Search dblp for Publications

export results for "Anjali Sardana"

 download as .bib file

@article{DBLP:journals/smr/GoyalS23,
  author       = {Anjali Goyal and
                  Neetu Sardana},
  title        = {IM\({}_{\mbox{NRFixer}}\): {A} hybrid approach to alleviate class-imbalance
                  problem for predicting the fixability of Non-Reproducible bugs},
  journal      = {J. Softw. Evol. Process.},
  volume       = {35},
  number       = {3},
  year         = {2023},
  url          = {https://doi.org/10.1002/smr.2290},
  doi          = {10.1002/SMR.2290},
  timestamp    = {Tue, 28 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/smr/GoyalS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bigdatama/GuptaGKS21,
  author       = {Vishan Kumar Gupta and
                  Avdhesh Gupta and
                  Dinesh Kumar and
                  Anjali Sardana},
  title        = {Prediction of {COVID-19} confirmed, death, and cured cases in India
                  using random forest model},
  journal      = {Big Data Min. Anal.},
  volume       = {4},
  number       = {2},
  pages        = {116--123},
  year         = {2021},
  url          = {https://doi.org/10.26599/BDMA.2020.9020016},
  doi          = {10.26599/BDMA.2020.9020016},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/bigdatama/GuptaGKS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/saem/GoyalS19,
  author       = {Anjali Goyal and
                  Neetu Sardana},
  title        = {An empirical study of non-reproducible bugs},
  journal      = {Int. J. Syst. Assur. Eng. Manag.},
  volume       = {10},
  number       = {5},
  pages        = {1186--1220},
  year         = {2019},
  url          = {https://doi.org/10.1007/s13198-019-00850-5},
  doi          = {10.1007/S13198-019-00850-5},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/saem/GoyalS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ic3/GoyalS19,
  author       = {Anjali Goyal and
                  Neetu Sardana},
  title        = {Empirical Analysis of Ensemble Machine Learning Techniques for Bug
                  Triaging},
  booktitle    = {2019 Twelfth International Conference on Contemporary Computing, {IC3}
                  2019, Noida, India, August 8-10, 2019},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/IC3.2019.8844876},
  doi          = {10.1109/IC3.2019.8844876},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/ic3/GoyalS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ic3/GoyalS18,
  author       = {Anjali Goyal and
                  Neetu Sardana},
  editor       = {Srinivas Aluru and
                  Ananth Kalyanaraman and
                  Debajyoti Bera and
                  Kishore Kothapalli and
                  David Abramson and
                  Ilkay Altintas and
                  Sanjukta Bhowmick and
                  Madhu Govindaraju and
                  Smruti Ranjan Sarangi and
                  Sushil K. Prasad and
                  Steven Bogaerts and
                  Vikas Saxena and
                  Sanjay Goel},
  title        = {Characterization Study of Developers in Non-Reproducible Bugs},
  booktitle    = {2018 Eleventh International Conference on Contemporary Computing,
                  {IC3} 2018, Noida, India, August 2-4, 2018},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/IC3.2018.8530641},
  doi          = {10.1109/IC3.2018.8530641},
  timestamp    = {Tue, 20 Jun 2023 16:27:45 +0200},
  biburl       = {https://dblp.org/rec/conf/ic3/GoyalS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eInformatica/GoyalS17,
  author       = {Anjali Goyal and
                  Neetu Sardana},
  title        = {NRFixer: Sentiment Based Model for Predicting the Fixability of Non-Reproducible
                  Bugs},
  journal      = {e Informatica Softw. Eng. J.},
  volume       = {11},
  number       = {1},
  pages        = {103--116},
  year         = {2017},
  url          = {https://doi.org/10.5277/e-Inf170105},
  doi          = {10.5277/E-INF170105},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eInformatica/GoyalS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eInformatica/GoyalS17a,
  author       = {Anjali Goyal and
                  Neetu Sardana},
  title        = {Machine Learning or Information Retrieval Techniques for Bug Triaging:
                  Which is better?},
  journal      = {e Informatica Softw. Eng. J.},
  volume       = {11},
  number       = {1},
  pages        = {117--141},
  year         = {2017},
  url          = {https://doi.org/10.5277/e-Inf170106},
  doi          = {10.5277/E-INF170106},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eInformatica/GoyalS17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/idt/GoyalS17,
