Emmanuel S. Pilli

Orcid: 0000-0002-6056-1147

Affiliations:
  • Malaviya National Institute of Technology, Jaipur, Rajasthan, India


According to our database1, Emmanuel S. Pilli authored at least 64 papers between 2010 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
BD-Trust: behavioural and data trust management scheme for internet of things.
J. Ambient Intell. Humaniz. Comput., December, 2023

ProvLink-IoT: A novel provenance model for Link-Layer Forensics in IoT networks.
Forensic Sci. Int. Digit. Investig., September, 2023

BLAST-IoT: BLockchain Assisted Scalable Trust in Internet of Things.
Comput. Electr. Eng., July, 2023

An effective NIDS framework based on a comprehensive survey of feature optimization and classification techniques.
Neural Comput. Appl., March, 2023

A Defense Solution to Secure Low-Power and Lossy Networks Against DAO Insider Attacks.
Proceedings of the IEEE Region 10 Conference, 2023

MSPIS: Multimodal Suspicious Profile Identification System in Online Social Network.
Proceedings of the Pattern Recognition and Machine Intelligence, 2023

SoK: Digital Signatures and Taproot Transactions in Bitcoin.
Proceedings of the Information Systems Security - 19th International Conference, 2023

2022
DepML: An Efficient Machine Learning-Based MDD Detection System in IoMT Framework.
SN Comput. Sci., 2022

CONTAIN4n6: a systematic evaluation of container artifacts.
J. Cloud Comput., 2022

ProvNet-IoT: Provenance based network layer forensics in Internet of Things.
Digit. Investig., 2022

Energy-aware scientific workflow scheduling in cloud environment.
Clust. Comput., 2022

vServiceInspector: Introspection-assisted evolutionary bag-of-ngram approach to detect malware in cloud servers.
Ad Hoc Networks, 2022

2021
BGSA: Broker Guided Service Allocation in Federated Cloud.
Sustain. Comput. Informatics Syst., 2021

A smart anomaly-based intrusion detection system for the Internet of Things (IoT) network using GWO-PSO-RF model.
J. Reliab. Intell. Environ., 2021

BSS: a brokering model for service selection using integrated weighting approach in cloud environment.
J. Cloud Comput., 2021

MuSe: a multi-level storage scheme for big RDF data using MapReduce.
J. Big Data, 2021

An Optimal NIDS for VCN Using Feature Selection and Deep Learning Technique: IDS for VCN.
Int. J. Digit. Crime Forensics, 2021

<i>BerConvoNet: </i> A deep learning framework for fake news classification.
Appl. Soft Comput., 2021

Ready-IoT: A Novel Forensic Readiness Model for Internet of Things.
Proceedings of the 7th IEEE World Forum on Internet of Things, 2021

An Automated MDD Detection System based on Machine Learning Methods in Smart Connected Healthcare.
Proceedings of the IEEE International Symposium on Smart Electronic Systems, 2021

CbPIS: Cyberbullying Profile Identification System with Users in Loop.
Proceedings of the IC3 2021: Thirteenth International Conference on Contemporary Computing, Noida, India, August 5, 2021

2020
VMGuard: A VMI-Based Security Architecture for Intrusion Detection in Cloud Environment.
IEEE Trans. Cloud Comput., 2020

Storage, partitioning, indexing and retrieval in Big RDF frameworks: A survey.
Comput. Sci. Rev., 2020

Towards trustworthy Internet of Things: A survey on Trust Management applications and schemes.
Comput. Commun., 2020

A Taxonomy of Hypervisor Forensic Tools.
Proceedings of the Advances in Digital Forensics XVI, 2020

2019
Brokering in interconnected cloud computing environments: A survey.
J. Parallel Distributed Comput., 2019

Energy-efficient fuzzy-based approach for dynamic virtual machine consolidation.
Int. J. Grid Util. Comput., 2019

SOD-CED: salient object detection for noisy images using convolution encoder-decoder.
IET Comput. Vis., 2019

A Detailed Investigation and Analysis of Using Machine Learning Techniques for Intrusion Detection.
IEEE Commun. Surv. Tutorials, 2019

RraR: Robust Recommendation Aggregation using Retraining in Internet of Things.
Proceedings of the 5th IEEE World Forum on Internet of Things, 2019

A Holistic Forensic Model for the Internet of Things.
Proceedings of the Advances in Digital Forensics XV, 2019

VMProtector: Malign Process Detection for Protecting Virtual Machines in Cloud Environment.
Proceedings of the Advances in Computing and Data Sciences, 2019

