The scientist’s investigation covers issues in Computer security, The Internet, Cloud computing, Artificial intelligence and Computer vision. His study in Computer security is interdisciplinary in nature, drawing from both Phishing, Spoofed URL, Denial-of-service attack and Smart city. His Denial-of-service attack research includes elements of Network security, Application layer, Digital identity and Taxonomy.
His research in The Internet intersects with topics in Layer, Bandwidth and Security privacy, Internet privacy. His Cloud computing study combines topics in areas such as Wireless, Wireless network, Database, Computer network and Big data. His studies in Artificial intelligence integrate themes in fields like Machine learning and Pattern recognition.
Brij B. Gupta mostly deals with Computer security, Denial-of-service attack, Cloud computing, The Internet and Artificial intelligence. His work in the fields of Authentication overlaps with other areas such as Service provider. His Authentication research is multidisciplinary, relying on both Overhead and Public-key cryptography.
His biological study spans a wide range of topics, including Network simulation, Computer network and Flooding. His work deals with themes such as Distributed computing and Big data, which intersect with Cloud computing. He works mostly in the field of Artificial intelligence, limiting it down to topics relating to Machine learning and, in certain cases, Phishing, as a part of the same area of interest.
Brij B. Gupta spends much of his time researching Artificial intelligence, Computer security, Denial-of-service attack, Machine learning and Deep learning. His study focuses on the intersection of Artificial intelligence and fields such as Pattern recognition with connections in the field of F1 score, Centroid and Intelligent decision support system. His work on Authentication as part of general Computer security research is often related to Defence mechanisms, thus linking different fields of science.
Brij B. Gupta combines subjects such as Probabilistic logic, Cloud computing and Reliability with his study of Denial-of-service attack. The Cloud computing study combines topics in areas such as Variable, Computer network and The Internet. The study incorporates disciplines such as Fake news, Internet privacy and Social network in addition to Deep learning.
His scientific interests lie mostly in Computer security, Artificial intelligence, Deep learning, Reputation and Convolutional neural network. His Computer security research includes themes of The Internet, Denial-of-service attack and Big data. The concepts of his Big data study are interwoven with issues in Computer network and Cloud computing.
His Artificial intelligence research is multidisciplinary, incorporating perspectives in Fake news, Internet privacy and Social network. His research integrates issues of Image, Enhanced Data Rates for GSM Evolution, Set and Pattern recognition in his study of Deep learning. He has included themes like Small and medium-sized enterprises, Cross-site scripting, Information privacy and Payload in his Convolutional neural network study.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Secure integration of IoT and Cloud Computing
Christos Stergiou;Kostas E. Psannis;Byung-Gyu Kim;Brij B. Gupta.
Future Generation Computer Systems (2018)
Efficient IoT-based sensor BIG Data collection–processing and analysis in smart buildings
Andreas P. Plageras;Kostas E. Psannis;Christos Stergiou;Haoxiang Wang.
Future Generation Computer Systems (2017)
Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security
Brij Gupta;Dharma P. Agrawal;Shingo Yamaguchi.
(2016)
An Efficient Algorithm for Media-based Surveillance System (EAMSuS) in IoT Smart City Framework
Vasileios A. Memos;Kostas E. Psannis;Yutaka Ishibashi;Byung-Gyu Kim.
Future Generation Computer Systems (2017)
A Survey of Phishing Email Filtering Techniques
Ammar Almomani;B. B. Gupta;Samer Atawneh;A. Meulenberg.
IEEE Communications Surveys and Tutorials (2013)
Cryptanalysis of a novel ultra-lightweight mutual authentication protocol for IoT devices using RFID tags
Aakanksha Tewari;B. B. Gupta.
The Journal of Supercomputing (2017)
Fighting against phishing attacks: state of the art and future challenges
B. B. Gupta;Aakanksha Tewari;Ankit Kumar Jain;Dharma P. Agrawal.
Neural Computing and Applications (2017)
Security in Internet of Things: issues, challenges, taxonomy, and architecture
Vipindev Adat;Brij B. Gupta.
Telecommunication Systems (2018)
Deep Recurrent neural network vs. support vector machine for aspect-based sentiment analysis of Arabic hotels’ reviews
Mohammad Al-Smadi;Omar Qawasmeh;Mahmoud Al-Ayyoub;Yaser Jararweh.
Journal of Computational Science (2017)
Taxonomy of DoS and DDoS attacks and desirable defense mechanism in a Cloud computing environment
B. B. Gupta;Omkar P. Badve.
Neural Computing and Applications (2017)
Duquesne University
Jordan University of Science and Technology
University of Cincinnati
Menoufia University
King Saud University
RMIT University
Shanghai Jiao Tong University
King Saud University
Guangzhou University
Xidian University
Profile was last updated on December 6th, 2021.
Research.com Ranking is based on data retrieved from the Microsoft Academic Graph (MAG).
The ranking d-index is inferred from publications deemed to belong to the considered discipline.
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below: