Gaurav Somani
Gaurav Somani
Assistant Professor, Computer Science and Engg, Central University of Rajasthan
Verified email at curaj.ac.in
TitleCited byYear
Policy based resource allocation in IaaS cloud
A Nathani, S Chaudhary, G Somani
Future Generation Computer Systems 28 (1), 94-103, 2012
2102012
DDoS attacks in cloud computing: Issues, taxonomy, and future directions
G Somani, MS Gaur, D Sanghi, M Conti, R Buyya
Computer Communications 107, 30-48, 2017
1012017
Application performance isolation in virtualization
G Somani, S Chaudhary
2009 IEEE International Conference on Cloud Computing, 41-48, 2009
852009
DDoS attacks in Cloud Computing: Collateral Damage to Non-targets
G Somani, MS Gaur, D Sanghi, M Conti
Computer Networks 109 (Part 2), 157-171, 2016
382016
Negotiation for resource allocation in IaaS cloud
J Akhani, S Chuadhary, G Somani
Proceedings of the Fourth Annual ACM Bangalore Conference, 15, 2011
312011
DDoS/EDoS attack in cloud: affecting everyone out there!
G Somani, MS Gaur, D Sanghi
Proceedings of the 8th International Conference on Security of Information …, 2015
202015
Combating DDoS attacks in the cloud: requirements, trends, and future directions
G Somani, MS Gaur, D Sanghi, M Conti, M Rajarajan, R Buyya
IEEE Cloud Computing 4 (1), 22-32, 2017
162017
Index page based EDoS attacks in infrastructure cloud
B Saini, G Somani
Security in Computer Networks and Distributed Systems, International …, 2014
162014
VUPIC: Virtual machine usage based placement in IaaS cloud
G Somani, P Khandelwal, K Phatnani
arXiv preprint arXiv:1212.0085, 2012
162012
Service resizing for quick DDoS mitigation in cloud computing environment
G Somani, MS Gaur, D Sanghi, M Conti, R Buyya
Annals of Telecommunications 72 (5-6), 237-252, 2017
142017
Access control and authentication in the internet of things environment
AK Ranjan, G Somani
Connectivity Frameworks for Smart Devices, 283-305, 2016
132016
DARAC: DDoS Mitigation Using DDoS Aware Resource Allocation in Cloud
G Somani, A Johri, M Taneja, U Pyne, MS Gaur, D Sanghi
ICISS 2015, Information Systems Security, International Conference on, 263-282, 2015
132015
Anti-Hijack: Runtime Detection of Malware Initiated Hijacking in Android
VG Shankar, G Somani
Procedia Computer Science 78, 587-594, 2016
112016
Performance isolation and scheduler behavior
G Somani, S Chaudhary
2010 First International Conference On Parallel, Distributed and Grid …, 2010
82010
AndroTaint: An efficient android malware detection framework using dynamic taint analysis
VG Shankar, G Somani, MS Gaur, V Laxmi, M Conti
2017 ISEA Asia Security and Privacy (ISEASP), 1-13, 2017
72017
Load balancing in Xen virtual machine monitor
G Somani, S Chaudhary
Contemporary Computing, International Conference on, 62-70, 2010
72010
Dynamic resource allocation using auto-negotiation in Haizea
P Chokhani, G Somani
2013 Sixth International Conference on Contemporary Computing (IC3), 232-238, 2013
62013
Allocation of slotted deadline sensitive leases in infrastructure cloud
D Vora, S Chaudhary, M Bhise, V Kumar, G Somani
Distributed Computing and Internet Technology, International Conference on …, 2012
62012
Scale Inside-out: Rapid Mitigation of Cloud DDoS Attacks
G Somani, MS Gaur, D Sanghi, M Conti, M Rajarajan
IEEE Transactions on Dependable and Secure Computing 15 (6), 959-973, 2018
52018
DDoS victim service containment to minimize the internal collateral damages in cloud computing
G Somani, MS Gaur, D Sanghi, M Conti, M Rajarajan
Computers & Electrical Engineering 59, 165-179, 2017
52017
The system can't perform the operation now. Try again later.
Articles 1–20