  author       = {Anjali Goyal and
                  Neetu Sardana},
  title        = {Optimizing bug report assignment using multi criteria decision making
                  technique},
  journal      = {Intell. Decis. Technol.},
  volume       = {11},
  number       = {3},
  pages        = {307--320},
  year         = {2017},
  url          = {https://doi.org/10.3233/IDT-170297},
  doi          = {10.3233/IDT-170297},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/idt/GoyalS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijossp/GoyalS16,
  author       = {Anjali Goyal and
                  Neetu Sardana},
  title        = {Analytical Study on Bug Triaging Practices},
  journal      = {Int. J. Open Source Softw. Process.},
  volume       = {7},
  number       = {2},
  pages        = {20--42},
  year         = {2016},
  url          = {https://doi.org/10.4018/IJOSSP.2016040102},
  doi          = {10.4018/IJOSSP.2016040102},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijossp/GoyalS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ic3/AnjaliMS16,
  author       = {Anjali Goyal and
                  Devina Mohan and
                  Neetu Sardana},
  editor       = {Sanjay Goel and
                  Dheeraj Sanghi and
                  Albert Y. Zomaya and
                  Azzedine Boukerche and
                  Ratan K. Ghosh and
                  Manoj Singh Gaur and
                  Rahul Banerjee and
                  Vikas Saxena},
  title        = {Visheshagya: Time based expertise model for bug report assignment},
  booktitle    = {Ninth International Conference on Contemporary Computing, {IC3} 2016,
                  Noida, India, August 11-13, 2016},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/IC3.2016.7880218},
  doi          = {10.1109/IC3.2016.7880218},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ic3/AnjaliMS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/GoelSJ13,
  author       = {Radhika Goel and
                  Anjali Sardana and
                  Ramesh C. Joshi},
  title        = {Wireless Honeypot: Framework, Architectures and Tools},
  journal      = {Int. J. Netw. Secur.},
  volume       = {15},
  number       = {5},
  pages        = {373--383},
  year         = {2013},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v15-n5/ijns-2013-v15-n5-p373-383.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/GoelSJ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/GoelSJ12,
  author       = {Radhika Goel and
                  Anjali Sardana and
                  Ramesh C. Joshi},
  title        = {Parallel Misuse and Anomaly Detection Model},
  journal      = {Int. J. Netw. Secur.},
  volume       = {14},
  number       = {4},
  pages        = {211--222},
  year         = {2012},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v14-n4/ijns-2012-v14-n4-p211-222.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/GoelSJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acity/MahajanS12,
  author       = {Premraj Mahajan and
                  Anjali Sardana},
  editor       = {Natarajan Meghanathan and
                  Dhinaharan Nagamalai and
                  Nabendu Chaki},
  title        = {Key Distribution Schemes in Wireless Sensor Networks: Novel Classification
                  and Analysis},
  booktitle    = {Advances in Computing and Information Technology - Proceedings of
                  the Second International Conference on Advances in Computing and Information
                  Technology {(ACITY)} July 13-15, 2012, Chennai, India - Volume 1},
  series       = {Advances in Intelligent Systems and Computing},
  volume       = {176},
  pages        = {43--53},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31513-8\_5},
  doi          = {10.1007/978-3-642-31513-8\_5},
  timestamp    = {Sat, 05 Sep 2020 18:05:32 +0200},
  biburl       = {https://dblp.org/rec/conf/acity/MahajanS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acity/VarshneyJS12,
  author       = {Gaurav Varshney and
                  Ramesh Chandra Joshi and
                  Anjali Sardana},
  editor       = {Natarajan Meghanathan and
                  Dhinaharan Nagamalai and
                  Nabendu Chaki},
  title        = {Personal Secret Information Based Authentication towards Preventing
                  Phishing Attacks},
  booktitle    = {Advances in Computing and Information Technology - Proceedings of
                  the Second International Conference on Advances in Computing and Information
                  Technology {(ACITY)} July 13-15, 2012, Chennai, India - Volume 1},
