default search action
Search dblp for Publications
export results for "Anjali Sardana"
@article{DBLP:journals/smr/GoyalS23, author = {Anjali Goyal and Neetu Sardana}, title = {IM\({}_{\mbox{NRFixer}}\): {A} hybrid approach to alleviate class-imbalance problem for predicting the fixability of Non-Reproducible bugs}, journal = {J. Softw. Evol. Process.}, volume = {35}, number = {3}, year = {2023}, url = {https://doi.org/10.1002/smr.2290}, doi = {10.1002/SMR.2290}, timestamp = {Tue, 28 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/smr/GoyalS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bigdatama/GuptaGKS21, author = {Vishan Kumar Gupta and Avdhesh Gupta and Dinesh Kumar and Anjali Sardana}, title = {Prediction of {COVID-19} confirmed, death, and cured cases in India using random forest model}, journal = {Big Data Min. Anal.}, volume = {4}, number = {2}, pages = {116--123}, year = {2021}, url = {https://doi.org/10.26599/BDMA.2020.9020016}, doi = {10.26599/BDMA.2020.9020016}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/bigdatama/GuptaGKS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/saem/GoyalS19, author = {Anjali Goyal and Neetu Sardana}, title = {An empirical study of non-reproducible bugs}, journal = {Int. J. Syst. Assur. Eng. Manag.}, volume = {10}, number = {5}, pages = {1186--1220}, year = {2019}, url = {https://doi.org/10.1007/s13198-019-00850-5}, doi = {10.1007/S13198-019-00850-5}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/saem/GoyalS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ic3/GoyalS19, author = {Anjali Goyal and Neetu Sardana}, title = {Empirical Analysis of Ensemble Machine Learning Techniques for Bug Triaging}, booktitle = {2019 Twelfth International Conference on Contemporary Computing, {IC3} 2019, Noida, India, August 8-10, 2019}, pages = {1--6}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/IC3.2019.8844876}, doi = {10.1109/IC3.2019.8844876}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/ic3/GoyalS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ic3/GoyalS18, author = {Anjali Goyal and Neetu Sardana}, editor = {Srinivas Aluru and Ananth Kalyanaraman and Debajyoti Bera and Kishore Kothapalli and David Abramson and Ilkay Altintas and Sanjukta Bhowmick and Madhu Govindaraju and Smruti Ranjan Sarangi and Sushil K. Prasad and Steven Bogaerts and Vikas Saxena and Sanjay Goel}, title = {Characterization Study of Developers in Non-Reproducible Bugs}, booktitle = {2018 Eleventh International Conference on Contemporary Computing, {IC3} 2018, Noida, India, August 2-4, 2018}, pages = {1--6}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/IC3.2018.8530641}, doi = {10.1109/IC3.2018.8530641}, timestamp = {Tue, 20 Jun 2023 16:27:45 +0200}, biburl = {https://dblp.org/rec/conf/ic3/GoyalS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eInformatica/GoyalS17, author = {Anjali Goyal and Neetu Sardana}, title = {NRFixer: Sentiment Based Model for Predicting the Fixability of Non-Reproducible Bugs}, journal = {e Informatica Softw. Eng. J.}, volume = {11}, number = {1}, pages = {103--116}, year = {2017}, url = {https://doi.org/10.5277/e-Inf170105}, doi = {10.5277/E-INF170105}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eInformatica/GoyalS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eInformatica/GoyalS17a, author = {Anjali Goyal and Neetu Sardana}, title = {Machine Learning or Information Retrieval Techniques for Bug Triaging: Which is better?}, journal = {e Informatica Softw. Eng. J.}, volume = {11}, number = {1}, pages = {117--141}, year = {2017}, url = {https://doi.org/10.5277/e-Inf170106}, doi = {10.5277/E-INF170106}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eInformatica/GoyalS17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/idt/GoyalS17, author = {Anjali Goyal and Neetu Sardana}, title = {Optimizing bug report assignment using multi criteria decision making technique}, journal = {Intell. Decis. Technol.}, volume = {11}, number = {3}, pages = {307--320}, year = {2017}, url = {https://doi.org/10.3233/IDT-170297}, doi = {10.3233/IDT-170297}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/idt/GoyalS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijossp/GoyalS16, author = {Anjali Goyal and Neetu Sardana}, title = {Analytical Study on Bug Triaging Practices}, journal = {Int. J. Open Source Softw. Process.}, volume = {7}, number = {2}, pages = {20--42}, year = {2016}, url = {https://doi.org/10.4018/IJOSSP.2016040102}, doi = {10.4018/IJOSSP.2016040102}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijossp/GoyalS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ic3/AnjaliMS16, author = {Anjali Goyal and Devina Mohan and Neetu Sardana}, editor = {Sanjay Goel and Dheeraj Sanghi and Albert Y. Zomaya and Azzedine Boukerche and Ratan K. Ghosh and Manoj Singh Gaur and Rahul Banerjee and Vikas Saxena}, title = {Visheshagya: Time based expertise model for bug report assignment}, booktitle = {Ninth International Conference on Contemporary Computing, {IC3} 2016, Noida, India, August 11-13, 2016}, pages = {1--6}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/IC3.2016.7880218}, doi = {10.1109/IC3.2016.7880218}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ic3/AnjaliMS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/GoelSJ13, author = {Radhika Goel and Anjali Sardana and Ramesh C. Joshi}, title = {Wireless Honeypot: Framework, Architectures and Tools}, journal = {Int. J. Netw. Secur.}, volume = {15}, number = {5}, pages = {373--383}, year = {2013}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v15-n5/ijns-2013-v15-n5-p373-383.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/GoelSJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/GoelSJ12, author = {Radhika Goel and Anjali Sardana and Ramesh C. Joshi}, title = {Parallel Misuse and Anomaly Detection Model}, journal = {Int. J. Netw. Secur.}, volume = {14}, number = {4}, pages = {211--222}, year = {2012}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v14-n4/ijns-2012-v14-n4-p211-222.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/GoelSJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acity/MahajanS12, author = {Premraj Mahajan and Anjali Sardana}, editor = {Natarajan Meghanathan and Dhinaharan Nagamalai and Nabendu Chaki}, title = {Key Distribution Schemes in Wireless Sensor Networks: Novel Classification and Analysis}, booktitle = {Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology {(ACITY)} July 13-15, 2012, Chennai, India - Volume 1}, series = {Advances in Intelligent Systems and Computing}, volume = {176}, pages = {43--53}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31513-8\_5}, doi = {10.1007/978-3-642-31513-8\_5}, timestamp = {Sat, 05 Sep 2020 18:05:32 +0200}, biburl = {https://dblp.org/rec/conf/acity/MahajanS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acity/VarshneyJS12, author = {Gaurav Varshney and Ramesh Chandra Joshi and Anjali Sardana}, editor = {Natarajan Meghanathan and Dhinaharan Nagamalai and Nabendu Chaki}, title = {Personal Secret Information Based Authentication towards Preventing Phishing Attacks}, booktitle = {Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology {(ACITY)} July 13-15, 2012, Chennai, India - Volume 1}, series = {Advances in Intelligent Systems and Computing}, volume = {176}, pages = {31--42}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31513-8\_4}, doi = {10.1007/978-3-642-31513-8\_4}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acity/VarshneyJS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cason/GuptaKSA12, author = {Sanchika Gupta and Padam Kumar and Anjali Sardana and Ajith Abraham}, title = {A fingerprinting system calls approach for intrusion detection in a cloud environment}, booktitle = {Fourth International Conference on Computational Aspects of Social Networks, CASoN 2012, Sao Carlos, Brazil, November 21-23, 2012}, pages = {309--314}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/CASoN.2012.6412420}, doi = {10.1109/CASON.2012.6412420}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/cason/GuptaKSA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cason/GuptaKSA12a, author = {Sanchika Gupta and Padam Kumar and Anjali Sardana and Ajith Abraham}, title = {A secure and lightweight approach for critical data security in cloud}, booktitle = {Fourth International Conference on Computational Aspects of Social Networks, CASoN 2012, Sao Carlos, Brazil, November 21-23, 2012}, pages = {315--320}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/CASoN.2012.6412421}, doi = {10.1109/CASON.2012.6412421}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cason/GuptaKSA12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cube/JainS12, author = {Pragya Jain and Anjali Sardana}, editor = {Vidyasagar M. Potdar and Debajyoti Mukhopadhyay}, title = {Defending against internet worms using honeyfarm}, booktitle = {{CUBE} International {IT} Conference {\&} Exhibition, {CUBE} '12, Pune, India - September 03 - 06, 2012}, pages = {795--800}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2381716.2381867}, doi = {10.1145/2381716.2381867}, timestamp = {Fri, 01 Mar 2019 14:49:59 +0100}, biburl = {https://dblp.org/rec/conf/cube/JainS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ic3/GuptaHS12, author = {Sanchika Gupta and Susmita Horrow and Anjali Sardana}, editor = {Manish Parashar and Dinesh K. Kaushik and Omer F. Rana and Ravi Samtaney and Yuanyuan Yang and Albert Y. Zomaya}, title = {A Hybrid Intrusion Detection Architecture for Defense against DDoS Attacks in Cloud Environment}, booktitle = {Contemporary Computing - 5th International Conference, {IC3} 2012, Noida, India, August 6-8, 2012. Proceedings}, series = {Communications in Computer and Information Science}, volume = {306}, pages = {498--499}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32129-0\_53}, doi = {10.1007/978-3-642-32129-0\_53}, timestamp = {Wed, 24 May 2017 08:31:09 +0200}, biburl = {https://dblp.org/rec/conf/ic3/GuptaHS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icacci/HorrowGS12, author = {Susmita Horrow and Sanchika Gupta and Anjali Sardana}, editor = {Kaliappan Gopalan and Sabu M. Thampi}, title = {Implementing private cloud at {IIT} Roorkee: an initial experience}, booktitle = {2012 International Conference on Advances in Computing, Communications and Informatics, {ICACCI} '12, Chennai, India, August 3-5, 2012}, pages = {453--458}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2345396.2345471}, doi = {10.1145/2345396.2345471}, timestamp = {Sun, 29 Aug 2021 01:08:46 +0200}, biburl = {https://dblp.org/rec/conf/icacci/HorrowGS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icacci/ManikantaS12, author = {Yakkala V. Naga Manikanta and Anjali Sardana}, editor = {Kaliappan Gopalan and Sabu M. Thampi}, title = {Protecting web applications from {SQL} injection attacks by using framework and database firewall}, booktitle = {2012 International Conference on Advances in Computing, Communications and Informatics, {ICACCI} '12, Chennai, India, August 3-5, 2012}, pages = {609--613}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2345396.2345495}, doi = {10.1145/2345396.2345495}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icacci/ManikantaS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icacci/VarshneySJ12, author = {Gaurav Varshney and Anjali Sardana and Ramesh Chandra Joshi}, editor = {Kaliappan Gopalan and Sabu M. Thampi}, title = {Secret information display based authentication technique towards preventing phishing attacks}, booktitle = {2012 International Conference on Advances in Computing, Communications and Informatics, {ICACCI} '12, Chennai, India, August 3-5, 2012}, pages = {602--608}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2345396.2345494}, doi = {10.1145/2345396.2345494}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icacci/VarshneySJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/GuptaSK12, author = {Sanchika Gupta and Anjali Sardana and Padam Kumar}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {A light weight centralized file monitoring approach for securing files in Cloud environment}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {382--387}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470835/}, timestamp = {Thu, 10 Mar 2022 09:31:39 +0100}, biburl = {https://dblp.org/rec/conf/icitst/GuptaSK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securit/HorrowS12, author = {Susmita Horrow and Anjali Sardana}, editor = {R. Chandrasekhar and Andrew S. Tanenbaum and P. Venkat Rangan}, title = {Identity management framework for cloud based internet of things}, booktitle = {First International Conference on Security of Internet of Things, {SECURIT} '12, Kollam, India - August 17 - 19, 2012}, pages = {200--203}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2490428.2490456}, doi = {10.1145/2490428.2490456}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/securit/HorrowS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securit/ShahS12, author = {Mitul Shah and Anjali Sardana}, editor = {R. Chandrasekhar and Andrew S. Tanenbaum and P. Venkat Rangan}, title = {Searching in internet of things using {VCS}}, booktitle = {First International Conference on Security of Internet of Things, {SECURIT} '12, Kollam, India - August 17 - 19, 2012}, pages = {63--67}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2490428.2490437}, doi = {10.1145/2490428.2490437}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/securit/ShahS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/services/GuptaHS12, author = {Sanchika Gupta and Susmita Horrow and Anjali Sardana}, title = {{IDS} Based Defense for Cloud Based Mobile Infrastructure as a Service}, booktitle = {Eighth {IEEE} World Congress on Services, {SERVICES} 2012, Honolulu, HI, USA, June 24-29, 2012}, pages = {199--202}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/SERVICES.2012.45}, doi = {10.1109/SERVICES.2012.45}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/services/GuptaHS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/services/HorrowGSA12, author = {Susmita Horrow and Sanchika Gupta and Anjali Sardana and Ajith Abraham}, title = {Secure Private Cloud Architecture for Mobile Infrastructure as a Service}, booktitle = {Eighth {IEEE} World Congress on Services, {SERVICES} 2012, Honolulu, HI, USA, June 24-29, 2012}, pages = {149--154}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/SERVICES.2012.25}, doi = {10.1109/SERVICES.2012.25}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/services/HorrowGSA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/ChaudharyMS12, author = {Ajay Chaudhary and Manoj Misra and Anjali Sardana}, editor = {Manoj Singh Gaur and Atilla El{\c{c}}i and Oleg B. Makarevich and Mehmet A. Orgun and Virendra Singh}, title = {An efficient fuzzy controller based technique for network traffic classification to improve QoS}, booktitle = {5th International Conference of Security of Information and Networks, {SIN} '12, Jaipur, India, October 22 - 26, 2012}, pages = {95--102}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2388576.2388589}, doi = {10.1145/2388576.2388589}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sin/ChaudharyMS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijmcmc/SardanaJ11, author = {Anjali Sardana and Ramesh C. Joshi}, title = {Dual-Level Attack Detection, Characterization and Response for Networks Under DDoS Attacks}, journal = {Int. J. Mob. Comput. Multim. Commun.}, volume = {3}, number = {1}, pages = {1--20}, year = {2011}, url = {https://doi.org/10.4018/jmcmc.2011010101}, doi = {10.4018/JMCMC.2011010101}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijmcmc/SardanaJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/MalikS11, author = {Siddharth Malik and Anjali Sardana}, title = {Secure Vault: {A} privacy preserving reliable architecture for Secure Social Networking}, booktitle = {7th International Conference on Information Assurance and Security, {IAS} 2011, Melacca, Malaysia, December 5-8, 2011}, pages = {116--121}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISIAS.2011.6122805}, doi = {10.1109/ISIAS.2011.6122805}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/IEEEias/MalikS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acc/JayaS11, author = {Jaya and Anjali Sardana}, editor = {Ajith Abraham and Jaime Lloret Mauri and John F. Buford and Junichi Suzuki and Sabu M. Thampi}, title = {Multiple Secrets Sharing with Meaningful Shares}, booktitle = {Advances in Computing and Communications - First International Conference, {ACC} 2011, Kochi, India, July 22-24, 2011, Proceedings, Part {IV}}, series = {Communications in Computer and Information Science}, volume = {193}, pages = {233--243}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22726-4\_25}, doi = {10.1007/978-3-642-22726-4\_25}, timestamp = {Mon, 29 May 2017 13:41:41 +0200}, biburl = {https://dblp.org/rec/conf/acc/JayaS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ic3/VarshneyJS11, author = {Gaurav Varshney and Ramesh Chandra Joshi and Anjali Sardana}, editor = {Srinivas Aluru and Sanghamitra Bandyopadhyay and {\"{U}}mit V. {\c{C}}ataly{\"{u}}rek and Devdatt P. Dubhashi and Phillip H. Jones and Manish Parashar and Bertil Schmidt}, title = {Unified Modeling Technique for Threat Cause Ranking, Mitigation and Testing}, booktitle = {Contemporary Computing - 4th International Conference, {IC3} 2011, Noida, India, August 8-10, 2011. Proceedings}, series = {Communications in Computer and Information Science}, volume = {168}, pages = {491--500}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22606-9\_48}, doi = {10.1007/978-3-642-22606-9\_48}, timestamp = {Wed, 24 May 2017 08:31:10 +0200}, biburl = {https://dblp.org/rec/conf/ic3/VarshneyJS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jim/SardanaJKJ10, author = {Anjali Sardana and Ramesh C. Joshi and Tai{-}Hoon Kim and Sung Jang}, title = {Deciding optimal entropic thresholds to calibrate the detection mechanism for variable rate DDoS attacks in {ISP} domain: honeypot based approach}, journal = {J. Intell. Manuf.