Brij B. Gupta

Affiliations:
  • National Institute of Technology Kurukshetra, India
  • Indian Institute of Technology Roorkee, India (PhD)


According to our database1, Brij B. Gupta authored at least 224 papers between 2008 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
A Survey of Deep Active Learning.
ACM Comput. Surv., 2022

2021
Joint computation offloading and task caching for multi-user and multi-task MEC systems: reinforcement learning-based algorithms.
Wirel. Networks, 2021

An attribute-based keyword search for m-Health networks.
J. Comput. Virol. Hacking Tech., 2021

Pre-Trained Convolutional Neural Networks for Breast Cancer Detection Using Ultrasound Images.
ACM Trans. Internet Techn., 2021

Efficient and Secure Routing Protocol Based on Artificial Intelligence Algorithms With UAV-Assisted for Vehicular Ad Hoc Networks in Intelligent Transportation Systems.
IEEE Trans. Intell. Transp. Syst., 2021

Secure and Energy Efficient-Based E-Health Care Framework for Green Internet of Things.
IEEE Trans. Green Commun. Netw., 2021

Defense mechanisms against DDoS attack based on entropy in SDN-cloud using POX controller.
Telecommun. Syst., 2021

A secure and efficient key agreement framework for critical energy infrastructure using mobile device.
Telecommun. Syst., 2021

Developing a Vietnamese Tourism Question Answering System Using Knowledge Graph and Deep Learning.
ACM Trans. Asian Low Resour. Lang. Inf. Process., 2021

Correction to: A biometric cryptosystem scheme based on random projection and neural network.
Soft Comput., 2021

A biometric cryptosystem scheme based on random projection and neural network.
Soft Comput., 2021

Extended-Range Prediction Model Using NSGA-III Optimized RNN-GRU-LSTM for Driver Stress and Drowsiness.
Sensors, 2021

Handling Data Heterogeneity in Electricity Load Disaggregation via Optimized Complete Ensemble Empirical Mode Decomposition and Wavelet Packet Transform.
Sensors, 2021

A trust infrastructure based authentication method for clustered vehicular ad hoc networks.
Peer-to-Peer Netw. Appl., 2021

A QoS Ensuring Two-Layered Multi-Attribute Auction Mechanism to Mitigate DDoS Attack.
Mob. Networks Appl., 2021

Ensemble machine learning approach for classification of IoT devices in smart home.
Int. J. Mach. Learn. Cybern., 2021

Secure blockchain enabled Cyber-physical systems in healthcare using deep belief network with ResNet model.
J. Parallel Distributed Comput., 2021

An Auction-Based Incentivized Solution Against DDoS Attacks.
J. Inf. Technol. Res., 2021

Blockchain-based authentication and authorization for smart city applications.
Inf. Process. Manag., 2021

IoT-Based Big Data Secure Management in the Fog Over a 6G Wireless Network.
IEEE Internet Things J., 2021

A Lightweight and Robust Secure Key Establishment Protocol for Internet of Medical Things in COVID-19 Patients Care.
IEEE Internet Things J., 2021

Blockchain-Assisted Secure Fine-Grained Searchable Encryption for a Cloud-Based Healthcare Cyber-Physical System.
IEEE CAA J. Autom. Sinica, 2021

A reputation score policy and Bayesian game theory based incentivized mechanism for DDoS attacks mitigation and cyber defense.
Future Gener. Comput. Syst., 2021

Security, privacy and forensics in the enterprise information systems.
Enterp. Inf. Syst., 2021

DNS rule-based schema to botnet detection.
Enterp. Inf. Syst., 2021

Three-dimensional Measurement Using Structured Light Based on Deep Learning.
Comput. Syst. Sci. Eng., 2021

PWG-IDS: An Intrusion Detection Model for Solving Class Imbalance in IIoT Networks Using Generative Adversarial Networks.
CoRR, 2021

Clustering Algorithm to Detect Adversaries in Federated Learning.
CoRR, 2021

A taxonomy of various attacks on smart card-based applications and countermeasures.
Concurr. Comput. Pract. Exp., 2021

Survey on atrial fibrillation detection from a single-lead ECG wave for Internet of Medical Things.
Comput. Commun., 2021

A novel approach for phishing URLs detection using lexical based machine learning in a real-time environment.
Comput. Commun., 2021

Hybrid ant genetic algorithm for efficient task scheduling in cloud data centers.
Comput. Electr. Eng., 2021

Multiple features based approach for automatic fake news detection on social networks using deep learning.
Appl. Soft Comput., 2021

An energy aware grouping memetic algorithm to schedule the sensing activity in WSNs-based IoT for smart cities.
Appl. Soft Comput., 2021

Clustering based Rewarding Algorithm to Detect Adversaries in Federated Machine Learning based IoT Environment.
Proceedings of the IEEE International Conference on Consumer Electronics, 2021

An End-to-End Security Framework for Smart Healthcare Information Sharing against Botnet-based Cyber-Attacks.
Proceedings of the IEEE International Conference on Consumer Electronics, 2021

Entropy based Defensive Mechanism against DDoS Attack in SDN-Cloud enabled Online Social Networks.
Proceedings of the IEEE International Conference on Consumer Electronics, 2021

Classification Based Machine Learning for Detection of DDoS attack in Cloud Computing.
Proceedings of the IEEE International Conference on Consumer Electronics, 2021

Fog Layer-based DDoS attack Detection Approach for Internet-of-Things (IoTs) devices.
Proceedings of the IEEE International Conference on Consumer Electronics, 2021

Mitigating Botnet based DDoS Attacks by Selecting Incentivized Cooperating ISPs for Risk Transfer.
Proceedings of the IEEE International Conference on Consumer Electronics, 2021

Shielding Smart Home IoT Devices against Adverse Effects of XSS using AI model.
Proceedings of the IEEE International Conference on Consumer Electronics, 2021

Filtering of Distributed Denial of Services (DDoS) Attacks in Cloud Computing Environment.
Proceedings of the IEEE International Conference on Communications Workshops, 2021

Deep Learning Based Approach for Secure Web of Things (WoT).
Proceedings of the IEEE International Conference on Communications Workshops, 2021

2020
Deep Learning Based Multi-Channel Intelligent Attack Detection for Data Security.
IEEE Trans. Sustain. Comput., 2020

ThinORAM: Towards Practical Oblivious Data Access in Fog Computing Environment.
IEEE Trans. Serv. Comput., 2020

Visual saliency guided complex image retrieval.
Pattern Recognit. Lett., 2020

Parallel implementation for 3D medical volume fuzzy segmentation.
Pattern Recognit. Lett., 2020

Phishing Attack Detection using a Search Engine and Heuristics-based Technique.
J. Inf. Technol. Res., 2020

Taxonomy of Payment Structures and Economic Incentive Schemes in Internet.
J. Inf. Technol. Res., 2020

A Survey on Contactless Smart Cards and Payment System: Technologies, Policies, Attacks and Countermeasures.
J. Glob. Inf. Manag., 2020

Secure Timestamp-Based Mutual Authentication Protocol for IoT Devices Using RFID Tags.
Int. J. Semantic Web Inf. Syst., 2020

Fake profile detection in multimedia big data on online social networks.
Int. J. Inf. Comput. Secur., 2020

Nested context-aware sanitisation and feature injection in clustered templates of JavaScript worms on the cloud-based OSN.
Int. J. Inf. Comput. Secur., 2020

An Economic Incentive-Based Risk Transfer Approach for Defending Against DDoS Attacks.
Int. J. E Serv. Mob. Appl., 2020

Attribute-based access control and authentication mechanism using smart cards for cloud-based IoT applications.
Int. J. Embed. Syst., 2020

Decentralised control-based interaction framework for secure data transmission in internet of automated vehicles.
Int. J. Embed. Syst., 2020

An internet-of-things-based security scheme for healthcare environment for robust location privacy.
Int. J. Comput. Sci. Eng., 2020

A crowdsourcing method for online social networks security assessment based on human-centric computing.
Hum. centric Comput. Inf. Sci., 2020

Security, privacy and trust of different layers in Internet-of-Things (IoTs) framework.
Future Gener. Comput. Syst., 2020

Live forensics of software attacks on cyber-physical systems.
Future Gener. Comput. Syst., 2020

Classification of spammer and nonspammer content in online social network using genetic algorithm-based feature selection.
Enterp. Inf. Syst., 2020

Cloud-based Federated Boosting for Mobile Crowdsensing.
CoRR, 2020

An efficient KP design framework of attribute-based searchable encryption for user level revocation in cloud.
Concurr. Comput. Pract. Exp., 2020

An overview of Internet of Things (IoT): Architectural aspects, challenges, and protocols.
Concurr. Comput. Pract. Exp., 2020

Multi attribute auction based incentivized solution against DDoS attacks.
Comput. Secur., 2020

Differential Privacy Approach to Solve Gradient Leakage Attack in a Federated Machine Learning Environment.
Proceedings of the Computational Data and Social Networks - 9th International Conference, 2020

Behavioral Analysis to Detect Social Spammer in Online Social Networks (OSNs).
Proceedings of the Computational Data and Social Networks - 9th International Conference, 2020

Metadata Security Measures for Protecting Confidential Information on the Cloud.
Proceedings of the Computational Data and Social Networks - 9th International Conference, 2020

A Novel Approach for Fake News Detection in Vehicular Ad-Hoc Network (VANET).
Proceedings of the Computational Data and Social Networks - 9th International Conference, 2020

XSSPro: XSS Attack Detection Proxy to Defend Social Networking Platforms.
Proceedings of the Computational Data and Social Networks - 9th International Conference, 2020

An Analysis of Provable Security Frameworks for RFID Security.
Proceedings of the Handbook of Computer Networks and Cyber Security, 2020

Secure Machine Learning Scenario from Big Data in Cloud Computing via Internet of Things Network.
Proceedings of the Handbook of Computer Networks and Cyber Security, 2020

Cooperative Mechanisms for Defending Distributed Denial of Service (DDoS) Attacks.
Proceedings of the Handbook of Computer Networks and Cyber Security, 2020

2019
Advanced Media-Based Smart Big Data on Intelligent Cloud Systems.
IEEE Trans. Sustain. Comput., 2019

Soft Computing-Based EEG Classification by Optimal Feature Selection and Neural Networks.
IEEE Trans. Ind. Informatics, 2019

A novel coverless information hiding method based on the average pixel value of the sub-images.
Multim. Tools Appl., 2019

Medical image resolution enhancement for healthcare using nonlocal self-similarity and low-rank prior.
Multim. Tools Appl., 2019

Improving the performance of the needleman-wunsch algorithm using parallelization and vectorization techniques.
Multim. Tools Appl., 2019

Network flow analysis for detection and mitigation of Fraudulent Resource Consumption (FRC) attacks in multimedia cloud computing.
Multim. Tools Appl., 2019

Impact of digital fingerprint image quality on the fingerprint recognition accuracy.
Multim. Tools Appl., 2019

Multi-orientation geometric medical volumes segmentation using 3D multiresolution analysis.
Multim. Tools Appl., 2019

An efficient employment of internet of multimedia things in smart and future agriculture.
Multim. Tools Appl., 2019

Collaboration networks of arab biomedical researchers.
Multim. Tools Appl., 2019

An Identity-Based Signcryption on Lattice without Trapdoor.
J. Univers. Comput. Sci., 2019

Feature Based Approach for Detection of Smishing Messages in the Mobile Environment.
J. Inf. Technol. Res., 2019

ISEkFT: An IBE-Based Searchable Encryption Scheme With k-Keyword Fuzzy Search Trapdoor.
J. Inf. Technol. Res., 2019

A machine learning based approach for phishing detection using hyperlinks information.
J. Ambient Intell. Humaniz. Comput., 2019

Evaluation and monitoring of XSS defensive solutions: a survey, open research issues and future directions.
J. Ambient Intell. Humaniz. Comput., 2019

Deep learning models for human centered computing in fog and mobile edge networks.
J. Ambient Intell. Humaniz. Comput., 2019

Distributed denial of service (DDoS) attack mitigation in software defined network (SDN)-based cloud computing environment.
J. Ambient Intell. Humaniz. Comput., 2019

Efficient fingerprint matching on smart cards for high security and privacy in smart systems.
Inf. Sci., 2019

A novel CNN based security guaranteed image watermarking generation scenario for smart city applications.
Inf. Sci., 2019

Compressive Sensing of Medical Images With Confidentially Homomorphic Aggregations.
IEEE Internet Things J., 2019

A Framework for Preserving the Privacy of Online Users Against XSS Worms on Online Social Network.
Int. J. Inf. Technol. Web Eng., 2019

A novel ECC-based lightweight authentication protocol for internet of things devices.
Int. J. High Perform. Comput. Netw., 2019

Towards Privacy Risk Analysis in Android Applications Using Machine Learning Approaches.
Int. J. E Serv. Mob. Appl., 2019

Dynamic Policy Attribute Based Encryption and its Application in Generic Construction of Multi-Keyword Search.
Int. J. E Serv. Mob. Appl., 2019

Classification of various attacks and their defence mechanism in online social networks: a survey.
Enterp. Inf. Syst., 2019

A client-server JavaScript code rewriting-based framework to detect the XSS worms from online social network.
Concurr. Comput. Pract. Exp., 2019

An optimized service broker routing policy based on differential evolution algorithm in fog/cloud environment.
Clust. Comput., 2019

Hybrid approach for detection of malicious profiles in twitter.
Comput. Electr. Eng., 2019

Improving fuzzy C-mean-based community detection in social networks using dynamic parallelism.
Comput. Electr. Eng., 2019

IEEE Access Special Section Editorial: Recent Advances in Computational Intelligence Paradigms for Security and Privacy for Fog and Mobile Edge Computing.
IEEE Access, 2019

MQTT-driven Remote Temperature Monitoring System for IoT-based Smart Homes.
Proceedings of the IEEE 8th Global Conference on Consumer Electronics, 2019

Secure Fine-Grained Multi-Keyword Search with Protection from Key Abusers in the Cloud.
Proceedings of the IEEE 8th Global Conference on Consumer Electronics, 2019

PBNM and Economic Incentive Based Framework for Protection Against DDoS Attacks.
Proceedings of the IEEE 8th Global Conference on Consumer Electronics, 2019

DDoS Detection Framework in Resource Constrained Internet of Things Domain.
Proceedings of the IEEE 8th Global Conference on Consumer Electronics, 2019

2018
Recent Advances in Mobile Cloud Computing.
Wirel. Commun. Mob. Comput., 2018

Guest Editorial Deep Learning Models for Industry Informatics.
IEEE Trans. Ind. Informatics, 2018

Towards detection of phishing websites on client-side using machine learning based approach.
Telecommun. Syst., 2018

Defending against phishing attacks: taxonomy of methods, current issues and future directions.
Telecommun. Syst., 2018

Security in Internet of Things: issues, challenges, taxonomy, and architecture.
Telecommun. Syst., 2018

Security, privacy & efficiency of sustainable Cloud Computing for Big Data & IoT.
Sustain. Comput. Informatics Syst., 2018

Introduction to special issue on recent advances on sustainability for green cloud and fog computing.
Sustain. Comput. Informatics Syst., 2018

Advances in applying soft computing techniques for big data and cloud computing.
Soft Comput., 2018

Four-image encryption scheme based on quaternion Fresnel transform, chaos and computer generated hologram.
Multim. Tools Appl., 2018

Collusion attacks mitigation in internet of things: a fog based model.
Multim. Tools Appl., 2018

Visual data mining for crowd anomaly detection using artificial bacteria colony.
Multim. Tools Appl., 2018

Color image watermarking scheme based on quaternion Hadamard transform and Schur decomposition.
Multim. Tools Appl., 2018

Guest Editorial: Recent Advances on Security and Privacy of Multimedia Big Data in the Critical Infrastructure.
Multim. Tools Appl., 2018

Advances in Security and Privacy of Multimedia Big Data in Mobile and Cloud Computing.
Multim. Tools Appl., 2018

XSS-secure as a service for the platforms of online social network-based multimedia web applications in cloud.
Multim. Tools Appl., 2018

A novel approach to defend multimedia flash crowd in cloud environment.
Multim. Tools Appl., 2018

Accelerating 3D medical volume segmentation using GPUs.
Multim. Tools Appl., 2018

Socially-conforming cooperative computation in cloud networks.
J. Parallel Distributed Comput., 2018

The convergence of new computing paradigms and big data analytics methodologies for online social networks.
J. Comput. Sci., 2018

Big data driven outlier detection for soybean straw near infrared spectroscopy.
J. Comput. Sci., 2018

Deep Recurrent neural network vs. support vector machine for aspect-based sentiment analysis of Arabic hotels' reviews.
J. Comput. Sci., 2018

Deep learning for Arabic NLP: A survey.
J. Comput. Sci., 2018

Two-level authentication approach to protect from phishing attacks in real time.
J. Ambient Intell. Humaniz. Comput., 2018

Plague of cross-site scripting on web applications: a review, taxonomy and challenges.
Int. J. Web Based Communities, 2018

A lightweight mutual authentication approach for RFID tags in IoT devices.
Int. J. Netw. Virtual Organisations, 2018

Intelligent phishing detection system using similarity matching algorithms.
Int. J. Inf. Commun. Technol., 2018

Detection of phishing attacks in financial and e-banking websites using link and visual similarity relation.
Int. J. Inf. Comput. Secur., 2018

Robust injection point-based framework for modern applications against XSS vulnerabilities in online social networks.
Int. J. Inf. Comput. Secur., 2018

Survey on DDoS Attacks and Defense Mechanisms in Cloud and Fog Computing.
Int. J. E Serv. Mob. Appl., 2018

Taxonomy of Distributed Denial of Service (DDoS) Attacks and Defense Mechanisms in Present Era of Smartphone Devices.
Int. J. E Serv. Mob. Appl., 2018

Petri net-based verification of security protocol implementation in software evolution.
Int. J. Embed. Syst., 2018

Assessment of Honeypots: Issues, Challenges and Future Directions.
Int. J. Cloud Appl. Comput., 2018

Social media security and trustworthiness: Overview and new direction.
Future Gener. Comput. Syst., 2018

Flexible data access control in D2D communications.
Future Gener. Comput. Syst., 2018

Secure integration of IoT and Cloud Computing.
Future Gener. Comput. Syst., 2018

Efficient IoT-based sensor BIG Data collection-processing and analysis in smart buildings.
Future Gener. Comput. Syst., 2018

An Efficient Algorithm for Media-based Surveillance System (EAMSuS) in IoT Smart City Framework.
Future Gener. Comput. Syst., 2018

Cloud-assisted secure video transmission and sharing framework for smart cities.
Future Gener. Comput. Syst., 2018

Recent research in computational intelligence paradigms into security and privacy for online social networks (OSNs).
Future Gener. Comput. Syst., 2018

Hunting for DOM-Based XSS vulnerabilities in mobile cloud-based online social network.
Future Gener. Comput. Syst., 2018

An efficient key agreement protocol for Sybil-precaution in online social networks.
Future Gener. Comput. Syst., 2018

Recent advances in fog and mobile edge computing.
Trans. Emerg. Telecommun. Technol., 2018

SybilTrap: A graph-based semi-supervised Sybil defense scheme for online social networks.
Concurr. Comput. Pract. Exp., 2018

Edge Computing with Cloud for Voice Disorder Assessment and Treatment.
IEEE Commun. Mag., 2018

Medical Image Forgery Detection for Smart Healthcare.
IEEE Commun. Mag., 2018

Mitigation and risk factor analysis of android applications.
Comput. Electr. Eng., 2018

Crowdsourcing based scientific issue tracking with topic analysis.
Appl. Soft Comput., 2018

Studying the controversy in online crowds' interactions.
Appl. Soft Comput., 2018

A Lightweight Authenticated Encryption Scheme Based on Chaotic SCML for Railway Cloud Service.
IEEE Access, 2018

Efficient Compressed Ciphertext Length Scheme Using Multi-Authority CP-ABE for Hierarchical Attributes.
IEEE Access, 2018

A Practical Public Key Encryption Scheme Based on Learning Parity With Noise.
IEEE Access, 2018

A Study on the Collusion Security of LUT-Based Client-Side Watermark Embedding.
IEEE Access, 2018

Variable Selection and Optimization in Rapid Detection of Soybean Straw Biomass Based on CARS.
IEEE Access, 2018

Cognitive Privacy Middleware for Deep Learning Mashup in Environmental IoT.
IEEE Access, 2018

Efficient Quantum Information Hiding for Remote Medical Image Sharing.
IEEE Access, 2018

Self-Adaptive Scheduling of Base Transceiver Stations in Green 5G Networks.
IEEE Access, 2018

Service Orchestration of Optimizing Continuous Features in Industrial Surveillance Using Big Data Based Fog-Enabled Internet of Things.
IEEE Access, 2018

Evaluation Models for the Nearest Closer Routing Protocol in Wireless Sensor Networks.
IEEE Access, 2018

Vulnerability Analysis for the Authentication Protocols in Trusted Computing Platforms and a Proposed Enhancement of the OffPAD Protocol.
IEEE Access, 2018

Security and privacy of big data for social networking services in cloud.
Proceedings of the IEEE INFOCOM 2018, 2018

A robust anonymity preserving authentication protocol for IoT devices.
Proceedings of the IEEE International Conference on Consumer Electronics, 2018

Malware propagation effects on SCADA system and smart power grid.
Proceedings of the IEEE International Conference on Consumer Electronics, 2018

Economic incentive based solution against distributed denial of service attacks for IoT customers.
Proceedings of the IEEE International Conference on Consumer Electronics, 2018

A Dynamic Security Policies Generation Model for Access Control in Smart Card Based Applications.
Proceedings of the Cyberspace Safety and Security - 10th International Symposium, 2018

2017
Cryptanalysis of a novel ultra-lightweight mutual authentication protocol for IoT devices using RFID tags.
J. Supercomput., 2017

Internet of surveillance: a cloud supported large-scale wireless surveillance system.
J. Supercomput., 2017

Phishing Detection: Analysis of Visual Similarity Based Approaches.
Secur. Commun. Networks, 2017

Cross-Site Scripting (XSS) attacks and defense mechanisms: classification and state-of-the-art.
Int. J. Syst. Assur. Eng. Manag., 2017

Fighting against phishing attacks: state of the art and future challenges.
Neural Comput. Appl., 2017

Taxonomy of DoS and DDoS attacks and desirable defense mechanism in a Cloud computing environment.
Neural Comput. Appl., 2017

CyVOD: a novel trinity multimedia social network scheme.
Multim. Tools Appl., 2017

Secure and imperceptible digital image steganographic algorithm based on diamond encoding in DWT domain.
Multim. Tools Appl., 2017

Accelerating compute intensive medical imaging segmentation algorithms using hybrid CPU-GPU implementations.
Multim. Tools Appl., 2017

Smart XSS Attack Surveillance System for OSN in Virtualized Intelligence Network of Nodes of Fog Computing.
Int. J. Web Serv. Res., 2017

Automated wireless video surveillance: an evaluation framework.
J. Real Time Image Process., 2017

GARCH and ANN-based DDoS detection and filtering in cloud computing environment.
Int. J. Embed. Syst., 2017

Enhancing the Browser-Side Context-Aware Sanitization of Suspicious HTML5 Code for Halting the DOM-Based XSS Vulnerabilities in Cloud.
Int. J. Cloud Appl. Comput., 2017

Detection, Avoidance, and Attack Pattern Mechanisms in Modern Web Application Vulnerabilities: Present and Future Challenges.
Int. J. Cloud Appl. Comput., 2017

Security challenges in cloud computing: state-of-art.
Int. J. Big Data Intell., 2017

A lightweight mutual authentication protocol based on elliptic curve cryptography for IoT devices.
Int. J. Adv. Intell. Paradigms, 2017

Efficient yet robust biometric iris matching on smart cards for data high security and privacy.
Future Gener. Comput. Syst., 2017

Security Strength Indicator in Fallback Authentication: Nudging Users for Better Answers in Secret Questions.
CoRR, 2017

Software-Defined System Support for Enabling Ubiquitous Mobile Edge Computing.
Comput. J., 2017

Editorial security, privacy, and forensics in the critical infrastructure: advances and future directions.
Ann. des Télécommunications, 2017

A survey on smart power grid: frameworks, tools, security issues, and solutions.
Ann. des Télécommunications, 2017

A Comparative Evaluation of Atrial Fibrillation Detection Methods in Koreans Based on Optical Recordings Using a Smartphone.
IEEE Access, 2017

Efficient Large-scale Medical Data (eHealth Big Data) Analytics in Internet of Things.
Proceedings of the 19th IEEE Conference on Business Informatics, 2017

