Udaya Kiran Tupakula

Orcid: 0000-0001-5048-9797

According to our database1, Udaya Kiran Tupakula authored at least 92 papers between 2003 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Anti-phishing: A comprehensive perspective.
Expert Syst. Appl., March, 2024

Techniques for Enhancing Security in Industrial Control Systems.
ACM Trans. Cyber Phys. Syst., January, 2024

The WMDP Benchmark: Measuring and Reducing Malicious Use With Unlearning.
CoRR, 2024

2023
A trust-aware openflow switching framework for software defined networks (SDN).
Comput. Networks, December, 2023

2022
Toward a Trust Aware Network Slice-Based Service Provision in Virtualized Infrastructures.
IEEE Trans. Netw. Serv. Manag., 2022

Implementation of Techniques for Enhancing Security of Southbound Infrastructure in SDN.
Proceedings of the 13th International Conference on Network of the Future, 2022

2021
SDN-Enabled Secure IoT Architecture.
IEEE Internet Things J., 2021

Techniques for Securing 5G Network Services from attacks.
Proceedings of the 20th IEEE International Conference on Trust, 2021

Techniques for Securing Control Systems from Attacks.
Proceedings of the 20th IEEE International Conference on Trust, 2021

Software Enabled Security Architecture and Mechanisms for Securing 5G Network Services.
Proceedings of the 7th IEEE International Conference on Network Softwarization, 2021

2020
Counteracting Attacks From Malicious End Hosts in Software Defined Networks.
IEEE Trans. Netw. Serv. Manag., 2020

VMGuard: A VMI-Based Security Architecture for Intrusion Detection in Cloud Environment.
IEEE Trans. Cloud Comput., 2020

Software Enabled Security Architecture for Counteracting Attacks in Control Systems.
CoRR, 2020

Towards a Trust Aware Network Slice based End to End Services for Virtualised Infrastructures.
CoRR, 2020

Towards a Dynamic Policy Enhanced Integrated Security Architecture for SDN Infrastructure.
Proceedings of the NOMS 2020, 2020

Attack Detection on the Software Defined Networking Switches.
Proceedings of the 6th IEEE Conference on Network Softwarization, 2020

Towards a Security Enhanced Virtualised Network Infrastructure for Internet of Medical Things (IoMT).
Proceedings of the 6th IEEE Conference on Network Softwarization, 2020

2019
A Policy-Based Security Architecture for Software-Defined Networks.
IEEE Trans. Inf. Forensics Secur., 2019

Securing SDN controller and switches from attacks.
Int. J. High Perform. Comput. Netw., 2019

Analysis of Policy-Based Security Management System in Software-Defined Networks.
IEEE Commun. Lett., 2019

A Detailed Investigation and Analysis of Using Machine Learning Techniques for Intrusion Detection.
IEEE Commun. Surv. Tutorials, 2019

Mitigating attacks in software defined networks.
Clust. Comput., 2019

Access Control Based Dynamic Path Establishment for Securing Flows from the User Devices with Different Security Clearance.
Proceedings of the Advanced Information Networking and Applications, 2019

2018
Securing Services in Networked Cloud Infrastructures.
IEEE Trans. Cloud Comput., 2018

Secure Monitoring of Patients With Wandering Behavior in Hospital Environments.
IEEE Access, 2018

Towards QoS and Security in Software-Driven Heterogeneous Autonomous Networks.
Proceedings of the IEEE Global Communications Conference, 2018

2017
On the Design and Implementation of an Integrated Security Architecture for Cloud with Improved Resilience.
IEEE Trans. Cloud Comput., 2017

Intrusion detection techniques in cloud environment: A survey.
J. Netw. Comput. Appl., 2017

PSI-NetVisor: Program semantic aware intrusion detection at network and hypervisor layer in cloud.
J. Intell. Fuzzy Syst., 2017

VAED: VMI-assisted evasion detection approach for infrastructure as a service cloud.
Concurr. Comput. Pract. Exp., 2017

SDN-based Dynamic Policy Specification and Enforcement for Provisioning SECaaS in Cloud.
Proceedings of the Web Information Systems Engineering - WISE 2017, 2017

An Eclat Algorithm Based Energy Detection for Cognitive Radio Networks.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Mitigating attacks in Software Defined Network (SDN).
Proceedings of the 2017 Fourth International Conference on Software Defined Systems, 2017

Securing communication in multiple Autonomous System domains with Software Defined Networking.
Proceedings of the 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), 2017

Autoencoder-based feature learning for cyber security applications.
Proceedings of the 2017 International Joint Conference on Neural Networks, 2017

A trust model based energy detection for cognitive radio networks.
Proceedings of the Australasian Computer Science Week Multiconference, 2017

2016
Integrated Security for Services Hosted in Virtual Environments.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

On the Design and Implementation of a Security Architecture for End to End Services in Software Defined Networks.
Proceedings of the 41st IEEE Conference on Local Computer Networks, 2016

NvCloudIDS: A security architecture to detect intrusions at network and virtualization layer in cloud environment.
Proceedings of the 2016 International Conference on Advances in Computing, 2016

Securing Virtual Machines from Anomalies Using Program-Behavior Analysis in Cloud Environment.
Proceedings of the 18th IEEE International Conference on High Performance Computing and Communications; 14th IEEE International Conference on Smart City; 2nd IEEE International Conference on Data Science and Systems, 2016

On the Design and Implementation of a Security Architecture for Software Defined Networks.
Proceedings of the 18th IEEE International Conference on High Performance Computing and Communications; 14th IEEE International Conference on Smart City; 2nd IEEE International Conference on Data Science and Systems, 2016

Securing Big Data Environments from Attacks.
Proceedings of the 2nd IEEE International Conference on Big Data Security on Cloud, 2016

2015
Securing wireless mobile nodes from distributed denial-of-service attacks.
Concurr. Comput. Pract. Exp., 2015

Trust Enhanced Security for Tenant Transactions in the Cloud Environment.
Comput. J., 2015

Improved detection of primary user emulation attacks in cognitive radio networks.
Proceedings of the International Telecommunication Networks and Applications Conference, 2015

Botnet detection using software defined networking.
Proceedings of the 22nd International Conference on Telecommunications, 2015

Hypervisor-based Security Architecture to Protect Web Applications.
Proceedings of the 13th Australasian Information Security Conference, 2015

An Enhanced Model for Network Flow Based Botnet Detection.
Proceedings of the 38th Australasian Computer Science Conference, 2015

2014
Security as a Service Model for Cloud Environment.
IEEE Trans. Netw. Serv. Manag., 2014

Antivirus security: naked during updates.
Softw. Pract. Exp., 2014

Counteracting security attacks in virtual machines in the cloud using property based attestation.
J. Netw. Comput. Appl., 2014

Trust Enhanced Cloud Security for Healthcare Services.
Proceedings of the 13th IEEE International Conference on Trust, 2014

Secure monitoring for dementia patients.
Proceedings of the Symposium on Applied Computing, 2014

Techniques for detecting attacks on critical infrastructure.
Proceedings of the International Conference on Computing, Networking and Communications, 2014

Hypervisor-based Security Architecture for Validating DNS Services (Poster).
Proceedings of the Twelfth Australasian Information Security Conference, 2014

2013
Trust Enhanced Security Architecture for Detecting Insider Threats.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Integrated Security Architecture for Virtual Machines.
Proceedings of the Security and Privacy in Communication Networks, 2013

Security Techniques for Counteracting Attacks in Mobile Healthcare Services.
Proceedings of the 4th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN-2013) and the 3rd International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH), 2013

Securing Mobile Devices from DoS Attacks.
Proceedings of the 16th IEEE International Conference on Computational Science and Engineering, 2013

On the Security of Tenant Transactions in the Cloud.
Proceedings of the IEEE 5th International Conference on Cloud Computing Technology and Science, 2013

On Malware Characterization and Attack Classification.
Proceedings of the First Australasian Web Conference, 2013

2012
Dynamic State-Based Security Architecture for Detecting Security Attacks in Virtual Machines.
Comput. J., 2012

TREASURE: Trust Enhanced Security for Cloud Environments.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Distributed service control technique for detecting security attacks.
Proceedings of the 2012 IEEE Network Operations and Management Symposium, 2012

Intrusion detection techniques for virtual domains.
Proceedings of the 19th International Conference on High Performance Computing, 2012

2011
TVDSEC: Trusted Virtual Domain Security.
Proceedings of the IEEE 4th International Conference on Utility and Cloud Computing, 2011

TVLAN: Trusted and Virtualised Local Area Networks.
Proceedings of the IEEE 10th International Conference on Trust, 2011

Counteracting DDoS attacks in WLAN.
Proceedings of the 4th International Conference on Security of Information and Networks, 2011

Security techniques for zero day attacks.
Proceedings of the 7th International Wireless Communications and Mobile Computing Conference, 2011

On the design of Virtual machine Intrusion detection system.
Proceedings of the 12th IFIP/IEEE International Symposium on Integrated Network Management, 2011

Security Architecture for Virtual Machines.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2011

Security Techniques for Beyond 3G Wireless Mobile Networks.
Proceedings of the IEEE/IFIP 9th International Conference on Embedded and Ubiquitous Computing, 2011

Intrusion Detection Techniques for Infrastructure as a Service Cloud.
Proceedings of the IEEE Ninth International Conference on Dependable, 2011

Techniques for Analysing PDF Malware.
Proceedings of the 18th Asia Pacific Software Engineering Conference, 2011

2010
Detecting Security Attacks in Trusted Virtual Domains.
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010

2009
Trust Management in Mobile Ad Hoc Networks.
Proceedings of the Guide to Wireless Ad Hoc Networks, 2009

DoSTRACK: a system for defending against DoS attacks.
Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), 2009

SBAC: Service Based Access Control.
Proceedings of the 14th IEEE International Conference on Engineering of Complex Computer Systems, 2009

2008
A hybrid model against TCP. SYN and reflection DDoS attacks.
Comput. Syst. Sci. Eng., 2008

Subjective logic based trust model for mobile ad hoc networks.
Proceedings of the 4th International ICST Conference on Security and Privacy in Communication Networks, 2008

2007
DDoS: design, implementation and analysis of automated model.
Int. J. Wirel. Mob. Comput., 2007

Trust Integrated Cooperation Architecture for Mobile Ad-hoc Networks.
Proceedings of the 4th IEEE International Symposium on Wireless Communication Systems, 2007

TEAM: Trust Enhanced Security Architecture for Mobile Ad-hoc Networks.
Proceedings of the 15th IEEE International Conference on Networks, 2007

Trust and Recommendations in Mobile Ad hoc Networks.
Proceedings of the Third International Conference on Networking and Services (ICNS 2007), 2007

Trust Enhanced Secure Mobile Ad-Hoc Network Routing.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

2006
Fellowship: Defense against Flooding and Packet Drop Attacks in MANET.
Proceedings of the Management of Integrated End-to-End Communications and Services, 2006

Analysis of traceback techniques.
Proceedings of the proceedings of the Fourth Australasian Symposium on Grid Computing and e-Research (AusGrid 2006) and the Fourth Australasian Information Security Workshop (Network Security) (AISW 2006), 2006

2004
Tracing DoS Floods: An Automated Approach.
J. Netw. Syst. Manag., 2004

Counteracting TCP SYN DDoS attacks using automated model.
Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November, 2004

2003
A Controller Agent Model to Counteract DoS Attacks in Multiple Domains.
Proceedings of the Integrated Network Management VII, Managing It All, 2003

Counteracting DDoS attacks in multiple ISP domains using routing arbiter architecture.
Proceedings of the 11th IEEE International Conference on Networks, 2003

A Practical Method to Counteract Denial of Service Attacks.
Proceedings of the Computer Science 2003, 2003


  Loading...