Neha Agrawal
Orcid: 0000-0002-7254-079X
According to our database1,
Neha Agrawal
authored at least 33 papers
between 2009 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
A comprehensive survey on low-rate and high-rate DDoS defense approaches in SDN: taxonomy, research challenges, and opportunities.
Multim. Tools Appl., April, 2024
Multim. Tools Appl., January, 2024
Shaping the future of industry: Understanding the dynamics of industrial digital twins.
Comput. Ind. Eng., 2024
Optimizing Concurrent Co-Designing of ICs and Package using Multi Technology and RF Solution.
Proceedings of the 28th International Symposium on VLSI Design and Test, 2024
Improved Child Safety Using Edge-Fog-Cloud Enabled Smart IoT Wearable Device: An Architecture.
Proceedings of the 16th International Conference on COMmunication Systems & NETworkS, 2024
2023
Analysis of multi-dimensional Industrial IoT (IIoT) data in Edge-Fog-Cloud based architectural frameworks : A survey on current state and research challenges.
J. Ind. Inf. Integr., October, 2023
J. Supercomput., May, 2023
Training Large-Vocabulary Neural Language Models by Private Federated Learning for Resource-Constrained Devices.
Proceedings of the IEEE International Conference on Acoustics, 2023
ACL Assisted Security Mechanism Against Low-Rate DDoS Attack in SDN-Cloud-IoT Networks.
Proceedings of the OITS International Conference on Information Technology, 2023
Proceedings of the OITS International Conference on Information Technology, 2023
2021
An SDN-Assisted Defense Mechduanism for the Shrew DDoS Attack in a Cloud Computing Environment.
J. Netw. Syst. Manag., 2021
Autonomic cloud computing based management and security solutions: State-of-the-art, challenges, and opportunities.
Trans. Emerg. Telecommun. Technol., 2021
Dynamic load balancing assisted optimized access control mechanism for Edge-Fog-Cloud network in Internet of Things environment.
Concurr. Comput. Pract. Exp., 2021
Proceedings of the HotStorage '21: 13th ACM Workshop on Hot Topics in Storage and File Systems, 2021
2020
Detection of Low-Rate Cloud DDoS Attacks in Frequency Domain Using Fast Hartley Transform.
Wirel. Pers. Commun., 2020
Int. J. Netw. Manag., 2020
2019
A trustworthy agent-based encrypted access control method for mobile cloud computing environment.
Pervasive Mob. Comput., 2019
Defense Mechanisms Against DDoS Attacks in a Cloud Computing Environment: State-of-the-Art and Research Challenges.
IEEE Commun. Surv. Tutorials, 2019
Barriers in Business-IT Alignment in the Banking Sector in a Developing Country: A Case Study of Commercial Banks in the Gambia.
Proceedings of the Information Systems, 2019
2018
Inf. Process. Lett., 2018
2017
Defense schemes for variants of distributed denial-of-service (DDoS) attacks in cloud computing: A survey.
Inf. Secur. J. A Glob. Perspect., 2017
The Performance Analysis of Honeypot Based Intrusion Detection System for Wireless Network.
Int. J. Wirel. Inf. Networks, 2017
Proceedings of the 2017 IEEE 7th International Symposium on Cloud and Service Computing, 2017
2015
Wirel. Pers. Commun., 2015
Comparison Clustering using Cosine and Fuzzy set based Similarity Measures of Text Documents.
CoRR, 2015
2014
The performance evaluation of proactive fault tolerant scheme over cloud using CloudSim simulator.
Proceedings of the Fifth International Conference on the Applications of Digital Information and Web Technologies, 2014
2013
Int. J. Web Appl., 2013
Proceedings of the Tenth International Conference on Wireless and Optical Communications Networks, 2013
Segmentation of parathyroid tumors from DCE-MRI using Linear Dynamic System analysis.
Proceedings of the 10th IEEE International Symposium on Biomedical Imaging: From Nano to Macro, 2013
Performance Comparison of Executing Fast Transactions in Bitcoin Network Using Verifiable Code Execution.
Proceedings of the 2013 2nd International Conference on Advanced Computing, 2013
2012
Proceedings of the Odyssey 2012: The Speaker and Language Recognition Workshop, 2012
2009
Proceedings of the 2009 Data Compression Conference (DCC 2009), 2009
Biometric data hiding: A 3 factor authentication approach to verify identity with a single image using steganography, encryption and matching.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2009