Vulnerability retrospection of security solutions for software-defined Cyber–Physical System against DDoS and IoT-DDoS attacks M Snehi, A Bhandari Computer Science Review 40, 100371, 2021 | 129 | 2021 |
New-flow based DDoS attacks in SDN: Taxonomy, rationales, and research challenges MP Singh, A Bhandari Computer Communications 154, 509-527, 2020 | 123 | 2020 |
A review of detection approaches for distributed denial of service attacks P Kaur, M Kumar, A Bhandari Systems Science & Control Engineering 5 (1), 301-320, 2017 | 122 | 2017 |
Medical expert systems for diagnosis of various diseases J Singla, D Grover, A Bhandari International Journal of Computer Applications 93 (7), 2014 | 88 | 2014 |
Characterizing flash events and distributed denial‐of‐service attacks: an empirical investigation A Bhandari, AL Sangal, K Kumar Security and Communication Networks 9 (13), 2222-2239, 2016 | 79 | 2016 |
Distributed denial of service attacks: a threat or challenge J Kaur Chahal, A Bhandari, S Behal New Review of Information Networking 24 (1), 31-103, 2019 | 60 | 2019 |
iNIDS: SWOT Analysis and TOWS Inferences of State-of-the-Art NIDS solutions for the development of Intelligent Network Intrusion Detection System J Verma, A Bhandari, G Singh Computer Communications 195, 227-247, 2022 | 33 | 2022 |
Review of existing data sets for network intrusion detection system J Verma, A Bhandari, G Singh Advances in Mathematics: Scientific Journal 9 (6), 3849-3854, 2020 | 33 | 2020 |
Destination address entropy based detection and traceback approach against distributed denial of service attacks A Bhandari, AL Sangal, K Kumar International Journal of Computer Network and Information Security 7 (8), 9, 2015 | 33 | 2015 |
Traceback techniques against DDOS attacks: a comprehensive review K Kumar, AL Sangal, A Bhandari 2011 2nd International Conference on Computer and Communication Technology …, 2011 | 28 | 2011 |
Diverse methods for signature based intrusion detection schemes adopted J Snehi, A Bhandari, V Baggan, M Snehi International Journal of Recent Technology and Engineering 9 (2), 44-49, 2020 | 27 | 2020 |
Simulation study of application layer DDoS attack S Barjinder, krishan Kumar, A Bhandari Green Computing and Internet of Things (ICGCIoT), 2015 International …, 2015 | 23* | 2015 |
Performance metrics for defense framework against distributed denial of service attacks A Bhandari, AL Sangal, K Kumar International Journal on Network Security 5 (2), 38, 2014 | 23 | 2014 |
Global intrusion detection environments and platform for anomaly-based intrusion detection systems J Snehi, A Bhandari, M Snehi, U Tandon, V Baggan Proceedings of Second International Conference on Computing, Communications …, 2021 | 22 | 2021 |
Apprehending mirai botnet philosophy and smart learning models for IoT-DDoS detection M Snehi, A Bhandari 2021 8th International Conference on Computing for Sustainable Global …, 2021 | 19 | 2021 |
A meta-analysis of role of network intrusion detection systems in confronting network attacks J Verma, A Bhandari, G Singh 2021 8th international conference on computing for sustainable global …, 2021 | 18 | 2021 |
Load balancing in software defined networking: A review P Kaur, JK Chahal, A Bhandari Asian Journal of Computer Science and Technology 7 (2), 1-5, 2018 | 17 | 2018 |
A novel distributed stack ensembled meta-learning-based optimized classification framework for real-time prolific IoT traffic streams M Snehi, A Bhandari Arabian Journal for Science and Engineering 47 (8), 9907-9930, 2022 | 16 | 2022 |
Introspecting intrusion detection systems in dealing with security concerns in cloud environment J Snehi, M Snehi, A Bhandari, V Baggan, R Ahuja 2021 10th International Conference on System Modeling & Advancement in …, 2021 | 15 | 2021 |
AIDAAS: Incident handling and remediation anomaly-based IDaaS for cloud service providers J Snehi, A Bhandari, V Baggan, M Snehi, H Kaur 2021 10th International Conference on System Modeling & Advancement in …, 2021 | 9 | 2021 |