- Network Security and Intrusion Detection
- Complex Network Analysis Techniques
- Caching and Content Delivery
- IoT and Edge/Fog Computing
- Cloud Computing and Resource Management
- Mobile Ad Hoc Networks
- Spam and Phishing Detection
- Opinion Dynamics and Social Influence
- Internet Traffic Analysis and Secure E-voting
- Opportunistic and Delay-Tolerant Networks
- Data Management and Algorithms
- Data Mining Algorithms and Applications
- Cryptography and Data Security
- Web Application Security Vulnerabilities
- Web Data Mining and Analysis
- Advanced Malware Detection Techniques
- Rough Sets and Fuzzy Logic
- Recommender Systems and Techniques
- Security and Verification in Computing
- Distributed and Parallel Computing Systems
- Privacy-Preserving Technologies in Data
- Text and Document Classification Technologies
- Topic Modeling
- Peer-to-Peer Network Technologies
- Network Time Synchronization Technologies
National Institute of Technology Karnataka
2016-2025
Sardar Vallabhbhai National Institute of Technology Surat
2015-2016
Jawaharlal Nehru University
2012
Yahoo (United Kingdom)
2006
Distributed denial of service (DDoS) attacks are some the most devastating against Web applications. A large number these aim to exhaust network bandwidth server, and called layer DDoS attacks. They volumetric rely on a volume packets throttle bandwidth. However, as time passed, infrastructure became more robust defenses also advanced. Recently, have started targeting application layer. Unlike attacks, can be carried out with relatively low attack volume. utilize legitimate requests, which...
The increasing number of Web services over the makes requester to use tools search for suitable available throughout globe. UDDI is first step towards meeting these demands. However requester’s demand may include not only functional aspects but also non-functional like Quality Service (QoS). There a need select most (qualitatively optimal) service based on QoS requirements and preferences. In this paper we explore different types (demands) with illustrations. We propose broker architecture...
Asymmetric application layer DDoS attacks using computationally intensive HTTP requests are an extremely dangerous class of capable taking down web servers with relatively few attacking connections. These consume limited network bandwidth and similar to legitimate traffic, which makes their detection difficult. Existing mechanisms for these use indirect representations actual user behaviour complex modelling techniques, leads a higher false positive rate (FPR) longer time, them unsuitable...
Climate change, environmental stresses, and evolving pathogens pose major threats to global food security. Developing resilient crops with robust defense mechanisms is crucial ensure sustainable agricultural production in the face of these challenges. CRISPR-based genome editing has emerged as a powerful tool for precisely modifying plant genes enhance stress tolerance disease resistance. This review explores recent advancements CRISPR-mediated modification defense-related crops. We discuss...
Association rule mining activity is both computationally and I/O intensive. A majority of ARM algorithms reported in the literature efficient handling high dimensional data but single database based. Many enterprises maintain several databases independently to serve different purposes. There could be an implicit association among various parts such data. In this paper, we investigate a mechanism generate rules (ARs) between sets values which are subsets domains attributes occurring relations...
Distributed Denial of Service (DDoS) attacks using the HTTP protocol have started gaining popularity in recent years. A trend this direction has been use computationally expensive requests to launch attacks. These attacks, called Asymmetric Workload can bring down servers limited resources, and are extremely difficult detect. The introduction HTTP/2 welcomed by developers because it improves user experience efficiency. This was made possible ability transport their associated inline...
Cloud computing is an upcoming trend in the field of computer science recent years. In cloud, resources are provided as service form virtual machine to its clients across globe based on demand. Huge demand for cloud results overutilization servers whenever there a heavy load. It necessary distribute load by taking into consideration allocating right amount dynamically improve performance applications running machines. this paper we present algorithm which allocate need and servers. We...
Efficient and low power utilizing clock synchronization is a challenging task for wireless-sensor network (WSN). Therefore, it crucial to design light weight protocols these networks. An adaptive offset prediction model WSN proposed in this paper that exchanges fewer messages improve the accuracy efficiency. Timing information required collected by setting small set up investigate soil condition control irrigation agriculture. The networks soils moisture, temperature, humidity, pressure...
The increasing demand in computing resources and widespread adaptation of Service Oriented Architecture (SOA) has made cloud as a new IT delivery mechanism. In cloud, are provided to the requester service, which include Software (SaaS), Platform (PaaS) Infrastructure (IaaS). Cloud Computing is still developing stage faces many challenges. Out various issues, scheduling plays very important role determining efficient execution tasks environment. this paper we present algorithm uses tree based...
Rapid growth of internet technology made many IaaS providers arise across the globe to meet needs small IT companies. Number companies started using resources provider due elastic and pay as you go nature. Increasing number cloud results in difficulty for requester select suitable based on requirements. In this paper we present a broker architecture selecting from multiple providers. The measure quality each prioritize them requester. experiment is conducted cloudsim simulator shows that...