Gaurav Somani
Title
Cited by
Cited by
Year
Policy based resource allocation in IaaS cloud
A Nathani, S Chaudhary, G Somani
Future Generation Computer Systems 28 (1), 94-103, 2012
2282012
DDoS attacks in cloud computing: Issues, taxonomy, and future directions
G Somani, MS Gaur, D Sanghi, M Conti, R Buyya
Computer Communications 107, 30-48, 2017
1552017
Application performance isolation in virtualization
G Somani, S Chaudhary
2009 IEEE International Conference on Cloud Computing, 41-48, 2009
902009
DDoS attacks in Cloud Computing: Collateral Damage to Non-targets
G Somani, MS Gaur, D Sanghi, M Conti
Computer Networks 109 (Part 2), 157-171, 2016
562016
Negotiation for resource allocation in IaaS cloud
J Akhani, S Chuadhary, G Somani
Proceedings of the Fourth Annual ACM Bangalore Conference, 15, 2011
332011
Combating DDoS attacks in the cloud: requirements, trends, and future directions
G Somani, MS Gaur, D Sanghi, M Conti, M Rajarajan, R Buyya
IEEE Cloud Computing 4 (1), 22-32, 2017
292017
DDoS/EDoS attack in cloud: affecting everyone out there!
G Somani, MS Gaur, D Sanghi
Proceedings of the 8th International Conference on Security of Information …, 2015
272015
Service resizing for quick DDoS mitigation in cloud computing environment
G Somani, MS Gaur, D Sanghi, M Conti, R Buyya
Annals of Telecommunications 72 (5), 237-252, 2017
222017
Index page based EDoS attacks in infrastructure cloud
B Saini, G Somani
Security in Computer Networks and Distributed Systems, International …, 2014
222014
DARAC: DDoS Mitigation Using DDoS Aware Resource Allocation in Cloud
G Somani, A Johri, M Taneja, U Pyne, MS Gaur, D Sanghi
ICISS 2015, Information Systems Security, International Conference on, 263-282, 2015
192015
Access control and authentication in the internet of things environment
AK Ranjan, G Somani
Connectivity Frameworks for Smart Devices, 283-305, 2016
182016
VUPIC: Virtual machine usage based placement in IaaS cloud
G Somani, P Khandelwal, K Phatnani
arXiv preprint arXiv:1212.0085, 2012
182012
Scale Inside-out: Rapid Mitigation of Cloud DDoS Attacks
G Somani, MS Gaur, D Sanghi, M Conti, M Rajarajan
IEEE Transactions on Dependable and Secure Computing 15 (6), 959-973, 2018
132018
Research advances in cloud computing
S Chaudhary, G Somani, R Buyya
Springer Singapore, 2017
132017
AndroTaint: An efficient android malware detection framework using dynamic taint analysis
VG Shankar, G Somani, MS Gaur, V Laxmi, M Conti
2017 ISEA Asia security and privacy (ISEASP), 1-13, 2017
122017
Anti-Hijack: Runtime detection of malware initiated hijacking in android
VG Shankar, G Somani
Procedia Computer Science 78, 587-594, 2016
112016
DDoS victim service containment to minimize the internal collateral damages in cloud computing
G Somani, MS Gaur, D Sanghi, M Conti, M Rajarajan
Computers & Electrical Engineering 59, 165-179, 2017
102017
A Systematic Survey on Cloud Forensics Challenges, Solutions, and Future Directions
B Manral, G Somani, KKR Choo, M Conti, MS Gaur
ACM Computing Surveys (CSUR) 52 (6), 1-38, 2020
92020
Dynamic resource allocation using auto-negotiation in Haizea
P Chokhani, G Somani
2013 Sixth International Conference on Contemporary Computing (IC3), 232-238, 2013
82013
Performance isolation and scheduler behavior
G Somani, S Chaudhary
2010 First International Conference On Parallel, Distributed and Grid …, 2010
82010
The system can't perform the operation now. Try again later.
Articles 1–20