Anjali Sardana
According to our database1,
Anjali Sardana
authored at least 30 papers
between 2007 and 2021.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2021
Prediction of COVID-19 confirmed, death, and cured cases in India using random forest model.
Big Data Min. Anal., 2021
2013
2012
An efficient fuzzy controller based technique for network traffic classification to improve QoS.
Proceedings of the 5th International Conference of Security of Information and Networks, 2012
Proceedings of the Eighth IEEE World Congress on Services, 2012
Proceedings of the Eighth IEEE World Congress on Services, 2012
Proceedings of the First International Conference on Security of Internet of Things, 2012
Proceedings of the First International Conference on Security of Internet of Things, 2012
A light weight centralized file monitoring approach for securing files in Cloud environment.
Proceedings of the 7th International Conference for Internet Technology and Secured Transactions, 2012
Secret information display based authentication technique towards preventing phishing attacks.
Proceedings of the 2012 International Conference on Advances in Computing, 2012
Protecting web applications from SQL injection attacks by using framework and database firewall.
Proceedings of the 2012 International Conference on Advances in Computing, 2012
Proceedings of the 2012 International Conference on Advances in Computing, 2012
A Hybrid Intrusion Detection Architecture for Defense against DDoS Attacks in Cloud Environment.
Proceedings of the Contemporary Computing - 5th International Conference, 2012
Proceedings of the CUBE International IT Conference & Exhibition, 2012
Proceedings of the Fourth International Conference on Computational Aspects of Social Networks, 2012
A fingerprinting system calls approach for intrusion detection in a cloud environment.
Proceedings of the Fourth International Conference on Computational Aspects of Social Networks, 2012
Personal Secret Information Based Authentication towards Preventing Phishing Attacks.
Proceedings of the Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology (ACITY) July 13-15, 2012, Chennai, India, 2012
Key Distribution Schemes in Wireless Sensor Networks: Novel Classification and Analysis.
Proceedings of the Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology (ACITY) July 13-15, 2012, Chennai, India, 2012
2011
Dual-Level Attack Detection, Characterization and Response for Networks Under DDoS Attacks.
Int. J. Mob. Comput. Multim. Commun., 2011
Proceedings of the Contemporary Computing - 4th International Conference, 2011
Proceedings of the Advances in Computing and Communications, 2011
Secure Vault: A privacy preserving reliable architecture for Secure Social Networking.
Proceedings of the 7th International Conference on Information Assurance and Security, 2011
2010
Deciding optimal entropic thresholds to calibrate the detection mechanism for variable rate DDoS attacks in ISP domain: honeypot based approach.
J. Intell. Manuf., 2010
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010
Proceedings of the ARES 2010, 2010
2009
An auto-responsive honeypot architecture for dynamic resource allocation and QoS adaptation in DDoS attacked networks.
Comput. Commun., 2009
2008
Proceedings of the International Symposium on Information Processing, 2008
Proceedings of the 16th International Conference on Networks, 2008
2007
Simulation of Dynamic Honeypot Based Redirection to Counter Service Level DDoS Attacks.
Proceedings of the Information Systems Security, Third International Conference, 2007
Proceedings of the Third International Symposium on Information Assurance and Security, 2007