Anjali Sardana

According to our database1, Anjali Sardana authored at least 30 papers between 2007 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
Prediction of COVID-19 confirmed, death, and cured cases in India using random forest model.
Big Data Min. Anal., 2021

2013
Wireless Honeypot: Framework, Architectures and Tools.
Int. J. Netw. Secur., 2013

2012
Parallel Misuse and Anomaly Detection Model.
Int. J. Netw. Secur., 2012

An efficient fuzzy controller based technique for network traffic classification to improve QoS.
Proceedings of the 5th International Conference of Security of Information and Networks, 2012

Secure Private Cloud Architecture for Mobile Infrastructure as a Service.
Proceedings of the Eighth IEEE World Congress on Services, 2012

IDS Based Defense for Cloud Based Mobile Infrastructure as a Service.
Proceedings of the Eighth IEEE World Congress on Services, 2012

Searching in internet of things using VCS.
Proceedings of the First International Conference on Security of Internet of Things, 2012

Identity management framework for cloud based internet of things.
Proceedings of the First International Conference on Security of Internet of Things, 2012

A light weight centralized file monitoring approach for securing files in Cloud environment.
Proceedings of the 7th International Conference for Internet Technology and Secured Transactions, 2012

Secret information display based authentication technique towards preventing phishing attacks.
Proceedings of the 2012 International Conference on Advances in Computing, 2012

Protecting web applications from SQL injection attacks by using framework and database firewall.
Proceedings of the 2012 International Conference on Advances in Computing, 2012

Implementing private cloud at IIT Roorkee: an initial experience.
Proceedings of the 2012 International Conference on Advances in Computing, 2012

A Hybrid Intrusion Detection Architecture for Defense against DDoS Attacks in Cloud Environment.
Proceedings of the Contemporary Computing - 5th International Conference, 2012

Defending against internet worms using honeyfarm.
Proceedings of the CUBE International IT Conference & Exhibition, 2012

A secure and lightweight approach for critical data security in cloud.
Proceedings of the Fourth International Conference on Computational Aspects of Social Networks, 2012

A fingerprinting system calls approach for intrusion detection in a cloud environment.
Proceedings of the Fourth International Conference on Computational Aspects of Social Networks, 2012

Personal Secret Information Based Authentication towards Preventing Phishing Attacks.
Proceedings of the Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology (ACITY) July 13-15, 2012, Chennai, India, 2012

Key Distribution Schemes in Wireless Sensor Networks: Novel Classification and Analysis.
Proceedings of the Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology (ACITY) July 13-15, 2012, Chennai, India, 2012

2011
Dual-Level Attack Detection, Characterization and Response for Networks Under DDoS Attacks.
Int. J. Mob. Comput. Multim. Commun., 2011

Unified Modeling Technique for Threat Cause Ranking, Mitigation and Testing.
Proceedings of the Contemporary Computing - 4th International Conference, 2011

Multiple Secrets Sharing with Meaningful Shares.
Proceedings of the Advances in Computing and Communications, 2011

Secure Vault: A privacy preserving reliable architecture for Secure Social Networking.
Proceedings of the 7th International Conference on Information Assurance and Security, 2011

2010
Deciding optimal entropic thresholds to calibrate the detection mechanism for variable rate DDoS attacks in ISP domain: honeypot based approach.
J. Intell. Manuf., 2010

Dual-level defense for networks under DDoS attacks.
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010

Dual-Level Attack Detection and Characterization for Networks under DDoS.
Proceedings of the ARES 2010, 2010

2009
An auto-responsive honeypot architecture for dynamic resource allocation and QoS adaptation in DDoS attacked networks.
Comput. Commun., 2009

2008
Honeypot Based Routing to Mitigate DDoS Attacks on Servers at ISP Level.
Proceedings of the International Symposium on Information Processing, 2008

Autonomous dynamic honeypot routing mechanism for mitigating DDoS attacks in DMZ.
Proceedings of the 16th International Conference on Networks, 2008

2007
Simulation of Dynamic Honeypot Based Redirection to Counter Service Level DDoS Attacks.
Proceedings of the Information Systems Security, Third International Conference, 2007

Detection and Honeypot Based Redirection to Counter DDoS Attacks in ISP Domain.
Proceedings of the Third International Symposium on Information Assurance and Security, 2007


  Loading...