Neha Agrawal

Orcid: 0000-0002-7254-079X

According to our database1, Neha Agrawal authored at least 31 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A comprehensive survey on low-rate and high-rate DDoS defense approaches in SDN: taxonomy, research challenges, and opportunities.
Multim. Tools Appl., April, 2024

Software defined networks (SDNs) for environmental surveillance : A Survey.
Multim. Tools Appl., January, 2024

Improved Child Safety Using Edge-Fog-Cloud Enabled Smart IoT Wearable Device: An Architecture.
Proceedings of the 16th International Conference on COMmunication Systems & NETworkS, 2024

2023
Analysis of multi-dimensional Industrial IoT (IIoT) data in Edge-Fog-Cloud based architectural frameworks : A survey on current state and research challenges.
J. Ind. Inf. Integr., October, 2023

A survey on software-defined vehicular networks (SDVNs): a security perspective.
J. Supercomput., May, 2023

Training Large-Vocabulary Neural Language Models by Private Federated Learning for Resource-Constrained Devices.
Proceedings of the IEEE International Conference on Acoustics, 2023

ACL Assisted Security Mechanism Against Low-Rate DDoS Attack in SDN-Cloud-IoT Networks.
Proceedings of the OITS International Conference on Information Technology, 2023

GPS Spoof and Detect in Ardupilot Simulating UAVs.
Proceedings of the OITS International Conference on Information Technology, 2023

2021
An SDN-Assisted Defense Mechduanism for the Shrew DDoS Attack in a Cloud Computing Environment.
J. Netw. Syst. Manag., 2021

Autonomic cloud computing based management and security solutions: State-of-the-art, challenges, and opportunities.
Trans. Emerg. Telecommun. Technol., 2021

Dynamic load balancing assisted optimized access control mechanism for Edge-Fog-Cloud network in Internet of Things environment.
Concurr. Comput. Pract. Exp., 2021

Enabling near-data processing in distributed object storage systems.
Proceedings of the HotStorage '21: 13th ACM Workshop on Hot Topics in Storage and File Systems, 2021

2020
Detection of Low-Rate Cloud DDoS Attacks in Frequency Domain Using Fast Hartley Transform.
Wirel. Pers. Commun., 2020

A proactive defense method for the stealthy EDoS attacks in a cloud environment.
Int. J. Netw. Manag., 2020

2019
A trustworthy agent-based encrypted access control method for mobile cloud computing environment.
Pervasive Mob. Comput., 2019

Defense Mechanisms Against DDoS Attacks in a Cloud Computing Environment: State-of-the-Art and Research Challenges.
IEEE Commun. Surv. Tutorials, 2019

Barriers in Business-IT Alignment in the Banking Sector in a Developing Country: A Case Study of Commercial Banks in the Gambia.
Proceedings of the Information Systems, 2019

2018
Low rate cloud DDoS attack defense method based on power spectral density analysis.
Inf. Process. Lett., 2018

2017
Defense schemes for variants of distributed denial-of-service (DDoS) attacks in cloud computing: A survey.
Inf. Secur. J. A Glob. Perspect., 2017

The Performance Analysis of Honeypot Based Intrusion Detection System for Wireless Network.
Int. J. Wirel. Inf. Networks, 2017

A Lightweight Approach to Detect the Low/High Rate IP Spoofed Cloud DDoS Attacks.
Proceedings of the 2017 IEEE 7th International Symposium on Cloud and Service Computing, 2017

2015
Wireless Rogue Access Point Detection Using Shadow Honeynet.
Wirel. Pers. Commun., 2015

Comparison Clustering using Cosine and Fuzzy set based Similarity Measures of Text Documents.
CoRR, 2015

2014
The performance evaluation of proactive fault tolerant scheme over cloud using CloudSim simulator.
Proceedings of the Fifth International Conference on the Applications of Digital Information and Web Technologies, 2014

2013
The study of the Cloud impact in the CloudSim Simulator Environment.
Int. J. Web Appl., 2013

GSM and PSTN gateway for asterisk EPBX.
Proceedings of the Tenth International Conference on Wireless and Optical Communications Networks, 2013

Segmentation of parathyroid tumors from DCE-MRI using Linear Dynamic System analysis.
Proceedings of the 10th IEEE International Symposium on Biomedical Imaging: From Nano to Macro, 2013

Performance Comparison of Executing Fast Transactions in Bitcoin Network Using Verifiable Code Execution.
Proceedings of the 2013 2nd International Conference on Advanced Computing, 2013

2012
Cisco's speaker segmentation and recognition system.
Proceedings of the Odyssey 2012: The Speaker and Language Recognition Workshop, 2012

2009
DCT Domain Message Embedding in Spread-Spectrum Steganography System.
Proceedings of the 2009 Data Compression Conference (DCC 2009), 2009

Biometric data hiding: A 3 factor authentication approach to verify identity with a single image using steganography, encryption and matching.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2009


  Loading...