Book Chapters
1. Ashish Joshi “Efficient Analysis in the healthcare domain using Machine Learning–Telemedicine the Computer Transformation of Healthcare TELe-Health, 2021 Springer.
2. Tapping the Big Data Analytics and IOT in the pandemic era, In CRC BHBA'21 Digital Health Transformation using Blockchain and Artificial Intelligence, CRC Press, Taylor and Francis Group, Advances in Smart healthcare Technologies, 2021.
Journal publications
3. A. Joshi, A. Dumka, A. Raturi, S. Kumar, and I. Pant, “Modeling real time object identification performance evaluation with YOLO,” Ymerdigital.com. [Online]. Available: https://ymerdigital.com/uploads/YMER210604.pdf. [Accessed: 26-May-2023].
4. Ashish Joshi, R. H. Goudar, and Kanak Tewari, "A Fault Tolerance Architecture: A Solution for Routing Protocols with Improved Convergence and Reduced Flooding," International Journal of Information and Education Technology vol. 2, no. 5, pp. 480-482, 2012.
5. A. Joshi, K. Tewari, V. Kumar, and D. Bordoloi, “Integrating static analysis tools for improving operating system security,” Ijcsmc.com. [Online]. Available: https://www.ijcsmc.com/docs/papers/April2014/V3I4201499b34.pdf
6. X. Uniyal and P. Barthwal, A. Joshi “Wine quality evaluation using machine learning algorithms,” Asia-pacific Journal of Convergent Research Interchange, vol. 3, no. 4, pp. 1–9, 2017.
7. A. Kumar, A. Joshi, A. Kumar, A. Mittal, and D. R. Gangodkar, “Template matching application in Geo-referencing of remote sensing temporal image,” Int. J. Signal Process. Image Process. Pattern Recognit., vol. 7, no. 2, pp. 201–210, 2014.
Conferences Publication
1. I. Pant and A. Joshi, “Wireless motes outlier detection taxonomy using ML-based techniques,” in Advances in Intelligent Systems and Computing, Singapore: Springer Singapore, 2022, pp. 75–83.
2. A. Joshi, A. Dhumka, Y. Dhiman, C. Rawat, and Ritika, “A comparative study of supervised learning techniques for remote sensing image classification,” in Advances in Intelligent Systems and Computing, Singapore: Springer Singapore, 2022, pp. 49–61.
3. K. K. Gola, G. Khan, A. Joshi, and R. Rathore, “KKG-512: A new approach for kryptos key generation of size 512 bits using plaintext,” in International Conference on Intelligent Computing and Smart Communication 2019, Singapore: Springer Singapore, 2020, pp. 167–181.
4. K. Tewari, A. Joshi, S. Garg, R. H. Goudar, and D. Bordoloi, “A resilient platform for safe execution of software inside a dynamic environment,” in 2013 7th International Conference on Intelligent Systems and Control (ISCO), 2013, pp. 476–479.
5. A. Joshi, K. Tewari, A. Kumar, and B. Pant, “A multi-language CLIR with classification by rational agents,” in 2013 International Conference on Information Systems and Computer Networks, 2013, pp. 94–97.
6. A. Joshi, K. Tewari, B. Pant, and R. H. Goudar, “‘Eco-computation’: A step towards more friendly green computing,” in Advances in Intelligent Systems and Computing, New Delhi: Springer India, 2014, pp. 983–991.
7. A. Joshi, S. Kumar, and R. H. Goudar, “A more multifactor secure authentication scheme based on graphical authentication,” in 2012 International Conference on Advances in Computing and Communications, 2012, pp. 186–189.
8. S. Kumar, A. Joshi, and A. Raturi, “Study on smart security measures in threat and risk assessment,” in 2022 3rd International Conference on Computing, Analytics and Networks (ICAN), 2022, pp. 1–4.
9. A. Raturi, S. Kumar, and A. Joshi, “Security risk assessment & mitigation framework for cloud-based IT systems,” in 2022 3rd International Conference on Computing, Analytics and Networks (ICAN), 2022, pp. 1–5.
10. A. Joshi, A. Raturi, S. Kumar, A. Dumka, and D. P. Singh, “Improved security and privacy in cloud data security and privacy: Measures and attacks,” in 2022 International Conference on Fourth Industrial Revolution Based Technology and Practices (ICFIRTP), 2022, pp. 230–233.
11. A. Joshi, A. Raturi, and S. Kumar, “An analysis of vulnerability scanners in web applications for VAPT,” in 2022 International Conference on Computational Intelligence and Sustainable Engineering Solutions (CISES), 2022, pp. 278–283.
Keynote Address
• Invited keynote speaker for webinar The core of Computational Intelligence -Volume-2 Accelerating Artificial Intelligence including robotics and IOT interventions, WIT Dehradun 04/02/2021 organized by MHRD.
• Invited Technical Speaker in “National conference on Emerging Paradigms in Big Data Analysis in cloud computing Environment (NCBDCCE-2015)”, 21-22 Sept 2015.
• Technical Speaker in "Emerging paradigms in cloud computing and communication convergence", 06-7 May 2016.
Portfolio
Throughout my academic journey, I have consistently excelled in the field of cybersecurity, earning recognition for my dedication and expertise. My achievements include several prestigious certifications that validate my skills in network security, ethical hacking, and risk management. I have actively participated in cybersecurity competitions, where my team secured top positions, demonstrating our ability to devise effective security solutions under pressure. Additionally, I completed a comprehensive research project that explored emerging threats and mitigation strategies, contributing valuable insights to the field. My commitment to continuous learning is evident as I stay updated with the latest industry trends and best practices. As I pursue further opportunities in cybersecurity, I am eager to leverage my knowledge and experience to enhance organizational security and protect sensitive information in an increasingly digital world.
Research
Certifications
ashish@cseind.in
+919634884434
© 2025. All rights reserved.