Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Neminath Hubballi
@article{DBLP:journals/tjs/SoodH24, author = {Shaurya Sood and Neminath Hubballi}, title = {SlowTrack: detecting slow rate Denial of Service attacks against {HTTP} with behavioral parameters}, journal = {J. Supercomput.}, volume = {80}, number = {2}, pages = {1788--1817}, year = {2024}, url = {https://doi.org/10.1007/s11227-023-05453-3}, doi = {10.1007/S11227-023-05453-3}, timestamp = {Fri, 02 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tjs/SoodH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccnc/HubballiCK24, author = {Neminath Hubballi and Pankaj Chaudhary and Sameer G. Kulkarni}, title = {PePC: Popularity Based Early Predictive Caching in Named Data Networks}, booktitle = {21st {IEEE} Consumer Communications {\&} Networking Conference, {CCNC} 2024, Las Vegas, NV, USA, January 6-9, 2024}, pages = {478--483}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/CCNC51664.2024.10454826}, doi = {10.1109/CCNC51664.2024.10454826}, timestamp = {Tue, 26 Mar 2024 22:14:36 +0100}, biburl = {https://dblp.org/rec/conf/ccnc/HubballiCK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccnc/BarshaH24, author = {Nisha Kumari Barsha and Neminath Hubballi}, title = {Detecting Cyber Attacks in Smart-Grid Networks with Probability Distribution Comparison}, booktitle = {21st {IEEE} Consumer Communications {\&} Networking Conference, {CCNC} 2024, Las Vegas, NV, USA, January 6-9, 2024}, pages = {648--649}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/CCNC51664.2024.10454689}, doi = {10.1109/CCNC51664.2024.10454689}, timestamp = {Tue, 26 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccnc/BarshaH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/ChaudharyHK23, author = {Pankaj Chaudhary and Neminath Hubballi and Sameer G. Kulkarni}, title = {eNCache: Improving content delivery with cooperative caching in Named Data Networking}, journal = {Comput. Networks}, volume = {237}, pages = {110104}, year = {2023}, url = {https://doi.org/10.1016/j.comnet.2023.110104}, doi = {10.1016/J.COMNET.2023.110104}, timestamp = {Wed, 03 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/ChaudharyHK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnsm/TiwariH23, author = {Namrata Tiwari and Neminath Hubballi}, title = {Secure Socket Shell Bruteforce Attack Detection With Petri Net Modeling}, journal = {{IEEE} Trans. Netw. Serv. Manag.}, volume = {20}, number = {1}, pages = {697--710}, year = {2023}, url = {https://doi.org/10.1109/TNSM.2022.3212591}, doi = {10.1109/TNSM.2022.3212591}, timestamp = {Tue, 28 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tnsm/TiwariH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccel/HubballiSG23, author = {Neminath Hubballi and Yogendra Singh and Dipin Garg}, title = {XSSMitigate: Deep Packet Inspection based {XSS} Attack Quarantine in Software Defined Networks}, booktitle = {{IEEE} International Conference on Consumer Electronics, {ICCE} 2023, Las Vegas, NV, USA, January 6-8, 2023}, pages = {1--6}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICCE56470.2023.10043374}, doi = {10.1109/ICCE56470.2023.10043374}, timestamp = {Tue, 21 Feb 2023 18:13:47 +0100}, biburl = {https://dblp.org/rec/conf/iccel/HubballiSG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/HubballiK22, author = {Neminath Hubballi and Pratibha Khandait}, title = {KeyClass: Efficient keyword matching for network traffic classification}, journal = {Comput. Commun.}, volume = {185}, pages = {79--91}, year = {2022}, url = {https://doi.org/10.1016/j.comcom.2021.12.021}, doi = {10.1016/J.COMCOM.2021.12.021}, timestamp = {Fri, 18 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/HubballiK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/TripathiH21, author = {Nikhil Tripathi and Neminath Hubballi}, title = {Application Layer Denial-of-Service Attacks and Defense Mechanisms: {A} Survey}, journal = {{ACM} Comput. Surv.}, volume = {54}, number = {4}, pages = {86:1--86:33}, year = {2022}, url = {https://doi.org/10.1145/3448291}, doi = {10.1145/3448291}, timestamp = {Wed, 23 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csur/TripathiH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/HubballiP22, author = {Neminath Hubballi and Kanishk Patel}, editor = {Venkata Ramana Badarla and Surya Nepal and Rudrapatna K. Shyamasundar}, title = {WiP: Control Plane Saturation Attack Mitigation in Software Defined Networks}, booktitle = {Information Systems Security - 18th International Conference, {ICISS} 2022, Tirupati, India, December 16-20, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13784}, pages = {235--246}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-23690-7\_14}, doi = {10.1007/978-3-031-23690-7\_14}, timestamp = {Fri, 23 Dec 2022 17:47:39 +0100}, biburl = {https://dblp.org/rec/conf/iciss/HubballiP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/SangwanJH22, author = {Aniket Sangwan and Sarthak Jain and Neminath Hubballi}, editor = {Venkata Ramana Badarla and Surya Nepal and Rudrapatna K. Shyamasundar}, title = {WiP: EventTracker-Event Driven Evidence Collection for Digital Forensics}, booktitle = {Information Systems Security - 18th International Conference, {ICISS} 2022, Tirupati, India, December 16-20, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13784}, pages = {247--259}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-23690-7\_15}, doi = {10.1007/978-3-031-23690-7\_15}, timestamp = {Fri, 23 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iciss/SangwanJH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/SoodPH22, author = {Shaurya Sood and Pritesh Palod and Neminath Hubballi}, editor = {Venkata Ramana Badarla and Surya Nepal and Rudrapatna K. Shyamasundar}, title = {WiP: Characterizing the Impact of Multiplexed DoS Attacks on {HTTP} and Detection}, booktitle = {Information Systems Security - 18th International Conference, {ICISS} 2022, Tirupati, India, December 16-20, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13784}, pages = {260--271}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-23690-7\_16}, doi = {10.1007/978-3-031-23690-7\_16}, timestamp = {Fri, 23 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iciss/SoodPH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/TripathiH21, author = {Nikhil Tripathi and Neminath Hubballi}, title = {Preventing time synchronization in {NTP} broadcast mode}, journal = {Comput. Secur.}, volume = {102}, pages = {102135}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2020.102135}, doi = {10.1016/J.COSE.2020.102135}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/TripathiH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-net/KhandaitHM21, author = {Pratibha Khandait and Neminath Hubballi and Bodhisatwa Mazumdar}, title = {IoTHunter: IoT network traffic classification using device specific keywords}, journal = {{IET} Networks}, volume = {10}, number = {2}, pages = {59--75}, year = {2021}, url = {https://doi.org/10.1049/ntw2.12007}, doi = {10.1049/NTW2.12007}, timestamp = {Tue, 25 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iet-net/KhandaitHM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/integration/AalamMH21, author = {Umar Aalam and Bodhisatwa Mazumdar and Neminath Hubballi}, title = {mMIG: Inversion optimization in majority inverter graph with minority operations}, journal = {Integr.}, volume = {81}, pages = {195--210}, year = {2021}, url = {https://doi.org/10.1016/j.vlsi.2021.05.005}, doi = {10.1016/J.VLSI.2021.05.005}, timestamp = {Wed, 03 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/integration/AalamMH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcn/KhandaitTH21, author = {Pratibha Khandait and Namrata Tiwari and Neminath Hubballi}, title = {Who is Trying to Compromise Your {SSH} Server ? An Analysis of Authentication Logs and Detection of Bruteforce Attacks}, booktitle = {{ICDCN} '21: International Conference on Distributed Computing and Networking, Virtual Event, Nara, Japan, January 5-8, 2021, Adjunct Volume}, pages = {127--132}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3427477.3429772}, doi = {10.1145/3427477.3429772}, timestamp = {Tue, 19 Jan 2021 17:08:37 +0100}, biburl = {https://dblp.org/rec/conf/icdcn/KhandaitTH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/SoodSH21, author = {Shaurya Sood and Manash Saikia and Neminath Hubballi}, editor = {Somanath Tripathy and Rudrapatna K. Shyamasundar and Rajiv Ranjan}, title = {WiP: Slow Rate {HTTP} Attack Detection with Behavioral Parameters}, booktitle = {Information Systems Security - 17th International Conference, {ICISS} 2021, Patna, India, December 16-20, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13146}, pages = {26--37}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-92571-0\_2}, doi = {10.1007/978-3-030-92571-0\_2}, timestamp = {Fri, 30 Dec 2022 14:59:16 +0100}, biburl = {https://dblp.org/rec/conf/iciss/SoodSH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnsm/TayalSHN20, author = {Anuja Tayal and Neha Sharma and Neminath Hubballi and Maitreya Natu}, title = {Traffic Dynamics-Aware Probe Selection for Fault Detection in Networks}, journal = {J. Netw. Syst. Manag.