default search action
Neminath Hubballi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j26]Purna Kukadiya, Trapti Jain, Neminath Hubballi:
Reducing the Impact of DoS Attack on Static and Dynamic SE Using a Deep Learning-Based Model. IEEE Trans. Ind. Informatics 20(10): 11644-11654 (2024) - [j25]Shaurya Sood, Neminath Hubballi:
SlowTrack: detecting slow rate Denial of Service attacks against HTTP with behavioral parameters. J. Supercomput. 80(2): 1788-1817 (2024) - [j24]Nisha Kumari Barsha, Neminath Hubballi:
Anomaly Detection in SCADA Systems: A State Transition Modeling. IEEE Trans. Netw. Serv. Manag. 21(3): 3511-3521 (2024) - [c40]Neminath Hubballi, Nisha Kumari Barsha:
Mitigating Resource Depletion and Message Sequencing Attacks in SCADA Systems. AINA (3) 2024: 37-47 - [c39]Neminath Hubballi, Pankaj Chaudhary, Sameer G. Kulkarni:
PePC: Popularity Based Early Predictive Caching in Named Data Networks. CCNC 2024: 478-483 - [c38]Nisha Kumari Barsha, Neminath Hubballi:
Detecting Cyber Attacks in Smart-Grid Networks with Probability Distribution Comparison. CCNC 2024: 648-649 - [c37]Neminath Hubballi, Pankaj Chaudhary:
CPCache: Cooperative Popularity based Caching for Named Data Networks. ICOIN 2024: 379-384 - 2023
- [j23]Pankaj Chaudhary, Neminath Hubballi, Sameer G. Kulkarni:
eNCache: Improving content delivery with cooperative caching in Named Data Networking. Comput. Networks 237: 110104 (2023) - [j22]Namrata Tiwari, Neminath Hubballi:
Secure Socket Shell Bruteforce Attack Detection With Petri Net Modeling. IEEE Trans. Netw. Serv. Manag. 20(1): 697-710 (2023) - [c36]Neminath Hubballi, Yogendra Singh, Dipin Garg:
XSSMitigate: Deep Packet Inspection based XSS Attack Quarantine in Software Defined Networks. ICCE 2023: 1-6 - 2022
- [j21]Neminath Hubballi, Pratibha Khandait:
KeyClass: Efficient keyword matching for network traffic classification. Comput. Commun. 185: 79-91 (2022) - [j20]Nikhil Tripathi, Neminath Hubballi:
Application Layer Denial-of-Service Attacks and Defense Mechanisms: A Survey. ACM Comput. Surv. 54(4): 86:1-86:33 (2022) - [c35]Neminath Hubballi, Kanishk Patel:
WiP: Control Plane Saturation Attack Mitigation in Software Defined Networks. ICISS 2022: 235-246 - [c34]Aniket Sangwan, Sarthak Jain, Neminath Hubballi:
WiP: EventTracker-Event Driven Evidence Collection for Digital Forensics. ICISS 2022: 247-259 - [c33]Shaurya Sood, Pritesh Palod, Neminath Hubballi:
WiP: Characterizing the Impact of Multiplexed DoS Attacks on HTTP and Detection. ICISS 2022: 260-271 - 2021
- [j19]Nikhil Tripathi, Neminath Hubballi:
Preventing time synchronization in NTP broadcast mode. Comput. Secur. 102: 102135 (2021) - [j18]Pratibha Khandait, Neminath Hubballi, Bodhisatwa Mazumdar:
IoTHunter: IoT network traffic classification using device specific keywords. IET Networks 10(2): 59-75 (2021) - [j17]Umar Aalam, Bodhisatwa Mazumdar, Neminath Hubballi:
mMIG: Inversion optimization in majority inverter graph with minority operations. Integr. 81: 195-210 (2021) - [c32]Pratibha Khandait, Namrata Tiwari, Neminath Hubballi:
Who is Trying to Compromise Your SSH Server ? An Analysis of Authentication Logs and Detection of Bruteforce Attacks. ICDCN (Adjunct Volume) 2021: 127-132 - [c31]Shaurya Sood, Manash Saikia, Neminath Hubballi:
WiP: Slow Rate HTTP Attack Detection with Behavioral Parameters. ICISS 2021: 26-37 - 2020
- [j16]Anuja Tayal, Neha Sharma, Neminath Hubballi, Maitreya Natu:
Traffic Dynamics-Aware Probe Selection for Fault Detection in Networks. J. Netw. Syst. Manag. 28(4): 1055-1084 (2020) - [j15]Anuja Tayal, Neha Sharma, Neminath Hubballi, Maitreya Natu:
Correction to: Traffic Dynamics-Aware Probe Selection for Fault Detection in Networks. J. Netw. Syst. Manag. 28(4): 1085 (2020) - [j14]Neminath Hubballi, Mayank Swarnkar, Mauro Conti:
BitProb: Probabilistic Bit Signatures for Accurate Application Identification. IEEE Trans. Netw. Serv. Manag. 17(3): 1730-1741 (2020) - [c30]Amit Kumar Meena, Neminath Hubballi, Yogendra Singh, Vimal Bhatia, Katrin Franke:
Network Security Systems Log Analysis for Trends and Insights: A Case Study. IEEE ANTS 2020: 1-6 - [c29]Pratibha Khandait, Neminath Hubballi, Katrin Franke:
POSTER: Towards Automating Detection of Anomalous HTTP Requests with Joint Probability Estimation of Characters. AsiaCCS 2020: 889-891 - [c28]Neminath Hubballi, Namrata Tiwari, Pratibha Khandait:
POSTER: Distributed SSH Bruteforce Attack Detection with Flow Content Similarity and Login Failure Reputation. AsiaCCS 2020: 916-918 - [c27]Pratibha Khandait, Neminath Hubballi, Bodhisatwa Mazumdar:
Efficient Keyword Matching for Deep Packet Inspection based Network Traffic Classification. COMSNETS 2020: 567-570 - [c26]Amit Kumar Meena, Neminath Hubballi:
NViZ: An Interactive Visualization of Network Security Systems Logs. COMSNETS 2020: 685-687 - [i1]Nikhil Tripathi, Neminath Hubballi:
Preventing Time Synchronization in NTP's Broadcast Mode. CoRR abs/2005.01783 (2020)
2010 – 2019
- 2019
- [j13]Mayank Swarnkar, Neminath Hubballi:
SpamDetector : Detecting spam callers in Voice over Internet Protocol with graph anomalies. Secur. Priv. 2(1) (2019) - [c25]Vinti Agarwal, Neminath Hubballi, Ambika Shrestha Chitrakar, Katrin Franke:
Identifying Anomalous HTTP Traffic with Association Rule Mining. ANTS 2019: 1-6 - [c24]Neminath Hubballi, Amey Kiran Patel, Amit Kumar Meena, Nikhil Tripathi:
Cloud Security Service Level Agreements: Representation and Measurement. INFOCOM Workshops 2019: 145-150 - 2018
- [j12]Nikhil Tripathi, Neminath Hubballi:
Slow rate denial of service attacks against HTTP/2 and detection. Comput. Secur. 72: 255-272 (2018) - [j11]Mayank Swarnkar, Neminath Hubballi:
RDClass: on using relative distance of keywords for accurate network traffic classification. IET Networks 7(4): 273-279 (2018) - [j10]Neminath Hubballi, Jonathan Santini:
Detecting TCP ACK storm attack: a state transition modelling approach. IET Networks 7(6): 429-434 (2018) - [j9]Neminath Hubballi, Mayank Swarnkar:
BitCoding: Network Traffic Classification Through Encoded Bit Level Signatures. IEEE/ACM Trans. Netw. 26(5): 2334-2346 (2018) - [j8]Nikhil Tripathi, Neminath Hubballi:
Detecting stealth DHCP starvation attack using machine learning approach. J. Comput. Virol. Hacking Tech. 14(3): 233-244 (2018) - [c23]Mayank Swarnkar, Neminath Hubballi, Nikhil Tripathi, Mauro Conti:
AppHunter: Mobile Application Traffic Classification. ANTS 2018: 1-6 - [c22]Anuja Tayal, Neminath Hubballi, Maitreya Natu, Vaishali P. Sadaphal:
Congestion-aware probe selection for fault detection in networks. COMSNETS 2018: 407-409 - 2017
- [j7]Neminath Hubballi, Nikhil Tripathi:
A closer look into DHCP starvation attack in wireless networks. Comput. Secur. 65: 387-404 (2017) - [j6]Neminath Hubballi, Nikhil Tripathi:
An event based technique for detecting spoofed IP packets. J. Inf. Secur. Appl. 35: 32-43 (2017) - [j5]Diksha Golait, Neminath Hubballi:
Detecting Anomalous Behavior in VoIP Systems: A Discrete Event System Modeling. IEEE Trans. Inf. Forensics Secur. 12(3): 730-745 (2017) - [c21]Himanshu Dogra, Sudhakar Verma, Neminath Hubballi, Mayank Swarnkar:
Security service level agreement measurement in cloud: A proof of concept implementation. ANTS 2017: 1-6 - [c20]Anuja Tayal, Neminath Hubballi, Nikhil Tripathi:
Communication recurrence and similarity detection in network flows. ANTS 2017: 1-6 - [c19]Nikhil Tripathi, Mayank Swarnkar, Neminath Hubballi:
DNS spoofing in local networks made easy. ANTS 2017: 1-6 - [c18]Neminath Hubballi, Mayank Swarnkar:
BitCoding: Protocol Type Agnostic Robust Bit Level Signatures for Traffic Classification. GLOBECOM 2017: 1-6 - 2016
- [j4]Mayank Swarnkar, Neminath Hubballi:
OCPAD: One class Naive Bayes classifier for payload based anomaly detection. Expert Syst. Appl. 64: 330-339 (2016) - [c17]Nikhil Tripathi, Neminath Hubballi:
A probabilistic anomaly detection scheme to detect DHCP starvation attacks. ANTS 2016: 1-6 - [c16]Sainath Batthala, Mayank Swarnkar, Neminath Hubballi, Maitreya Natu:
VoIP Profiler: Profiling Voice over IP User Communication Behavior. ARES 2016: 312-320 - [c15]Nikhil Tripathi, Neminath Hubballi, Yogendra Singh:
How Secure are Web Servers? An Empirical Study of Slow HTTP DoS Attacks and Detection. ARES 2016: 454-463 - [c14]Neminath Hubballi, Himanshu Dogra:
Detecting Packed Executable File: Supervised or Anomaly Detection Method? ARES 2016: 638-643 - [c13]Sainath Batthala, Neminath Hubballi, Maitreya Natu, Vaishali P. Sadaphal:
If-what analysis to manage batch systems. COMSNETS 2016: 1-2 - 2015
- [c12]Mayank Swarnkar, Neminath Hubballi:
Rangegram: A novel payload based anomaly detection technique against web traffic. IEEE ANTS 2015: 1-6 - [c11]Nikhil Tripathi, Neminath Hubballi:
Exploiting DHCP server-side IP address conflict detection: A DHCP starvation attack. IEEE ANTS 2015: 1-3 - [c10]Sri Yogesh Dorbala, Kishore R., Neminath Hubballi:
An Experience Report on Scalable Implementation of DDoS Attack Detection. CAiSE Workshops 2015: 518-529 - [c9]Jayeeta Datta, Neha Kataria, Neminath Hubballi:
Network traffic classification in encrypted environment: A case study of Google Hangout. NCC 2015: 1-6 - 2014
- [j3]Neminath Hubballi, Vinoth Suryanarayanan:
False alarm minimization techniques in signature-based intrusion detection systems: A survey. Comput. Commun. 49: 1-17 (2014) - 2013
- [j2]Neminath Hubballi, Santosh Biswas, Sukumar Nandi:
Towards reducing false alarms in network intrusion detection systems with data summarization technique. Secur. Commun. Networks 6(3): 275-285 (2013) - [c8]Neminath Hubballi, Deepanshu Goyal:
FlowSummary: Summarizing Network Flows for Communication Periodicity Detection. PReMI 2013: 695-700 - 2012
- [c7]Neminath Hubballi:
Pairgram: Modeling frequency information of lookahead pairs for system call based anomaly detection. COMSNETS 2012: 1-10 - 2011
- [j1]Neminath Hubballi, Santosh Biswas, Sukumar Nandi:
Network specific false alarm reduction in intrusion detection system. Secur. Commun. Networks 4(11): 1339-1349 (2011) - [c6]Ferdous A. Barbhuiya, Santosh Biswas, Neminath Hubballi, Sukumar Nandi:
A host based DES approach for detecting ARP spoofing. CICS 2011: 114-121 - [c5]Neminath Hubballi, Santosh Biswas, Sukumar Nandi:
Sequencegram: n-gram modeling of system calls for program based anomaly detection. COMSNETS 2011: 1-10 - [c4]Neminath Hubballi, Bidyut Kr. Patra, Sukumar Nandi:
NDoT: Nearest Neighbor Distance Based Outlier Detection Technique. PReMI 2011: 36-42 - 2010
- [c3]Neminath Hubballi, Santosh Biswas, Sukumar Nandi:
Layered Higher Order N-grams for Hardening Payload Based Anomaly Intrusion Detection. ARES 2010: 321-326 - [c2]Bidyut Kr. Patra, Neminath Hubballi, Santosh Biswas, Sukumar Nandi:
Distance Based Fast Hierarchical Clustering Method for Large Datasets. RSCTC 2010: 50-59 - [c1]Neminath Hubballi, S. Roopa, Ritesh Ratti, Ferdous A. Barbhuiya, Santosh Biswas, Arijit Sur, Sukumar Nandi, Vivek Ramachandran:
An Active Intrusion Detection System for LAN Specific Attacks. AST/UCMA/ISA/ACN 2010: 129-142
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 21:31 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint