Sanchika Gupta

Orcid: 0000-0003-4218-0065

According to our database1, Sanchika Gupta authored at least 17 papers between 2011 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Learning Algorithms in Static Analysis of Web Applications.
CoRR, 2022

2018
Probabilistic Real-Time Intrusion Detection System for Docker Containers.
Proceedings of the Security in Computing and Communications - 6th International Symposium, 2018

2017
Profile and Back Off Based Distributed NIDS in Cloud.
Wirel. Pers. Commun., 2017

2015
An Immediate System Call Sequence Based Approach for Detecting Malicious Program Executions in Cloud Environment.
Wirel. Pers. Commun., 2015

Collaborative teaching in large classes of computer science courses.
Proceedings of the Eighth International Conference on Contemporary Computing, 2015

2014
System cum Program-Wide Lightweight Malicious Program Execution Detection Scheme for Cloud.
Inf. Secur. J. A Glob. Perspect., 2014

2013
A Profile Based Network Intrusion Detection and Prevention System for Securing Cloud Environment.
Int. J. Distributed Sens. Networks, 2013

VM Profile Based Optimized Network Attack Pattern Detection Scheme for DDOS Attacks in Cloud.
Proceedings of the Security in Computing and Communications - International Symposium, 2013

A desktop notification based scheme for preventing online frauds attempts to cloud users S|pp|S.
Proceedings of the International Conference on Advances in Computing, 2013

2012
Secure Private Cloud Architecture for Mobile Infrastructure as a Service.
Proceedings of the Eighth IEEE World Congress on Services, 2012

IDS Based Defense for Cloud Based Mobile Infrastructure as a Service.
Proceedings of the Eighth IEEE World Congress on Services, 2012

A light weight centralized file monitoring approach for securing files in Cloud environment.
Proceedings of the 7th International Conference for Internet Technology and Secured Transactions, 2012

Implementing private cloud at IIT Roorkee: an initial experience.
Proceedings of the 2012 International Conference on Advances in Computing, 2012

A Hybrid Intrusion Detection Architecture for Defense against DDoS Attacks in Cloud Environment.
Proceedings of the Contemporary Computing - 5th International Conference, 2012

A secure and lightweight approach for critical data security in cloud.
Proceedings of the Fourth International Conference on Computational Aspects of Social Networks, 2012

A fingerprinting system calls approach for intrusion detection in a cloud environment.
Proceedings of the Fourth International Conference on Computational Aspects of Social Networks, 2012

2011
Ontology Based Information Retrieval for Learning Styles of Autistic People.
Proceedings of the High Performance Architecture and Grid Computing, 2011


  Loading...