default search action
Gaurav Somani 0001
Person information
- affiliation: Central University of Rajasthan, Ajmer, India
Other persons with the same name
- Gaurav Somani 0002 — Indian Institute of Technology (BHU) Varanasi, India
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j17]Anmol Kumar, Gaurav Somani, Mayank Agarwal:
Comparing HAProxy Scheduling Algorithms During the DDoS Attacks. IEEE Netw. Lett. 6(2): 139-142 (2024) - 2023
- [j16]Hawa Singh Gurjar, Gaurav Somani:
Amplification/Reflection Attack Suppression Using Victim Separation. IEEE Netw. Lett. 5(2): 140-143 (2023) - [j15]Anmol Kumar, Gaurav Somani:
Service separation assisted DDoS attack mitigation in cloud targets. J. Inf. Secur. Appl. 73: 103435 (2023) - [j14]Anmol Kumar, Gaurav Somani:
DDoS at a Glance: Attack Launch to Solutions. IT Prof. 25(3): 36-42 (2023) - [c17]Anmol Kumar, Gaurav Somani:
On the timing of applying resource separation during DDoS attacks. CCGridW 2023: 147-152 - 2022
- [c16]Gulshan Kumar Singh, Gaurav Somani:
Detecting Cloud Originated DDoS Attacks at the Source Using Out-Cloud Attack Detection (OCAD). ICISS 2022: 169-185 - [c15]Anmol Kumar, Gaurav Somani:
DDoS attack mitigation in cloud targets using scale-inside out assisted container separation. INFOCOM Workshops 2022: 1-6 - 2021
- [j13]Bharat Manral, Gaurav Somani:
Establishing forensics capabilities in the presence of superuser insider threats. Digit. Investig. 38: 301263 (2021) - [j12]Arpita Patidar, Gaurav Somani:
Serving while attacked: DDoS attack effect minimization using page separation and container allocation strategy. J. Inf. Secur. Appl. 59: 102818 (2021) - [c14]Tejpal Kumar, Gaurav Somani:
Origin Information Assisted Hybrid Analysis to Detect APT Malware. ICISS 2021: 75-93 - 2020
- [j11]Bharat Manral, Gaurav Somani, Kim-Kwang Raymond Choo, Mauro Conti, Manoj Singh Gaur:
A Systematic Survey on Cloud Forensics Challenges, Solutions, and Future Directions. ACM Comput. Surv. 52(6): 124:1-124:38 (2020) - [j10]Jyoti Gajrani, Meenakshi Tripathi, Vijay Laxmi, Gaurav Somani, Akka Zemmari, Manoj Singh Gaur:
Vulvet: Vetting of Vulnerabilities in Android Apps to Thwart Exploitation. DTRAP 1(2): 10:1-10:25 (2020) - [j9]Shweta Saharan, Gaurav Somani, Gaurav Gupta, Robin Verma, Manoj Singh Gaur, Rajkumar Buyya:
QuickDedup: Efficient VM deduplication in cloud computing environments. J. Parallel Distributed Comput. 139: 18-31 (2020)
2010 – 2019
- 2019
- [j8]Gaurav Somani, Xinghui Zhao, Satish Narayana Srirama, Rajkumar Buyya:
Integration of Cloud, Internet of Things, and Big Data Analytics. Softw. Pract. Exp. 49(4): 561-564 (2019) - 2018
- [j7]Gaurav Somani, Manoj Singh Gaur, Dheeraj Sanghi, Mauro Conti, Muttukrishnan Rajarajan:
Scale Inside-Out: Rapid Mitigation of Cloud DDoS Attacks. IEEE Trans. Dependable Secur. Comput. 15(6): 959-973 (2018) - 2017
- [j6]Gaurav Somani, Manoj Singh Gaur, Dheeraj Sanghi, Mauro Conti, Rajkumar Buyya:
Service resizing for quick DDoS mitigation in cloud computing environment. Ann. des Télécommunications 72(5-6): 237-252 (2017) - [j5]Gaurav Somani, Manoj Singh Gaur, Dheeraj Sanghi, Mauro Conti, Muttukrishnan Rajarajan:
DDoS victim service containment to minimize the internal collateral damages in cloud computing. Comput. Electr. Eng. 59: 165-179 (2017) - [j4]Gaurav Somani, Manoj Singh Gaur, Dheeraj Sanghi, Mauro Conti, Muttukrishnan Rajarajan, Rajkumar Buyya:
Combating DDoS Attacks in the Cloud: Requirements, Trends, and Future Directions. IEEE Cloud Comput. 4(1): 22-32 (2017) - [j3]Gaurav Somani, Manoj Singh Gaur, Dheeraj Sanghi, Mauro Conti, Rajkumar Buyya:
DDoS attacks in cloud computing: Issues, taxonomy, and future directions. Comput. Commun. 107: 30-48 (2017) - [e1]Sanjay Chaudhary, Gaurav Somani, Rajkumar Buyya:
Research Advances in Cloud Computing. Springer 2017, ISBN 978-981-10-5025-1 [contents] - 2016
- [j2]Gaurav Somani, Manoj Singh Gaur, Dheeraj Sanghi, Mauro Conti:
DDoS attacks in cloud computing: Collateral damage to non-targets. Comput. Networks 109: 157-171 (2016) - [c13]Bhupendra Singh, Ravi Saharan, Gaurav Somani, Gaurav Gupta:
Secure File Deletion for Solid State Drives. IFIP Int. Conf. Digital Forensics 2016: 345-362 - 2015
- [c12]Varun Bhardwaj, Anamika Sharma, Gaurav Somani:
Client-side verifiable accounting in infrastructure cloud. ICACCI 2015: 361-366 - [c11]Gaurav Somani, Abhinav Johri, Mohit Taneja, Utkarsh Pyne, Manoj Singh Gaur, Dheeraj Sanghi:
DARAC: DDoS Mitigation Using DDoS Aware Resource Allocation in Cloud. ICISS 2015: 263-282 - [c10]Gaurav Somani, Manoj Singh Gaur, Dheeraj Sanghi:
DDoS/EDoS attack in cloud: affecting everyone out there! SIN 2015: 169-176 - [i2]Gaurav Somani, Manoj Singh Gaur, Dheeraj Sanghi, Mauro Conti, Rajkumar Buyya:
DDoS Attacks in Cloud Computing: Issues, Taxonomy, and Future Directions. CoRR abs/1512.08187 (2015) - 2014
- [c9]Prabhjeet Kaur, Gaurav Somani:
Secure VM backup and vulnerability removal in infrastructure clouds. ICACCI 2014: 1217-1226 - [c8]Vikas Jaiman, Gaurav Somani:
An Order Preserving Encryption Scheme for Cloud Computing. SIN 2014: 211 - [c7]Bhavna Saini, Gaurav Somani:
Index Page Based EDoS Attacks in Infrastructure Cloud. SNDS 2014: 382-395 - 2013
- [c6]Akshita Malhotra, Gaurav Somani:
VMCloner: A Fast and Flexible Virtual Machine Cloner. CGC 2013: 181-187 - [c5]Pratick Chokhani, Gaurav Somani:
Dynamic resource allocation using auto-negotiation in Haizea. IC3 2013: 232-238 - 2012
- [j1]Amit Nathani, Sanjay Chaudhary, Gaurav Somani:
Policy based resource allocation in IaaS cloud. Future Gener. Comput. Syst. 28(1): 94-103 (2012) - [c4]Dhairya Vora, Sanjay Chaudhary, Minal Bhise, Vikas Kumar, Gaurav Somani:
Allocation of Slotted Deadline Sensitive Leases in Infrastructure Cloud. ICDCIT 2012: 242-252 - [i1]Gaurav Somani, Prateek Khandelwal, Kapil Phatnani:
VUPIC: Virtual Machine Usage Based Placement in IaaS Cloud. CoRR abs/1212.0085 (2012) - 2011
- [c3]Janki Akhani, Sanjay Chaudhary, Gaurav Somani:
Negotiation for resource allocation in IaaS cloud. Bangalore Compute Conf. 2011: 15 - 2010
- [c2]Gaurav Somani, Sanjay Chaudhary:
Load Balancing in Xen Virtual Machine Monitor. IC3 (2) 2010: 62-70
2000 – 2009
- 2009
- [c1]Gaurav Somani, Sanjay Chaudhary:
Application Performance Isolation in Virtualization. IEEE CLOUD 2009: 41-48
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-27 20:30 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint