BibTeX records: Neminath Hubballi

download as .bib file

@article{DBLP:journals/tjs/SoodH24,
  author       = {Shaurya Sood and
                  Neminath Hubballi},
  title        = {SlowTrack: detecting slow rate Denial of Service attacks against {HTTP}
                  with behavioral parameters},
  journal      = {J. Supercomput.},
  volume       = {80},
  number       = {2},
  pages        = {1788--1817},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11227-023-05453-3},
  doi          = {10.1007/S11227-023-05453-3},
  timestamp    = {Fri, 02 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tjs/SoodH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccnc/HubballiCK24,
  author       = {Neminath Hubballi and
                  Pankaj Chaudhary and
                  Sameer G. Kulkarni},
  title        = {PePC: Popularity Based Early Predictive Caching in Named Data Networks},
  booktitle    = {21st {IEEE} Consumer Communications {\&} Networking Conference,
                  {CCNC} 2024, Las Vegas, NV, USA, January 6-9, 2024},
  pages        = {478--483},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/CCNC51664.2024.10454826},
  doi          = {10.1109/CCNC51664.2024.10454826},
  timestamp    = {Tue, 26 Mar 2024 22:14:36 +0100},
  biburl       = {https://dblp.org/rec/conf/ccnc/HubballiCK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccnc/BarshaH24,
  author       = {Nisha Kumari Barsha and
                  Neminath Hubballi},
  title        = {Detecting Cyber Attacks in Smart-Grid Networks with Probability Distribution
                  Comparison},
  booktitle    = {21st {IEEE} Consumer Communications {\&} Networking Conference,
                  {CCNC} 2024, Las Vegas, NV, USA, January 6-9, 2024},
  pages        = {648--649},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/CCNC51664.2024.10454689},
  doi          = {10.1109/CCNC51664.2024.10454689},
  timestamp    = {Tue, 26 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccnc/BarshaH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/ChaudharyHK23,
  author       = {Pankaj Chaudhary and
                  Neminath Hubballi and
                  Sameer G. Kulkarni},
  title        = {eNCache: Improving content delivery with cooperative caching in Named
                  Data Networking},
  journal      = {Comput. Networks},
  volume       = {237},
  pages        = {110104},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.comnet.2023.110104},
  doi          = {10.1016/J.COMNET.2023.110104},
  timestamp    = {Wed, 03 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/ChaudharyHK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnsm/TiwariH23,
  author       = {Namrata Tiwari and
                  Neminath Hubballi},
  title        = {Secure Socket Shell Bruteforce Attack Detection With Petri Net Modeling},
  journal      = {{IEEE} Trans. Netw. Serv. Manag.},
  volume       = {20},
  number       = {1},
  pages        = {697--710},
  year         = {2023},
  url          = {https://doi.org/10.1109/TNSM.2022.3212591},
  doi          = {10.1109/TNSM.2022.3212591},
  timestamp    = {Tue, 28 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tnsm/TiwariH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccel/HubballiSG23,
  author       = {Neminath Hubballi and
                  Yogendra Singh and
                  Dipin Garg},
  title        = {XSSMitigate: Deep Packet Inspection based {XSS} Attack Quarantine
                  in Software Defined Networks},
  booktitle    = {{IEEE} International Conference on Consumer Electronics, {ICCE} 2023,
                  Las Vegas, NV, USA, January 6-8, 2023},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICCE56470.2023.10043374},
  doi          = {10.1109/ICCE56470.2023.10043374},
  timestamp    = {Tue, 21 Feb 2023 18:13:47 +0100},
  biburl       = {https://dblp.org/rec/conf/iccel/HubballiSG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/HubballiK22,
  author       = {Neminath Hubballi and
                  Pratibha Khandait},
  title        = {KeyClass: Efficient keyword matching for network traffic classification},
  journal      = {Comput. Commun.},
  volume       = {185},
  pages        = {79--91},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.comcom.2021.12.021},
  doi          = {10.1016/J.COMCOM.2021.12.021},
  timestamp    = {Fri, 18 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/HubballiK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/TripathiH21,
  author       = {Nikhil Tripathi and
                  Neminath Hubballi},
  title        = {Application Layer Denial-of-Service Attacks and Defense Mechanisms:
                  {A} Survey},
  journal      = {{ACM} Comput. Surv.},
  volume       = {54},
  number       = {4},
  pages        = {86:1--86:33},
  year         = {2022},
  url          = {https://doi.org/10.1145/3448291},
  doi          = {10.1145/3448291},
  timestamp    = {Wed, 23 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csur/TripathiH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/HubballiP22,
  author       = {Neminath Hubballi and
                  Kanishk Patel},
  editor       = {Venkata Ramana Badarla and
                  Surya Nepal and
                  Rudrapatna K. Shyamasundar},
  title        = {WiP: Control Plane Saturation Attack Mitigation in Software Defined
                  Networks},
  booktitle    = {Information Systems Security - 18th International Conference, {ICISS}
                  2022, Tirupati, India, December 16-20, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13784},
  pages        = {235--246},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-23690-7\_14},
  doi          = {10.1007/978-3-031-23690-7\_14},
  timestamp    = {Fri, 23 Dec 2022 17:47:39 +0100},
  biburl       = {https://dblp.org/rec/conf/iciss/HubballiP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/SangwanJH22,
  author       = {Aniket Sangwan and
                  Sarthak Jain and
                  Neminath Hubballi},
  editor       = {Venkata Ramana Badarla and
                  Surya Nepal and
                  Rudrapatna K. Shyamasundar},
  title        = {WiP: EventTracker-Event Driven Evidence Collection for Digital Forensics},
  booktitle    = {Information Systems Security - 18th International Conference, {ICISS}
                  2022, Tirupati, India, December 16-20, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13784},
  pages        = {247--259},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-23690-7\_15},
  doi          = {10.1007/978-3-031-23690-7\_15},
  timestamp    = {Fri, 23 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iciss/SangwanJH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/SoodPH22,
  author       = {Shaurya Sood and
                  Pritesh Palod and
                  Neminath Hubballi},
  editor       = {Venkata Ramana Badarla and
                  Surya Nepal and
                  Rudrapatna K. Shyamasundar},
  title        = {WiP: Characterizing the Impact of Multiplexed DoS Attacks on {HTTP}
                  and Detection},
  booktitle    = {Information Systems Security - 18th International Conference, {ICISS}
                  2022, Tirupati, India, December 16-20, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13784},
  pages        = {260--271},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-23690-7\_16},
  doi          = {10.1007/978-3-031-23690-7\_16},
  timestamp    = {Fri, 23 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iciss/SoodPH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/TripathiH21,
  author       = {Nikhil Tripathi and
                  Neminath Hubballi},
  title        = {Preventing time synchronization in {NTP} broadcast mode},
  journal      = {Comput. Secur.},
  volume       = {102},
  pages        = {102135},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2020.102135},
  doi          = {10.1016/J.COSE.2020.102135},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/TripathiH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-net/KhandaitHM21,
  author       = {Pratibha Khandait and
                  Neminath Hubballi and
                  Bodhisatwa Mazumdar},
  title        = {IoTHunter: IoT network traffic classification using device specific
                  keywords},
  journal      = {{IET} Networks},
  volume       = {10},
  number       = {2},
  pages        = {59--75},
  year         = {2021},
  url          = {https://doi.org/10.1049/ntw2.12007},
  doi          = {10.1049/NTW2.12007},
  timestamp    = {Tue, 25 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iet-net/KhandaitHM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/integration/AalamMH21,
  author       = {Umar Aalam and
                  Bodhisatwa Mazumdar and
                  Neminath Hubballi},
  title        = {mMIG: Inversion optimization in majority inverter graph with minority
                  operations},
  journal      = {Integr.},
  volume       = {81},
  pages        = {195--210},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.vlsi.2021.05.005},
  doi          = {10.1016/J.VLSI.2021.05.005},
  timestamp    = {Wed, 03 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/integration/AalamMH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcn/KhandaitTH21,
  author       = {Pratibha Khandait and
                  Namrata Tiwari and
                  Neminath Hubballi},
  title        = {Who is Trying to Compromise Your {SSH} Server ? An Analysis of Authentication
                  Logs and Detection of Bruteforce Attacks},
  booktitle    = {{ICDCN} '21: International Conference on Distributed Computing and
                  Networking, Virtual Event, Nara, Japan, January 5-8, 2021, Adjunct
                  Volume},
  pages        = {127--132},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3427477.3429772},
  doi          = {10.1145/3427477.3429772},
  timestamp    = {Tue, 19 Jan 2021 17:08:37 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcn/KhandaitTH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/SoodSH21,
  author       = {Shaurya Sood and
                  Manash Saikia and
                  Neminath Hubballi},
  editor       = {Somanath Tripathy and
                  Rudrapatna K. Shyamasundar and
                  Rajiv Ranjan},
  title        = {WiP: Slow Rate {HTTP} Attack Detection with Behavioral Parameters},
  booktitle    = {Information Systems Security - 17th International Conference, {ICISS}
