- Network Security and Intrusion Detection
- Blockchain Technology Applications and Security
- Opportunistic and Delay-Tolerant Networks
- Advanced Malware Detection Techniques
- Internet Traffic Analysis and Secure E-voting
- Quantum Information and Cryptography
- Vehicular Ad Hoc Networks (VANETs)
- Cryptography and Data Security
- Hate Speech and Cyberbullying Detection
- Software-Defined Networks and 5G
- Cloud Data Security Solutions
- Cryptographic Implementations and Security
- Spam and Phishing Detection
- User Authentication and Security Systems
- Software Engineering Research
- Wireless Body Area Networks
- Mobile Ad Hoc Networks
- Software Reliability and Analysis Research
- Software Engineering Techniques and Practices
- Spectroscopy Techniques in Biomedical and Chemical Research
- Misinformation and Its Impacts
- EEG and Brain-Computer Interfaces
- Quantum Mechanics and Applications
Cleveland State University
2020-2024
REVA University
2023
Vellore Institute of Technology University
2011
Distributed Denial of Service (DDoS) attacks aims exhausting the target network with malicious traffic, which is a threat to availability service. Many detection systems, specifically Intrusion Detection System (IDS) have been proposed throughout last two decades as Internet evolved, although users and organizations find it continuously challenging defeated while dealing DDoS. Though, IDS first point defense for protecting critical networks against ever evolving issues intrusive activities,...
Network slicing plays a crucial role in supporting Fifth Generation (5G) mobile network, which is designed to efficiently accommodate diverse range of services with varying service level requirements. In this work, our efforts are largely aimed at exposing security flaws 5G network from Distributed Denial Service (DDoS) attack perspective. Time consuming authentication process during the inter-slice handover procedure exploited launch DDoS attack. To address issue, we offer novel detection...
Abstract: With the approbation of portable proficiency and communal media growing, information is voluntarily accessible. The spread deceptive broadcast has extensive consequences like generating prejudiced state observance inducing biased race to preserve certain aspirants. Furthermore, spammers exploit appealing news structures return income relating notifications over click baits. In this article, we recommend accomplish a parallel arrangement divergent sections accessible online with...