关注
Dr. Manish Snehi
Dr. Manish Snehi
Punjabi University
在 csepup.ac.in 的电子邮件经过验证
标题
引用次数
引用次数
年份
Vulnerability Retrospection of Security solutions for Software-defined Cyber-Physical System against DDoS and IoT-DDoS
M Snehi, A Bhandari
Computer Science Review 40, 2021
1012021
Diverse methods for signature based intrusion detection schemes adopted
J Snehi, A Bhandari, V Baggan, M Snehi
International Journal of Recent Technology and Engineering 9 (2), 44-49, 2020
222020
Global intrusion detection environments and platform for anomaly-based intrusion detection systems
J Snehi, A Bhandari, M Snehi, U Tandon, V Baggan
Proceedings of Second International Conference on Computing, Communications …, 2021
192021
Apprehending mirai botnet philosophy and smart learning models for IoT-DDoS detection
M Snehi, A Bhandari
2021 8th International Conference on Computing for Sustainable Global …, 2021
162021
High Performance Architecture and Grid Computing: International Conference, HPAGC 2011, Chandigarh, India, July 19-20, 2011. Proceedings
A Mantri, SNS Kendra, G Kumar, S Kumar
Springer Science & Business Media, 2011
162011
A Novel Distributed Stack Ensembled Meta-Learning-Based Optimized Classification Framework for Real-time Prolific IoT Traffic Streams
M Snehi, A Bhandari
Arabian Journal for Science and Engineering, 2022
142022
Introspecting intrusion detection systems in dealing with security concerns in cloud environment
J Snehi, M Snehi, A Bhandari, V Baggan, R Ahuja
2021 10th International Conference on System Modeling & Advancement in …, 2021
142021
Virtualization as an engine to drive cloud computing security
S Jyoti, S Manish, G Rupali
International Conference on High Performance Architecture and Grid Computing …, 2011
102011
AIDAAS: Incident handling and remediation anomaly-based IDaaS for cloud service providers
J Snehi, A Bhandari, V Baggan, M Snehi, H Kaur
2021 10th International Conference on System Modeling & Advancement in …, 2021
72021
Security management in SDN using fog computing: A survey
M Snehi, A Bhandari
Strategies for e-Service, e-Governance, and Cybersecurity, 117-126, 2021
62021
SDN‐based cloud combining edge computing for IoT infrastructure
J Snehi, M Snehi, D Prasad, S Simaiya, I Kansal, V Baggan
Software Defined Networks: Architecture and Applications, 497-540, 2022
52022
IoT-based DDoS on cyber physical systems: Research challenges, datasets and future prospects
M Snehi, A Bhandari
2022 IEEE International IOT, Electronics and Mechatronics Conference …, 2022
52022
An SDN/NFV based intelligent fog architecture for DDoS defense in cyber physical systems
M Snehi, A Bhandari
2021 10th International Conference on System Modeling & Advancement in …, 2021
42021
Web Server Security Solution for Detecting Cross-site Scripting Attacks in Real-time Using Deep Learning
GC Jyoti Verma, Manish Snehi, Monika Sethi, Vidhu Baggan
2023 International Conference on Artificial Intelligence and Applications …, 2023
22023
Empirical Investigation of IoT Traffic in Smart Environments: Characteristics, Research Gaps and Recommendations
M Snehi, A Bhandari
2021 10th International Conference on System Modeling & Advancement in …, 2022
22022
Security threats to mobile agents
J Snehi, M Snehi, S Goyal
Proceedings of the International Conference on Advances in Computing and …, 2011
22011
Investigating convergence of cyber physical systems and big data analytics to develop real-time defense solution
M Snehi
Security and Resilience of Cyber Physical Systems, 37-48, 2022
12022
An Efficient Model of IGP for Network-based Communication: A Comparison
V Baggan, SP Chaturvedi, J Snehi, M Snehi
2021 10th International Conference on System Modeling & Advancement in …, 2021
12021
A Simulation‐Based Study of a Digital Twin Model of the Air Purifier System in Chandigarh Using LabVIEW
J Verma, M Sethi, V Baggan, M Snehi, J Arora
Simulation Techniques of Digital Twin in Real‐Time Applications: Design …, 2024
2024
Deep Learning and Blockchain Applications in Healthcare Sector Using Imaging Data
M Sethi, J Arora, V Baggan, J Verma, M Snehi
Next-Generation Cybersecurity: AI, ML, and Blockchain, 135-158, 2024
2024
系统目前无法执行此操作,请稍后再试。
文章 1–20