Udaya Kiran Tupakula
Orcid: 0000-0001-5048-9797
According to our database1,
Udaya Kiran Tupakula
authored at least 92 papers
between 2003 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
ACM Trans. Cyber Phys. Syst., January, 2024
2023
Comput. Networks, December, 2023
2022
Toward a Trust Aware Network Slice-Based Service Provision in Virtualized Infrastructures.
IEEE Trans. Netw. Serv. Manag., 2022
Implementation of Techniques for Enhancing Security of Southbound Infrastructure in SDN.
Proceedings of the 13th International Conference on Network of the Future, 2022
2021
Proceedings of the 20th IEEE International Conference on Trust, 2021
Proceedings of the 20th IEEE International Conference on Trust, 2021
Software Enabled Security Architecture and Mechanisms for Securing 5G Network Services.
Proceedings of the 7th IEEE International Conference on Network Softwarization, 2021
2020
IEEE Trans. Netw. Serv. Manag., 2020
VMGuard: A VMI-Based Security Architecture for Intrusion Detection in Cloud Environment.
IEEE Trans. Cloud Comput., 2020
CoRR, 2020
Towards a Trust Aware Network Slice based End to End Services for Virtualised Infrastructures.
CoRR, 2020
Towards a Dynamic Policy Enhanced Integrated Security Architecture for SDN Infrastructure.
Proceedings of the NOMS 2020, 2020
Proceedings of the 6th IEEE Conference on Network Softwarization, 2020
Towards a Security Enhanced Virtualised Network Infrastructure for Internet of Medical Things (IoMT).
Proceedings of the 6th IEEE Conference on Network Softwarization, 2020
2019
IEEE Trans. Inf. Forensics Secur., 2019
Int. J. High Perform. Comput. Netw., 2019
IEEE Commun. Lett., 2019
A Detailed Investigation and Analysis of Using Machine Learning Techniques for Intrusion Detection.
IEEE Commun. Surv. Tutorials, 2019
Access Control Based Dynamic Path Establishment for Securing Flows from the User Devices with Different Security Clearance.
Proceedings of the Advanced Information Networking and Applications, 2019
2018
IEEE Trans. Cloud Comput., 2018
IEEE Access, 2018
Proceedings of the IEEE Global Communications Conference, 2018
2017
On the Design and Implementation of an Integrated Security Architecture for Cloud with Improved Resilience.
IEEE Trans. Cloud Comput., 2017
J. Netw. Comput. Appl., 2017
PSI-NetVisor: Program semantic aware intrusion detection at network and hypervisor layer in cloud.
J. Intell. Fuzzy Syst., 2017
Concurr. Comput. Pract. Exp., 2017
SDN-based Dynamic Policy Specification and Enforcement for Provisioning SECaaS in Cloud.
Proceedings of the Web Information Systems Engineering - WISE 2017, 2017
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
Proceedings of the 2017 Fourth International Conference on Software Defined Systems, 2017
Securing communication in multiple Autonomous System domains with Software Defined Networking.
Proceedings of the 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), 2017
Proceedings of the 2017 International Joint Conference on Neural Networks, 2017
Proceedings of the Australasian Computer Science Week Multiconference, 2017
2016
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
On the Design and Implementation of a Security Architecture for End to End Services in Software Defined Networks.
Proceedings of the 41st IEEE Conference on Local Computer Networks, 2016
NvCloudIDS: A security architecture to detect intrusions at network and virtualization layer in cloud environment.
Proceedings of the 2016 International Conference on Advances in Computing, 2016
Securing Virtual Machines from Anomalies Using Program-Behavior Analysis in Cloud Environment.
Proceedings of the 18th IEEE International Conference on High Performance Computing and Communications; 14th IEEE International Conference on Smart City; 2nd IEEE International Conference on Data Science and Systems, 2016
On the Design and Implementation of a Security Architecture for Software Defined Networks.
Proceedings of the 18th IEEE International Conference on High Performance Computing and Communications; 14th IEEE International Conference on Smart City; 2nd IEEE International Conference on Data Science and Systems, 2016
Proceedings of the 2nd IEEE International Conference on Big Data Security on Cloud, 2016
2015
Concurr. Comput. Pract. Exp., 2015
Comput. J., 2015
Proceedings of the International Telecommunication Networks and Applications Conference, 2015
Proceedings of the 22nd International Conference on Telecommunications, 2015
Proceedings of the 13th Australasian Information Security Conference, 2015
Proceedings of the 38th Australasian Computer Science Conference, 2015
2014
IEEE Trans. Netw. Serv. Manag., 2014
Counteracting security attacks in virtual machines in the cloud using property based attestation.
J. Netw. Comput. Appl., 2014
Proceedings of the 13th IEEE International Conference on Trust, 2014
Proceedings of the Symposium on Applied Computing, 2014
Proceedings of the International Conference on Computing, Networking and Communications, 2014
Proceedings of the Twelfth Australasian Information Security Conference, 2014
2013
Proceedings of the 12th IEEE International Conference on Trust, 2013
Proceedings of the Security and Privacy in Communication Networks, 2013
Proceedings of the 4th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN-2013) and the 3rd International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH), 2013
Proceedings of the 16th IEEE International Conference on Computational Science and Engineering, 2013
Proceedings of the IEEE 5th International Conference on Cloud Computing Technology and Science, 2013
Proceedings of the First Australasian Web Conference, 2013
2012
Dynamic State-Based Security Architecture for Detecting Security Attacks in Virtual Machines.
Comput. J., 2012
Proceedings of the 11th IEEE International Conference on Trust, 2012
Proceedings of the 2012 IEEE Network Operations and Management Symposium, 2012
Proceedings of the 19th International Conference on High Performance Computing, 2012
2011
Proceedings of the IEEE 4th International Conference on Utility and Cloud Computing, 2011
Proceedings of the IEEE 10th International Conference on Trust, 2011
Proceedings of the 4th International Conference on Security of Information and Networks, 2011
Proceedings of the 7th International Wireless Communications and Mobile Computing Conference, 2011
Proceedings of the 12th IFIP/IEEE International Symposium on Integrated Network Management, 2011
Proceedings of the Algorithms and Architectures for Parallel Processing, 2011
Proceedings of the IEEE/IFIP 9th International Conference on Embedded and Ubiquitous Computing, 2011
Proceedings of the IEEE Ninth International Conference on Dependable, 2011
Proceedings of the 18th Asia Pacific Software Engineering Conference, 2011
2010
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010
2009
Proceedings of the Guide to Wireless Ad Hoc Networks, 2009
Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), 2009
Proceedings of the 14th IEEE International Conference on Engineering of Complex Computer Systems, 2009
2008
A hybrid model against TCP. SYN and reflection DDoS attacks.
Comput. Syst. Sci. Eng., 2008
Proceedings of the 4th International ICST Conference on Security and Privacy in Communication Networks, 2008
2007
Int. J. Wirel. Mob. Comput., 2007
Proceedings of the 4th IEEE International Symposium on Wireless Communication Systems, 2007
Proceedings of the 15th IEEE International Conference on Networks, 2007
Proceedings of the Third International Conference on Networking and Services (ICNS 2007), 2007
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007
2006
Proceedings of the Management of Integrated End-to-End Communications and Services, 2006
Proceedings of the proceedings of the Fourth Australasian Symposium on Grid Computing and e-Research (AusGrid 2006) and the Fourth Australasian Information Security Workshop (Network Security) (AISW 2006), 2006
2004
Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November, 2004
2003
A Controller Agent Model to Counteract DoS Attacks in Multiple Domains.
Proceedings of the Integrated Network Management VII, Managing It All, 2003
Counteracting DDoS attacks in multiple ISP domains using routing arbiter architecture.
Proceedings of the 11th IEEE International Conference on Networks, 2003
Proceedings of the Computer Science 2003, 2003