关注
Gaurav Somani
标题
引用次数
引用次数
年份
DDoS attacks in cloud computing: Issues, taxonomy, and future directions
G Somani, MS Gaur, D Sanghi, M Conti, R Buyya
Computer Communications 107, 30-48, 2017
3772017
Policy based resource allocation in IaaS cloud
A Nathani, S Chaudhary, G Somani
Future Generation Computer Systems 28 (1), 94-103, 2012
2702012
Application performance isolation in virtualization
G Somani, S Chaudhary
2009 IEEE International Conference on Cloud Computing, 41-48, 2009
1162009
DDoS attacks in Cloud Computing: Collateral Damage to Non-targets
G Somani, MS Gaur, D Sanghi, M Conti
Computer Networks 109 (Part 2), 157-171, 2016
1062016
A Systematic Survey on Cloud Forensics Challenges, Solutions, and Future Directions
B Manral, G Somani, KKR Choo, M Conti, MS Gaur
ACM Computing Surveys (CSUR) 52 (6), 1-38, 2020
892020
Scale Inside-out: Rapid Mitigation of Cloud DDoS Attacks
G Somani, MS Gaur, D Sanghi, M Conti, M Rajarajan
IEEE Transactions on Dependable and Secure Computing 15 (6), 959-973, 2018
842018
Combating DDoS attacks in the cloud: requirements, trends, and future directions
G Somani, MS Gaur, D Sanghi, M Conti, M Rajarajan, R Buyya
IEEE Cloud Computing 4 (1), 22-32, 2017
812017
DDoS/EDoS attack in cloud: affecting everyone out there!
G Somani, MS Gaur, D Sanghi
Proceedings of the 8th International Conference on Security of Information …, 2015
502015
Service resizing for quick DDoS mitigation in cloud computing environment
G Somani, MS Gaur, D Sanghi, M Conti, R Buyya
Annals of Telecommunications 72 (5), 237-252, 2017
472017
Research advances in cloud computing
S Chaudhary, G Somani, R Buyya
Springer Singapore, 2017
422017
AndroTaint: An efficient android malware detection framework using dynamic taint analysis
VG Shankar, G Somani, MS Gaur, V Laxmi, M Conti
2017 ISEA Asia security and privacy (ISEASP), 1-13, 2017
382017
Negotiation for resource allocation in IaaS cloud
J Akhani, S Chuadhary, G Somani
Proceedings of the Fourth Annual ACM Bangalore Conference, 15, 2011
382011
DARAC: DDoS Mitigation Using DDoS Aware Resource Allocation in Cloud
G Somani, A Johri, M Taneja, U Pyne, MS Gaur, D Sanghi
ICISS 2015, Information Systems Security, International Conference on, 263-282, 2015
362015
QuickDedup: Efficient VM deduplication in cloud computing environments
S Saharan, G Somani, G Gupta, R Verma, MS Gaur, R Buyya
Journal of Parallel and Distributed Computing 139, 18-31, 2020
312020
VUPIC: Virtual machine usage based placement in IaaS cloud
G Somani, P Khandelwal, K Phatnani
arXiv preprint arXiv:1212.0085, 2012
302012
Access control and authentication in the internet of things environment
AK Ranjan, G Somani
Connectivity Frameworks for Smart Devices: The Internet of Things from a …, 2016
292016
Index page based EDoS attacks in infrastructure cloud
B Saini, G Somani
Security in Computer Networks and Distributed Systems, International …, 2014
272014
DDoS victim service containment to minimize the internal collateral damages in cloud computing
G Somani, MS Gaur, D Sanghi, M Conti, M Rajarajan
Computers & Electrical Engineering 59, 165-179, 2017
232017
Anti-Hijack: Runtime detection of malware initiated hijacking in android
VG Shankar, G Somani
Procedia Computer Science 78, 587-594, 2016
192016
Vulvet Vetting of Vulnerabilities in Android Apps to Thwart Exploitation
J Gajrani, M Tripathi, V Laxmi, G Somani, A Zemmari, MS Gaur
Digital Threats: Research and Practice 1 (2), 1-25, 2020
152020
系统目前无法执行此操作,请稍后再试。
文章 1–20