Ramesh C. Joshi, PhD
Affiliations: | Electronics and Computer Engineering | IIT Roorkee |
Website:
http://www.iitr.ac.in/~ECE/rcjosfecGoogle:
"Ramesh Joshi"Bio:
Dr. R.C. Joshi Ex. Prof. E. & C.E. Department at IIT Roorkee and Chancellor at Graphic Era University Dehradun was born in Pithoragarh District on 1st June 1946.He received his B.E degree from NIT Allahabad in1967,M.E.1st Div. with Honors and Ph.D Degree from Roorkee University, now IIT Roorkee, in 1970 & 1980 respectively.
(Show more)
Children
Sign in to add traineeHemant Darbari | grad student | 1985-1990 | IIT Roorkee |
Nupur Prakash | grad student | 1995-1998 | Punjab university |
Mayank Dave | grad student | 2000-2003 | IIT Roorkee |
Shashikala Tapasvi | grad student | 2000-2003 | IIT Roorkee |
Lalit Kumar Awasthi | grad student | 2001-2004 | IIT Roorkee |
Archna M. Rajukar | grad student | 2001-2004 | IIT Roorkee |
Durga Toshniwal | grad student | 2002-2005 | IIT Roorkee |
Narottam Chand | grad student | 2002-2006 | IIT Roorkee |
Mohd Abdul Hai Zahid | grad student | 2004-2007 | IIT Roorkee |
Krishnan Kumar | grad student | 2005-2008 | IIT Roorkee |
Kota Solomon Raju | grad student | 2005-2008 | IIT Roorkee |
Anjali Sardana | grad student | 2006-2009 | IIT Roorkee |
Teek Parval Sharma | grad student | 2006-2009 | IIT Roorkee |
BETA: Related publications
See more...
Publications
You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect. |
Bijalwan A, Wazid M, Pilli ES, et al. (2015) Forensics of Random-UDP Flooding Attacks Journal of Networks. 10 |
Awasthi LK, Misra M, Joshi RC. (2014) Minimum mutable checkpoint-based coordinated checkpointing protocol for mobile distributed systems International Journal of Communication Networks and Distributed Systems. 12: 356-380 |
Goel R, Sardana A, Joshi RC. (2013) Wireless honeypot: Framework, architectures and tools International Journal of Network Security. 15: 373-383 |
Goel R, Sardana A, Joshi RC. (2012) Parallel misuse and anomaly detection model International Journal of Network Security. 14: 211-222 |
Awasthi LK, Misra M, Joshi RC. (2012) An efficient coordinated checkpointing approach for distributed computing systems with reliable channels International Journal of Computers and Applications. 34: 1-10 |
Varshney G, Sardana A, Joshi RC. (2012) Secret information display based authentication technique towards preventing phishing attacks Acm International Conference Proceeding Series. 602-608 |
Varshney G, Joshi RC, Sardana A, et al. (2012) A conceptual framework for pre deployment network analysis of specification driven systems 2012 International Conference On Computer and Information Science, Iccis 2012 - a Conference of World Engineering, Science and Technology Congress, Estcon 2012 - Conference Proceedings. 2: 868-873 |
Varshney G, Joshi RC, Sardana A. (2012) Personal secret information based authentication towards preventing phishing attacks Advances in Intelligent Systems and Computing. 176: 31-42 |
Patil BM, Joshi RC, Toshniwal D, et al. (2011) A new approach: role of data mining in prediction of survival of burn patients. Journal of Medical Systems. 35: 1531-42 |
Chauhan N, Awasthi LK, Chand N, et al. (2011) Cooperative caching in mobile ad hoc networks International Journal of Mobile Computing and Multimedia Communications. 3: 20-35 |