Gaurav Somani
Citat de
Citat de
DDoS attacks in cloud computing: Issues, taxonomy, and future directions
G Somani, MS Gaur, D Sanghi, M Conti, R Buyya
Computer Communications 107, 30-48, 2017
Policy based resource allocation in IaaS cloud
A Nathani, S Chaudhary, G Somani
Future Generation Computer Systems 28 (1), 94-103, 2012
Application performance isolation in virtualization
G Somani, S Chaudhary
2009 IEEE International Conference on Cloud Computing, 41-48, 2009
DDoS attacks in Cloud Computing: Collateral Damage to Non-targets
G Somani, MS Gaur, D Sanghi, M Conti
Computer Networks 109 (Part 2), 157-171, 2016
Combating DDoS attacks in the cloud: requirements, trends, and future directions
G Somani, MS Gaur, D Sanghi, M Conti, M Rajarajan, R Buyya
IEEE Cloud Computing 4 (1), 22-32, 2017
A Systematic Survey on Cloud Forensics Challenges, Solutions, and Future Directions
B Manral, G Somani, KKR Choo, M Conti, MS Gaur
ACM Computing Surveys (CSUR) 52 (6), 1-38, 2020
Scale Inside-out: Rapid Mitigation of Cloud DDoS Attacks
G Somani, MS Gaur, D Sanghi, M Conti, M Rajarajan
IEEE Transactions on Dependable and Secure Computing 15 (6), 959-973, 2018
Negotiation for resource allocation in IaaS cloud
J Akhani, S Chuadhary, G Somani
Proceedings of the Fourth Annual ACM Bangalore Conference, 15, 2011
DDoS/EDoS attack in cloud: affecting everyone out there!
G Somani, MS Gaur, D Sanghi
Proceedings of the 8th International Conference on Security of Information …, 2015
Service resizing for quick DDoS mitigation in cloud computing environment
G Somani, MS Gaur, D Sanghi, M Conti, R Buyya
Annals of Telecommunications 72 (5), 237-252, 2017
Research advances in cloud computing
S Chaudhary, G Somani, R Buyya
Springer Singapore, 2017
DARAC: DDoS Mitigation Using DDoS Aware Resource Allocation in Cloud
G Somani, A Johri, M Taneja, U Pyne, MS Gaur, D Sanghi
ICISS 2015, Information Systems Security, International Conference on, 263-282, 2015
Index page based EDoS attacks in infrastructure cloud
B Saini, G Somani
Security in Computer Networks and Distributed Systems, International …, 2014
AndroTaint: An efficient android malware detection framework using dynamic taint analysis
VG Shankar, G Somani, MS Gaur, V Laxmi, M Conti
2017 ISEA Asia security and privacy (ISEASP), 1-13, 2017
VUPIC: Virtual machine usage based placement in IaaS cloud
G Somani, P Khandelwal, K Phatnani
arXiv preprint arXiv:1212.0085, 2012
Access control and authentication in the internet of things environment
AK Ranjan, G Somani
Connectivity Frameworks for Smart Devices, 283-305, 2016
QuickDedup: Efficient VM deduplication in cloud computing environments
S Saharan, G Somani, G Gupta, R Verma, MS Gaur, R Buyya
Journal of Parallel and Distributed Computing 139, 18-31, 2020
DDoS victim service containment to minimize the internal collateral damages in cloud computing
G Somani, MS Gaur, D Sanghi, M Conti, M Rajarajan
Computers & Electrical Engineering 59, 165-179, 2017
Anti-Hijack: Runtime detection of malware initiated hijacking in android
VG Shankar, G Somani
Procedia Computer Science 78, 587-594, 2016
Performance isolation and scheduler behavior
G Somani, S Chaudhary
2010 First International Conference On Parallel, Distributed and Grid …, 2010
Sistemul nu poate realiza operația în acest moment. Încercați din nou mai târziu.
Articole 1–20