default search action
Anupama Mishra
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c8]Anupama Mishra, John Kwok Tai Chui, Brij B. Gupta:
Tempered Image Detection Using ELA and Convolutional Neural Networks. ICCE 2024: 1-3 - 2023
- [j9]Gaurav Singh Negi, Anupama Mishra, Mukul Kumar Gupta, Nitin Kumar Saxena, DilipKumar Jang Bahadur Saini, Kapil Joshi:
Microgrid digital twins: concepts and their controlling through multi-agent systems. Int. J. High Perform. Syst. Archit. 11(4): 225-236 (2023) - [j8]Dilip Kumar Jang Bahadur Saini, Anupama Mishra, Dhirendra Siddharth, Pooja Joshi, Ritika Bansal, Shavi Bansal, Kwok Tai Chui:
Development of Enhanced Chimp Optimization Algorithm (OFCOA) in Cognitive Radio Networks for Energy Management and Resource Allocation. Int. J. Softw. Sci. Comput. Intell. 15(1): 1-20 (2023) - [j7]Anupama Mishra, Neena Gupta, Brij B. Gupta:
Defensive mechanism against DDoS attack based on feature selection and multi-classifier algorithms. Telecommun. Syst. 82(2): 229-244 (2023) - 2022
- [j6]Bineet Kumar Joshi, Bansidhar Joshi, Anupama Mishra, Varsha Arya, Avadhesh Kumar Gupta, Dragan Perakovic:
A Comparative Study of Privacy-Preserving Homomorphic Encryption Techniques in Cloud Computing. Int. J. Cloud Appl. Comput. 12(1): 1-11 (2022) - [j5]Kuldeep Pathoee, Deepesh Rawat, Anupama Mishra, Varsha Arya, Marjan Kuchaki Rafsanjani, Avadhesh Kumar Gupta:
A Cloud-Based Predictive Model for the Detection of Breast Cancer. Int. J. Cloud Appl. Comput. 12(1): 1-12 (2022) - [j4]Deepak Srivastava, Ajay Kumar, Anupama Mishra, Varsha Arya, Ammar Almomani, Ching-Hsien Hsu, Domenico Santaniello:
Performance Optimization of Multi-Hop Routing Protocols With Clustering-Based Hybrid Networking Architecture in Mobile Adhoc Cloud Networks. Int. J. Cloud Appl. Comput. 12(1): 1-15 (2022) - [j3]Ikhlas F. Zamzami, Kuldeep Pathoee, Brij B. Gupta, Anupama Mishra, Deepesh Rawat, Wadee Alhalabi:
Machine learning algorithms for smart and intelligent healthcare system in Society 5.0. Int. J. Intell. Syst. 37(12): 11742-11763 (2022) - [j2]Anupama Mishra, Bineet Kumar Joshi, Varsha Arya, Avadhesh Kumar Gupta, Kwok Tai Chui:
Detection of Distributed Denial of Service (DDoS) Attacks Using Computational Intelligence and Majority Vote-Based Ensemble Approach. Int. J. Softw. Sci. Comput. Intell. 14(1): 1-10 (2022) - [i2]Anupama Mishra:
Prediction Approach against DDoS Attack based on Machine Learning Multiclassfier. CoRR abs/2204.12855 (2022) - 2021
- [j1]Anupama Mishra, Neena Gupta, B. B. Gupta:
Defense mechanisms against DDoS attack based on entropy in SDN-cloud using POX controller. Telecommun. Syst. 77(1): 47-62 (2021) - [c7]Anupama Mishra, Brij B. Gupta, Ching-Hsien Hsu, Kwok Tai Chui:
The early detection of malicious communication with DNS traffic through the use of simple features. GCCE 2021: 291-293 - [c6]Anupama Mishra, Brij B. Gupta, Dragan Perakovic, Francisco José García-Peñalvo, Ching-Hsien Hsu:
Classification Based Machine Learning for Detection of DDoS attack in Cloud Computing. ICCE 2021: 1-4 - [c5]Anupama Mishra, Brij B. Gupta, Dragan Perakovic, Shingo Yamaguchi, Ching-Hsien Hsu:
Entropy based Defensive Mechanism against DDoS Attack in SDN-Cloud enabled Online Social Networks. ICCE 2021: 1-6 - [c4]Anupama Mishra, Brij B. Gupta, Dragan Perakovic, Zhili Zhou:
Defensive Approach using Blockchain Technology against Distributed Denial of Service attacks. SysCom 2021: 8-14 - [c3]Anupama Mishra, Brij B. Gupta, Dragan Perakovic, Francisco José García-Peñalvo:
A Survey on Data mining classification approaches. SysCom 2021: 52-59
2010 – 2019
- 2013
- [i1]Priyanka Negi, Anupama Mishra, Brij B. Gupta:
Enhanced CBF Packet Filtering Method to Detect DDoS Attack in Cloud Computing Environment. CoRR abs/1304.7073 (2013) - 2011
- [c2]Brij B. Gupta, P. K. Agrawal, Anupama Mishra, M. K. Pattanshetti:
On Estimating Strength of a DDoS Attack Using Polynomial Regression Model. ACC (4) 2011: 244-249 - [c1]Anupama Mishra, Brij B. Gupta, Ramesh Chandra Joshi:
A Comparative Study of Distributed Denial of Service Attacks, Intrusion Tolerance and Mitigation Techniques. EISIC 2011: 286-289
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-13 18:01 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint