Your selections:
Intrusion detection techniques in cloud environment: A survey
- Mishra, Preeti, Pilli, Emmanuel S., Varadharajan, Vijay, Tupakula, Udaya
- Varadharajan, Vijay, Tupakula, Udaya
Integrated security for services hosted in virtual environments
- Jayarathna, Dilshan, Varadharajan, Vijay, Tupakula, Udaya
- Karmakar, Kallol Krishna, Varadharajan, Vijay, Tupakula, Udaya
Botnet detection using software defined networking
- Wijesinghe, Udaya, Tupakula, Udaya, Varadharajan, Vijay
Securing wireless mobile nodes from distributed denial-of-service attacks
- Varadharajan, Vijay, Tupakula, Udaya
Trust enhanced security for tenant transactions in the cloud environment
- Tupakula, Udaya, Varadharajan, Vijay
Counteracting security attacks in virtual machines in the cloud using property based attestation
- Varadharajan, Vijay, Tupakula, Udaya
Security as a service model for cloud environment
- Varadharajan, Vijay, Tupakula, Udaya
Techniques for detecting attacks on critical infrastructure
- Tupakula, Udaya, Varadharajan, Vijay
Integrated security architecture for virtual machines
- Varadharajan, Vijay, Tupakula, Udaya
Trust enhanced security architecture for detecting insider threats
- Tupakula, Udaya, Varadharajan, Vijay
On the design of virtual machine intrusion detection system
- Tupakula, Udaya, Varadharajan, Vijay
Security architecture for virtual machines
- Tupakula, Udaya, Varadharajan, Vijay, Bichhawat, Abhishek
Are you sure you would like to clear your session, including search history and login status?