Risk transfer mechanism to defend DDoS attacks in IoT scenario.
Proceedings of the IEEE International Symposium on Consumer Electronics, 2017

Solutions for inter-connectivity and security in a smart hospital building.
Proceedings of the 15th IEEE International Conference on Industrial Informatics, 2017

2016
XSS-immune: a Google chrome extension-based XSS defensive framework for contemporary platforms of web applications.
Secur. Commun. Networks, 2016

JS-SAN: defense mechanism for HTML5-based web applications against javascript code injection vulnerabilities.
Secur. Commun. Networks, 2016

A novel approach to protect against phishing attacks at client side using auto-updated white-list.
EURASIP J. Inf. Secur., 2016

Guest editorial special issues on security trends in mobile cloud computing, web, and social networking.
EURASIP J. Inf. Secur., 2016

An Infrastructure-Based Framework for the Alleviation of JavaScript Worms from OSN in Mobile Cloud Platforms.
Proceedings of the Network and System Security - 10th International Conference, 2016

On privacy verification in the IoT service based on PN<sup>2</sup>.
Proceedings of the IEEE 5th Global Conference on Consumer Electronics, 2016

XSS detection with automatic view isolation on online social network.
Proceedings of the IEEE 5th Global Conference on Consumer Electronics, 2016

2015
A Petri net-based framework of intrusion detection systems.
Proceedings of the IEEE 4th Global Conference on Consumer Electronics, 2015

DDoS detection and filtering technique in cloud environment using GARCH model.
Proceedings of the IEEE 4th Global Conference on Consumer Electronics, 2015

PHP-sensor: a prototype method to discover workflow violation and XSS vulnerabilities in PHP web applications.
Proceedings of the 12th ACM International Conference on Computing Frontiers, 2015

2014
An Encapsulated Approach of Forensic Model for digital investigation.
Proceedings of the IEEE 3rd Global Conference on Consumer Electronics, 2014

2013
Predicting Number of Zombies in a DDoS Attacks Using Isotonic Regression.
Proceedings of the Mining Social Networks and Security Informatics, 2013

Enhanced CBF Packet Filtering Method to Detect DDoS Attack in Cloud Computing Environment
CoRR, 2013

Phishing Dynamic Evolving Neural Fuzzy Framework for Online Detection Zero-day Phishing Email
CoRR, 2013

A Survey of Phishing Email Filtering Techniques.
IEEE Commun. Surv. Tutorials, 2013

2012
ANN Based Scheme to Predict Number of Zombies in a DDoS Attack.
Int. J. Netw. Secur., 2012

Distributed Denial of Service Prevention Techniques
CoRR, 2012

Botnet-based Distributed Denial of Service (DDoS) Attacks on Web Servers: Classification and Art
CoRR, 2012

Dynamic and Auto Responsive Solution for Distributed Denial-of-Service Attacks Detection in ISP Network
CoRR, 2012

An Efficient Analytical Solution to Thwart DDoS Attacks in Public Domain
CoRR, 2012

An ISP Level Solution to Combat DDoS Attacks using Combined Statistical Based Approach
CoRR, 2012

Predicting Number of Zombies in DDoS Attacks Using Pace Regression Model.
J. Comput. Inf. Technol., 2012

2011
A Comparative Study of Distributed Denial of Service Attacks, Intrusion Tolerance and Mitigation Techniques.
Proceedings of the European Intelligence and Security Informatics Conference, 2011

SVM Based Scheme for Predicting Number of Zombies in a DDoS Attack.
Proceedings of the European Intelligence and Security Informatics Conference, 2011

On Estimating Strength of a DDoS Attack Using Polynomial Regression Model.
Proceedings of the Advances in Computing and Communications, 2011

2010
Estimating strength of DDoS attack using various regression models.
Int. J. Multim. Intell. Secur., 2010

2009
Defending against Distributed Denial of Service Attacks: Issues and Challenges.
Inf. Secur. J. A Glob. Perspect., 2009

2008
FVBA: A combined statistical approach for low rate degrading and high bandwidth disruptive DDoS attacks detection in ISP domain.
Proceedings of the 16th International Conference on Networks, 2008


  Loading...