}, volume = {28}, number = {4}, pages = {1055--1084}, year = {2020}, url = {https://doi.org/10.1007/s10922-020-09514-3}, doi = {10.1007/S10922-020-09514-3}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnsm/TayalSHN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnsm/TayalSHN20a, author = {Anuja Tayal and Neha Sharma and Neminath Hubballi and Maitreya Natu}, title = {Correction to: Traffic Dynamics-Aware Probe Selection for Fault Detection in Networks}, journal = {J. Netw. Syst. Manag.}, volume = {28}, number = {4}, pages = {1085}, year = {2020}, url = {https://doi.org/10.1007/s10922-020-09529-w}, doi = {10.1007/S10922-020-09529-W}, timestamp = {Wed, 07 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnsm/TayalSHN20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnsm/HubballiSC20, author = {Neminath Hubballi and Mayank Swarnkar and Mauro Conti}, title = {BitProb: Probabilistic Bit Signatures for Accurate Application Identification}, journal = {{IEEE} Trans. Netw. Serv. Manag.}, volume = {17}, number = {3}, pages = {1730--1741}, year = {2020}, url = {https://doi.org/10.1109/TNSM.2020.2999856}, doi = {10.1109/TNSM.2020.2999856}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tnsm/HubballiSC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEants/MeenaHSBF20, author = {Amit Kumar Meena and Neminath Hubballi and Yogendra Singh and Vimal Bhatia and Katrin Franke}, title = {Network Security Systems Log Analysis for Trends and Insights: {A} Case Study}, booktitle = {14th {IEEE} International Conference on Advanced Networks and Telecommunications Systems, {ANTS} 2020, New Delhi, India, December 14-17, 2020}, pages = {1--6}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/ANTS50601.2020.9342776}, doi = {10.1109/ANTS50601.2020.9342776}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEants/MeenaHSBF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KhandaitHF20, author = {Pratibha Khandait and Neminath Hubballi and Katrin Franke}, editor = {Hung{-}Min Sun and Shiuh{-}Pyng Shieh and Guofei Gu and Giuseppe Ateniese}, title = {{POSTER:} Towards Automating Detection of Anomalous {HTTP} Requests with Joint Probability Estimation of Characters}, booktitle = {{ASIA} {CCS} '20: The 15th {ACM} Asia Conference on Computer and Communications Security, Taipei, Taiwan, October 5-9, 2020}, pages = {889--891}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3320269.3405434}, doi = {10.1145/3320269.3405434}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KhandaitHF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HubballiTK20, author = {Neminath Hubballi and Namrata Tiwari and Pratibha Khandait}, editor = {Hung{-}Min Sun and Shiuh{-}Pyng Shieh and Guofei Gu and Giuseppe Ateniese}, title = {{POSTER:} Distributed {SSH} Bruteforce Attack Detection with Flow Content Similarity and Login Failure Reputation}, booktitle = {{ASIA} {CCS} '20: The 15th {ACM} Asia Conference on Computer and Communications Security, Taipei, Taiwan, October 5-9, 2020}, pages = {916--918}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3320269.3405443}, doi = {10.1145/3320269.3405443}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/HubballiTK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/comsnets/KhandaitHM20, author = {Pratibha Khandait and Neminath Hubballi and Bodhisatwa Mazumdar}, title = {Efficient Keyword Matching for Deep Packet Inspection based Network Traffic Classification}, booktitle = {2020 International Conference on COMmunication Systems {\&} NETworkS, {COMSNETS} 2020, Bengaluru, India, January 7-11, 2020}, pages = {567--570}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/COMSNETS48256.2020.9027353}, doi = {10.1109/COMSNETS48256.2020.9027353}, timestamp = {Tue, 17 Mar 2020 15:15:11 +0100}, biburl = {https://dblp.org/rec/conf/comsnets/KhandaitHM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/comsnets/MeenaH20, author = {Amit Kumar Meena and Neminath Hubballi}, title = {NViZ: An Interactive Visualization of Network Security Systems Logs}, booktitle = {2020 International Conference on COMmunication Systems {\&} NETworkS, {COMSNETS} 2020, Bengaluru, India, January 7-11, 2020}, pages = {685--687}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/COMSNETS48256.2020.9027439}, doi = {10.1109/COMSNETS48256.2020.9027439}, timestamp = {Tue, 17 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/comsnets/MeenaH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2005-01783, author = {Nikhil Tripathi and Neminath Hubballi}, title = {Preventing Time Synchronization in NTP's Broadcast Mode}, journal = {CoRR}, volume = {abs/2005.01783}, year = {2020}, url = {https://arxiv.org/abs/2005.01783}, eprinttype = {arXiv}, eprint = {2005.01783}, timestamp = {Fri, 08 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2005-01783.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/SwarnkarH19, author = {Mayank Swarnkar and Neminath Hubballi}, title = {SpamDetector : Detecting spam callers in Voice over Internet Protocol with graph anomalies}, journal = {Secur. Priv.}, volume = {2}, number = {1}, year = {2019}, url = {https://doi.org/10.1002/spy2.54}, doi = {10.1002/SPY2.54}, timestamp = {Tue, 16 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/SwarnkarH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEants/AgarwalHCF19, author = {Vinti Agarwal and Neminath Hubballi and Ambika Shrestha Chitrakar and Katrin Franke}, title = {Identifying Anomalous {HTTP} Traffic with Association Rule Mining}, booktitle = {2019 {IEEE} International Conference on Advanced Networks and Telecommunications Systems, {ANTS} 2019, Goa, India, December 16-19, 2019}, pages = {1--6}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ANTS47819.2019.9118146}, doi = {10.1109/ANTS47819.2019.9118146}, timestamp = {Mon, 29 Jun 2020 13:38:06 +0200}, biburl = {https://dblp.org/rec/conf/IEEEants/AgarwalHCF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/HubballiPMT19, author = {Neminath Hubballi and Amey Kiran Patel and Amit Kumar Meena and Nikhil Tripathi}, title = {Cloud Security Service Level Agreements: Representation and Measurement}, booktitle = {{IEEE} {INFOCOM} 2019 - {IEEE} Conference on Computer Communications Workshops, {INFOCOM} Workshops 2019, Paris, France, April 29 - May 2, 2019}, pages = {145--150}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/INFCOMW.2019.8845105}, doi = {10.1109/INFCOMW.2019.8845105}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infocom/HubballiPMT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/TripathiH18, author = {Nikhil Tripathi and Neminath Hubballi}, title = {Slow rate denial of service attacks against {HTTP/2} and detection}, journal = {Comput. Secur.}, volume = {72}, pages = {255--272}, year = {2018}, url = {https://doi.org/10.1016/j.cose.2017.09.009}, doi = {10.1016/J.COSE.2017.09.009}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/TripathiH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-net/SwarnkarH18, author = {Mayank Swarnkar and Neminath Hubballi}, title = {\emph{RDClass}: on using relative distance of keywords for accurate network traffic classification}, journal = {{IET} Networks}, volume = {7}, number = {4}, pages = {273--279}, year = {2018}, url = {https://doi.org/10.1049/iet-net.2017.0065}, doi = {10.1049/IET-NET.2017.0065}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iet-net/SwarnkarH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-net/HubballiS18, author = {Neminath Hubballi and Jonathan Santini}, title = {Detecting {TCP} {ACK} storm attack: a state transition modelling approach}, journal = {{IET} Networks}, volume = {7}, number = {6}, pages = {429--434}, year = {2018}, url = {https://doi.org/10.1049/iet-net.2018.5003}, doi = {10.1049/IET-NET.2018.5003}, timestamp = {Tue, 13 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iet-net/HubballiS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ton/HubballiS18, author = {Neminath Hubballi and Mayank Swarnkar}, title = {\emph{BitCoding}: Network Traffic Classification Through Encoded Bit Level Signatures}, journal = {{IEEE/ACM} Trans. Netw.