134 results on '"SOMANI, GAURAV"'
Search Results
2. Cyber Attack Victim Separation: New Dimensions to Minimize Attack Effects by Resource Management
3. Service separation assisted DDoS attack mitigation in cloud targets
4. Detecting Cloud Originated DDoS Attacks at the Source Using Out-Cloud Attack Detection (OCAD)
5. Origin Information Assisted Hybrid Analysis to Detect APT Malware
6. Establishing forensics capabilities in the presence of superuser insider threats
7. DDoS Attacks in Cloud Computing: Issues, Taxonomy, and Future Directions
8. Serving while attacked: DDoS attack effect minimization using page separation and container allocation strategy
9. Security Infrastructure for Cyber Attack Targeted Networks and Services
10. Detecting Cloud Originated DDoS Attacks at the Source Using Out-Cloud Attack Detection (OCAD)
11. Cross-VM Attacks: Attack Taxonomy, Defense Mechanisms, and New Directions
12. QuickDedup: Efficient VM deduplication in cloud computing environments
13. A fuzzy similarity-based rough set approach for attribute selection in set-valued information systems
14. A Fuzzy Regression Technique Through Same-Points in Fuzzy Geometry
15. VUPIC: Virtual Machine Usage Based Placement in IaaS Cloud
16. Origin Information Assisted Hybrid Analysis to Detect APT Malware
17. Secure File Deletion for Solid State Drives
18. Access Control and Authentication in the Internet of Things Environment
19. DDoS attacks in cloud computing: Issues, taxonomy, and future directions
20. DDoS Protection and Security Assurance in Cloud
21. Security of Cloud-Based Storage
22. DARAC: DDoS Mitigation Using DDoS Aware Resource Allocation in Cloud
23. On the timing of applying resource separation during DDoS attacks
24. DDoS attacks in cloud computing: Collateral damage to non-targets
25. Index Page Based EDoS Attacks in Infrastructure Cloud
26. Cross-VM Attacks: Attack Taxonomy, Defense Mechanisms, and New Directions
27. Amplification/Reflection attack suppression using victim separation
28. Service resizing for quick DDoS mitigation in cloud computing environment
29. Allocation of Slotted Deadline Sensitive Leases in Infrastructure Cloud
30. Load Balancing in Xen Virtual Machine Monitor
31. Virtual Machine Placement in IaaS Cloud
32. Policy based resource allocation in IaaS cloud
33. DDoS attack mitigation in cloud targets using scale-inside out assisted container separation
34. DARAC: DDoS Mitigation Using DDoS Aware Resource Allocation in Cloud
35. DDoS at a Glance: Attack Launch to Solutions
36. Allocation of Slotted Deadline Sensitive Leases in Infrastructure Cloud
37. Vulvet
38. A Systematic Survey on Cloud Forensics Challenges, Solutions, and Future Directions
39. A fuzzy similarity-based rough set approach for attribute selection in set-valued information systems
40. A Systematic Survey on Cloud Forensics Challenges, Solutions, and Future Directions.
41. Integration of Cloud, Internet of Things, and Big Data Analytics
42. Scale Inside-Out: Rapid Mitigation of Cloud DDoS Attacks
43. DDoS victim service containment to minimize the internal collateral damages in cloud computing
44. AndroTaint: An efficient android malware detection framework using dynamic taint analysis
45. Combating DDoS Attacks in the Cloud: Requirements, Trends, and Future Directions
46. Integration of Cloud, Internet of Things, and Big Data Analytics.
47. Service resizing for quick DDoS mitigation in cloud computing environment
48. Anti-Hijack: Runtime Detection of Malware Initiated Hijacking in Android
49. DDoS/EDoS attack in cloud
50. Client-side verifiable accounting in infrastructure cloud
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.