Author of the publication

A Hybrid Intrusion Detection Architecture for Defense against DDoS Attacks in Cloud Environment.

, , and . IC3, volume 306 of Communications in Computer and Information Science, page 498-499. Springer, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Dual-level defense for networks under DDoS attacks., and . SAC, page 733-734. ACM, (2010)Simulation of Dynamic Honeypot Based Redirection to Counter Service Level DDoS Attacks., and . ICISS, volume 4812 of Lecture Notes in Computer Science, page 259-262. Springer, (2007)Identity management framework for cloud based internet of things., and . SECURIT, page 200-203. ACM, (2012)Protecting web applications from SQL injection attacks by using framework and database firewall., and . ICACCI, page 609-613. ACM, (2012)Key Distribution Schemes in Wireless Sensor Networks: Novel Classification and Analysis., and . ACITY (1), volume 176 of Advances in Intelligent Systems and Computing, page 43-53. Springer, (2012)Secret information display based authentication technique towards preventing phishing attacks., , and . ICACCI, page 602-608. ACM, (2012)Implementing private cloud at IIT Roorkee: an initial experience., , and . ICACCI, page 453-458. ACM, (2012)IDS Based Defense for Cloud Based Mobile Infrastructure as a Service., , and . SERVICES, page 199-202. IEEE Computer Society, (2012)Personal Secret Information Based Authentication towards Preventing Phishing Attacks., , and . ACITY (1), volume 176 of Advances in Intelligent Systems and Computing, page 31-42. Springer, (2012)Wireless Honeypot: Framework, Architectures and Tools., , and . Int. J. Netw. Secur., 15 (5): 373-383 (2013)