of abrupt traffic changes inside public domain is monitored to detect a wide range of DDoS attacks. Although, various statistical measures can be used to construct profile of the traffic normally seen in the network to identify anomalies whenever traffic goes out of profile, we have selected volume and… ▽ More

    Submitted 25 April, 2012; originally announced April 2012.

    Comments: arXiv admin note: substantial text overlap with arXiv:1203.2400

    Journal ref: Proceedings of ACM International Conference on Advances in Computer, Communication and Computing (ICAC3-2008), pp. 503-509, Jan. 23-24, 2009,India

  5. arXiv:1203.2400  [pdf

    cs.CR

    An ISP Level Solution to Combat DDoS Attacks using Combined Statistical Based Approach

    Authors: B. B. Gupta, Manoj Misra, R. C. Joshi

    Abstract: Disruption from service caused by DDoS attacks is an immense threat to Internet today. These attacks can disrupt the availability of Internet services completely, by eating either computational or communication resources through sheer volume of packets sent from distributed locations in a coordinated manner or graceful degradation of network performance by sending attack traffic at low rate. In th… ▽ More

    Submitted 12 March, 2012; originally announced March 2012.

    Journal ref: International Journal of Information Assurance and Security (JIAS), vol. 3, no. 2, pp. 102-110, 2008

  6. arXiv:1203.2399  [pdf

    cs.CR

    Estimating strength of DDoS attack using various regression models

    Authors: B. B. Gupta, R. C. Joshi, Manoj Misra

    Abstract: Anomaly-based DDoS detection systems construct profile of the traffic normally seen in the network, and identify anomalies whenever traffic deviate from normal profile beyond a threshold. This extend of deviation is normally not utilised. This paper reports the evaluation results of proposed approach that utilises this extend of deviation from detection threshold to estimate strength of DDoS attac… ▽ More

    Submitted 12 March, 2012; originally announced March 2012.

    Journal ref: Int. J. Multimedia Intelligence and Security, Vol. 1, No. 4, pp.378-391