Works (4)

Updated: July 5th, 2023 15:05

2022 article

A Reinforcement Approach for Detecting P2P Botnet Communities in Dynamic Communication Graphs

IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC 2022), pp. 56–61.

By: H. Joshi n & R. Dutta n

TL;DR: A reinforcement-based approach is proposed, suitable for large communication graphs, that improves precision and recall of P2P botnet community detection in dynamic communication graphs. (via Semantic Scholar)
Sources: Web Of Science, NC State University Libraries
Added: December 12, 2022

2022 article

The AERPAW Experiment Workflow - Considerations for Designing Usage Models for a Computing-supported Physical Research Platform

IEEE INFOCOM 2022 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS).

By: M. Mushi*, H. Joshi*, R. Dutta*, I. Guvenc*, M. Sichitiu*, B. Floyd*, T. Zajkowski n

author keywords: Wireless; testbed; 5G; NextG; UAV; UAS; drone
TL;DR: The challenges and considerations of designing an experiment workflow that balances the need for guaranteeing safe testbed operation, and providing flexible programmatic access to this unique resource are articulated. (via Semantic Scholar)
Sources: Web Of Science, NC State University Libraries
Added: October 31, 2022

2019 review

Towards a virtual network function research agenda: A systematic literature review of VNF design considerations

[Review of ]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 146.

author keywords: Virtual network functions; Network function virtualization; Future networking
TL;DR: Common themes in future research directions for VNFs include: better ways of managing VNF state information to improve flexibility and agility during load balancing, failover, and life cycle operations, and designing V NFs to enable their transparent migration across central and edge clouds. (via Semantic Scholar)
UN Sustainable Development Goal Categories
Source: Web Of Science
Added: November 25, 2019

2015 conference paper

Impact of software obfuscation on susceptibility to return-oriented programming attacks

2015 36th ieee sarnoff symposium, 161–166.

By: H. Joshi n, A. Dhanasekaran n & R. Dutta n

TL;DR: The hypothesis that some of the most popular obfuscation techniques, including changing the control flow graph and substituting simpler instruction sequences with complex instructions, may make the obfuscated binary more vulnerable to Return-Oriented Programming (ROP) based attacks is investigated. (via Semantic Scholar)
UN Sustainable Development Goal Categories
16. Peace, Justice and Strong Institutions (OpenAlex)
Sources: NC State University Libraries, NC State University Libraries
Added: August 6, 2018

Citation Index includes data from a number of different sources. If you have questions about the sources of data in the Citation Index or need a set of data which is free to re-distribute, please contact us.

Certain data included herein are derived from the Web of Science© and InCites© (2024) of Clarivate Analytics. All rights reserved. You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.