}, volume = {26}, number = {5}, pages = {2334--2346}, year = {2018}, url = {http://doi.ieeecomputersociety.org/10.1109/TNET.2018.2868816}, doi = {10.1109/TNET.2018.2868816}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ton/HubballiS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/TripathiH18, author = {Nikhil Tripathi and Neminath Hubballi}, title = {Detecting stealth {DHCP} starvation attack using machine learning approach}, journal = {J. Comput. Virol. Hacking Tech.}, volume = {14}, number = {3}, pages = {233--244}, year = {2018}, url = {https://doi.org/10.1007/s11416-017-0310-x}, doi = {10.1007/S11416-017-0310-X}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/TripathiH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEants/SwarnkarHTC18, author = {Mayank Swarnkar and Neminath Hubballi and Nikhil Tripathi and Mauro Conti}, title = {AppHunter: Mobile Application Traffic Classification}, booktitle = {{IEEE} International Conference on Advanced Networks and Telecommunications Systems, {ANTS} 2018, Indore, India, December 16-19, 2018}, pages = {1--6}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ANTS.2018.8710170}, doi = {10.1109/ANTS.2018.8710170}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEants/SwarnkarHTC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/comsnets/TayalHNS18, author = {Anuja Tayal and Neminath Hubballi and Maitreya Natu and Vaishali P. Sadaphal}, title = {Congestion-aware probe selection for fault detection in networks}, booktitle = {10th International Conference on Communication Systems {\&} Networks, {COMSNETS} 2018, Bengaluru, India, January 3-7, 2018}, pages = {407--409}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/COMSNETS.2018.8328229}, doi = {10.1109/COMSNETS.2018.8328229}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/comsnets/TayalHNS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/HubballiT17, author = {Neminath Hubballi and Nikhil Tripathi}, title = {A closer look into {DHCP} starvation attack in wireless networks}, journal = {Comput. Secur.}, volume = {65}, pages = {387--404}, year = {2017}, url = {https://doi.org/10.1016/j.cose.2016.10.002}, doi = {10.1016/J.COSE.2016.10.002}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/HubballiT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/HubballiT17, author = {Neminath Hubballi and Nikhil Tripathi}, title = {An event based technique for detecting spoofed {IP} packets}, journal = {J. Inf. Secur. Appl.}, volume = {35}, pages = {32--43}, year = {2017}, url = {https://doi.org/10.1016/j.jisa.2017.04.001}, doi = {10.1016/J.JISA.2017.04.001}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/HubballiT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/GolaitH17, author = {Diksha Golait and Neminath Hubballi}, title = {Detecting Anomalous Behavior in VoIP Systems: {A} Discrete Event System Modeling}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {3}, pages = {730--745}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2016.2632071}, doi = {10.1109/TIFS.2016.2632071}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/GolaitH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEants/DograVHS17, author = {Himanshu Dogra and Sudhakar Verma and Neminath Hubballi and Mayank Swarnkar}, title = {Security service level agreement measurement in cloud: {A} proof of concept implementation}, booktitle = {2017 {IEEE} International Conference on Advanced Networks and Telecommunications Systems, {ANTS} 2017, Bhubaneswar, India, December 17-20, 2017}, pages = {1--6}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ANTS.2017.8384139}, doi = {10.1109/ANTS.2017.8384139}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEants/DograVHS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEants/TayalHT17, author = {Anuja Tayal and Neminath Hubballi and Nikhil Tripathi}, title = {Communication recurrence and similarity detection in network flows}, booktitle = {2017 {IEEE} International Conference on Advanced Networks and Telecommunications Systems, {ANTS} 2017, Bhubaneswar, India, December 17-20, 2017}, pages = {1--6}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ANTS.2017.8384174}, doi = {10.1109/ANTS.2017.8384174}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEants/TayalHT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEants/TripathiSH17, author = {Nikhil Tripathi and Mayank Swarnkar and Neminath Hubballi}, title = {{DNS} spoofing in local networks made easy}, booktitle = {2017 {IEEE} International Conference on Advanced Networks and