  series       = {Advances in Intelligent Systems and Computing},
  volume       = {176},
  pages        = {31--42},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31513-8\_4},
  doi          = {10.1007/978-3-642-31513-8\_4},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acity/VarshneyJS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cason/GuptaKSA12,
  author       = {Sanchika Gupta and
                  Padam Kumar and
                  Anjali Sardana and
                  Ajith Abraham},
  title        = {A fingerprinting system calls approach for intrusion detection in
                  a cloud environment},
  booktitle    = {Fourth International Conference on Computational Aspects of Social
                  Networks, CASoN 2012, Sao Carlos, Brazil, November 21-23, 2012},
  pages        = {309--314},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/CASoN.2012.6412420},
  doi          = {10.1109/CASON.2012.6412420},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/cason/GuptaKSA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cason/GuptaKSA12a,
  author       = {Sanchika Gupta and
                  Padam Kumar and
                  Anjali Sardana and
                  Ajith Abraham},
  title        = {A secure and lightweight approach for critical data security in cloud},
  booktitle    = {Fourth International Conference on Computational Aspects of Social
                  Networks, CASoN 2012, Sao Carlos, Brazil, November 21-23, 2012},
  pages        = {315--320},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/CASoN.2012.6412421},
  doi          = {10.1109/CASON.2012.6412421},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cason/GuptaKSA12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cube/JainS12,
  author       = {Pragya Jain and
                  Anjali Sardana},
  editor       = {Vidyasagar M. Potdar and
                  Debajyoti Mukhopadhyay},
  title        = {Defending against internet worms using honeyfarm},
  booktitle    = {{CUBE} International {IT} Conference {\&} Exhibition, {CUBE} '12,
                  Pune, India - September 03 - 06, 2012},
  pages        = {795--800},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2381716.2381867},
  doi          = {10.1145/2381716.2381867},
  timestamp    = {Fri, 01 Mar 2019 14:49:59 +0100},
  biburl       = {https://dblp.org/rec/conf/cube/JainS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ic3/GuptaHS12,
  author       = {Sanchika Gupta and
                  Susmita Horrow and
                  Anjali Sardana},
  editor       = {Manish Parashar and
                  Dinesh K. Kaushik and
                  Omer F. Rana and
                  Ravi Samtaney and
                  Yuanyuan Yang and
                  Albert Y. Zomaya},
  title        = {A Hybrid Intrusion Detection Architecture for Defense against DDoS
                  Attacks in Cloud Environment},
  booktitle    = {Contemporary Computing - 5th International Conference, {IC3} 2012,
                  Noida, India, August 6-8, 2012. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {306},
  pages        = {498--499},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32129-0\_53},
  doi          = {10.1007/978-3-642-32129-0\_53},
  timestamp    = {Wed, 24 May 2017 08:31:09 +0200},
  biburl       = {https://dblp.org/rec/conf/ic3/GuptaHS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icacci/HorrowGS12,
  author       = {Susmita Horrow and
                  Sanchika Gupta and
                  Anjali Sardana},
  editor       = {Kaliappan Gopalan and
                  Sabu M. Thampi},
  title        = {Implementing private cloud at {IIT} Roorkee: an initial experience},
  booktitle    = {2012 International Conference on Advances in Computing, Communications
                  and Informatics, {ICACCI} '12, Chennai, India, August 3-5, 2012},
  pages        = {453--458},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2345396.2345471},
  doi          = {10.1145/2345396.2345471},
  timestamp    = {Sun, 29 Aug 2021 01:08:46 +0200},
  biburl       = {https://dblp.org/rec/conf/icacci/HorrowGS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icacci/ManikantaS12,
  author       = {Yakkala V. Naga Manikanta and
                  Anjali Sardana},
  editor       = {Kaliappan Gopalan and
                  Sabu M. Thampi},
  title        = {Protecting web applications from {SQL} injection attacks by using
                  framework and database firewall},
  booktitle    = {2012 International Conference on Advances in Computing, Communications
                  and Informatics, {ICACCI} '12, Chennai, India, August 3-5, 2012},
