Gaurav Somani

Orcid: 0000-0001-7147-165X

Affiliations:
  • Central University of Rajasthan, Ajmer, India


According to our database1, Gaurav Somani authored at least 35 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Comparing HAProxy Scheduling Algorithms During the DDoS Attacks.
IEEE Netw. Lett., June, 2024

2023
Service separation assisted DDoS attack mitigation in cloud targets.
J. Inf. Secur. Appl., March, 2023

DDoS at a Glance: Attack Launch to Solutions.
IT Prof., 2023

Amplification/Reflection Attack Suppression Using Victim Separation.
IEEE Netw. Lett., 2023

On the timing of applying resource separation during DDoS attacks.
Proceedings of the 23rd IEEE/ACM International Symposium on Cluster, 2023

2022
DDoS attack mitigation in cloud targets using scale-inside out assisted container separation.
Proceedings of the IEEE INFOCOM 2022, 2022

Detecting Cloud Originated DDoS Attacks at the Source Using Out-Cloud Attack Detection (OCAD).
Proceedings of the Information Systems Security - 18th International Conference, 2022

2021
Serving while attacked: DDoS attack effect minimization using page separation and container allocation strategy.
J. Inf. Secur. Appl., 2021

Establishing forensics capabilities in the presence of superuser insider threats.
Digit. Investig., 2021

Origin Information Assisted Hybrid Analysis to Detect APT Malware.
Proceedings of the Information Systems Security - 17th International Conference, 2021

2020
QuickDedup: Efficient VM deduplication in cloud computing environments.
J. Parallel Distributed Comput., 2020

<i>Vulvet</i>: Vetting of Vulnerabilities in Android Apps to Thwart Exploitation.
DTRAP, 2020

A Systematic Survey on Cloud Forensics Challenges, Solutions, and Future Directions.
ACM Comput. Surv., 2020

2019
Integration of Cloud, Internet of Things, and Big Data Analytics.
Softw. Pract. Exp., 2019

2018
Scale Inside-Out: Rapid Mitigation of Cloud DDoS Attacks.
IEEE Trans. Dependable Secur. Comput., 2018

2017
DDoS attacks in cloud computing: Issues, taxonomy, and future directions.
Comput. Commun., 2017

Combating DDoS Attacks in the Cloud: Requirements, Trends, and Future Directions.
IEEE Cloud Comput., 2017

DDoS victim service containment to minimize the internal collateral damages in cloud computing.
Comput. Electr. Eng., 2017

Service resizing for quick DDoS mitigation in cloud computing environment.
Ann. des Télécommunications, 2017

2016
DDoS attacks in cloud computing: Collateral damage to non-targets.
Comput. Networks, 2016

Secure File Deletion for Solid State Drives.
Proceedings of the Advances in Digital Forensics XII, 2016

2015
DDoS/EDoS attack in cloud: affecting everyone out there!
Proceedings of the 8th International Conference on Security of Information and Networks, 2015

DARAC: DDoS Mitigation Using DDoS Aware Resource Allocation in Cloud.
Proceedings of the Information Systems Security - 11th International Conference, 2015

Client-side verifiable accounting in infrastructure cloud.
Proceedings of the 2015 International Conference on Advances in Computing, 2015

2014
Index Page Based EDoS Attacks in Infrastructure Cloud.
Proceedings of the Recent Trends in Computer Networks and Distributed Systems Security, 2014

An Order Preserving Encryption Scheme for Cloud Computing.
Proceedings of the 7th International Conference on Security of Information and Networks, 2014

Secure VM backup and vulnerability removal in infrastructure clouds.
Proceedings of the 2014 International Conference on Advances in Computing, 2014

2013
Dynamic resource allocation using auto-negotiation in Haizea.
Proceedings of the Sixth International Conference on Contemporary Computing, 2013

VMCloner: A Fast and Flexible Virtual Machine Cloner.
Proceedings of the 2013 International Conference on Cloud and Green Computing, Karlsruhe, Germany, September 30, 2013

2012
Policy based resource allocation in IaaS cloud.
Future Gener. Comput. Syst., 2012

VUPIC: Virtual Machine Usage Based Placement in IaaS Cloud
CoRR, 2012

Allocation of Slotted Deadline Sensitive Leases in Infrastructure Cloud.
Proceedings of the Distributed Computing and Internet Technology, 2012

2011
Negotiation for resource allocation in IaaS cloud.
Proceedings of the 4th Bangalore Annual Compute Conference, Compute 2011, 2011

2010
Load Balancing in Xen Virtual Machine Monitor.
Proceedings of the Contemporary Computing - Third International Conference, 2010

2009
Application Performance Isolation in Virtualization.
Proceedings of the IEEE International Conference on Cloud Computing, 2009


  Loading...