}, volume = {21}, number = {5}, pages = {623--634}, year = {2010}, url = {https://doi.org/10.1007/s10845-008-0204-3}, doi = {10.1007/S10845-008-0204-3}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jim/SardanaJKJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/SardanaJ10, author = {Anjali Sardana and Ramesh Chandra Joshi}, title = {Dual-Level Attack Detection and Characterization for Networks under DDoS}, booktitle = {{ARES} 2010, Fifth International Conference on Availability, Reliability and Security, 15-18 February 2010, Krakow, Poland}, pages = {9--16}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/ARES.2010.84}, doi = {10.1109/ARES.2010.84}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/SardanaJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/SardanaJ10, author = {Anjali Sardana and Ramesh Chandra Joshi}, editor = {Sung Y. Shin and Sascha Ossowski and Michael Schumacher and Mathew J. Palakal and Chih{-}Cheng Hung}, title = {Dual-level defense for networks under DDoS attacks}, booktitle = {Proceedings of the 2010 {ACM} Symposium on Applied Computing (SAC), Sierre, Switzerland, March 22-26, 2010}, pages = {733--734}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1774088.1774240}, doi = {10.1145/1774088.1774240}, timestamp = {Sun, 02 Jun 2019 21:18:37 +0200}, biburl = {https://dblp.org/rec/conf/sac/SardanaJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/SardanaJ09, author = {Anjali Sardana and Ramesh C. Joshi}, title = {An auto-responsive honeypot architecture for dynamic resource allocation and QoS adaptation in DDoS attacked networks}, journal = {Comput. Commun.}, volume = {32}, number = {12}, pages = {1384--1399}, year = {2009}, url = {https://doi.org/10.1016/j.comcom.2009.03.005}, doi = {10.1016/J.COMCOM.2009.03.005}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/SardanaJ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icon/SardanaJ08, author = {Anjali Sardana and Ramesh Chandra Joshi}, title = {Autonomous dynamic honeypot routing mechanism for mitigating DDoS attacks in {DMZ}}, booktitle = {Proceedings of the 16th International Conference on Networks, {ICON} 2008, December 12-14, 2008, held at India Habitat Centre, New Delhi, India}, pages = {1--7}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ICON.2008.4772623}, doi = {10.1109/ICON.2008.4772623}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icon/SardanaJ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isip/SardanaJ08, author = {Anjali Sardana and Ramesh Chandra Joshi}, editor = {Fei Yu and Qi Luo}, title = {Honeypot Based Routing to Mitigate DDoS Attacks on Servers at {ISP} Level}, booktitle = {International Symposium on Information Processing, {ISIP} 2008 / International Pacific Workshop on Web Mining, and Web-Based Application, {WMWA} 2008, Moscow, Russia, 23-25 May 2008}, pages = {505--509}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ISIP.2008.115}, doi = {10.1109/ISIP.2008.115}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isip/SardanaJ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/SardanaKJ07, author = {Anjali Sardana and Krishan Kumar and Ramesh Chandra Joshi}, editor = {Ning Zhang and Ajith Abraham}, title = {Detection and Honeypot Based Redirection to Counter DDoS Attacks in {ISP} Domain}, booktitle = {Proceedings of the Third International Symposium on Information Assurance and Security, {IAS} 2007, August 29-31, 2007, Manchester, United Kingdom}, pages = {191--196}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/IAS.2007.23}, doi = {10.1109/IAS.2007.23}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEias/SardanaKJ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/SardanaJ07, author = {Anjali Sardana and Ramesh Chandra Joshi}, editor = {Patrick D. McDaniel and Shyam K. Gupta}, title = {Simulation of Dynamic Honeypot Based Redirection to Counter Service Level DDoS Attacks}, booktitle = {Information Systems Security, Third International Conference, {ICISS} 2007, Delhi, India, December 16-20, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4812}, pages = {259--262}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77086-2\_21}, doi = {10.1007/978-3-540-77086-2\_21}, timestamp = {Thu, 05 Jan 2023 17:10:29 +0100}, biburl = {https://dblp.org/rec/conf/iciss/SardanaJ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.