City Research Online

Items where Author is "Conti, M."

Up a level
Export as [feed] RSS 2.0 [feed] RSS
Group by: Type | No Grouping
Jump to: Article
Number of items: 8.

Article

Somani, G., Gaur, M. S., Sanghi, D., Conti, M. and Rajarajan, M. (2018). Scale Inside-Out: Rapid Mitigation of Cloud DDoS Attacks. IEEE Transactions on Dependable and Secure Computing, 15(6), doi: 10.1109/TDSC.2017.2763160

Idrees, F., Rajarajan, M., Conti, M., Chen, T. and Rahulamathavan, Y. (2017). PIndroid: A novel Android malware detection system using ensemble learning methods. Computers and Security, 68, pp. 36-46. doi: 10.1016/j.cose.2017.03.011

Somani, G., Gaur, M. S., Sanghi, D., Conti, M., Rajarajan, M. and Buyya, R. (2017). Combating DDoS attacks in the cloud: Requirements, trends, and future directions. IEEE Cloud Computing, 4(1), pp. 22-32. doi: 10.1109/MCC.2017.14

Gajrani, J., Tripathi, M., Laxmi, V., Gaur, M. S., Conti, M. and Rajarajan, M. (2017). sPECTRA: a Precise framEwork for analyzing CrypTographic vulneRabilities in Android apps. 2017 14th IEEE Annual Consumer Communications & Networking Conference (CCNC), pp. 854-860. doi: 10.1109/CCNC.2017.7983245

Somani, G., Gaur, M. S., Sanghi, D., Conti, M. and Rajarajan, M. (2016). DDoS victim service containment to minimize the internal collateral damages in cloud computing. Computers and Electrical Engineering, doi: 10.1016/j.compeleceng.2016.12.004

Li, F., Rahulamathavan, Y., Conti, M. and Rajarajan, M. (2015). Robust access control framework for mobile cloud computing network. Computer Communications, 68(Sept), pp. 61-72. doi: 10.1016/j.comcom.2015.07.005

Faruki, P., Bharmal, A., Laxmi, V., Ganmoor, V., Gaur, M. S., Conti, M. and Rajarajan, M. (2015). Android Security: A Survey of Issues, Malware Penetration, and Defenses. IEEE Communications Surveys and Tutorials, 17(2), pp. 998-1022. doi: 10.1109/COMST.2014.2386139

Naval, S., Laxmi, V., Rajarajan, M., Gaur, M. S. and Conti, M. (2015). Employing Program Semantics for Malware Detection. IEEE Transactions on Information Forensics and Security, 10(12), pp. 2591-2604. doi: 10.1109/TIFS.2015.2469253

This list was generated on Thu Feb 27 04:44:47 2020 UTC.