Game theory-based defense mechanisms against DDoS attacks on TCP/TCP-friendly flows HS Bedi, S Roy, S Shiva 2011 IEEE symposium on computational intelligence in cyber security (CICS …, 2011 | 67 | 2011 |
Securing cloud infrastructure against co-resident DoS attacks using game theoretic defense mechanisms HS Bedi, S Shiva Proceedings of the international conference on advances in computing …, 2012 | 64 | 2012 |
Suffering from buffering? Detecting QoE impairments in live video streams A Ahmed, Z Shafiq, H Bedi, A Khakpour 2017 IEEE 25th International Conference on Network Protocols (ICNP), 1-10, 2017 | 52 | 2017 |
Evaluating security and privacy in cloud computing services: A Stakeholder's perspective A Abuhussein, H Bedi, S Shiva 2012 international conference for internet technology and secured …, 2012 | 51 | 2012 |
Peering vs. transit: Performance comparison of peering and transit interconnections A Ahmed, Z Shafiq, H Bedi, A Khakpour 2017 IEEE 25th International Conference on Network Protocols (ICNP), 1-10, 2017 | 37 | 2017 |
A stochastic game model with imperfect information in cyber security S Shiva, S Roy, H Bedi, D Dasgupta, Q Wu The 5th International Conference on i-Warfare and Security, 308-318, 2010 | 24 | 2010 |
Named data networking for content delivery network workflows RK Thelagathoti, S Mastorakis, A Shah, H Bedi, S Shannigrahi 2020 IEEE 9th International Conference on Cloud Networking (CloudNet), 1-7, 2020 | 19 | 2020 |
Mitigating congestion based DoS attacks with an enhanced AQM technique H Bedi, S Roy, S Shiva Computer Communications 56, 60-73, 2015 | 19 | 2015 |
Network firewall for mitigating against persistent low volume attacks P Rigor, HS Bedi US Patent 11,405,359, 2022 | 17 | 2022 |
ADAPT: a game inspired attack-defense and performance metric taxonomy CB Simmons, SG Shiva, HS Bedi, V Shandilya Security and Privacy Protection in Information Processing Systems: 28th IFIP …, 2013 | 17 | 2013 |
Network firewall for mitigating against persistent low volume attacks P Rigor, HS Bedi US Patent 10,880,270, 2020 | 15 | 2020 |
A game inspired defense mechanism against distributed denial of service attacks H Bedi, S Shiva, S Roy Security and Communication Networks 7 (12), 2389-2404, 2014 | 14 | 2014 |
Deterministic Multifactor Cache Replacement H Bedi, A Khakpour, R Peters US Patent 10,013,362, 2018 | 12* | 2018 |
Deterministic Multifactor Cache Replacement H Bedi, AR Khakpour, RJ Peters US Patent US10013362B2, 2018 | 10 | 2018 |
A holistic game inspired defense architecture S Shiva, HS Bedi, CB Simmons, M Fisher, R Dharam Recent Progress in Data Engineering and Internet Technology: Volume 2, 471-476, 2012 | 10 | 2012 |
Cache optimization based on predictive routing HS Bedi, AR Khakpour, D Shiell US Patent 10,133,673, 2018 | 9 | 2018 |
Mitigating congestion-based denial of service attacks with active queue management H Bedi, S Roy, S Shiva 2013 IEEE Global Communications Conference (GLOBECOM), 1440-1445, 2013 | 9 | 2013 |
Towards a stakeholder-oriented taxonomical approach for secure cloud computing A Abuhussein, H Bedi, S Shiva 2013 IEEE Sixth International Conference on Cloud Computing, 958-959, 2013 | 7 | 2013 |
A conceptual model of self-monitoring multi-core systems D Dasgupta, H Bedi, D Garrett Proceedings of the Sixth Annual Workshop on Cyber Security and Information …, 2010 | 7 | 2010 |
Distributed load balancing in key-value networked caches S Huq, Z Shafiq, S Ghosh, A Khakpour, H Bedi 2017 IEEE 37th International Conference on Distributed Computing Systems …, 2017 | 6 | 2017 |