V. Anil Kumar

Orcid: 0000-0003-2598-8492

According to our database1, V. Anil Kumar authored at least 14 papers between 2004 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
Data sequence signal manipulation in multipath TCP (MPTCP): The vulnerability, attack and its detection.
Comput. Secur., 2021

2020
Darknet Traffic Analysis and Classification Using Numerical AGM and Mean Shift Clustering Algorithm.
SN Comput. Sci., 2020

Data Sequence Map Flooding in MPTCP Framework: Potential Challenges and Efficient Countermeasures.
Proceedings of the 11th International Conference on Computing, 2020

2019
Exploitation of HTTP/2 Proxies for Cryptojacking.
Proceedings of the Security in Computing and Communications - 7th International Symposium, 2019

2018
An Investigation on HTTP/2 Security.
J. Cyber Secur. Mobil., 2018

Performance Analysis of Blind Source Separation Using Canonical Correlation.
Circuits Syst. Signal Process., 2018

2017
Unsupervised noise removal technique based on constrained NMF.
IET Signal Process., 2017

2016
A GA trained ANN model for maximum power point tracking in solar photo voltaic cell.
Proceedings of the 11th International Conference on Industrial and Information Systems, 2016

2014
Data Enriched SACK: A Novel Acknowledgement Generation Scheme for Secure SCTP.
IEEE Commun. Lett., 2014

2012
Feedback manipulation flooding attack: Feasibility evaluation and impact quantification on Stream Control Transmission Protocol.
Proceedings of the 7th International Conference for Internet Technology and Secured Transactions, 2012

2009
On remote exploitation of TCP sender for low-rate flooding denial-of-service attack.
IEEE Commun. Lett., 2009

2007
A New Concept of Key Agreement Using Chaos-Synchronization Based Parameter Estimation.
Proceedings of the Information Systems Security, Third International Conference, 2007

Secure Chaotic Synchronization Using Negative Feedback of Super-Positioned Signals.
Proceedings of the Information Systems Security, Third International Conference, 2007

2004
TCP Based Denial-of-Service Attacks to Edge Network: Analysis and Detection.
Proceedings of the Intelligent Information Technology, 2004


  Loading...