Skip to main content

and
  1. No Access

    Article

    A Comprehensive Analysis of Machine Learning- and Deep Learning-Based Solutions for DDoS Attack Detection in SDN

    Software-defined networking (SDN) provides programmability, manageability, flexibility and efficiency compared to traditional networks. These are owing to the SDN’s mutual independence or separation of the con...

    Naziya Aslam, Shashank Srivastava in Arabian Journal for Science and Engineering (2024)

  2. No Access

    Article

    ONOS DDoS Defender: A Comparative Analysis of Existing DDoS Attack Datasets using Ensemble Approach

    Software-Defined Networking (SDN) outperforms conventional networks in terms of programmability, management, flexibility, and efficiency. This is because SDN separates the control and data planes. The centrali...

    Naziya Aslam, Shashank Srivastava, M. M. Gore in Wireless Personal Communications (2023)

  3. No Access

    Article

    Publish/Subscribe-Based P2P-Cloud of Underutilized Computing Resources for Providing Computation-as-a-Service

    The recent advancement in electronic devices and communication technology has lead to explosion in the digital data. These vast data have created ample opportunities to increase revenue and reduce costs, but c...

    Shashwati Banerjea, Mayank Pandey in Proceedings of the National Academy of Sci… (2021)

  4. No Access

    Chapter and Conference Paper

    Large Scale P2P Cloud of Underutilized Computing Resources for Providing MapReduce as a Service

    In today’s world, data is growing at an unprecedented rate. This vast amount of data brings in the challenge of efficient storage and processing. The common solution adopted by organizations is to hire the ser...

    Shashwati Banerjea, Mayank Pandey in Proceedings of the 2nd International Confe… (2019)

  5. No Access

    Article

    Balancing energy consumption across network for maximizing lifetime in cluster-based wireless sensor network

    For any wireless sensor network to be useful, it is imperative that the constituent nodes are able to conserve energy and yet forward data so as to enhance network lifetime. In a sensor network where the sensi...

    Sansar Singh Chauhan, M. M. Gore in CSI Transactions on ICT (2015)

  6. No Access

    Chapter and Conference Paper

    An Accurate and Self-correcting Localization Algorithm for UWSN Using Anchor Nodes of Varying Communication Range

    Precise event detection in underwater wireless sensor network requires the position information of the detecting sensor nodes. Manual positioning of nodes in such a network is highly infeasible. The popular di...

    Manas Kumar Mishra, Neha Ojha, M. M. Gore in Advances in Grid and Pervasive Computing (2011)

  7. No Access

    Chapter and Conference Paper

    Robust and Distributed Range-Free Localization Using Anchor Nodes with Varying Communication Range for Three Dimensional Wireless Sensor Networks

    Localization of the nodes in a sensor network is a premier activity which influences the performance of the network. The data collected by a sensor node may become useless if the location of that node is not k...

    Manas Kumar Mishra, M. M. Gore in Distributed Computing and Internet Technology (2011)

  8. No Access

    Chapter and Conference Paper

    On Optimal Space Tessellation with Deterministic Deployment for Coverage in Three-Dimensional Wireless Sensor Networks

    Coverage is one of the fundamental issues in Wireless Sensor Networks. It reflects how well the service volume is monitored or tracked by its participant sensors. Sensing ranges of nodes are assumed to be of s...

    Manas Kumar Mishra, M. M. Gore in Distributed Computing and Internet Technology (2010)

  9. No Access

    Chapter and Conference Paper

    A New Top-Down Hierarchical Multi-hop Routing Protocol for Wireless Sensor Networks

    This paper proposes a new top-down hierarchical, multi-hop, routing protocol for the wireless sensor networks. The proposed solution is appropriate for random deployment and suitable for different sizes of tar...

    M. P. Singh, M. M. Gore in Distributed Computing and Networking (2008)

  10. No Access

    Chapter and Conference Paper

    Hasslefree: Simplified Access Control Management for XML Documents

    In this article we propose an approach which simplifies the task of DBAs in specifying the access constraints on a XML document. In the proposed methodology, for enforcing a security policy on a XML document, ...

    Ashish Tripathi, M. M. Gore in Distributed Computing and Internet Technology (2007)

  11. No Access

    Chapter and Conference Paper

    Secure Data Management in Reactive Sensor Networks

    A wireless sensor network (WSN), an ad hoc network of resource constrained sensor nodes, has become an attractive option for monitoring applications. The wide use of sensor networks is due to the cheap hardwar...

    L. Chaithanya, M. P. Singh, M. M. Gore in Information Systems Security (2006)

  12. No Access

    Chapter and Conference Paper

    BUSTRAP – An Efficient Travel Planner for Metropolitans

    In this paper, we are providing a solution for an efficient and up-to-date commuting planner for a public transport system used by masses. Here, we present design and implementation features of a proposed syst...

    Sandeep Gupta, M. M. Gore in Distributed Computing - IWDC 2004 (2005)

  13. No Access

    Chapter and Conference Paper

    An Extension to ER Model for Top-Down Semantic Modeling of Databases of Applications

    An extension to ER (Entity Relationship) model for semantic modeling of databases in top down manner is presented. The model proposes a new entity type called composite entity type and a table based meta construc...

    S. K. Jain, M. M. Gore, Gulab Singh in Intelligent Information Technology (2005)

  14. No Access

    Chapter and Conference Paper

    Path Stability Based Adaptation of MANET Routing Protocols

    This paper proposes adaptation of Mobile Ad-hoc Network (MANET) [13] routing protocols taking stability of links as primary consideration. The presented scheme can be associated with a resource reservation str...

    Sandeep Choudhary, M M Gore, O P Vyas in Distributed Computing - IWDC 2004 (2005)

  15. No Access

    Chapter and Conference Paper

    Team Transaction: A New Transaction Model for Mobile Ad Hoc Networks

    In this paper, we propose a new transaction model, named as Team Transaction for distributed, cooperative computing on mobile ad hoc networks. The proposed model captures the mobility and distributive properties ...

    Ankur Gupta, Nitin Gupta, R K Ghosh in Distributed Computing and Internet Technol… (2005)

  16. No Access

    Article

    Monoclonal antibody raised against envelope glycoprotein peptide neutralizes Japanese encephalitis virus

     Epitopes on envelope glycoprotein of Indian strain of Japanese encephalitis virus were delineated by prediction methods. Monoclonal antibodies (MAb) raised against a putative B cell epitope peptide, reacted w...

    S. Dewasthaly, V. M. Ayachit, S. A. Sarthi, M. M. Gore in Archives of Virology (2001)

  17. No Access

    Chapter

    The Questacon Story

    I might never have got into the interactive science centre industry if it had not been for the infamous American Senator Joe McCarthy.

    M. M. Gore in Science Communication in Theory and Practice (2001)

  18. No Access

    Article

    Interferon (type-α and γ) production by fresh and cryopreserved human mononuclear cells

    A comparative study of interferon (IFN) production (type-α and γ) was carried out using Ficoll-hypaque purified fresh and cryopreserved mononuclear cells from eight normal healthy individuals. Newcastle diseas...

    A. C. Banerjea, N. Kedarnath, M. M. Gore, C. Dayaraj, A. V. Jamkar in Archives of Virology (1981)