Heuristic approaches for the reliable SDN controller placement problem AK Singh, S Maurya, N Kumar, S Srivastava Transactions on Emerging Telecommunications Technologies 31 (2), e3761, 2020 | 60 | 2020 |
Security attacks in named data networking: A review and research directions N Kumar, AK Singh, A Aleem, S Srivastava Journal of Computer Science and Technology 34, 1319-1350, 2019 | 33 | 2019 |
PSO and TLBO based reliable placement of controllers in SDN AK Singh, N Kumar, S Srivastava International Journal of Computer Network and Information Security 11 (2), 36-42, 2019 | 27 | 2019 |
Feature selection for interest flooding attack in named data networking N Kumar, AK Singh, S Srivastava International Journal of Computers and Applications 43 (6), 537-546, 2021 | 18 | 2021 |
Evaluating machine learning algorithms for detection of interest flooding attack in named data networking N Kumar, AK Singh, S Srivastava Proceedings of the 10th International Conference on Security of Information …, 2017 | 17 | 2017 |
Performance impact of topology poisoning attack in SDN and its countermeasure N Kaur, AK Singh, N Kumar, S Srivastava Proceedings of the 10th international conference on security of information …, 2017 | 13 | 2017 |
A triggered delay-based approach against cache privacy attack in NDN N Kumar, AK Singh, S Srivastava International Journal of Networked and Distributed Computing 6 (3), 174-184, 2018 | 10 | 2018 |
Improving heart disease prediction using feature selection through genetic algorithm A Aleem, G Prateek, N Kumar International Conference on Advanced Network Technologies and Intelligent …, 2021 | 9 | 2021 |
NBP: Namespace-based privacy to counter timing-based attack in named data networking N Kumar, A Aleem, AK Singh, S Srivastava Journal of Network and Computer Applications 144, 155-170, 2019 | 7 | 2019 |
FAULT-DETECTION ON MULTI-ROBOT PATH PLANNING. AK Singh, N Kumar International Journal of Advanced Research in Computer Science 8 (8), 2017 | 5 | 2017 |
Detection of DDoS attack in IoT using machine learning N Kumar, A Aleem, S Kumar International Conference on Advanced Network Technologies and Intelligent …, 2021 | 2 | 2021 |
IBPC: An Approach for Mitigation of Cache Pollution Attack in NDN using Interface-Based Popularity N Kumar, S Srivastava Arabian Journal for Science and Engineering 49 (3), 3241-3251, 2024 | 1 | 2024 |
Comparing the performance of tcp/ip with named data networking using ns-3 N Kumar, NK Gupta Proceedings of the 2022 Fourteenth International Conference on Contemporary …, 2022 | 1 | 2022 |
Automated categorization of student's query N Kumar, H Krishna, S Shubham, PP Rout International Journal of Computers and Applications 44 (11), 1056-1064, 2022 | | 2022 |
Fast Detection and Traceback-based Mitigation of Interest Flooding Attack N Kumar, S Srivastava | | 2021 |
A Triggered Delay-based Approach against Cache Privacy Attack in NDN SS Naveen Kumar, Ashutosh Kumar Singh International Journal of Networked and Distributed Computing 6 (3), 174 - 184, 2018 | | 2018 |