                  2021, Patna, India, December 16-20, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13146},
  pages        = {26--37},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-92571-0\_2},
  doi          = {10.1007/978-3-030-92571-0\_2},
  timestamp    = {Fri, 30 Dec 2022 14:59:16 +0100},
  biburl       = {https://dblp.org/rec/conf/iciss/SoodSH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnsm/TayalSHN20,
  author       = {Anuja Tayal and
                  Neha Sharma and
                  Neminath Hubballi and
                  Maitreya Natu},
  title        = {Traffic Dynamics-Aware Probe Selection for Fault Detection in Networks},
  journal      = {J. Netw. Syst. Manag.},
  volume       = {28},
  number       = {4},
  pages        = {1055--1084},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10922-020-09514-3},
  doi          = {10.1007/S10922-020-09514-3},
  timestamp    = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnsm/TayalSHN20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnsm/TayalSHN20a,
  author       = {Anuja Tayal and
                  Neha Sharma and
                  Neminath Hubballi and
                  Maitreya Natu},
  title        = {Correction to: Traffic Dynamics-Aware Probe Selection for Fault Detection
                  in Networks},
  journal      = {J. Netw. Syst. Manag.},
  volume       = {28},
  number       = {4},
  pages        = {1085},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10922-020-09529-w},
  doi          = {10.1007/S10922-020-09529-W},
  timestamp    = {Wed, 07 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnsm/TayalSHN20a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnsm/HubballiSC20,
  author       = {Neminath Hubballi and
                  Mayank Swarnkar and
                  Mauro Conti},
  title        = {BitProb: Probabilistic Bit Signatures for Accurate Application Identification},
  journal      = {{IEEE} Trans. Netw. Serv. Manag.},
  volume       = {17},
  number       = {3},
  pages        = {1730--1741},
  year         = {2020},
  url          = {https://doi.org/10.1109/TNSM.2020.2999856},
  doi          = {10.1109/TNSM.2020.2999856},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tnsm/HubballiSC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEants/MeenaHSBF20,
  author       = {Amit Kumar Meena and
                  Neminath Hubballi and
                  Yogendra Singh and
                  Vimal Bhatia and
                  Katrin Franke},
  title        = {Network Security Systems Log Analysis for Trends and Insights: {A}
                  Case Study},
  booktitle    = {14th {IEEE} International Conference on Advanced Networks and Telecommunications
                  Systems, {ANTS} 2020, New Delhi, India, December 14-17, 2020},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/ANTS50601.2020.9342776},
  doi          = {10.1109/ANTS50601.2020.9342776},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEants/MeenaHSBF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KhandaitHF20,
  author       = {Pratibha Khandait and
                  Neminath Hubballi and
                  Katrin Franke},
  editor       = {Hung{-}Min Sun and
                  Shiuh{-}Pyng Shieh and
                  Guofei Gu and
                  Giuseppe Ateniese},
  title        = {{POSTER:} Towards Automating Detection of Anomalous {HTTP} Requests
                  with Joint Probability Estimation of Characters},
  booktitle    = {{ASIA} {CCS} '20: The 15th {ACM} Asia Conference on Computer and Communications
                  Security, Taipei, Taiwan, October 5-9, 2020},
  pages        = {889--891},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3320269.3405434},
  doi          = {10.1145/3320269.3405434},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/KhandaitHF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HubballiTK20,
  author       = {Neminath Hubballi and
                  Namrata Tiwari and
                  Pratibha Khandait},
  editor       = {Hung{-}Min Sun and
                  Shiuh{-}Pyng Shieh and
                  Guofei Gu and
                  Giuseppe Ateniese},
  title        = {{POSTER:} Distributed {SSH} Bruteforce Attack Detection with Flow
                  Content Similarity and Login Failure Reputation},
  booktitle    = {{ASIA} {CCS} '20: The 15th {ACM} Asia Conference on Computer and Communications
                  Security, Taipei, Taiwan, October 5-9, 2020},
  pages        = {916--918},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3320269.3405443},
  doi          = {10.1145/3320269.3405443},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/HubballiTK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/comsnets/KhandaitHM20,
  author       = {Pratibha Khandait and
                  Neminath Hubballi and
                  Bodhisatwa Mazumdar},
  title        = {Efficient Keyword Matching for Deep Packet Inspection based Network
                  Traffic Classification},
  booktitle    = {2020 International Conference on COMmunication Systems {\&} NETworkS,
                  {COMSNETS} 2020, Bengaluru, India, January 7-11, 2020},
  pages        = {567--570},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/COMSNETS48256.2020.9027353},
  doi          = {10.1109/COMSNETS48256.2020.9027353},
  timestamp    = {Tue, 17 Mar 2020 15:15:11 +0100},
  biburl       = {https://dblp.org/rec/conf/comsnets/KhandaitHM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/comsnets/MeenaH20,
  author       = {Amit Kumar Meena and
                  Neminath Hubballi},
  title        = {NViZ: An Interactive Visualization of Network Security Systems Logs},
  booktitle    = {2020 International Conference on COMmunication Systems {\&} NETworkS,
                  {COMSNETS} 2020, Bengaluru, India, January 7-11, 2020},
  pages        = {685--687},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/COMSNETS48256.2020.9027439},
  doi          = {10.1109/COMSNETS48256.2020.9027439},
  timestamp    = {Tue, 17 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/comsnets/MeenaH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2005-01783,
  author       = {Nikhil Tripathi and
                  Neminath Hubballi},
  title        = {Preventing Time Synchronization in NTP's Broadcast Mode},
  journal      = {CoRR},
  volume       = {abs/2005.01783},
  year         = {2020},
  url          = {https://arxiv.org/abs/2005.01783},
  eprinttype    = {arXiv},
  eprint       = {2005.01783},
  timestamp    = {Fri, 08 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2005-01783.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/SwarnkarH19,
  author       = {Mayank Swarnkar and
                  Neminath Hubballi},
  title        = {SpamDetector : Detecting spam callers in Voice over Internet Protocol
                  with graph anomalies},
  journal      = {Secur. Priv.},
  volume       = {2},
  number       = {1},
  year         = {2019},
  url          = {https://doi.org/10.1002/spy2.54},
  doi          = {10.1002/SPY2.54},
  timestamp    = {Tue, 16 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/SwarnkarH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEants/AgarwalHCF19,
  author       = {Vinti Agarwal and
                  Neminath Hubballi and
                  Ambika Shrestha Chitrakar and
                  Katrin Franke},
  title        = {Identifying Anomalous {HTTP} Traffic with Association Rule Mining},
  booktitle    = {2019 {IEEE} International Conference on Advanced Networks and Telecommunications
                  Systems, {ANTS} 2019, Goa, India, December 16-19, 2019},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ANTS47819.2019.9118146},
  doi          = {10.1109/ANTS47819.2019.9118146},
  timestamp    = {Mon, 29 Jun 2020 13:38:06 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEants/AgarwalHCF19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/HubballiPMT19,
  author       = {Neminath Hubballi and
                  Amey Kiran Patel and
                  Amit Kumar Meena and
                  Nikhil Tripathi},
  title        = {Cloud Security Service Level Agreements: Representation and Measurement},
  booktitle    = {{IEEE} {INFOCOM} 2019 - {IEEE} Conference on Computer Communications
                  Workshops, {INFOCOM} Workshops 2019, Paris, France, April 29 - May
                  2, 2019},
  pages        = {145--150},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/INFCOMW.2019.8845105},
  doi          = {10.1109/INFCOMW.2019.8845105},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/HubballiPMT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/TripathiH18,
  author       = {Nikhil Tripathi and
                  Neminath Hubballi},
  title        = {Slow rate denial of service attacks against {HTTP/2} and detection},
  journal      = {Comput. Secur.},
  volume       = {72},
  pages        = {255--272},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.cose.2017.09.009},
  doi          = {10.1016/J.COSE.2017.09.009},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/TripathiH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-net/SwarnkarH18,
  author       = {Mayank Swarnkar and
                  Neminath Hubballi},
  title        = {\emph{RDClass}: on using relative distance of keywords for accurate
                  network traffic classification},
  journal      = {{IET} Networks},
  volume       = {7},
  number       = {4},
  pages        = {273--279},
  year         = {2018},
  url          = {https://doi.org/10.1049/iet-net.2017.0065},
  doi          = {10.1049/IET-NET.2017.0065},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iet-net/SwarnkarH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-net/HubballiS18,
  author       = {Neminath Hubballi and
                  Jonathan Santini},
  title        = {Detecting {TCP} {ACK} storm attack: a state transition modelling approach},
  journal      = {{IET} Networks},
  volume       = {7},
  number       = {6},
  pages        = {429--434},
  year         = {2018},
  url          = {https://doi.org/10.1049/iet-net.2018.5003},
  doi          = {10.1049/IET-NET.2018.5003},
  timestamp    = {Tue, 13 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iet-net/HubballiS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ton/HubballiS18,
  author       = {Neminath Hubballi and
                  Mayank Swarnkar},
  title        = {\emph{BitCoding}: Network Traffic Classification Through Encoded Bit
                  Level Signatures},
  journal      = {{IEEE/ACM} Trans. Netw.},
  volume       = {26},
  number       = {5},
  pages        = {2334--2346},
  year         = {2018},
  url          = {http://doi.ieeecomputersociety.org/10.1109/TNET.2018.2868816},
  doi          = {10.1109/TNET.2018.2868816},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ton/HubballiS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/TripathiH18,
  author       = {Nikhil Tripathi and
                  Neminath Hubballi},
  title        = {Detecting stealth {DHCP} starvation attack using machine learning
                  approach},
  journal      = {J. Comput. Virol. Hacking Tech.},
  volume       = {14},
  number       = {3},
  pages        = {233--244},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11416-017-0310-x},
  doi          = {10.1007/S11416-017-0310-X},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/TripathiH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEants/SwarnkarHTC18,
  author       = {Mayank Swarnkar and
                  Neminath Hubballi and
                  Nikhil Tripathi and
                  Mauro Conti},
  title        = {AppHunter: Mobile Application Traffic Classification},
  booktitle    = {{IEEE} International Conference on Advanced Networks and Telecommunications
                  Systems, {ANTS} 2018, Indore, India, December 16-19, 2018},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/ANTS.2018.8710170},
  doi          = {10.1109/ANTS.2018.8710170},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEants/SwarnkarHTC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/comsnets/TayalHNS18,
  author       = {Anuja Tayal and
                  Neminath Hubballi and
                  Maitreya Natu and
                  Vaishali P. Sadaphal},
  title        = {Congestion-aware probe selection for fault detection in networks},
  booktitle    = {10th International Conference on Communication Systems {\&} Networks,
                  {COMSNETS} 2018, Bengaluru, India, January 3-7, 2018},
  pages        = {407--409},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/COMSNETS.2018.8328229},
  doi          = {10.1109/COMSNETS.2018.8328229},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/comsnets/TayalHNS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/HubballiT17,
  author       = {Neminath Hubballi and
                  Nikhil Tripathi},
  title        = {A closer look into {DHCP} starvation attack in wireless networks},
  journal      = {Comput. Secur.},
  volume       = {65},
  pages        = {387--404},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.cose.2016.10.002},
  doi          = {10.1016/J.COSE.2016.10.002},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/HubballiT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/HubballiT17,
  author       = {Neminath Hubballi and
                  Nikhil Tripathi},
  title        = {An event based technique for detecting spoofed {IP} packets},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {35},
  pages        = {32--43},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.jisa.2017.04.001},
  doi          = {10.1016/J.JISA.2017.04.001},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/HubballiT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/GolaitH17,
  author       = {Diksha Golait and
                  Neminath Hubballi},
  title        = {Detecting Anomalous Behavior in VoIP Systems: {A} Discrete Event System
                  Modeling},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {3},
  pages        = {730--745},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2016.2632071},
  doi          = {10.1109/TIFS.2016.2632071},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/GolaitH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEants/DograVHS17,
  author       = {Himanshu Dogra and
                  Sudhakar Verma and
                  Neminath Hubballi and
                  Mayank Swarnkar},
  title        = {Security service level agreement measurement in cloud: {A} proof of
                  concept implementation},
  booktitle    = {2017 {IEEE} International Conference on Advanced Networks and Telecommunications
                  Systems, {ANTS} 2017, Bhubaneswar, India, December 17-20, 2017},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/ANTS.2017.8384139},
  doi          = {10.1109/ANTS.2017.8384139},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEants/DograVHS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEants/TayalHT17,
  author       = {Anuja Tayal and
                  Neminath Hubballi and
                  Nikhil Tripathi},
  title        = {Communication recurrence and similarity detection in network flows},
  booktitle    = {2017 {IEEE} International Conference on Advanced Networks and Telecommunications
                  Systems, {ANTS} 2017, Bhubaneswar, India, December 17-20, 2017},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/ANTS.2017.8384174},
  doi          = {10.1109/ANTS.2017.8384174},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEants/TayalHT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEants/TripathiSH17,
  author       = {Nikhil Tripathi and
                  Mayank Swarnkar and
                  Neminath Hubballi},
  title        = {{DNS} spoofing in local networks made easy},
  booktitle    = {2017 {IEEE} International Conference on Advanced Networks and Telecommunications
                  Systems, {ANTS} 2017, Bhubaneswar, India, December 17-20, 2017},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/ANTS.2017.8384122},
  doi          = {10.1109/ANTS.2017.8384122},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEants/TripathiSH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/HubballiS17,
  author       = {Neminath Hubballi and
                  Mayank Swarnkar},
  title        = {BitCoding: Protocol Type Agnostic Robust Bit Level Signatures for
                  Traffic Classification},
  booktitle    = {2017 {IEEE} Global Communications Conference, {GLOBECOM} 2017, Singapore,
                  December 4-8, 2017},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/GLOCOM.2017.8254001},
  doi          = {10.1109/GLOCOM.2017.8254001},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/globecom/HubballiS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eswa/SwarnkarH16,
  author       = {Mayank Swarnkar and
                  Neminath Hubballi},
  title        = {{OCPAD:} One class Naive Bayes classifier for payload based anomaly
                  detection},
  journal      = {Expert Syst. Appl.},
  volume       = {64},
  pages        = {330--339},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.eswa.2016.07.036},
  doi          = {10.1016/J.ESWA.2016.07.036},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/eswa/SwarnkarH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEants/TripathiH16,
  author       = {Nikhil Tripathi and
                  Neminath Hubballi},
  title        = {A probabilistic anomaly detection scheme to detect {DHCP} starvation
                  attacks},
  booktitle    = {2016 {IEEE} International Conference on Advanced Networks and Telecommunications
                  Systems, {ANTS} 2016, Bangalore, India, November 6-9, 2016},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ANTS.2016.7947848},
  doi          = {10.1109/ANTS.2016.7947848},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEants/TripathiH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/BatthalaSHN16,
  author       = {Sainath Batthala and
                  Mayank Swarnkar and
                  Neminath Hubballi and
                  Maitreya Natu},
  title        = {VoIP Profiler: Profiling Voice over {IP} User Communication Behavior},
  booktitle    = {11th International Conference on Availability, Reliability and Security,
                  {ARES} 2016, Salzburg, Austria, August 31 - September 2, 2016},
  pages        = {312--320},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/ARES.2016.19},
  doi          = {10.1109/ARES.2016.19},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/BatthalaSHN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/TripathiHS16,
  author       = {Nikhil Tripathi and
                  Neminath Hubballi and
                  Yogendra Singh},
  title        = {How Secure are Web Servers? An Empirical Study of Slow {HTTP} DoS
                  Attacks and Detection},
  booktitle    = {11th International Conference on Availability, Reliability and Security,
                  {ARES} 2016, Salzburg, Austria, August 31 - September 2, 2016},
  pages        = {454--463},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/ARES.2016.20},
  doi          = {10.1109/ARES.2016.20},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/TripathiHS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/HubballiD16,
  author       = {Neminath Hubballi and
                  Himanshu Dogra},
  title        = {Detecting Packed Executable File: Supervised or Anomaly Detection
                  Method?},
  booktitle    = {11th International Conference on Availability, Reliability and Security,
                  {ARES} 2016, Salzburg, Austria, August 31 - September 2, 2016},
  pages        = {638--643},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/ARES.2016.18},
  doi          = {10.1109/ARES.2016.18},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/HubballiD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/comsnets/BatthalaHNS16,
  author       = {Sainath Batthala and
                  Neminath Hubballi and
                  Maitreya Natu and
                  Vaishali P. Sadaphal},
  title        = {If-what analysis to manage batch systems},
  booktitle    = {8th International Conference on Communication Systems and Networks,
                  {COMSNETS} 2016, Bangalore, India, January 5-10, 2016},
  pages        = {1--2},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/COMSNETS.2016.7440010},
  doi          = {10.1109/COMSNETS.2016.7440010},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/comsnets/BatthalaHNS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEants/SwarnkarH15,
  author       = {Mayank Swarnkar and
                  Neminath Hubballi},
  title        = {Rangegram: {A} novel payload based anomaly detection technique against
                  web traffic},
  booktitle    = {2015 {IEEE} International Conference on Advanced Networks and Telecommuncations
                  Systems, {ANTS} 2015, Kolkata, India, December 15-18, 2015},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ANTS.2015.7413635},
  doi          = {10.1109/ANTS.2015.7413635},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEants/SwarnkarH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEants/TripathiH15,
  author       = {Nikhil Tripathi and
                  Neminath Hubballi},
  title        = {Exploiting {DHCP} server-side {IP} address conflict detection: {A}
                  {DHCP} starvation attack},
  booktitle    = {2015 {IEEE} International Conference on Advanced Networks and Telecommuncations
                  Systems, {ANTS} 2015, Kolkata, India, December 15-18, 2015},
  pages        = {1--3},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ANTS.2015.7413661},
  doi          = {10.1109/ANTS.2015.7413661},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEants/TripathiH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/caise/DorbalaRH15,
  author       = {Sri Yogesh Dorbala and
                  Kishore R. and
                  Neminath Hubballi},
  editor       = {Anne Persson and
                  Janis Stirna},
  title        = {An Experience Report on Scalable Implementation of DDoS Attack Detection},
  booktitle    = {Advanced Information Systems Engineering Workshops - CAiSE 2015 International
                  Workshops, Stockholm, Sweden, June 8-9, 2015, Proceedings},
  series       = {Lecture Notes in Business Information Processing},
  volume       = {215},
  pages        = {518--529},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-19243-7\_47},
  doi          = {10.1007/978-3-319-19243-7\_47},
  timestamp    = {Sun, 02 Jun 2019 21:20:00 +0200},
  biburl       = {https://dblp.org/rec/conf/caise/DorbalaRH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ncc/DattaKH15,
  author       = {Jayeeta Datta and
                  Neha Kataria and
                  Neminath Hubballi},
  title        = {Network traffic classification in encrypted environment: {A} case
                  study of Google Hangout},
  booktitle    = {Twenty First National Conference on Communications, {NCC} 2015, Mumbai,
                  India, February 27 - March 1, 2015},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/NCC.2015.7084879},
  doi          = {10.1109/NCC.2015.7084879},
  timestamp    = {Wed, 16 Oct 2019 14:14:56 +0200},
  biburl       = {https://dblp.org/rec/conf/ncc/DattaKH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/HubballiS14,
  author       = {Neminath Hubballi and
                  Vinoth Suryanarayanan},
  title        = {False alarm minimization techniques in signature-based intrusion detection
                  systems: {A} survey},
  journal      = {Comput. Commun.},
  volume       = {49},
  pages        = {1--17},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.comcom.2014.04.012},
  doi          = {10.1016/J.COMCOM.2014.04.012},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/HubballiS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/HubballiBN13,
  author       = {Neminath Hubballi and
                  Santosh Biswas and
                  Sukumar Nandi},
  title        = {Towards reducing false alarms in network intrusion detection systems
                  with data summarization technique},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {3},
  pages        = {275--285},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.562},
  doi          = {10.1002/SEC.562},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/HubballiBN13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/premi/HubballiG13,
  author       = {Neminath Hubballi and
                  Deepanshu Goyal},
  editor       = {Pradipta Maji and
                  Ashish Ghosh and
                  M. Narasimha Murty and
                  Kuntal Ghosh and
                  Sankar K. Pal},
  title        = {FlowSummary: Summarizing Network Flows for Communication Periodicity
                  Detection},
  booktitle    = {Pattern Recognition and Machine Intelligence - 5th International Conference,
                  PReMI 2013, Kolkata, India, December 10-14, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8251},
  pages        = {695--700},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-45062-4\_98},
  doi          = {10.1007/978-3-642-45062-4\_98},
  timestamp    = {Tue, 14 May 2019 10:00:41 +0200},
  biburl       = {https://dblp.org/rec/conf/premi/HubballiG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/comsnets/Hubballi12,
  author       = {Neminath Hubballi},
  editor       = {K. K. Ramakrishnan and
                  Rajeev Shorey and
                  Donald F. Towsley},
  title        = {Pairgram: Modeling frequency information of lookahead pairs for system
                  call based anomaly detection},
  booktitle    = {Fourth International Conference on Communication Systems and Networks,
                  {COMSNETS} 2012, Bangalore, India, January 3-7, 2012},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/COMSNETS.2012.6151337},
  doi          = {10.1109/COMSNETS.2012.6151337},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/comsnets/Hubballi12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/HubballiBN11,
  author       = {Neminath Hubballi and
                  Santosh Biswas and
                  Sukumar Nandi},
  title        = {Network specific false alarm reduction in intrusion detection system},
  journal      = {Secur. Commun. Networks},
  volume       = {4},
  number       = {11},
  pages        = {1339--1349},
  year         = {2011},
  url          = {https://doi.org/10.1002/sec.261},
  doi          = {10.1002/SEC.261},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/HubballiBN11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cics/BarbhuiyaBHN11,
  author       = {Ferdous A. Barbhuiya and
                  Santosh Biswas and
                  Neminath Hubballi and
                  Sukumar Nandi},
  title        = {A host based {DES} approach for detecting {ARP} spoofing},
  booktitle    = {2011 {IEEE} Symposium on Computational Intelligence in Cyber Security,
                  {CICS} 2011, Paris, France, April 12-13, 2011},
  pages        = {114--121},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/CICYBS.2011.5949401},
  doi          = {10.1109/CICYBS.2011.5949401},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cics/BarbhuiyaBHN11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/comsnets/HubballiBN11,
  author       = {Neminath Hubballi and
                  Santosh Biswas and
                  Sukumar Nandi},
  editor       = {David B. Johnson and
                  Anurag Kumar},
  title        = {Sequencegram: n-gram modeling of system calls for program based anomaly
                  detection},
  booktitle    = {Third International Conference on Communication Systems and Networks,
                  {COMSNETS} 2011, Bangalore, India, January 4-8, 2011},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/COMSNETS.2011.5716416},
  doi          = {10.1109/COMSNETS.2011.5716416},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/comsnets/HubballiBN11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/premi/HubballiPN11,
  author       = {Neminath Hubballi and
                  Bidyut Kr. Patra and
                  Sukumar Nandi},
  editor       = {Sergei O. Kuznetsov and
                  Deba Prasad Mandal and
                  Malay Kumar Kundu and
                  Sankar K. Pal},
  title        = {\emph{NDoT}: Nearest Neighbor Distance Based Outlier Detection Technique},
  booktitle    = {Pattern Recognition and Machine Intelligence - 4th International Conference,
                  PReMI 2011, Moscow, Russia, June 27 - July 1, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6744},
  pages        = {36--42},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21786-9\_8},
  doi          = {10.1007/978-3-642-21786-9\_8},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/premi/HubballiPN11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/HubballiBN10,
  author       = {Neminath Hubballi and
                  Santosh Biswas and
                  Sukumar Nandi},
  title        = {Layered Higher Order N-grams for Hardening Payload Based Anomaly Intrusion
                  Detection},
  booktitle    = {{ARES} 2010, Fifth International Conference on Availability, Reliability
                  and Security, 15-18 February 2010, Krakow, Poland},
  pages        = {321--326},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/ARES.2010.31},
  doi          = {10.1109/ARES.2010.31},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/HubballiBN10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rsctc/PatraHBN10,
  author       = {Bidyut Kr. Patra and
                  Neminath Hubballi and
                  Santosh Biswas and
                  Sukumar Nandi},
  editor       = {Marcin S. Szczuka and
                  Marzena Kryszkiewicz and
                  Sheela Ramanna and
                  Richard Jensen and
                  Qinghua Hu},
  title        = {Distance Based Fast Hierarchical Clustering Method for Large Datasets},
  booktitle    = {Rough Sets and Current Trends in Computing - 7th International Conference,
                  {RSCTC} 2010, Warsaw, Poland, June 28-30,2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6086},
  pages        = {50--59},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13529-3\_7},
  doi          = {10.1007/978-3-642-13529-3\_7},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/rsctc/PatraHBN10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sersc-isa/HubballiRRBBSNR10,
  author       = {Neminath Hubballi and
                  S. Roopa and
                  Ritesh Ratti and
                  Ferdous A. Barbhuiya and
                  Santosh Biswas and
                  Arijit Sur and
                  Sukumar Nandi and
                  Vivek Ramachandran},
  editor       = {Tai{-}Hoon Kim and
                  Hojjat Adeli},
  title        = {An Active Intrusion Detection System for {LAN} Specific Attacks},
  booktitle    = {Advances in Computer Science and Information Technology, {AST/UCMA/ISA/ACN}
                  2010 Conferences, Miyazaki, Japan, June 23-25, 2010. Joint Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6059},
  pages        = {129--142},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13577-4\_11},
  doi          = {10.1007/978-3-642-13577-4\_11},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sersc-isa/HubballiRRBBSNR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics