Uday Tupakula
Uday Tupakula
Unknown affiliation
Verified email at newcastle.edu.au
TitleCited byYear
Security as a service model for cloud environment
V Varadharajan, U Tupakula
IEEE Transactions on network and Service management 11 (1), 60-75, 2014
Intrusion detection techniques in cloud environment: A survey
P Mishra, ES Pilli, V Varadharajan, U Tupakula
Journal of Network and Computer Applications 77, 18-47, 2017
A practical method to counteract denial of service attacks
UK Tupakula, V Varadharajan
Proceedings of the 26th Australasian computer science conference-Volume 16 …, 2003
Intrusion detection techniques for infrastructure as a service cloud
U Tupakula, V Varadharajan, N Akku
2011 IEEE Ninth International Conference on Dependable, Autonomic and Secure …, 2011
Autoencoder-based feature learning for cyber security applications
M Yousefi-Azar, V Varadharajan, L Hamey, U Tupakula
2017 International joint conference on neural networks (IJCNN), 3854-3861, 2017
Trust and recommendations in mobile ad hoc networks
V Balakrishnan, V Varadharajan, UK Tupakula, P Lucs
International Conference on Networking and Services (ICNS'07), 64-64, 2007
Trust enhanced secure mobile ad-hoc network routing
V Balakrishnan, V Varadharajan, P Lucs, UK Tupakula
21st International Conference on Advanced Information Networking and …, 2007
A detailed investigation and analysis of using machine learning techniques for intrusion detection
P Mishra, V Varadharajan, U Tupakula, ES Pilli
IEEE Communications Surveys & Tutorials 21 (1), 686-728, 2018
Subjective logic based trust model for mobile ad hoc networks
V Balakrishnan, V Varadharajan, U Tupakula
Proceedings of the 4th international conference on Security and privacy in …, 2008
Fellowship: Defense against flooding and packet drop attacks in MANET
V Balakrishnan, V Varadharajan, UK Tupakula
2006 IEEE/IFIP Network Operations and Management Symposium NOMS 2006, 1-4, 2006
Counteracting security attacks in virtual machines in the cloud using property based attestation
V Varadharajan, U Tupakula
Journal of network and computer applications 40, 31-45, 2014
Team: Trust enhanced security architecture for mobile ad-hoc networks
V Balakrishnan, V Varadharajan, U Tupakula, P Lucs
2007 15th IEEE International Conference on Networks, 182-187, 2007
Mitigating flooding attacks in mobile ad-hoc networks supporting anonymous communications
V Balakrishnan, V Varadharajan, U Tupakula, MEG Moe
The 2nd International Conference on Wireless Broadband and Ultra Wideband …, 2007
Trust management in mobile ad hoc networks
V Balakrishnan, V Varadharajan, U Tupakula
Guide to wireless ad hoc networks, 473-502, 2009
Antivirus security: naked during updates
B Min, V Varadharajan, U Tupakula, M Hitchens
Software: Practice and Experience 44 (10), 1201-1222, 2014
Tvdsec: Trusted virtual domain security
U Tupakula, V Varadharajan
2011 Fourth IEEE International Conference on Utility and Cloud Computing, 57-64, 2011
Trust integrated cooperation architecture for mobile ad-hoc networks
V Balakrishnan, V Varadharajan, U Tupakula, P Lucs
2007 4th International Symposium on Wireless Communication Systems, 592-596, 2007
Tracing DDoS floods: An automated approach
UK Tupakula, V Varadharajan
Journal of Network and Systems Management 12 (1), 111-135, 2004
Mitigating attacks in software defined networks
KK Karmakar, V Varadharajan, U Tupakula
Cluster Computing 22 (4), 1143-1157, 2019
Improved detection of primary user emulation attacks in cognitive radio networks
F Jin, V Varadharajan, U Tupakula
2015 International Telecommunication Networks and Applications Conference …, 2015
The system can't perform the operation now. Try again later.
Articles 1–20