  pages        = {609--613},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2345396.2345495},
  doi          = {10.1145/2345396.2345495},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icacci/ManikantaS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icacci/VarshneySJ12,
  author       = {Gaurav Varshney and
                  Anjali Sardana and
                  Ramesh Chandra Joshi},
  editor       = {Kaliappan Gopalan and
                  Sabu M. Thampi},
  title        = {Secret information display based authentication technique towards
                  preventing phishing attacks},
  booktitle    = {2012 International Conference on Advances in Computing, Communications
                  and Informatics, {ICACCI} '12, Chennai, India, August 3-5, 2012},
  pages        = {602--608},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2345396.2345494},
  doi          = {10.1145/2345396.2345494},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icacci/VarshneySJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/GuptaSK12,
  author       = {Sanchika Gupta and
                  Anjali Sardana and
                  Padam Kumar},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {A light weight centralized file monitoring approach for securing files
                  in Cloud environment},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {382--387},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470835/},
  timestamp    = {Thu, 10 Mar 2022 09:31:39 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/GuptaSK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securit/HorrowS12,
  author       = {Susmita Horrow and
                  Anjali Sardana},
  editor       = {R. Chandrasekhar and
                  Andrew S. Tanenbaum and
                  P. Venkat Rangan},
  title        = {Identity management framework for cloud based internet of things},
  booktitle    = {First International Conference on Security of Internet of Things,
                  {SECURIT} '12, Kollam, India - August 17 - 19, 2012},
  pages        = {200--203},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2490428.2490456},
  doi          = {10.1145/2490428.2490456},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/securit/HorrowS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securit/ShahS12,
  author       = {Mitul Shah and
                  Anjali Sardana},
  editor       = {R. Chandrasekhar and
                  Andrew S. Tanenbaum and
                  P. Venkat Rangan},
  title        = {Searching in internet of things using {VCS}},
  booktitle    = {First International Conference on Security of Internet of Things,
                  {SECURIT} '12, Kollam, India - August 17 - 19, 2012},
  pages        = {63--67},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2490428.2490437},
  doi          = {10.1145/2490428.2490437},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/securit/ShahS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/services/GuptaHS12,
  author       = {Sanchika Gupta and
                  Susmita Horrow and
                  Anjali Sardana},
  title        = {{IDS} Based Defense for Cloud Based Mobile Infrastructure as a Service},
  booktitle    = {Eighth {IEEE} World Congress on Services, {SERVICES} 2012, Honolulu,
                  HI, USA, June 24-29, 2012},
  pages        = {199--202},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/SERVICES.2012.45},
  doi          = {10.1109/SERVICES.2012.45},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/services/GuptaHS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/services/HorrowGSA12,
  author       = {Susmita Horrow and
                  Sanchika Gupta and
                  Anjali Sardana and
                  Ajith Abraham},
  title        = {Secure Private Cloud Architecture for Mobile Infrastructure as a Service},
  booktitle    = {Eighth {IEEE} World Congress on Services, {SERVICES} 2012, Honolulu,
                  HI, USA, June 24-29, 2012},
  pages        = {149--154},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/SERVICES.2012.25},
  doi          = {10.1109/SERVICES.2012.25},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/services/HorrowGSA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/ChaudharyMS12,
  author       = {Ajay Chaudhary and
                  Manoj Misra and
                  Anjali Sardana},
  editor       = {Manoj Singh Gaur and
                  Atilla El{\c{c}}i and
                  Oleg B. Makarevich and
                  Mehmet A. Orgun and
                  Virendra Singh},
  title        = {An efficient fuzzy controller based technique for network traffic
                  classification to improve QoS},
  booktitle    = {5th International Conference of Security of Information and Networks,
                  {SIN} '12, Jaipur, India, October 22 - 26, 2012},
  pages        = {95--102},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2388576.2388589},
  doi          = {10.1145/2388576.2388589},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sin/ChaudharyMS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmcmc/SardanaJ11,
  author       = {Anjali Sardana and
                  Ramesh C. Joshi},
  title        = {Dual-Level Attack Detection, Characterization and Response for Networks
                  Under DDoS Attacks},
  journal      = {Int. J. Mob. Comput. Multim. Commun.},
  volume       = {3},
  number       = {1},
  pages        = {1--20},
  year         = {2011},
  url          = {https://doi.org/10.4018/jmcmc.2011010101},
  doi          = {10.4018/JMCMC.2011010101},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijmcmc/SardanaJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/MalikS11,
  author       = {Siddharth Malik and
                  Anjali Sardana},
  title        = {Secure Vault: {A} privacy preserving reliable architecture for Secure
                  Social Networking},
  booktitle    = {7th International Conference on Information Assurance and Security,
                  {IAS} 2011, Melacca, Malaysia, December 5-8, 2011},
  pages        = {116--121},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISIAS.2011.6122805},
  doi          = {10.1109/ISIAS.2011.6122805},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEias/MalikS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acc/JayaS11,
  author       = {Jaya and
                  Anjali Sardana},
  editor       = {Ajith Abraham and
                  Jaime Lloret Mauri and
                  John F. Buford and
                  Junichi Suzuki and
                  Sabu M. Thampi},
  title        = {Multiple Secrets Sharing with Meaningful Shares},
  booktitle    = {Advances in Computing and Communications - First International Conference,
                  {ACC} 2011, Kochi, India, July 22-24, 2011, Proceedings, Part {IV}},
  series       = {Communications in Computer and Information Science},
  volume       = {193},
  pages        = {233--243},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22726-4\_25},
  doi          = {10.1007/978-3-642-22726-4\_25},
  timestamp    = {Mon, 29 May 2017 13:41:41 +0200},
  biburl       = {https://dblp.org/rec/conf/acc/JayaS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ic3/VarshneyJS11,
  author       = {Gaurav Varshney and
                  Ramesh Chandra Joshi and
                  Anjali Sardana},
  editor       = {Srinivas Aluru and
                  Sanghamitra Bandyopadhyay and
                  {\"{U}}mit V. {\c{C}}ataly{\"{u}}rek and
                  Devdatt P. Dubhashi and
                  Phillip H. Jones and
                  Manish Parashar and
                  Bertil Schmidt},
  title        = {Unified Modeling Technique for Threat Cause Ranking, Mitigation and
                  Testing},
  booktitle    = {Contemporary Computing - 4th International Conference, {IC3} 2011,
                  Noida, India, August 8-10, 2011. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {168},
  pages        = {491--500},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22606-9\_48},
  doi          = {10.1007/978-3-642-22606-9\_48},
  timestamp    = {Wed, 24 May 2017 08:31:10 +0200},
  biburl       = {https://dblp.org/rec/conf/ic3/VarshneyJS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jim/SardanaJKJ10,
  author       = {Anjali Sardana and
                  Ramesh C. Joshi and
                  Tai{-}Hoon Kim and
                  Sung Jang},
  title        = {Deciding optimal entropic thresholds to calibrate the detection mechanism
                  for variable rate DDoS attacks in {ISP} domain: honeypot based approach},
  journal      = {J. Intell. Manuf.},
  volume       = {21},
  number       = {5},
  pages        = {623--634},
  year         = {2010},
  url          = {https://doi.org/10.1007/s10845-008-0204-3},
  doi          = {10.1007/S10845-008-0204-3},
  timestamp    = {Thu, 24 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jim/SardanaJKJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/SardanaJ10,
  author       = {Anjali Sardana and
                  Ramesh Chandra Joshi},
  title        = {Dual-Level Attack Detection and Characterization for Networks under
                  DDoS},
  booktitle    = {{ARES} 2010, Fifth International Conference on Availability, Reliability
