R. C. Joshi
YOU?
Author Swipe
View article: Integration of Functional Mock-up Interface with Discrete Event System Specification for Co-simulation of Discrete and Continuous-Time Models
Integration of Functional Mock-up Interface with Discrete Event System Specification for Co-simulation of Discrete and Continuous-Time Models Open
View article: Flexible Textile-Based Coaxial Transmission Lines for Wearable Applications
Flexible Textile-Based Coaxial Transmission Lines for Wearable Applications Open
Flexible and lightweight textile-based coaxial transmission lines for wearable applications are presented. In particular, textile yarns defined by copper (Cu), polyester (PES), and polytetrafluoroehtylene (PTFE) materials were used to desi…
View article: BSS: a brokering model for service selection using integrated weighting approach in cloud environment
BSS: a brokering model for service selection using integrated weighting approach in cloud environment Open
Cloud providers shares their resources and services through collaboration in order to increase resource utilization, profit and quality of services. The offered services with different access patterns, similar characteristics, varied perfo…
View article: BSS: A Brokering Model for Service Selection using Integrated Weighting approach in Federated Cloud
BSS: A Brokering Model for Service Selection using Integrated Weighting approach in Federated Cloud Open
Federated Cloud is a multi-cloud platform that integrates various cloud providers either through standardization or an agreement. The services offered by different federation members possess different access patterns, similar characteristi…
View article: Dual-Band, Dual-Sense Textile Antenna With AMC Backing for Localization Using GPS and WBAN/WLAN
Dual-Band, Dual-Sense Textile Antenna With AMC Backing for Localization Using GPS and WBAN/WLAN Open
A wearable textile antenna with dual-band and dual-sense characteristics is presented in this work. It operates at the 2.45 GHz band for WBAN and WLAN applications, and at the 1.575 GHz band for Global Positioning System (GPS) applications…
View article: Analysis and Design of Dual-Band Folded-Shorted Patch Antennas for Robust Wearable Applications
Analysis and Design of Dual-Band Folded-Shorted Patch Antennas for Robust Wearable Applications Open
A flexible folded-shorted patch (FSP) antenna with dual-band functionality for wearable applications is presented. The proposed antenna is operational at 400 MHz and 2.4 GHz and can be considered compact for the lower operational frequency…
View article: Design of a wireless power transfer system for assisted living applications
Design of a wireless power transfer system for assisted living applications Open
Advances in material science and semiconductor technology have enabled a variety of inventions to be implemented in electronic systems and devices used in the medical, telecommunications, and consumer electronics sectors. In this paper, a …
View article: Network Forensic Frameworks
Network Forensic Frameworks Open
In this chapter, various frameworks based on various criteria and their relevance with the network forensics is discussed. The various frameworks based on distributed systems, soft computing, honeynet, attack graph, formal method, aggregat…
View article: Network Forensic Acquisition
Network Forensic Acquisition Open
This chapter discusses about the acquisition of packets in the network forensic system. For the same topics such as TCP/IP protocol suite, packet capture format, pcapng dump file format, NetFlow record format, and IPFIX format are discusse…
View article: Cloud Forensics
Cloud Forensics Open
Cloud computing is a computing platform which provides everything as a service to the user in the digital world. Security is one of the deepest concerns in the cloud environment. Cloud forensics is the process of investigating and analyzin…
View article: Network Forensic Attribution
Network Forensic Attribution Open
Attribution is the process to investigate and attribute the attacks. In this chapter the attribution phase of network forensics is discussed. IP traceback mechanism is discussed with relevance to network forensics. Topics such as autonomou…
View article: Botnet Forensics
Botnet Forensics Open
Botnet is a network of compromised computers controlled by attackers. In this chapter botnet forensics with relevance to network forensics is discussed. To understand the botnet threat, the architectures, protocols, and life cycle of botne…
View article: Network Forensic Analysis
Network Forensic Analysis Open
Network forensic analysis is the activity performed by investigators to reconstruct the network activity over a period. The approach is commonly used to investigate individuals suspected of crimes and reconstruct a chain of events during a…
View article: Network Forensic Process Models
Network Forensic Process Models Open
In this chapter, various process models along with their various phases in the field of digital forensics and network forensics are discussed. The discussion in the field of processing digital forensics and network forensics is also given.…
View article: Network Forensic Tools
Network Forensic Tools Open
Various tools are available in the literature for doing the network forensics. In this chapter, first the network forensic analysis tools such as NetDetector, NetIntercept, OmniPeek, PyFlag, and Xplico are discussed. Next the vulnerability…
View article: Network Forensics
Network Forensics Open
This chapter discusses about the various terms used in the network forensics. The background of network forensics and difference with the network security is discussed. Classification of network forensics based on purpose, capture of packe…