Zum Hauptinhalt springen

Showing 1–36 of 36 results for author: Gupta, B

Searching in archive cs. Search in all archives.
.
  1. arXiv:2407.21053  [pdf

    cs.CL cs.AI

    Knowledge Models for Cancer Clinical Practice Guidelines : Construction, Management and Usage in Question Answering

    Authors: Pralaypati Ta, Bhumika Gupta, Arihant Jain, Sneha Sree C, Keerthi Ram, Mohanasankar Sivaprakasam

    Abstract: An automated knowledge modeling algorithm for Cancer Clinical Practice Guidelines (CPGs) extracts the knowledge contained in the CPG documents and transforms it into a programmatically interactable, easy-to-update structured model with minimal human intervention. The existing automated algorithms have minimal scope and cannot handle the varying complexity of the knowledge content in the CPGs for d… ▽ More

    Submitted 23 July, 2024; originally announced July 2024.

  2. arXiv:2406.14799  [pdf, other

    cs.RO eess.SY

    Capture Point Control in Thruster-Assisted Bipedal Locomotion

    Authors: Shreyansh Pitroda, Aditya Bondada, Kaushik Venkatesh Krishnamurthy, Adarsh Salagame, Chenghao Wang, Taoran Liu, Bibek Gupta, Eric Sihite, Reza Nemovi, Alireza Ramezani, Morteza Gharib

    Abstract: Despite major advancements in control design that are robust to unplanned disturbances, bipedal robots are still susceptible to falling over and struggle to negotiate rough terrains. By utilizing thrusters in our bipedal robot, we can perform additional posture manipulation and expand the modes of locomotion to enhance the robot's stability and ability to negotiate rough and difficult-to-navigate… ▽ More

    Submitted 20 June, 2024; originally announced June 2024.

    Comments: Submitted and to be presented at IEEE AIM 2024. arXiv admin note: substantial text overlap with arXiv:2103.15952

  3. arXiv:2406.13039  [pdf, other

    cs.RO

    Modeling and Controls of Fluid-Structure Interactions (FSI) in Dynamic Morphing Flight

    Authors: Bibek Gupta, Eric Sihite, Alireza Ramezani

    Abstract: The primary aim of this study is to enhance the accuracy of our aerodynamic Fluid-Structure Interaction (FSI) model to support the controlled tracking of 3D flight trajectories by Aerobat, which is a dynamic morphing winged drone. Building upon our previously documented Unsteady Aerodynamic model rooted in horseshoe vortices, we introduce a new iteration of Aerobat, labeled as version beta, which… ▽ More

    Submitted 18 June, 2024; originally announced June 2024.

  4. arXiv:2405.05490  [pdf, other

    cs.RO eess.SY

    Banking Turn of High-DOF Dynamic Morphing Wing Flight by Shifting Structure Response Using Optimization

    Authors: Bibek Gupta, Yogi Shah, Taoran Liu, Eric Sihite, Alireza Ramezani

    Abstract: The 3D flight control of a flapping wing robot is a very challenging problem. The robot stabilizes and controls its pose through the aerodynamic forces acting on the wing membrane which has complex dynamics and it is difficult to develop a control method to interact with such a complex system. Bats, in particular, are capable of performing highly agile aerial maneuvers such as tight banking and bo… ▽ More

    Submitted 8 May, 2024; originally announced May 2024.

  5. arXiv:2308.00183  [pdf, other

    cs.RO eess.SY

    Hovering Control of Flapping Wings in Tandem with Multi-Rotors

    Authors: Aniket Dhole, Bibek Gupta, Adarsh Salagame, Xuejian Niu, Yizhe Xu, Kaushik Venkatesh, Paul Ghanem, Ioannis Mandralis, Eric Sihite, Alireza Ramezani

    Abstract: This work briefly covers our efforts to stabilize the flight dynamics of Northeastern's tailless bat-inspired micro aerial vehicle, Aerobat. Flapping robots are not new. A plethora of examples is mainly dominated by insect-style design paradigms that are passively stable. However, Aerobat, in addition for being tailless, possesses morphing wings that add to the inherent complexity of flight contro… ▽ More

    Submitted 31 July, 2023; originally announced August 2023.

  6. arXiv:2307.10231  [pdf

    cs.AI cs.LG

    Automated Knowledge Modeling for Cancer Clinical Practice Guidelines

    Authors: Pralaypati Ta, Bhumika Gupta, Arihant Jain, Sneha Sree C, Arunima Sarkar, Keerthi Ram, Mohanasankar Sivaprakasam

    Abstract: Clinical Practice Guidelines (CPGs) for cancer diseases evolve rapidly due to new evidence generated by active research. Currently, CPGs are primarily published in a document format that is ill-suited for managing this developing knowledge. A knowledge model of the guidelines document suitable for programmatic interaction is required. This work proposes an automated method for extraction of knowle… ▽ More

    Submitted 15 July, 2023; originally announced July 2023.

  7. arXiv:2303.09364  [pdf, other

    cs.CL

    Tollywood Emotions: Annotation of Valence-Arousal in Telugu Song Lyrics

    Authors: R Guru Ravi Shanker, B Manikanta Gupta, BV Koushik, Vinoo Alluri

    Abstract: Emotion recognition from a given music track has heavily relied on acoustic features, social tags, and metadata but is seldom focused on lyrics. There are no datasets of Indian language songs that contain both valence and arousal manual ratings of lyrics. We present a new manually annotated dataset of Telugu songs' lyrics collected from Spotify with valence and arousal annotated on a discrete scal… ▽ More

    Submitted 16 March, 2023; originally announced March 2023.

  8. arXiv:2303.06306  [pdf

    cs.LG cs.CR

    Blockchain-based decentralized voting system security Perspective: Safe and secure for digital voting system

    Authors: Jagbeer Singh, Utkarsh Rastogi, Yash Goel, Brijesh Gupta, Utkarsh

    Abstract: This research study focuses primarily on Block-Chain-based voting systems, which facilitate participation in and administration of voting for voters, candidates, and officials. Because we used Block-Chain in the backend, which enables everyone to trace vote fraud, our system is incredibly safe. This paper approach any unique identification the Aadhar Card number or an OTP will be generated then us… ▽ More

    Submitted 10 March, 2023; originally announced March 2023.

  9. arXiv:2302.01049  [pdf, other

    cs.CV

    Paced-Curriculum Distillation with Prediction and Label Uncertainty for Image Segmentation

    Authors: Mobarakol Islam, Lalithkumar Seenivasan, S. P. Sharan, V. K. Viekash, Bhavesh Gupta, Ben Glocker, Hongliang Ren

    Abstract: Purpose: In curriculum learning, the idea is to train on easier samples first and gradually increase the difficulty, while in self-paced learning, a pacing function defines the speed to adapt the training progress. While both methods heavily rely on the ability to score the difficulty of data samples, an optimal scoring function is still under exploration. Methodology: Distillation is a knowledge… ▽ More

    Submitted 2 February, 2023; originally announced February 2023.

    Comments: 15 pages

  10. arXiv:2207.13287  [pdf, other

    cs.LG

    Detecting Concept Drift in the Presence of Sparsity -- A Case Study of Automated Change Risk Assessment System

    Authors: Vishwas Choudhary, Binay Gupta, Anirban Chatterjee, Subhadip Paul, Kunal Banerjee, Vijay Agneeswaran

    Abstract: Missing values, widely called as \textit{sparsity} in literature, is a common characteristic of many real-world datasets. Many imputation methods have been proposed to address this problem of data incompleteness or sparsity. However, the accuracy of a data imputation method for a given feature or a set of features in a dataset is highly dependent on the distribution of the feature values and its c… ▽ More

    Submitted 27 July, 2022; originally announced July 2022.

  11. arXiv:2207.12254  [pdf, other

    cs.RO eess.SY

    A Letter on Progress Made on Husky Carbon: A Legged-Aerial, Multi-modal Platform

    Authors: Adarsh Salagame, Shoghair Manjikian, Chenghao Wang, Kaushik Venkatesh Krishnamurthy, Shreyansh Pitroda, Bibek Gupta, Tobias Jacob, Benjamin Mottis, Eric Sihite, Milad Ramezani, Alireza Ramezani

    Abstract: Animals, such as birds, widely use multi-modal locomotion by combining legged and aerial mobility with dominant inertial effects. The robotic biomimicry of this multi-modal locomotion feat can yield ultra-flexible systems in terms of their ability to negotiate their task spaces. The main objective of this paper is to discuss the challenges in achieving multi-modal locomotion, and to report our pro… ▽ More

    Submitted 25 July, 2022; originally announced July 2022.

    Comments: arXiv admin note: text overlap with arXiv:2104.05834, arXiv:2205.06392

  12. arXiv:2110.03445  [pdf

    cs.CR cs.AI

    PWG-IDS: An Intrusion Detection Model for Solving Class Imbalance in IIoT Networks Using Generative Adversarial Networks

    Authors: Lei Zhang, Shuaimin Jiang, Xiajiong Shen, Brij B. Gupta, Zhihong Tian

    Abstract: With the continuous development of industrial IoT (IIoT) technology, network security is becoming more and more important. And intrusion detection is an important part of its security. However, since the amount of attack traffic is very small compared to normal traffic, this imbalance makes intrusion detection in it very difficult. To address this imbalance, an intrusion detection system called pr… ▽ More

    Submitted 5 October, 2021; originally announced October 2021.

  13. arXiv:2108.07951  [pdf, other

    cs.LG cs.AI

    Look Before You Leap! Designing a Human-Centered AI System for Change Risk Assessment

    Authors: Binay Gupta, Anirban Chatterjee, Harika Matha, Kunal Banerjee, Lalitdutt Parsai, Vijay Agneeswaran

    Abstract: Reducing the number of failures in a production system is one of the most challenging problems in technology driven industries, such as, the online retail industry. To address this challenge, change management has emerged as a promising sub-field in operations that manages and reviews the changes to be deployed in production in a systematic manner. However, it is practically impossible to manually… ▽ More

    Submitted 17 August, 2021; originally announced August 2021.

  14. arXiv:2102.10799  [pdf

    cs.LG

    Clustering Algorithm to Detect Adversaries in Federated Learning

    Authors: Krishna Yadav, B. B Gupta

    Abstract: In recent times, federated machine learning has been very useful in building intelligent intrusion detection systems for IoT devices. As IoT devices are equipped with a security architecture vulnerable to various attacks, these security loopholes may bring a risk during federated training of decentralized IoT devices. Adversaries can take control over these IoT devices and inject false gradients t… ▽ More

    Submitted 22 February, 2021; originally announced February 2021.

    Comments: To appear in 39th IEEE Conference on Consumer Electronics(Jan 11-13 2021 )

  15. arXiv:2009.00236  [pdf, other

    cs.LG stat.ML

    A Survey of Deep Active Learning

    Authors: Pengzhen Ren, Yun Xiao, Xiaojun Chang, Po-Yao Huang, Zhihui Li, Brij B. Gupta, Xiaojiang Chen, Xin Wang

    Abstract: Active learning (AL) attempts to maximize the performance gain of the model by marking the fewest samples. Deep learning (DL) is greedy for data and requires a large amount of data supply to optimize massive parameters, so that the model learns how to extract high-quality features. In recent years, due to the rapid development of internet technology, we are in an era of information torrents and we… ▽ More

    Submitted 5 December, 2021; v1 submitted 30 August, 2020; originally announced September 2020.

  16. arXiv:2005.09526  [pdf, other

    eess.SP cs.AR cs.LG cs.NE

    In-memory Implementation of On-chip Trainable and Scalable ANN for AI/ML Applications

    Authors: Abhash Kumar, Jawar Singh, Sai Manohar Beeraka, Bharat Gupta

    Abstract: Traditional von Neumann architecture based processors become inefficient in terms of energy and throughput as they involve separate processing and memory units, also known as~\textit{memory wall}. The memory wall problem is further exacerbated when massive parallelism and frequent data movement are required between processing and memory units for real-time implementation of artificial neural netwo… ▽ More

    Submitted 19 May, 2020; originally announced May 2020.

  17. arXiv:2005.05304  [pdf, other

    cs.CR cs.LG stat.ML

    Cloud-based Federated Boosting for Mobile Crowdsensing

    Authors: Zhuzhu Wang, Yilong Yang, Yang Liu, Ximeng Liu, Brij B. Gupta, Jianfeng Ma

    Abstract: The application of federated extreme gradient boosting to mobile crowdsensing apps brings several benefits, in particular high performance on efficiency and classification. However, it also brings a new challenge for data and model privacy protection. Besides it being vulnerable to Generative Adversarial Network (GAN) based user data reconstruction attack, there is not the existing architecture th… ▽ More

    Submitted 9 May, 2020; originally announced May 2020.

    Comments: 17 pages, 7 figures. arXiv admin note: substantial text overlap with arXiv:1907.10218

  18. arXiv:1710.09077  [pdf, other

    cs.CV cs.CY

    Crop Planning using Stochastic Visual Optimization

    Authors: Gunjan Sehgal, Bindu Gupta, Kaushal Paneri, Karamjit Singh, Geetika Sharma, Gautam Shroff

    Abstract: As the world population increases and arable land decreases, it becomes vital to improve the productivity of the agricultural land available. Given the weather and soil properties, farmers need to take critical decisions such as which seed variety to plant and in what proportion, in order to maximize productivity. These decisions are irreversible and any unusual behavior of external factors, such… ▽ More

    Submitted 25 October, 2017; originally announced October 2017.

    Comments: 5 pages

  19. arXiv:1705.09819  [pdf

    cs.CR

    Defending against Phishing Attacks: Taxonomy of Methods, Current Issues and Future Directions

    Authors: B. B. Gupta, Nalin Asanka Gamagedara Arachchilage, Konstantinos E. Psannis

    Abstract: Internet technology is so pervasive today, for example, from online social networking to online banking, it has made people's lives more comfortable. Due the growth of Internet technology, security threats to systems and networks are relentlessly inventive. One such a serious threat is "phishing", in which, attackers attempt to steal the user's credentials using fake emails or websites or both. It… ▽ More

    Submitted 27 May, 2017; originally announced May 2017.

    Comments: 32, Telecommunication Systems, Springer, 2017

  20. arXiv:1705.03405  [pdf, ps, other

    physics.soc-ph cs.MA cs.SI

    A complex network analysis of ethnic conflicts and human rights violations

    Authors: Kiran Sharma, Gunjan Sehgal, Bindu Gupta, Geetika Sharma, Arnab Chatterjee, Anirban Chakraborti, Gautam Shroff

    Abstract: News reports in media contain records of a wide range of socio-economic and political events in time. Using a publicly available, large digital database of news records, and aggregating them over time, we study the network of ethnic conflicts and human rights violations. Complex network analyses of the events and the involved actors provide important insights on the engaging actors, groups, establ… ▽ More

    Submitted 21 July, 2017; v1 submitted 9 May, 2017; originally announced May 2017.

    Comments: 16 pages; main paper + Supplementary Information file; accepted for publication in Scientific Reports

    Journal ref: Scientific Reports 7 (2017) 8283

  21. arXiv:1701.03229  [pdf

    cs.CR

    Security Strength Indicator in Fallback Authentication: Nudging Users for Better Answers in Secret Questions

    Authors: Awanthika Senarath, Nalin Asanka Gamagedara Arachchilage, B. B. Gupta

    Abstract: In this paper, we describe ongoing work that focuses on improving the strength of the answers to security questions. The ultimate goal of the proposed research is to evaluate the possibility of nudging users towards strong answers for ubiquitous security questions. In this research we are proposing a user interface design for fallback authentication to encourage users to design stronger answers. T… ▽ More

    Submitted 11 January, 2017; originally announced January 2017.

    Comments: 5 pages in International Journal for Infonomics (IJI), 2016

  22. arXiv:1611.05556  [pdf, ps, other

    cs.NI

    Throughput of TCP over Cognitive Radio Channels

    Authors: Sudheer Poojary, Akash Agrawal, Bhoomika Gupta, Archana Bura, Vinod Sharma

    Abstract: In this paper, we study the performance of a TCP connection over cognitive radio networks. In these networks, the network may not always be available for transmission. Also, the packets can be lost due to wireless channel impairments. We evaluate the throughput and packet retransmission timeout probability of a secondary TCP connection over an ON/OFF channel. We first assume that the ON and OFF ti… ▽ More

    Submitted 16 November, 2016; originally announced November 2016.

  23. arXiv:1606.04929  [pdf, ps, other

    cs.HC

    Designing a Human-Machine Hybrid Computing System for Unstructured Data Analytics

    Authors: Koushik Sinha, Geetha Manjunath, Bidyut Gupta, Shahram Rahimi

    Abstract: Current machine algorithms for analysis of unstructured data typically show low accuracies due to the need for human-like intelligence. Conversely, though humans are much better than machine algorithms on analyzing unstructured data, they are unpredictable, slower and can be erroneous or even malicious as computing agents. Therefore, a hybrid platform that can intelligently orchestrate machine and… ▽ More

    Submitted 15 June, 2016; originally announced June 2016.

    Comments: conference pre-print version in Proc. 31st Intl. Conf. on Computers and Their Applications (CATA), Las Vegas, USA, April 4-6, 2016

  24. arXiv:1606.04928  [pdf

    cs.NI

    Locality based Core Selection for Multicore Shared Tree Multicasting

    Authors: Koushik Sinha, Bidyut Gupta, Shahram Rahimi, Ashraf Alyanbaawi

    Abstract: Multicasting can be done in two different ways: source based tree approach and shared tree approach. Protocols such as Core Based Tree (CBT), Protocol Independent Multicasting Sparse Mode (PIM-SM) use shared tree approach. Shared tree approach is preferred over source-based tree approach because in the later construction of minimum cost tree per source is needed unlike a single shared tree in the… ▽ More

    Submitted 15 June, 2016; originally announced June 2016.

    Comments: Conference pre-print version in Proc. 31st Intl. Conf. on Computers and Their Applications (CATA), Las Vegas, USA, April 4-6, 2016

  25. arXiv:1602.02148  [pdf, other

    cs.CR

    A replay-attack resistant message authentication scheme using time-based keying hash functions and unique message identifiers

    Authors: Boudhayan Gupta

    Abstract: Hash-based message authentication codes are an extremely simple yet hugely effective construction for producing keyed message digests using shared secrets. HMACs have seen widespread use as ad-hoc digital signatures in many Internet applications. While messages signed with an HMAC are secure against sender impersonation and tampering in transit, if used alone they are susceptible to replay attacks… ▽ More

    Submitted 5 February, 2016; originally announced February 2016.

  26. arXiv:1401.8131  [pdf

    cs.DC cs.NI

    Failure Detection and Recovery in Hierarchical Network Using FTN Approach

    Authors: Bhagvan Krishna Gupta, Ankit Mundra, Nitin Rakesh

    Abstract: In current scenario several commercial and social organizations are using computer networks for their business and management purposes. In order to meet the business requirements networks are also grow. The growth of network also promotes the handling capability of large networks because it counter raises the possibilities of various faults in the network. A fault in network degrades its performan… ▽ More

    Submitted 31 January, 2014; originally announced January 2014.

    Comments: 8 pages, 7 figure. International Journal of Computer Science Issues, 2013

  27. arXiv:1304.7073  [pdf

    cs.CR

    Enhanced CBF Packet Filtering Method to Detect DDoS Attack in Cloud Computing Environment

    Authors: Priyanka Negi, Anupama Mishra, B. B. Gupta

    Abstract: Tremendous and extraordinary growths in the field of internet, intranet, extranet and its users have developed an innovative era of great global competition and contention. Denial of service attack by multiple nodes is accomplished of disturbing the services of rival servers. The attack can be for multiple reasons. So it is a major threat for cloud environment. Due to low effectiveness and large s… ▽ More

    Submitted 26 April, 2013; originally announced April 2013.

  28. Validated Real Time Middle Ware For Distributed Cyber Physical Systems Using HMM

    Authors: Ankit Mundra, Bhagvan K. Gupta, Geetanjali Rathee, Meenu Chawla, Nitin Rakesh, Vipin Tyagi

    Abstract: Distributed Cyber Physical Systems designed for different scenario must be capable enough to perform in an efficient manner in every situation. Earlier approaches, such as CORBA, has performed but with different time constraints. Therefore, there was the need to design reconfigurable, robust, validated and consistent real time middle ware systems with end-to-end timing. In the DCPS-HMM we have pro… ▽ More

    Submitted 11 April, 2013; originally announced April 2013.

    Comments: 11 Pages, 4 figures

    Journal ref: International Journal of Distributed and Parallel Systems (IJDPS) Vol.4, No.2, March 2013

  29. arXiv:1302.0629  [pdf

    cs.CR

    Phishing Dynamic Evolving Neural Fuzzy Framework for Online Detection Zero-day Phishing Email

    Authors: Ammar ALmomani, B. B. Gupta, Tat-Chee Wan, Altyeb Altaher, Selvakumar Manickam

    Abstract: Phishing is a kind of attack in which criminals use spoofed emails and fraudulent web sites to trick financial organization and customers. Criminals try to lure online users by convincing them to reveal the username, passwords, credit card number and updating account information or fill billing information.

    Submitted 4 February, 2013; originally announced February 2013.

  30. arXiv:1208.3557  [pdf

    cs.CR

    Distributed Denial of Service Prevention Techniques

    Authors: B. B. Gupta, R. C. Joshi, Manoj Misra

    Abstract: The significance of the DDoS problem and the increased occurrence, sophistication and strength of attacks has led to the dawn of numerous prevention mechanisms. Each proposed prevention mechanism has some unique advantages and disadvantages over the others. In this paper, we present a classification of available mechanisms that are proposed in literature on preventing Internet services from possib… ▽ More

    Submitted 17 August, 2012; originally announced August 2012.

    Comments: ISSN: 1793-8198

    Journal ref: International Journal of Computer and Electrical Engineering (IJCEE), vol. 2, number 2, pp. 268-276, 2010

  31. Botnet-based Distributed Denial of Service (DDoS) Attacks on Web Servers: Classification and Art

    Authors: Esraa Alomari, Selvakumar Manickam, B. B. Gupta, Shankar Karuppayah, Rafeef Alfaris

    Abstract: Botnets are prevailing mechanisms for the facilitation of the distributed denial of service (DDoS) attacks on computer networks or applications. Currently, Botnet-based DDoS attacks on the application layer are latest and most problematic trends in network security threats. Botnet-based DDoS attacks on the application layer limits resources, curtails revenue, and yields customer dissatisfaction, a… ▽ More

    Submitted 2 August, 2012; originally announced August 2012.

  32. arXiv:1204.5592  [pdf

    cs.CR

    Dynamic and Auto Responsive Solution for Distributed Denial-of-Service Attacks Detection in ISP Network

    Authors: B. B. Gupta, R. C. Joshi, Manoj Misra

    Abstract: Denial of service (DoS) attacks and more particularly the distributed ones (DDoS) are one of the latest threat and pose a grave danger to users, organizations and infrastructures of the Internet. Several schemes have been proposed on how to detect some of these attacks, but they suffer from a range of problems, some of them being impractical and others not being effective against these attacks. Th… ▽ More

    Submitted 25 April, 2012; originally announced April 2012.

    Comments: arXiv admin note: substantial text overlap with arXiv:1203.2400

    Journal ref: International Journal of Computer Theory and Engineering, Vol. 1, No. 1, April 2009 1793-821X

  33. An Efficient Analytical Solution to Thwart DDoS Attacks in Public Domain

    Authors: B. B. Gupta, R. C. Joshi, Manoj Misra

    Abstract: In this paper, an analytical model for DDoS attacks detection is proposed, in which propagation of abrupt traffic changes inside public domain is monitored to detect a wide range of DDoS attacks. Although, various statistical measures can be used to construct profile of the traffic normally seen in the network to identify anomalies whenever traffic goes out of profile, we have selected volume and… ▽ More

    Submitted 25 April, 2012; originally announced April 2012.

    Comments: arXiv admin note: substantial text overlap with arXiv:1203.2400

    Journal ref: Proceedings of ACM International Conference on Advances in Computer, Communication and Computing (ICAC3-2008), pp. 503-509, Jan. 23-24, 2009,India

  34. arXiv:1203.2400  [pdf

    cs.CR

    An ISP Level Solution to Combat DDoS Attacks using Combined Statistical Based Approach

    Authors: B. B. Gupta, Manoj Misra, R. C. Joshi

    Abstract: Disruption from service caused by DDoS attacks is an immense threat to Internet today. These attacks can disrupt the availability of Internet services completely, by eating either computational or communication resources through sheer volume of packets sent from distributed locations in a coordinated manner or graceful degradation of network performance by sending attack traffic at low rate. In th… ▽ More

    Submitted 12 March, 2012; originally announced March 2012.

    Journal ref: International Journal of Information Assurance and Security (JIAS), vol. 3, no. 2, pp. 102-110, 2008

  35. arXiv:1203.2399  [pdf

    cs.CR

    Estimating strength of DDoS attack using various regression models

    Authors: B. B. Gupta, R. C. Joshi, Manoj Misra

    Abstract: Anomaly-based DDoS detection systems construct profile of the traffic normally seen in the network, and identify anomalies whenever traffic deviate from normal profile beyond a threshold. This extend of deviation is normally not utilised. This paper reports the evaluation results of proposed approach that utilises this extend of deviation from detection threshold to estimate strength of DDoS attac… ▽ More

    Submitted 12 March, 2012; originally announced March 2012.

    Journal ref: Int. J. Multimedia Intelligence and Security, Vol. 1, No. 4, pp.378-391

  36. arXiv:0904.3444  [pdf, ps, other

    cs.IT

    Comment to "Coverage by Randomly Deployed Wireless Sensor Networks"

    Authors: Bhupendra Gupta

    Abstract: It is a correction paper on "P.J. Wan and C.W. Yi, "Coverage by Randomly Deployed Wireless Sensor Networks", IEEE Transaction On Information Theory, vol.52, No.6, June 2006." In the above paper, Lemma (4), on page 2659 play the key role for deriving the main results in the paper. The statement as well as the proof of Lemma (4), page $2659,$ is not correct. We have given the correct version of… ▽ More

    Submitted 22 April, 2009; originally announced April 2009.