                  and Security, 15-18 February 2010, Krakow, Poland},
  pages        = {9--16},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/ARES.2010.84},
  doi          = {10.1109/ARES.2010.84},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/SardanaJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/SardanaJ10,
  author       = {Anjali Sardana and
                  Ramesh Chandra Joshi},
  editor       = {Sung Y. Shin and
                  Sascha Ossowski and
                  Michael Schumacher and
                  Mathew J. Palakal and
                  Chih{-}Cheng Hung},
  title        = {Dual-level defense for networks under DDoS attacks},
  booktitle    = {Proceedings of the 2010 {ACM} Symposium on Applied Computing (SAC),
                  Sierre, Switzerland, March 22-26, 2010},
  pages        = {733--734},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1774088.1774240},
  doi          = {10.1145/1774088.1774240},
  timestamp    = {Sun, 02 Jun 2019 21:18:37 +0200},
  biburl       = {https://dblp.org/rec/conf/sac/SardanaJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/SardanaJ09,
  author       = {Anjali Sardana and
                  Ramesh C. Joshi},
  title        = {An auto-responsive honeypot architecture for dynamic resource allocation
                  and QoS adaptation in DDoS attacked networks},
  journal      = {Comput. Commun.},
  volume       = {32},
  number       = {12},
  pages        = {1384--1399},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.comcom.2009.03.005},
  doi          = {10.1016/J.COMCOM.2009.03.005},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/SardanaJ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icon/SardanaJ08,
  author       = {Anjali Sardana and
                  Ramesh Chandra Joshi},
  title        = {Autonomous dynamic honeypot routing mechanism for mitigating DDoS
                  attacks in {DMZ}},
  booktitle    = {Proceedings of the 16th International Conference on Networks, {ICON}
                  2008, December 12-14, 2008, held at India Habitat Centre, New Delhi,
                  India},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ICON.2008.4772623},
  doi          = {10.1109/ICON.2008.4772623},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icon/SardanaJ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isip/SardanaJ08,
  author       = {Anjali Sardana and
                  Ramesh Chandra Joshi},
  editor       = {Fei Yu and
                  Qi Luo},
  title        = {Honeypot Based Routing to Mitigate DDoS Attacks on Servers at {ISP}
                  Level},
  booktitle    = {International Symposium on Information Processing, {ISIP} 2008 / International
                  Pacific Workshop on Web Mining, and Web-Based Application, {WMWA}
                  2008, Moscow, Russia, 23-25 May 2008},
  pages        = {505--509},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ISIP.2008.115},
  doi          = {10.1109/ISIP.2008.115},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isip/SardanaJ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/SardanaKJ07,
  author       = {Anjali Sardana and
                  Krishan Kumar and
                  Ramesh Chandra Joshi},
  editor       = {Ning Zhang and
                  Ajith Abraham},
  title        = {Detection and Honeypot Based Redirection to Counter DDoS Attacks in
                  {ISP} Domain},
  booktitle    = {Proceedings of the Third International Symposium on Information Assurance
                  and Security, {IAS} 2007, August 29-31, 2007, Manchester, United Kingdom},
  pages        = {191--196},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/IAS.2007.23},
  doi          = {10.1109/IAS.2007.23},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/SardanaKJ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/SardanaJ07,
  author       = {Anjali Sardana and
                  Ramesh Chandra Joshi},
  editor       = {Patrick D. McDaniel and
                  Shyam K. Gupta},
  title        = {Simulation of Dynamic Honeypot Based Redirection to Counter Service
                  Level DDoS Attacks},
  booktitle    = {Information Systems Security, Third International Conference, {ICISS}
                  2007, Delhi, India, December 16-20, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4812},
  pages        = {259--262},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77086-2\_21},
  doi          = {10.1007/978-3-540-77086-2\_21},
  timestamp    = {Thu, 05 Jan 2023 17:10:29 +0100},
  biburl       = {https://dblp.org/rec/conf/iciss/SardanaJ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}