DDoS attacks in cloud computing: Issues, taxonomy, and future directions G Somani, MS Gaur, D Sanghi, M Conti, R Buyya Computer Communications 107, 30-48, 2017 | 377 | 2017 |
Policy based resource allocation in IaaS cloud A Nathani, S Chaudhary, G Somani Future Generation Computer Systems 28 (1), 94-103, 2012 | 270 | 2012 |
Application performance isolation in virtualization G Somani, S Chaudhary 2009 IEEE International Conference on Cloud Computing, 41-48, 2009 | 116 | 2009 |
DDoS attacks in Cloud Computing: Collateral Damage to Non-targets G Somani, MS Gaur, D Sanghi, M Conti Computer Networks 109 (Part 2), 157-171, 2016 | 106 | 2016 |
A Systematic Survey on Cloud Forensics Challenges, Solutions, and Future Directions B Manral, G Somani, KKR Choo, M Conti, MS Gaur ACM Computing Surveys (CSUR) 52 (6), 1-38, 2020 | 89 | 2020 |
Scale Inside-out: Rapid Mitigation of Cloud DDoS Attacks G Somani, MS Gaur, D Sanghi, M Conti, M Rajarajan IEEE Transactions on Dependable and Secure Computing 15 (6), 959-973, 2018 | 84 | 2018 |
Combating DDoS attacks in the cloud: requirements, trends, and future directions G Somani, MS Gaur, D Sanghi, M Conti, M Rajarajan, R Buyya IEEE Cloud Computing 4 (1), 22-32, 2017 | 81 | 2017 |
DDoS/EDoS attack in cloud: affecting everyone out there! G Somani, MS Gaur, D Sanghi Proceedings of the 8th International Conference on Security of Information …, 2015 | 50 | 2015 |
Service resizing for quick DDoS mitigation in cloud computing environment G Somani, MS Gaur, D Sanghi, M Conti, R Buyya Annals of Telecommunications 72 (5), 237-252, 2017 | 47 | 2017 |
Research advances in cloud computing S Chaudhary, G Somani, R Buyya Springer Singapore, 2017 | 42 | 2017 |
AndroTaint: An efficient android malware detection framework using dynamic taint analysis VG Shankar, G Somani, MS Gaur, V Laxmi, M Conti 2017 ISEA Asia security and privacy (ISEASP), 1-13, 2017 | 38 | 2017 |
Negotiation for resource allocation in IaaS cloud J Akhani, S Chuadhary, G Somani Proceedings of the Fourth Annual ACM Bangalore Conference, 15, 2011 | 38 | 2011 |
DARAC: DDoS Mitigation Using DDoS Aware Resource Allocation in Cloud G Somani, A Johri, M Taneja, U Pyne, MS Gaur, D Sanghi ICISS 2015, Information Systems Security, International Conference on, 263-282, 2015 | 36 | 2015 |
QuickDedup: Efficient VM deduplication in cloud computing environments S Saharan, G Somani, G Gupta, R Verma, MS Gaur, R Buyya Journal of Parallel and Distributed Computing 139, 18-31, 2020 | 31 | 2020 |
VUPIC: Virtual machine usage based placement in IaaS cloud G Somani, P Khandelwal, K Phatnani arXiv preprint arXiv:1212.0085, 2012 | 30 | 2012 |
Access control and authentication in the internet of things environment AK Ranjan, G Somani Connectivity Frameworks for Smart Devices: The Internet of Things from a …, 2016 | 29 | 2016 |
Index page based EDoS attacks in infrastructure cloud B Saini, G Somani Security in Computer Networks and Distributed Systems, International …, 2014 | 27 | 2014 |
DDoS victim service containment to minimize the internal collateral damages in cloud computing G Somani, MS Gaur, D Sanghi, M Conti, M Rajarajan Computers & Electrical Engineering 59, 165-179, 2017 | 23 | 2017 |
Anti-Hijack: Runtime detection of malware initiated hijacking in android VG Shankar, G Somani Procedia Computer Science 78, 587-594, 2016 | 19 | 2016 |
Vulvet Vetting of Vulnerabilities in Android Apps to Thwart Exploitation J Gajrani, M Tripathi, V Laxmi, G Somani, A Zemmari, MS Gaur Digital Threats: Research and Practice 1 (2), 1-25, 2020 | 15 | 2020 |