HyPSo: Hybrid Partitioning for Big RDF Storage and Query Processing.
Proceedings of the ACM India Joint International Conference on Data Science and Management of Data, 2019

2018
Botnet Forensic: Issues, Challenges and Good Practices.
Netw. Protoc. Algorithms, 2018

Survey of Peer-to-Peer Botnets and Detection Frameworks.
Int. J. Netw. Secur., 2018

Big Data Handling Over Cloud for Internet of Things.
Int. J. Inf. Technol. Web Eng., 2018

CHACT: Convex Hull Enabled Active Contour Technique for Salient Object Detection.
IEEE Access, 2018

A Taxonomy of Cloud Endpoint Forensic Tools.
Proceedings of the Advances in Digital Forensics XIV, 2018

JOTR: Join-Optimistic Triple Reordering Approach for SPARQL Query Optimization on Big RDF Data.
Proceedings of the 9th International Conference on Computing, 2018

RMDD: Cross Layer Attack in Internet of Things.
Proceedings of the 2018 International Conference on Advances in Computing, 2018

Task Clustering-Based Energy-Aware Workflow Scheduling in Cloud Environment.
Proceedings of the 20th IEEE International Conference on High Performance Computing and Communications; 16th IEEE International Conference on Smart City; 4th IEEE International Conference on Data Science and Systems, 2018

UPB: User Preference based Brokering for Service Ranking and Selection in Federated Cloud.
Proceedings of the IEEE International Conference on Advanced Networks and Telecommunications Systems, 2018

2017
Intrusion detection techniques in cloud environment: A survey.
J. Netw. Comput. Appl., 2017

PSI-NetVisor: Program semantic aware intrusion detection at network and hypervisor layer in cloud.
J. Intell. Fuzzy Syst., 2017

A critical survey of live virtual machine migration techniques.
J. Cloud Comput., 2017

VAED: VMI-assisted evasion detection approach for infrastructure as a service cloud.
Concurr. Comput. Pract. Exp., 2017

Obviating capricious behavior in internet of things.
Proceedings of the 2017 International Conference on Advances in Computing, 2017

IHIDS: Introspection-based hybrid intrusion detection system in cloud environment.
Proceedings of the 2017 International Conference on Advances in Computing, 2017

A shortest path approach to SPARQL chain query optimisation.
Proceedings of the 2017 International Conference on Advances in Computing, 2017

2016
Fundamentals of Network Forensics - A Research Perspective
Computer Communications and Networks, Springer, ISBN: 978-1-4471-7299-4, 2016

NvCloudIDS: A security architecture to detect intrusions at network and virtualization layer in cloud environment.
Proceedings of the 2016 International Conference on Advances in Computing, 2016

Securing Virtual Machines from Anomalies Using Program-Behavior Analysis in Cloud Environment.
Proceedings of the 18th IEEE International Conference on High Performance Computing and Communications; 14th IEEE International Conference on Smart City; 2nd IEEE International Conference on Data Science and Systems, 2016

Salient Object Detection in Noisy Images.
Proceedings of the Advances in Artificial Intelligence, 2016

2015
Forensics of Random-UDP Flooding Attacks.
J. Networks, 2015

A Secure Hybrid Cloud Enabled architecture for Internet of Things.
Proceedings of the 2nd IEEE World Forum on Internet of Things, 2015

A Detection Algorithm for DoS Attack in the Cloud Environment.
Proceedings of the 8th Annual ACM India Conference, Ghaziabad, India, October 29-31, 2015, 2015

2014
LevelSync: A hierarchical time synchronization mechanism for wireless sensor networks.
Proceedings of the Seventh International Conference on Contemporary Computing, 2014

2013
Comparative Analysis and Research Issues in Classification Techniques for Intrusion Detection.
Proceedings of the Intelligent Computing, 2013

2011
Router and Interface Marking for Network Forensics.
Proceedings of the Advances in Digital Forensics VII - 7th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA, January 31, 2011

Data reduction by identification and correlation of TCP/IP attack attributes for network forensics.
Proceedings of the ICWET '11 International Conference & Workshop on Emerging Trends in Technology, Mumbai, Maharashtra, India, February 25, 2011

2010
Network forensic frameworks: Survey and research challenges.
Digit. Investig., 2010

A Framework for Network Forensic Analysis.
Proceedings of the Information and Communication Technologies - International Conference, 2010

Network Forensic Analysis by Correlation of Attacks with Network Attributes.
Proceedings of the Information and Communication Technologies - International Conference, 2010

An IP Traceback Model for Network Forensics.
Proceedings of the Digital Forensics and Cyber Crime, 2010


  Loading...