- Network Security and Intrusion Detection
- Advanced Malware Detection Techniques
- Software Engineering Research
- Caching and Content Delivery
- Software Reliability and Analysis Research
- Opportunistic and Delay-Tolerant Networks
- Internet Traffic Analysis and Secure E-voting
- Software Engineering Techniques and Practices
- Software Testing and Debugging Techniques
- Mobile Ad Hoc Networks
- Peer-to-Peer Network Technologies
- Complex Network Analysis Techniques
- Software System Performance and Reliability
- Cloud Computing and Resource Management
- Opinion Dynamics and Social Influence
- Smart Grid Security and Resilience
- Security in Wireless Sensor Networks
- Cloud Data Security Solutions
- Blockchain Technology Applications and Security
- Advanced Authentication Protocols Security
- Multimedia Communication and Technology
- Numerical methods for differential equations
- Cryptography and Data Security
- Iterative Methods for Nonlinear Equations
- Vehicular Ad Hoc Networks (VANETs)
Dr. B. R. Ambedkar National Institute of Technology Jalandhar
2015-2024
DAV University
2012-2020
Abstract In the information age where Internet is most important means of delivery plethora services, distributed denial‐of‐service (DDoS) attacks have emerged as one serious threat. Strategic, security, social, and financial implications these ceaselessly alarmed entire cyber community. To obviate a DDoS attack mitigate its impact, there an irrevocable prerequisite to accurately detect them promptly. An inherent challenge in addressing this issue efficiently distinguish from...
In this paper a smart grid cloud has been simulated using CloudSim. Various parameters like number of virtual machines (VM), VM Image size, RAM, bandwidth, cloudlet length, and their effect on cost completion time in time-shared space-shared resource allocation policy have studied. As the cloudlets increased from 68 to 178, greater completed execution with high as compared policy. Similar trend observed when bandwidth is 1 Gbps 10 RAM 512 MB 5120 MB. The processing linearly respect increase...
Smartphones are now able to use for various purposes such as online banking, social networking, web browsing, ubiquitous services, MMS, and more daily essential needs through apps. However, these apps highly vulnerable types of malware attacks attributed their open nature high popularity in the market. The fault lies underneath permission model Android These need several sensitive permissions during installation runtime, which enables possible security breaches by malware. Hence, there is a...
With all the brisk growth of web, distributed denial service attacks are becoming most serious issues in a data center scenarios where lot many servers deployed.A Distributed Denial Service attack generates substantial packets by large number agents and can easily tire out processing communication resources victim within very less period time.Defending DDoS problem involved several steps from detection, characterization trace back order todomitigation.The contribution this research paper is...
Intelligent prediction of neighboring node (k well defined neighbors as specified by the dht protocol) dynamism is helpful to improve resilience and can reduce overhead associated with topology maintenance structured overlay networks. The dynamic behavior nodes depends on many factors such underlying user's online behavior, geographical position, time day, day week etc. reported in applications. We exploit these characteristics for efficient networks implementing an intelligent predictive...
Delay Tolerant Network (DTN) addresses challenges of providing end-to-end service where data forwarding paths may not exist. Security and privacy are crucial to the wide deployments DTN. Without security guarantees, people reluctant accept such a new network paradigm. To address issues in DTNs, we this paper have discussed various open which need be addressed evolve secure DTNs.
Abstract Context Since last more than one‐decade software process improvement, widely known as SPI has received the attention of engineering community. Objective The objective paper is to empirically examine and develop a framework model structural dependences among inhibitors that impact initiatives in SMEs. Methods Authors used mixed method approach (empirical analysis interpretive modeling, ISM) evaluate, model, analyze association between Results results from empirical ISM show lack...
Abstract Context For successful initiation of software process improvement (SPI) initiatives in SMEs, it is vital for the practitioners to have deep understanding various SPI inhibitors. Objective The paper has following objectives: investigate factors which impact implementation synthesize available evidence, identify gaps between existing approaches literature, and develop taxonomy factors. Methods Database search snowballing procedure are adapted perform systematic mapping review,...