Nikhil Tripathi

Orcid: 0000-0001-8944-8044

According to our database1, Nikhil Tripathi authored at least 41 papers between 2001 and 2026.

Collaborative distances:

Timeline

Legend:

Book  In proceedings  Article  PhD thesis  Dataset  Other 

Links

On csauthors.net:

Bibliography

2026
Detecting Behavioural Anomalies in System Logs Using Log Sequence Analysis.
Proceedings of the 40th International Conference on Information Networking, 2026

Autonomous Control for Reusable Rocket Landing: Deriving a Robust Guidance through Deep Reinforcement Learning in a Custom 3D Simulation Environment.
Proceedings of the 18th International Conference on Agents and Artificial Intelligence, 2026

A Lightweight Reinforcement Learning Framework for Othello Agents: Exploring Reward Shaping and Efficient Exploration.
Proceedings of the 18th International Conference on Agents and Artificial Intelligence, 2026

AMQP Under Siege: Characterizing and Measuring Slow Rate DoS Attacks.
Proceedings of the 18th International Conference on COMmunication Systems and NETworks, 2026

TPACS: A Novel Trust-Aware Proactive Adaptive Caching Strategy for Named Data Networking.
Proceedings of the 18th International Conference on COMmunication Systems and NETworks, 2026

A Novel Image Encryption and Decryption Framework Using Graph Neural Networks.
Proceedings of the 18th International Conference on COMmunication Systems and NETworks, 2026

2025
ProxaDyn: A Proximity-Aware Dynamic Caching Approach for Named Data Networks.
IEEE Trans. Netw. Sci. Eng., 2025

Adaptive NDN caching: Leveraging dynamic behaviour for enhanced efficiency.
J. Netw. Comput. Appl., 2025

Identifying communication sequence anomalies to detect DoS attacks against MQTT.
Comput. Secur., 2025

Detecting interest flooding attacks in NDN: A probability-based event-driven approach.
Comput. Secur., 2025

Leveraging Benford's Law for Effective Intrusion Detection in MQTT-IoT Networks.
Proceedings of the 17th International Conference on COMmunication Systems and NETworks, 2025

Securing UAV Communications: A Comparative Performance Analysis of Post-Quantum Cryptographic Techniques.
Proceedings of the 17th International Conference on COMmunication Systems and NETworks, 2025

A Statistical Anomaly Detection Approach to Detect Induced Interest Flooding Attacks in NDN.
Proceedings of the 17th International Conference on COMmunication Systems and NETworks, 2025

2024
Delays Have Dangerous Ends: Slow HTTP/2 DoS Attacks Into the Wild and Their Real-Time Detection Using Event Sequence Analysis.
IEEE Trans. Dependable Secur. Comput., 2024

An Efficient Content Retrieval and Content Placement Approach for Named Data Networks.
Proceedings of the International Conference on Information Networking, 2024

Sign Guard: Banking Signature Authentication.
Proceedings of the 15th International Conference on Computing Communication and Networking Technologies, 2024

2023
GPS Spoof and Detect in Ardupilot Simulating UAVs.
Proceedings of the OITS International Conference on Information Technology, 2023

2022
Application Layer Denial-of-Service Attacks and Defense Mechanisms: A Survey.
ACM Comput. Surv., 2022

Defer No Time, Delays have Dangerous Ends: Slow HTTP/2 DoS Attacks into the Wild.
Proceedings of the 14th International Conference on COMmunication Systems & NETworkS, 2022

2021
Mobility assisted localization for mission critical Wireless Sensor Network applications using hybrid area exploration approach.
J. King Saud Univ. Comput. Inf. Sci., 2021

Preventing time synchronization in NTP broadcast mode.
Comput. Secur., 2021

2020
Preventing Time Synchronization in NTP's Broadcast Mode.
CoRR, 2020

2019
Cloud Security Service Level Agreements: Representation and Measurement.
Proceedings of the IEEE INFOCOM 2019, 2019

2018
Detecting stealth DHCP starvation attack using machine learning approach.
J. Comput. Virol. Hacking Tech., 2018

Slow rate denial of service attacks against HTTP/2 and detection.
Comput. Secur., 2018

AppHunter: Mobile Application Traffic Classification.
Proceedings of the IEEE International Conference on Advanced Networks and Telecommunications Systems, 2018

2017
An event based technique for detecting spoofed IP packets.
J. Inf. Secur. Appl., 2017

A closer look into DHCP starvation attack in wireless networks.
Comput. Secur., 2017

DNS spoofing in local networks made easy.
Proceedings of the 2017 IEEE International Conference on Advanced Networks and Telecommunications Systems, 2017

Communication recurrence and similarity detection in network flows.
Proceedings of the 2017 IEEE International Conference on Advanced Networks and Telecommunications Systems, 2017

2016
Sequential analysis driven reset optimization to improve power, area and routability.
Proceedings of the 2016 Design, Automation & Test in Europe Conference & Exhibition, 2016

How Secure are Web Servers? An Empirical Study of Slow HTTP DoS Attacks and Detection.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016

A probabilistic anomaly detection scheme to detect DHCP starvation attacks.
Proceedings of the 2016 IEEE International Conference on Advanced Networks and Telecommunications Systems, 2016

2015
Clock domain crossing aware sequential clock gating.
Proceedings of the 2015 Design, Automation & Test in Europe Conference & Exhibition, 2015

Exploiting DHCP server-side IP address conflict detection: A DHCP starvation attack.
Proceedings of the 2015 IEEE International Conference on Advanced Networks and Telecommuncations Systems, 2015

2014
Energy optimization in Android applications through wakelock placement.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2014

2005
An Ultra Low Power System Architecture for Sensor Network Applications.
Proceedings of the 32st International Symposium on Computer Architecture (ISCA 2005), 2005

2004
Overview of a compiler for synthesizing MATLAB programs onto FPGAs.
IEEE Trans. Very Large Scale Integr. Syst., 2004

2003
Making area-performance tradeoffs at the high level using the AccelFPGA compiler for FPGAs.
Proceedings of the ACM/SIGDA International Symposium on Field Programmable Gate Arrays, 2003

2002
A Behavioral Synthesis Tool for Exploiting Fine Grain Parallelism in FPGAs.
Proceedings of the Distributed Computing, 2002

2001
Optimal Assignment of High Threshold Voltage for Synthesizing Dual Threshold CMOS Circuits.
Proceedings of the 14th International Conference on VLSI Design (VLSI Design 2001), 2001


  Loading...