Telecommunications Systems, {ANTS} 2017, Bhubaneswar, India, December 17-20, 2017}, pages = {1--6}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ANTS.2017.8384122}, doi = {10.1109/ANTS.2017.8384122}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEants/TripathiSH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/HubballiS17, author = {Neminath Hubballi and Mayank Swarnkar}, title = {BitCoding: Protocol Type Agnostic Robust Bit Level Signatures for Traffic Classification}, booktitle = {2017 {IEEE} Global Communications Conference, {GLOBECOM} 2017, Singapore, December 4-8, 2017}, pages = {1--6}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/GLOCOM.2017.8254001}, doi = {10.1109/GLOCOM.2017.8254001}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/globecom/HubballiS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eswa/SwarnkarH16, author = {Mayank Swarnkar and Neminath Hubballi}, title = {{OCPAD:} One class Naive Bayes classifier for payload based anomaly detection}, journal = {Expert Syst. Appl.}, volume = {64}, pages = {330--339}, year = {2016}, url = {https://doi.org/10.1016/j.eswa.2016.07.036}, doi = {10.1016/J.ESWA.2016.07.036}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/eswa/SwarnkarH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEants/TripathiH16, author = {Nikhil Tripathi and Neminath Hubballi}, title = {A probabilistic anomaly detection scheme to detect {DHCP} starvation attacks}, booktitle = {2016 {IEEE} International Conference on Advanced Networks and Telecommunications Systems, {ANTS} 2016, Bangalore, India, November 6-9, 2016}, pages = {1--6}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ANTS.2016.7947848}, doi = {10.1109/ANTS.2016.7947848}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEants/TripathiH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/BatthalaSHN16, author = {Sainath Batthala and Mayank Swarnkar and Neminath Hubballi and Maitreya Natu}, title = {VoIP Profiler: Profiling Voice over {IP} User Communication Behavior}, booktitle = {11th International Conference on Availability, Reliability and Security, {ARES} 2016, Salzburg, Austria, August 31 - September 2, 2016}, pages = {312--320}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/ARES.2016.19}, doi = {10.1109/ARES.2016.19}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/BatthalaSHN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/TripathiHS16, author = {Nikhil Tripathi and Neminath Hubballi and Yogendra Singh}, title = {How Secure are Web Servers? An Empirical Study of Slow {HTTP} DoS Attacks and Detection}, booktitle = {11th International Conference on Availability, Reliability and Security, {ARES} 2016, Salzburg, Austria, August 31 - September 2, 2016}, pages = {454--463}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/ARES.2016.20}, doi = {10.1109/ARES.2016.20}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/TripathiHS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/HubballiD16, author = {Neminath Hubballi and Himanshu Dogra}, title = {Detecting Packed Executable File: Supervised or Anomaly Detection Method?}, booktitle = {11th International Conference on Availability, Reliability and Security, {ARES} 2016, Salzburg, Austria, August 31 - September 2, 2016}, pages = {638--643}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/ARES.2016.18}, doi = {10.1109/ARES.2016.18}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/HubballiD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/comsnets/BatthalaHNS16, author = {Sainath Batthala and Neminath Hubballi and Maitreya Natu and Vaishali P. Sadaphal}, title = {If-what analysis to manage batch systems}, booktitle = {8th International Conference on Communication Systems and Networks, {COMSNETS} 2016, Bangalore, India, January 5-10, 2016}, pages = {1--2}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/COMSNETS.2016.7440010}, doi = {10.1109/COMSNETS.2016.7440010}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/comsnets/BatthalaHNS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEants/SwarnkarH15, author = {Mayank Swarnkar and Neminath Hubballi}, title = {Rangegram: {A} novel payload based anomaly detection technique against web traffic}, booktitle = {2015 {IEEE} International Conference on Advanced Networks and Telecommuncations Systems, {ANTS} 2015, Kolkata, India, December 15-18, 2015}, pages = {1--6}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ANTS.2015.7413635}, doi = {10.1109/ANTS.2015.7413635}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEants/SwarnkarH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEants/TripathiH15, author = {Nikhil Tripathi and Neminath Hubballi}, title = {Exploiting {DHCP} server-side {IP} address conflict detection: {A} {DHCP} starvation attack}, booktitle = {2015 {IEEE} International Conference on Advanced Networks and Telecommuncations Systems, {ANTS} 2015, Kolkata, India, December 15-18, 2015}, pages = {1--3}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ANTS.2015.7413661}, doi = {10.1109/ANTS.2015.7413661}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEants/TripathiH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/caise/DorbalaRH15, author = {Sri Yogesh Dorbala and Kishore R. and Neminath Hubballi}, editor = {Anne Persson and Janis Stirna}, title = {An Experience Report on Scalable Implementation of DDoS Attack Detection}, booktitle = {Advanced Information Systems Engineering Workshops - CAiSE 2015 International Workshops, Stockholm, Sweden, June 8-9, 2015, Proceedings}, series = {Lecture Notes in Business Information Processing}, volume = {215}, pages = {518--529}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-19243-7\_47}, doi = {10.1007/978-3-319-19243-7\_47}, timestamp = {Sun, 02 Jun 2019 21:20:00 +0200}, biburl = {https://dblp.org/rec/conf/caise/DorbalaRH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ncc/DattaKH15, author = {Jayeeta Datta and Neha Kataria and Neminath Hubballi}, title = {Network traffic classification in encrypted environment: {A} case study of Google Hangout}, booktitle = {Twenty First National Conference on Communications, {NCC} 2015, Mumbai, India, February 27 - March 1, 2015}, pages = {1--6}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/NCC.2015.7084879}, doi = {10.1109/NCC.2015.7084879}, timestamp = {Wed, 16 Oct 2019 14:14:56 +0200}, biburl = {https://dblp.org/rec/conf/ncc/DattaKH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/HubballiS14, author = {Neminath Hubballi and Vinoth Suryanarayanan}, title = {False alarm minimization techniques in signature-based intrusion detection systems: {A} survey}, journal = {Comput. Commun.}, volume = {49}, pages = {1--17}, year = {2014}, url = {https://doi.org/10.1016/j.comcom.2014.04.012}, doi = {10.1016/J.COMCOM.2014.04.012}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/HubballiS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/HubballiBN13, author = {Neminath Hubballi and Santosh Biswas and Sukumar Nandi}, title = {Towards reducing false alarms in network intrusion detection systems with data summarization technique}, journal = {Secur. Commun. Networks}, volume = {6}, number = {3}, pages = {275--285}, year = {2013}, url = {https://doi.org/10.1002/sec.562}, doi = {10.1002/SEC.562}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/HubballiBN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/premi/HubballiG13, author = {Neminath Hubballi and Deepanshu Goyal}, editor = {Pradipta Maji and Ashish Ghosh and M. Narasimha Murty and Kuntal Ghosh and Sankar K. Pal}, title = {FlowSummary: Summarizing Network Flows for Communication Periodicity Detection}, booktitle = {Pattern Recognition and Machine Intelligence - 5th International Conference, PReMI 2013, Kolkata, India, December 10-14, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8251}, pages = {695--700}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-45062-4\_98}, doi = {10.1007/978-3-642-45062-4\_98}, timestamp = {Tue, 14 May 2019 10:00:41 +0200}, biburl = {https://dblp.org/rec/conf/premi/HubballiG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/comsnets/Hubballi12, author = {Neminath Hubballi}, editor = {K. K. Ramakrishnan and Rajeev Shorey and Donald F. Towsley}, title = {Pairgram: Modeling frequency information of lookahead pairs for system call based anomaly detection}, booktitle = {Fourth International Conference on Communication Systems and Networks, {COMSNETS} 2012, Bangalore, India, January 3-7, 2012}, pages = {1--10}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/COMSNETS.2012.6151337}, doi = {10.1109/COMSNETS.2012.6151337}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/comsnets/Hubballi12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/HubballiBN11, author = {Neminath Hubballi and Santosh Biswas and Sukumar Nandi}, title = {Network specific false alarm reduction in intrusion detection system}, journal = {Secur. Commun. Networks}, volume = {4}, number = {11}, pages = {1339--1349}, year = {2011}, url = {https://doi.org/10.1002/sec.261}, doi = {10.1002/SEC.261}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/HubballiBN11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cics/BarbhuiyaBHN11, author = {Ferdous A. Barbhuiya and Santosh Biswas and Neminath Hubballi and Sukumar Nandi}, title = {A host based {DES} approach for detecting {ARP} spoofing}, booktitle = {2011 {IEEE} Symposium on Computational Intelligence in Cyber Security, {CICS} 2011, Paris, France, April 12-13, 2011}, pages = {114--121}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/CICYBS.2011.5949401}, doi = {10.1109/CICYBS.2011.5949401}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cics/BarbhuiyaBHN11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/comsnets/HubballiBN11, author = {Neminath Hubballi and Santosh Biswas and Sukumar Nandi}, editor = {David B. Johnson and Anurag Kumar}, title = {Sequencegram: n-gram modeling of system calls for program based anomaly detection}, booktitle = {Third International Conference on Communication Systems and Networks, {COMSNETS} 2011, Bangalore, India, January 4-8, 2011}, pages = {1--10}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/COMSNETS.2011.5716416}, doi = {10.1109/COMSNETS.2011.5716416}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/comsnets/HubballiBN11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/premi/HubballiPN11, author = {Neminath Hubballi and Bidyut Kr. Patra and Sukumar Nandi}, editor = {Sergei O. Kuznetsov and Deba Prasad Mandal and Malay Kumar Kundu and Sankar K. Pal}, title = {\emph{NDoT}: Nearest Neighbor Distance Based Outlier Detection Technique}, booktitle = {Pattern Recognition and Machine Intelligence - 4th International Conference, PReMI 2011, Moscow, Russia, June 27 - July 1, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6744}, pages = {36--42}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21786-9\_8}, doi = {10.1007/978-3-642-21786-9\_8}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/premi/HubballiPN11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/HubballiBN10, author = {Neminath Hubballi and Santosh Biswas and Sukumar Nandi}, title = {Layered Higher Order N-grams for Hardening Payload Based Anomaly Intrusion Detection}, booktitle = {{ARES} 2010, Fifth International Conference on Availability, Reliability and Security, 15-18 February 2010, Krakow, Poland}, pages = {321--326}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/ARES.2010.31}, doi = {10.1109/ARES.2010.31}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/HubballiBN10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rsctc/PatraHBN10, author = {Bidyut Kr. Patra and Neminath Hubballi and Santosh Biswas and Sukumar Nandi}, editor = {Marcin S. Szczuka and Marzena Kryszkiewicz and Sheela Ramanna and Richard Jensen and Qinghua Hu}, title = {Distance Based Fast Hierarchical Clustering Method for Large Datasets}, booktitle = {Rough Sets and Current Trends in Computing - 7th International Conference, {RSCTC} 2010, Warsaw, Poland, June 28-30,2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6086}, pages = {50--59}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13529-3\_7}, doi = {10.1007/978-3-642-13529-3\_7}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/rsctc/PatraHBN10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sersc-isa/HubballiRRBBSNR10, author = {Neminath Hubballi and S. Roopa and Ritesh Ratti and Ferdous A. Barbhuiya and Santosh Biswas and Arijit Sur and Sukumar Nandi and Vivek Ramachandran}, editor = {Tai{-}Hoon Kim and Hojjat Adeli}, title = {An Active Intrusion Detection System for {LAN} Specific Attacks}, booktitle = {Advances in Computer Science and Information Technology, {AST/UCMA/ISA/ACN} 2010 Conferences, Miyazaki, Japan, June 23-25, 2010. Joint Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6059}, pages = {129--142}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13577-4\_11}, doi = {10.1007/978-3-642-13577-4\_11}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sersc-isa/HubballiRRBBSNR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.