S.No |
Paper Title |
Authors |
Conference Title |
Pages |
Year |
Link |
1 |
Intelligent DDoS Detection System in Software-Defined Networking |
Chaitanya Kumar, Bathini Pranay Kumar, Aditya Chaudhary, Ayush Gupta, Kapil Dev, Ayushi Sharma,Shashank Srivastava and Rajitha B |
6th IEEE CONECCT 2020 |
In Press |
2020 |
view |
2 |
A Triggered Delay-based Approach against Cache Privacy Attack in NDN |
Naveen Kumar and Shashank Srivastava |
17th International Conference on Computer and Information Science (ICIS) |
22-27 |
2018 |
view |
3 |
Software Defined Underlay-aware Structured Peer-to-Peer Overlay |
Nitin Shukla, Anurag Bamal, Shashank Srivastava, and Mayank Pandey |
19th International Conference on Distributed Computing and Networking |
1-10 |
2018 |
view |
4 |
Leveraging SDN for Early Detection and Mitigation of DDoS Attacks |
Neelam Dayal, Shashank Srivastava |
International Conference on Communication Systems and Networks |
52-75 |
2018 |
view |
5 |
An RBF-PSO based approach for early detection of DDoS attacks in SDN |
Neelam Dayal, Shashank Srivastava |
10th International Conference on Communication Systems \& Networks (COMSNETS) |
17-24 |
2018 |
view |
6 |
Performance Impact of Topology Poisoning Attack in SDN and its Countermeasure |
Nivindar Kaur, Ashutosh Kumar Singh, Naveen Kumar and Shashank Srivastava |
10th International Conference On Security Of Information And Networks(SIN) |
179-184 |
2017 |
view |
7 |
Evaluating Machine Learning Algorithms for Detection of Interest Flooding Attack in Named Data Networking |
Naveen Kumar, Ashutosh Kumar Singh and Shashank Srivastava |
10th International Conference On Security Of Information And Networks(SIN) |
299-302 |
2017 |
view |
8 |
Analyzing behavior of DDoS attacks to identify DDoS detection features in SDN |
Neelam Dayal, Shashank Srivastava |
IEEE International Conference on Communication Systems and Networks |
274-281 |
2017 |
view |
9 |
A hierarchical approach to adaptive distributed scheduling in cloud |
Prashant Misra, Shashank Srivastava, Nishant Narang, Sonu Goel, Prasenjit Maity, Aditya Saxena |
International Conference Advances in Computing, Communications and Informatics (ICACCI) |
1678-1687 |
2015 |
view |
10 |
Trust analysis of execution platform for self protected mobile code |
Shashank Srivastava, Divya Kumar, Shuchi Chandra |
International Conference Advances in Computing, Communications and Informatics (ICACCI) |
1904-1909 |
2015 |
view |
11 |
An approach for virtual machine image security |
Anjali Pandey, Shashank Srivastava |
International Conference Signal Propagation and Computer Technology (ICSPCT) |
616-623 |
2014 |
view |
12 |
Mutual authentication protocol using identity-based shared secret key in cloud environments |
Sandeep Saxena, Goutam Sanyal, Shashank Srivastava |
Recent Advances and Innovations in Engineering (ICRAIE) |
1-6 |
2014 |
view |
13 |
Inter cipher block diffusion: a novel transformation for proposed parallel AES |
Shashank Srivastava, Avinash Kumar Singh, GC Nandi |
2nd International Conference on Communication, Computing & Security |
872-879 |
2012 |
view |
14 |
Protection of mobile agent and its itinerary from malicious host |
Shashank Srivastava, GC Nandi |
Computer and Communication Technology (ICCCT), 2nd International Conference |
405-411 |
2011 |
view |
15 |
Detection of mobile agent's blocking in secure layered architectur |
Shashank Srivastava, GC Nandi |
Communication Systems and Network Technologies (CSNT), International Conference |
43-48 |
2011 |
view |
16 |
Statistical Analysis of Network Traffic over LAN through IAMT |
Shashank Srivastava, Abhinav Goyal, Rajeev Kumar, Nandi GC |
5th International Conference on Information Processing, ICIP |
329-335 |
2011 |
view |
17 |
Enhancing the efficiency of secure network monitoring through mobile agents |
Shashank Srivastava, GC Nandi |
Computer and Communication Technology (ICCCT), International Conference |
141-148 |
2010 |
view |
18 |
Localization of mobile robots in a network using mobile agents |
Shashank Srivastava, GC Nandi |
Computer and Communication Technology (ICCCT), International Conference |
415-420 |
2010 |
view |