Ashok Singh Sairam

Orcid: 0000-0001-9527-6496

According to our database1, Ashok Singh Sairam authored at least 41 papers between 2006 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Relationship between Noise addition and Compression based methods for Differential Privacy in Multi-Agent Systems.
Proceedings of the IEEE International Conference on Advanced Networks and Telecommunications Systems, 2023

Detecting toxic comments from highly skewed social media data.
Proceedings of the IEEE International Conference on Advanced Networks and Telecommunications Systems, 2023

2022
A Budget and Deadline Aware Task Assignment Scheme for Crowdsourcing Environment.
IEEE Trans. Emerg. Top. Comput., 2022

Ripple: An approach to locate <i>k</i> nearest neighbours for location-based services.
Inf. Syst., 2022

A multi-objective worker selection scheme in crowdsourced platforms using NSGA-II.
Expert Syst. Appl., 2022

LALB: An SDN Architecture for Dynamic Load Balancing.
Proceedings of the IEEE International Conference on Advanced Networks and Telecommunications Systems, 2022

2021
Controller placement problem in software-defined networking: A survey.
Networks, 2021

2020
An analytical model for information gathering and propagation in social networks using random graphs.
Data Knowl. Eng., 2020

2019
A Survey of Controller Placement Problem in Software Defined Networks.
CoRR, 2019

Worker Selection in Crowd-sourced Platforms using Non-dominated Sorting.
Proceedings of the TENCON 2019, 2019

Predictive Flow Modeling in Software Defined Network.
Proceedings of the TENCON 2019, 2019

Detecting Semantic Attacks in Intelligent Transport System.
Proceedings of the 4th International Conference on Intelligent Transportation Engineering, 2019

2018
Distributed star coloring of network for IP traceback.
Int. J. Inf. Sec., 2018

Wireless Precision Time Protocol.
IEEE Commun. Lett., 2018

Modeling privacy approaches for location based services.
Comput. Networks, 2018

IP Traceback in Dynamic Networks.
Proceedings of the Security and Privacy - Second ISEA International Conference, 2018

Using Bounded Binary Particle Swarm Optimization to Analyze Network Attack Graphs.
Proceedings of the 19th International Conference on Distributed Computing and Networking, 2018

Optimizing flow setup time in software defined network.
Proceedings of the 10th International Conference on Communication Systems & Networks, 2018

2017
Modeling and Performance Comparison of Privacy Approaches for Location Based Services.
CoRR, 2017

Concurrent Team Formation for Multiple Tasks in Crowdsourcing Platform.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

2016
Increasing the effectiveness of packet marking schemes using wrap-around counting Bloom filter.
Secur. Commun. Networks, 2016

Increasing Accuracy and Reliability of IP Traceback for DDoS Attack Using Completion Condition.
Int. J. Netw. Secur., 2016

Efficient user assignment in crowd sourcing applications.
Proceedings of the 2016 International Conference on Advances in Computing, 2016

Tunable synchronization in duty-cycled wireless sensor networks.
Proceedings of the 2016 IEEE International Conference on Advanced Networks and Telecommunications Systems, 2016

2015
Coloring networks for attacker identification and response.
Secur. Commun. Networks, 2015

Network Attack Detection and Mitigation.
Proceedings of the 2015 IEEE International Conference on Self-Adaptive and Self-Organizing Systems Workshops, 2015

Using CAPTCHA Selectively to Mitigate HTTP-Based Attacks.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

2014
Extended deterministic edge router marking.
Int. J. Commun. Networks Distributed Syst., 2014

Modelling energy efficiency of OR protocols in wireless networks.
Int. J. Ad Hoc Ubiquitous Comput., 2014

ICMP based IP traceback with negligible overhead for highly distributed reflector attack using bloom filters.
Comput. Commun., 2014

Implementation of an Adaptive Traffic-aware Firewall.
Proceedings of the 7th International Conference on Security of Information and Networks, 2014

2013
Professors - the new YouTube stars: education through Web 2.0 and social network.
Int. J. Web Based Communities, 2013

TOAR: transmission-aware opportunistic ad hoc routing protocol.
EURASIP J. Wirel. Commun. Netw., 2013

Time synchronization protocol for 6LoWPAN.
Proceedings of the International Conference on Advances in Computing, 2013

IP traceback in star colored networks.
Proceedings of the Fifth International Conference on Communication Systems and Networks, 2013

2012
On energy consumption analysis for ad hoc routing protocols.
Proceedings of the 2012 International Conference on Advances in Computing, 2012

Genetic algorithm combined with support vector machine for building an intrusion detection system.
Proceedings of the 2012 International Conference on Advances in Computing, 2012

Linear and Remainder Packet Marking for fast IP traceback.
Proceedings of the Fourth International Conference on Communication Systems and Networks, 2012

Audio steganography using LSB encoding technique with increased capacity and bit error rate optimization.
Proceedings of the Second International Conference on Computational Science, 2012

2011
FC-DERM: Fragmentation compatible deterministic edge router marking.
Proceedings of the IEEE 17th Asia-Pacific Conference on Communications, 2011

2006
Effective bandwidth utilisation in multihoming networks.
Proceedings of the First International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2006), 2006


  Loading...