default search action
Priyanka Verma 0001
Person information
- affiliation: University of Limerick, Department of Electronics and Computer Engineering, Castletroy, Limerick, Ireland
- affiliation: University of Galway, Data Science Institute, Ireland
Other persons with the same name
- Priyanka Verma — disambiguation page
- Priyanka Verma 0002 — National Institute of Industrial Engineering, NITIE, Department of Operations and Supply Chain Management, O&SCM, Mumbai, India (and 1 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j12]Sangeeta Sharma, Priyanka Verma, Nitesh Bharot, Amish Ranpariya, Rakesh Porika:
PULSE: Proactive uncovering of latent severe anomalous events in IIoT using LSTM-RF model. Clust. Comput. 27(10): 13749-13762 (2024) - [j11]Priyanka Verma, Nitesh Bharot, John G. Breslin, Mukta Sharma, Nisha Chaurasia, Ankit Vidyarthi:
Uncovering collateral damages and advanced defense strategies in cloud environments against DDoS attacks: A comprehensive review. Trans. Emerg. Telecommun. Technol. 35(4) (2024) - [j10]Nikhil Rathoure, Rajesh Kumar Pateriya, Nitesh Bharot, Priyanka Verma:
Combating deepfakes: a comprehensive multilayer deepfake video detection framework. Multim. Tools Appl. 83(38): 85619-85636 (2024) - [j9]Priyanka Verma, John G. Breslin, Donna O'Shea, Nakul Mehta, Nitesh Bharot, Ankit Vidyarthi:
Leveraging Gametic Heredity in Oversampling Techniques to Handle Class Imbalance for Efficient Cyberthreat Detection in IIoT. IEEE Trans. Consumer Electron. 70(1): 1940-1951 (2024) - [j8]Priyanka Verma, Nitesh Bharot, John G. Breslin, Donna O'Shea, Ankit Vidyarthi, Deepak Gupta:
Zero-Day Guardian: A Dual Model Enabled Federated Learning Framework for Handling Zero-Day Attacks in 5G Enabled IIoT. IEEE Trans. Consumer Electron. 70(1): 3856-3866 (2024) - [j7]Nisha Chaurasia, Munna Ram, Priyanka Verma, Nakul Mehta, Nitesh Bharot:
A federated learning approach to network intrusion detection using residual networks in industrial IoT networks. J. Supercomput. 80(13): 18325-18346 (2024) - [c4]Nitesh Bharot, John G. Breslin, Priyanka Verma:
Revolutionizing Human Activity Recognition in Healthcare: Harnessing Red Deer for Feature Selection and Focal Loss-Based MLP for Classification. SoftCOM 2024: 1-7 - 2023
- [j6]Jefkine Kafunah, Priyanka Verma, Muhammad Intizar Ali, John G. Breslin:
Out-of-Distribution Data Generation for Fault Detection and Diagnosis in Industrial Systems. IEEE Access 11: 135061-135073 (2023) - [c3]Priyanka Verma, John G. Breslin, Donna O'Shea:
PerCFed: An Effective Personalized Clustered Federated Learning Mechanism to Handle non-IID Challenges for Industry 4.0. CloudNet 2023: 299-306 - [c2]Nitesh Bharot, Mirco Soderi, Priyanka Verma, John G. Breslin:
Improving Product Quality Control in Smart Manufacturing through Transfer Learning-Based Fault Detection. SMARTCOMP 2023: 213-215 - [c1]Priyanka Verma, Miguel Ponce de Leon, John G. Breslin, Donna O'Shea:
FedTIU: Securing Virtualized PLCs Against DDoS Attacks Using a Federated Learning Enabled Threat Intelligence Unit. SMARTCOMP 2023: 233-236 - 2022
- [j5]Priyanka Verma, John G. Breslin, Donna O'Shea:
FLDID: Federated Learning Enabled Deep Intrusion Detection in Smart Manufacturing Industries. Sensors 22(22): 8974 (2022) - 2021
- [j4]Priyanka Verma, Shashikala Tapaswi, W. Wilfred Godfrey:
A request aware module using CS-IDR to reduce VM level collateral damages caused by DDoS attack in cloud environment. Clust. Comput. 24(3): 1917-1933 (2021) - [j3]Priyanka Verma, Shashikala Tapaswi, W. Wilfred Godfrey:
An Impact Analysis and Detection of HTTP Flooding Attack in Cloud Using Bio-Inspired Clustering Approach. Int. J. Swarm Intell. Res. 12(1): 29-49 (2021) - [j2]Priyanka Verma, Shashikala Tapaswi, W. Wilfred Godfrey:
A service governance and isolation based approach to mitigate internal collateral damages in cloud caused by DDoS attack. Wirel. Networks 27(4): 2529-2548 (2021) - 2020
- [j1]Priyanka Verma, Shashikala Tapaswi, W. Wilfred Godfrey:
AVDR: A Framework for Migration Policy to Handle DDoS Attacked VM in Cloud. Wirel. Pers. Commun. 115(2): 1335-1361 (2020)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-05 21:41 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint