Publication

Match-Prevention Technique Against Denial-of-Service Attack on Address Resolution and Duplicate Address Detection Processes in IPv6 Link-local Network. ISI IF 4.098 Q1

DHCPv6Auth: a mechanism to improve DHCPv6 (ISI IF 0.7 Q4)PDF

Efficient Route Discovery and Link Failure Detection Mechanisms for Source Routing Protocol in Mobile Ad-hoc Networks (ISI IF 4.098 Q1)PDF

Energy Efficient Multi-Hop Path in Wireless Sensor Networks Using an Enhanced Genetic Algorithm Information Sciences PDF

Authentication and Privacy Approach for DHCPv6 IEEE AccessPDF

Intrusion Detection System Based on Modified Binary Grey Wolf Optimisation Neural Computing and Applications 1–13 (ISI IF 4.6 Q1)PDF

DAD-Match; Security Technique to Prevent Denial of Service Attack on Duplicate Address Detection Process in IPv6 Link-Local Network

Conceptualizing Distrust Model with Balance Theory and Multi-Faceted for Mitigating False Reviews in Location-Based Services (LBS) Symmetry 11(9): 1118. (ISI IF 2.1 Q2)

DoS ATTACK AWARE ENVIROMENT WITH SECURE CLUSTERING AND ROUTING BASED ON RPL PROTOCOL OPERATION IET Circuits, Devices & Systems ISI IF 1.4 Q3

Detection and Defense Mechanisms on Duplicate Address Detection Process in IPv6 Link-Local Network: A Survey on Limitations and Requirements Arabian Journal for Science and Engineering 44(4): 3745–63 (ISI IF 1.5 Q3)

DNS Rule-Based Schema to Botnet Detection. Enterprise Information Systems 1–20 (ISI IF 2.1 Q3)

Anomaly-Based Intrusion Detection System Using Multi-Objective Grey Wolf Optimisation Algorithm. Journal of Ambient Intelligence and Humanized Computing:

“Preventing Denial of Service Attacks on Address Resolution in IPv6 Link-Local Network: AR-Match Security Technique.” In Computational Science and Technology, Springer, Singapore, 305–14.

“Hybridizing Entropy Based Mechanism with Adaptive Threshold Algorithm to Detect RA Flooding Attack in IPv6 Networks.” In Computational Science and Technology, Springer, Singapore, 315–23.

 “A Review of Botnet Detection Approaches Based on DNS Traffic Analysis.” In Intelligent and Interactive Computing, Springer, Singapore, 305–21.

“Propose a New Approach for Securing DHCPv6 Server in IPv6 Link-Local Network”. In Intelligent and Interactive Computing, Springer, Singapore

“Detection Techniques for DDoS Attacks in Cloud Environment.” In Intelligent and Interactive Computing, Springer, Singapore, 337-54.

Review on Security in Bluetooth Low Energy Mesh Network in Correlation with Wireless Mesh Network Security In 2019 IEEE Student Conference on Research and Development (SCOReD)

Overview of IPv6 Based DDoS and DoS Attacks Detection Mechanisms In International Conference on Advances in Cyber Security, 153–67.

Performance Evaluation for Four Supervised Classifiers in Internet Traffic Classification In International Conference on Advances in Cyber Security, 168–81

New Architecture Design of Cloud Computing Using Software-Defined Networking and Network Function Virtualization Technology. In International Conference of Reliable Information and Communication Technology, , 705–13.

Flow-Based IDS for ICMPv6-Based DDoS Attacks Detection Arabian Journal for Science and Engineering

Data Stream management system for video on demand hybrid storage server

markov-modulated bernoulli dynamic gentle random early detection Journal of Theoretical and Applied Information Technology Journal of theoretical and applied information technologyPDF

Variants of the Low Energy Adaptive Clustering Hierarchy Protocol : Survey , Issues and Challenges. Electronics PDF

A Machine Learning Approach to Detect Router Advertisement Flooding Attacks in Next-Generation IPv6 Networks Cognitive Computation PDF

DAD-match : technique to prevent DoS attack on duplicate address detection process in IPv6 link local network PDF

Hybrid Monitoring Technique for Detecting Abnormal Behaviour in RPL-Based Network PDF

A Comprehensive Review on Security Attacks in Dynamic Wireless Sensor Networks based on RPL protocol International Journal of Pure and Applied Mathematicss, Vol.118, pp. 653-667, 2018PDF

Multi-Objective optimization to reconstruct biological networks Biosystems, 174, 22-36. PDF

Performance comparison between progressive mobility prediction using hidden Markov model and multipath transmission control protocol. Journal of Intelligent & Fuzzy Systems (Preprint), 1-10.

Software-Defined Networking Techniques to Improve Mobile Network Connectivity: Technical Review

IoT-based smart waste management system in smart city : Proceedings of the 3rd International Conference of Reliable Information and Communication Technology (IRICT 2018) Proceedings of the 3rd International Conference of Reliable Information and Communication Technology (IRICT 2018), Springer, ISBN 978-3-319-99007-1

Proposed DAD-match Mechanism for Securing Duplicate Address Detection in IPv6 Link-Local Network Based on Symmetric Key Algorithm. Lecture Notes in Electrical Engineering

Labeled Flow-Based dataset of ICMPv6-based DDoS Attacks. Neural Computing and Applications

Performance Investigation of FLRED and AGRED Active Queue Management Methods Proceedings of Academicsera 13 th International Conference, Istanbul, Turkey, 23rd -24th February 2018

Progressive mobility prediction using dual hidden markov model for optimized access point selection Proc International Conferenceon Green and Human Information Technology 2018, pp. 15–20

MediGo: Internet of Things based Telemedicine System,  The International Conference on Big data, IoT, and Cloud Computing (BIC 2018), Jeju, Korea, 20-22 August 2018.

Failover Mechanism During Process Upgrading for Software Defined Networking, 2018 International Conference on Information and Communication Technology (ICOIACT), Yogyakarta, 6-7 March 2018.

A Survey on Quality Of Service Routing Enhancement Techniques in Video Streaming Over Software-Defined Networks. International Conference on Electrical, Electronics, Computers, Communication, Mechanical and Computing (EECCMC), Tamil Nadu, India, 28-29 January 2018.

Machine Learning Approach to Detect Router Advertisement Flooding Attacks in Next-Generation IPv6 Networks.

Rule-based detection technique for ICMPv6 anomalous behaviour: Neural Computing and Applications, 1-10: (ISI IF 2.5)

Genome-wide copy number analysis reveals candidate genelocithat confer susceptibility to high grade prostate cancer. Elsevier : Urologic Oncology. (ISI Impact Factor : 3.767) PDF

ICMPv6-based DoS and DDoS attacks and defense mechanisms. IETE Technical Review, 34(4), 390–407. (ISI IF 1.4 )

Software-Defined Networking Techniques to Improve Mobile Connectivity: Technical Review. IETE Technical Review, 1-13.(ISI  Impact Factor: 1.304) PDF

A Rule-Based Mechanism for Detecting HTTP Denial of Service Attacks During Flash Crowd Event. Advanced Science Letters, 23(6), 5017–6028.

Review of preventive security mechanisms for neighbour discovery protocol. Advanced Science Letters, 23(11). 

Genetic-based Routing Algorithm with Priority Constraints”,  Int. J. Networking and Virtual Organisations, Vol. 17, No. 1, 2017, (Indexed: Scopus) PDF

Improved Mechanism to Prevent Denial of Service Attack in IPv6 Duplicate Address Detection Process. International Journal of Advanced Computer Science and Applications, Vol.8, No.2(2017), pp.63-70, [ISI Indexed]. PDF

Theoretical Framework of Link Stability-based Forwarding Strategy in Vehicular Ad Hoc Networks, International Journal of Networking and Virtual Organisations, Vol. 17, No. 1, 2017, pp 32-45

Statistic Analysis of Video Frame Size Distribution Originating from Scalable Video Codec (SVC), Complexity Vol. 2017, pp. 1-12, Mar 2017. ISSN 1076-2787. [ISI 2015 Impact Factor: 3.514] PDF

Performance Evaluation of Single-Path and Multipath MANETS Routing Protocols For Dense and Sparse Topology, International Journal of Software Engineering and Computer Systems (IJSECS), Vol. 3, Feb. 2017, pp. 31-42. ISSN 2289-8522. PDF

 MESURING THE EFFICENY OF USING HADOOP TO ANALYZE BIG DATA-A CASE STUDY ON TWITTER DATA SET. Journal of Theoretical & Applied Information Technology, 95(12). PDF

A review on features’ robustness in high diversity mobile traffic classifications. International Journal of Communication Networks and Information Security (IJCNIS), 9(2). PDF

Enhanced Mechanism to Detect and Mitigate Economic Denial of Sustainability (EDoS) Attack in Cloud Computing Environments. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 8(9), 51-58.

An Adaptive Assessment and Prediction Mechanism in Network Security Situation Awareness. JCS 13(5): 114-129 (2017)

Evaluation of Phenotype Classification Methods for Obesity Using Direct to Consumer Genetic Data. In International Conference on Intelligent Computing (pp. 350-362). Springer, Cham.

Intelligent IPv6 based iot network monitoring and altering system on Cooja framework. Journal of Fundamental and Applied Sciences, 9(6S), 661-670. PDF

Sensorbuster: On identifying sensor nodes in p2p botnets. In Proceedings of the 12th International Conference on Availability, Reliability and Security (p. 34). ACM. PDF

Intelligent Routing Algorithm using Genetic Algorithm (IRAGA)”, Recent Trends in Information and Communication Technology: Proceedings of the 2nd International Conference of Reliable Information and Communication Technology (IRICT 2017), Springer, Series: Lecture Notes on Data Engineering and Communications Technologies, Vol. 5, ISBN 978-3-319-59426-2 (Indexed : ISI)

On the Design of Video on Demand Server-based Hybrid Storage System”, Recent Trends in Information and Communication Technology: Proceedings of the 2nd International Conference of Reliable Information and Communication Technology (IRICT 2017), Series: Lecture Notes on Data Engineering and Communications Technologies, Vol. 5, ISBN 978-3-319-59426-2 (Indexed : ISI) PDF

IPv6 OS Fingerprinting Methods. In International Visual Informatics Conference (pp. 661–668). PDF

 Internet of Things (IoT) communication protocols. In Information Technology (ICIT), 2017 8th International Conference on (pp. 685–690). PDF

Review on Detection Techniques against DDoS Attacks on a Software-Defined Networking Controller. In Information and Communication Technology (PICICT), 2017 Palestinian International Conference on (pp. 10–16). PDF

A New Set of Features for Detecting Router Advertisement Flooding Attacks. In Proceedings – 2017 Palestinian International Conference on Information and Communication Technology, PICICT 2017. PDF

Optimized access point selection with mobility prediction using hidden Markov Model for wireless network. 2017 Ninth International Conference on Ubiquitous and Future Networks (ICUFN), Milan, 2017, pp. 38-42.

Review of Security Issues in IPv6 Router Discovery. The 4th International Conference on Mathematical Sciences and Computer Engineering (ICMSCE 2017) conference, Langkawi, Malaysia 2017, 4th-5thMay PDF

Timestamp utilization in Trust-ND mechanism for securing Neighbor Discovery Protocol, 2016 14th Annual Conference on Privacy, Security and Trust (PST), Auckland, 2016, pp. 275-281.

Performance Analysis of the Constructive Interference Flooding in Wireless Sensor Networks, 8th International Conference on Information Technology (ICIT 17), Amman, Jordan, 17-19 May 2017

An Optimized Flow Management Mechanism in OpenFlow Network, 31st International Conference on Information Networking (ICOIN 2017), Da Nang, Vietnam, 11-3 January 2017.

Neighbor-Passive Monitoring Technique for Detecting Sinkhole Attacks in RPL Networks. In Proceedings of the 2017 International Conference on Computer Science and Artificial Intelligence (pp. 173–182). New York, NY, USA

Review on mechanisms for detecting sinkhole attacks on RPLs. In Information Technology (ICIT), 2017 8th International Conference on (pp. 369–374).

IPv6 OS Fingerprinting Methods. In International Visual Informatics Conference (pp. 661–668). PDF

Reliable Multicast Disruption Tolerant Networking: Conceptual Implementation Using Message Ferry, Proceedings of the 2017 IEEE Region 10 Conference (TENCON), Kuala Lumpur, Malaysia, 5-8 Nov. 2017, pp. 1817-1822.

I Trust my Zombies: A Trust-enabled Botnet.  arXiv preprint arXiv:1712.03713 

On Event Detection and Tracking Systems in Sensor Networks: Classification of Structure and Mechanisms’, Advanced Science Letters ISSN: 1936-6612, [SCOPUS/ISI Indexed]

Multipath Routing Selection based on Genetic Algorithm, Advanced Science Letters, ISSN: 1936-6612, [SCOPUS/ISI Indexed]

DDoS Attacks in VoIP: A Brief Review of Detection and Mitigation Techniques, International Journal of Advanced and Applied Sciences, ISSN: 2313-626X [ISI/Scopus Indexed] PDF

Communication Protocol for Constructive Interference Flooding in Wireless Sensor Networks, Journal of Theoretical & Applied Information Technology PDF

DOI: DOI

Securing Duplicate Address Detection on IPv6 Using Distributed Trust Mechanism, International Journal of Simulation- Systems, Science and Technology (IJSSST), Vol. 17, No. 2 PDF

Denial of Service Attack in IPv6 Duplicate Address Detection Process: An Impact Analysis on IPv6 Address Autoconfiguration Mechanism. International Journal of Advanced Computer Science and Applications(2016) (ISI Indexed) ISSN: 2156-5570 Vol.7, No.6 IJACSA (2016), pp.232-238. PDF

“A Study of Smart Home Environment and its security threats. International Journal of Reliability, Quality and Safety Engineering, ISSN: 1793-6446. Vol.23, No. 3(2016), pp.1-9. 

Novel Mechanism to Prevent Denial of Service Attacks in IPv6 Duplicate Address Detection Process. SERSC International Journal of Security and Its Applications (2016) (Scopus Indexed) ISSN: 1738-9976 IJSIA Vol.10, No.4 (2016), pp.143-154. PDF

DOI: -

Significance of Duplicate Address Detection Mechanism in IPv6 and its Security Issues: A Survey. Indian Journal of Science and Technology (2015) (Q1 Scopus Indexed) ISSN: 0974-6846 INDJST,pp.1-8, November 2015. PDF

ICMPv6-Based DoS and DDoS Attacks and Defense Mechanisms: Review. IETE Technical Review, 1-18. (ISI  Impact Factor: 1.304) PDF

NADTW: new approach for detecting TCP worm. Neural Computing and Applications, 1-14.  (ISI- IF: 1.49)

 A Reference Dataset for ICMPv6 Flooding Attacks. Journal of Engineering and Applied Sciences, 11(3), 476-481.  (Scopus) PDF

QRphish: An Automated QR Code Phishing Detection Approach. Journal of Engineering and Applied Sciences, 11(3), 553-560. (Scopus) PDF

Performance Characterization of ROHC for Satellite-based Unidirectional Links Using Error-Free Channels, Journal of Theoretical & Applied Information Technology, [Scopus Index] PDF

A Preliminary Performance Evaluation of K-means, KNN and EM Unsupervised Machine Learning Methods for Network Flow Classification. International Journal of Electrical and Computer Engineering (IJECE), 6(2), 778-784. (Scopus)

Message Passing Based Time Synchronization in Wireless Sensor Network: A Survey, International Journal of Distributed Sensor Networks, Volume 2016 (2016), Article ID 1280904, pp. 1-21. ISSN 1550-1329 

Efficient Approximated Q-Function Form for Error Probability over Rayleigh Fading Channels, Wireless Personal Communication, Springer US, Vol 89, No.2, PP: 467-478, ISSN: 0929-6212 [ISI Index] [Impact Factor 0.701]

A Novel Adaptive Grey Verhulst Model for Network Security Situation Prediction. International Journal of Advanced Computer Science and Applications, 7(1): 90-95, 2016. [ISI Indexed] PDF

Mathematical Modeling of Optimal Node Deployment for Indoor Wireless Sensor Networks, International Journal of Electrical and Computer Engineering (IJECE), ISSN: 2088-8708, Scopus Indexed Journal, 201 PDF

Review of Security Vulnerabilities in the IPv6 Neighbor Discovery Protocol, Information Science and Applications (ICISA) 2016 (pp. 603-612): Springer Singapore. PDF

A Performance Study of Hidden Markov Model and Random Forest in Internet Traffic Classification Information Science and Applications (ICISA) 2016 (pp. 319-329): Springer Singapore. PDF

A Survey of Botnet-Based DDoS Flooding Attacks of Application Layer: Detection and Mitigation Approaches Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security (pp. 52-79): IGI Global. PDF

Topology-Aware Mechanism to Improve Routing in Mobile Ad Hoc Networks, Advances in Machine Learning and Signal Processing: Proceedings of MALSIP 2015, Springer International Publishing, pp: 13-24, ISBN: 978-3-319-32213-1

Detecting Neighbor Discovery Protocol-Based Flooding Attack Using Machine Learning Techniques, Advances in Machine Learning and Signal Processing: Proceedings of MALSIP 2015, Springer International Publishing, pp: 129-139, ISBN: 978-3-319-32213-1

“Empirical Testing of Prototype Real-Time Multi-hop MAC for Wireless Sensor Networks,” Proceedings of the 6th IEEE International Conference on Control Systems, Computing and Engineering (ICCSCE 2016), Penang, Malaysia, 25-27 Nov. 2016, pp. 10-15.

“An Overview of DDoS attacks based on DNS”, The 7th International Conference on ICT Convergence (ICTC 2016), October 19-21 2016, Jeju Island, South Korea. pdf

“Analytical Modelling of Communication Overhearing for Route Failure Recovery in Mobile Ad Hoc Networks”, 56th International Conference on Innovative Engineering Technologies (ICIET), 6th-7th June 2016, Sydney, Australia. pages 1-6. pdf

Acoustic Echo Cancellation Technique for VoIP. In Advances in Signal Processing and Intelligent Recognition Systems (pp. 335-344). Springer International Publishing.

Comparative performance analysis of classification algorithms for intrusion detection system. In Privacy, Security and Trust (PST), 2016 14th Annual Conference on (pp. 282-288). IEEE.

“Integrated Framework to Detect and Mitigate Denial of Service (DoS) Attacks on Duplicate Address Detection Process in IPv6 Link Local Communication.”SERSC International Journal of Security and Its Applications (2015) (Indexed Scopus) ISSN: 1738-9976 IJSIA Vol.9, No.11 (2015), pp.77-86 pdf

DOI: DOI

BADUW: Behavioural based Approach for Detecting UDP Worm. Indian Journal of Science and Technology, 8(35).  (ISI) PDF

“An Intelligent ICMPv6 DDoS Flooding Attack Detection Framework (v6IIDS) Using Back-propagation Neural Network”. IETE Technical Review, 2015, (ISI, IF :0.925)

“Significance of Duplicate Address Detection Mechanism in IPv6 and its Security Issues: A Survey. Indian Journal of Science and Technology (2015) (Indexed ISI) ISSN: 0974-5645 INDJST Vol. 8(30), DOI: IPL0846, pp.1-8, November 2015. pdf

“A survey of botnet detection based on DNS”, Neural Computing and Applications (2015), Springer London, Page: 1-18, ISSN: 1433-3058 [ISI Index] [IF: 1.569] pdf

“An extended discrete autoregressive model for variable bit rate video traffic encoded by scalable video codec”, International Journal of Communication Systems, John Wiley & Sons. ISSN: 1099-1131 [ISI Index] [IF: 1.106] pdf

“Review of Acoustic Echo Cancellation Techniques for Voice Over IP”. Journal of Theoretical & Applied Information Technology, Vol. 77. No. 1, ISSN: 1992-8645 [Indexed Scopus] pdf

A Proposed Framework for Outsourcing and Secure Encrypted Data on OpenStack Object Storage (Swift), Journal of Computer Science, Volume 11 No 3, pp: 590.597 ISSN:  1549-3636 [Scopus Indexed] pdf

“Improvement of Address Resolution Security in IPv6 Local Network using Trust-ND”, TELKOMNIKA Indonesian Journal of Electrical Engineering, Volume 13, Number 1, pp. 195-202, ISSN: 2302-4046 [Indexed Ei] pdf

Congestion-aware TCP-friendly system for multimedia transmission based on UDP, Cluster Computing: Volume 18, Issue 2 (2015), Springer US, Page 693-705. ISI Indexed [IF:0.949] pdf

 A Survey on Analytical Modeling and Mitigation Techniques for the Energy Hole Problem in Corona-Based Wireless Sensor Network, Wireless Personal Communications, Volume 81, Number 1, pp. 161-187, ISSN: 0929-6212, Springer US [Impact Factor 0.979] [ISI Index]

Critical Review of Economical Denial of Sustainability (EDoS) Mitigation, Journal of Computer Science (Scopus Index) pdf

“Network Security Situation Assessment: A Review and Discussion”, Information Science and Applications, Lecture Notes in Electrical Engineering, Springer Berlin Heidelberg, Volume 339, 2015 pp: 407-414, ISBN: 978-3-662-46577-6 pdf

DOI: doi

Operational Analysis of Interarrival Rate-based Queuing Management Mechanism for High-speed Networks.” In Information Science and Applications, pp. 111-124. Springer Berlin Heidelberg, 2015. pdf

A Review and Discussion, Intelligence in the Era of Big Data, Communications in Computer and Information Science, Volume 516, pp: 424-435, 2015, ISBN: 978-3-662-46741-1

Multi-disjoint Routes Mechanism for Source Routing in Mobile Ad-hoc Networks pdf

Feasible Progressive Source Routing-based Strategy for Mobile Ad-hoc Networks 2015 International Conference on Control Theory and Its Application (CNTIA’2015), 15 – 17 December 2015, Melaka, Malaysia.

Topology-aware Mechanism to Improve Routing in Mobile Ad-hoc Networks 2015 International Conference on Machine learning and Signal Processing (MALSIP’2015), 15 – 17 December 2015, Melaka, Malaysia.

DOI: doi

‘On Event Detection and Tracking Systems in Sensor Networks: Classification of Structure and Mechanisms’, 2015 International Conference on Control Theory and Its Application (CNTIA),15 – 17 December 2015, Melaka, Malaysia

DOI: doi

“Multipath Routing Selection based on Genetic Algorithm”, 2015 International Conference on Control Theory and Its Application (CNTIA),15 – 17 December 2015, Melaka, Malaysia. pdf

On the Optimizing of LTE System Performance for SISO and MIMO Modes, IEEE Third International Conference on Artificial Intelligence, Modelling and Simulation, PP 412-416, Kota Kinabalu, Malaysia, Dec 2015.

“Neighbor Discovery Protocol Anomaly Detection using Finite State Machine and Strict Anomaly Detection” The 4th International Conference on Internet Applications, Protocols and Services (NETAPPS2015), 1-3 December 2015, Cyberjaya, Malaysia, pages 251-256 pdf

DOI: doi

“On Connectivity Analysis of Vehicular Ad hoc Networks in Presence of Channel Randomness”, 2015 4th International Conference on Internet Applications, Protocols and Services (NETAPPS2015),1-3 December 2015, Cyberjaya, Malaysia, pages 94-99 pdf

“Density-aware Directional Forwarding Strategy for Vehicular Ad hoc Networks”, 2015 IEEE 12th Malaysia International Conference on Communications (MICC’15),23-25 November 2015, Kuching, Malaysia, pages 129-134. [IEEE/Scopus]

Innovative Route Maintenance Based on Link Failure Prediction for Mobile Ad Hoc Networks, International Telecommunication Networks and Applications Conference (ITNAC) 2015, Sydney, Australia, 18-20 November 2015 ISSN: 978-1-4673-9347-8

“Security Mechanism for IPv6 Address Autoconfiguration”, International Conference on Automation, Cognitive Science, Optics, Micro Electro-Mechanical System, and Information Technology (ICACOMIT 2015), 29-30 October 2015, Bandung, Indonesia, IT-13, ISBN: 978-1-4673-7408-8

“Improving Security of Duplicate Address Detection on IPv6 Local Network in Public Area”, 2015 9th Asia Modelling Symposium (AMS2015), 7-8 September 2015, Kuala Lumpur, Malaysia, pages 123-128

Rule-Based Mechanism to Detect Denial of Service (DoS) Attacks on Duplicate Address Detection Process in IPv6 Link Local Communication”, 4th International Conference on Reliability, Infocom Technologies and Optimization (ICRITO’201 5), Noida, UP, India, 2–4 Sep 2015 ISBN: 978-1-4673-7231-2 pdf

Design and Deployment of OpenStack-SDN based Test-bed for EDoS, 4th International Conference on Reliability, Infocom Technologies and Optimization (ICRITO’201 5) (Trends and Future Directions), Noida, UP, India, 2–4 Sep 2015 ISBN: 978-1-4673-7231-2 pdf

A Survey of Mitigation Techniques Against Economic Denial of Sustainability (EDOS) Attack On Cloud Computing Architecture, 4th International Conference on Reliability, Infocom Technologies and Optimization (ICRITO’201 5) (Trends and Future Directions),  Noida, UP, India, 2–4 Sep 2015 ISBN: 978-1-4673-7231-2 pdf

“Reliable Behavioral Dataset for IPv6 Neighbor Discovery Protocol Investigation,” 5th International Conference on IT Convergence and Security (ICITCS), 2015 , vol., no., pp.1-5, 24-27 Aug. 2015

“Genetic Routing Algorithm based on Adjacencyconstraint Matrix,” International Conference on Software Engineering and Computer Systems (ICSECS’15), IEEE, pp. 207-212, 2015

”Significance of Duplicate Address Detection Mechanism in IPv6 and its Security Issues: A Survey, 4th International Conference on Computer Science and Computational Mathematics (ICCSCM 2015), 7-8 May 2015, Langkawi, Malaysia, ISBN: 978-967-114-14-9-6, Pages:294-299 pdf

”Theoretical Framework of Forwarding Strategy in Vehicular Ad Hoc Networks”. International Workshop on Graph Algorithms (IWGA2015), 13 May 2015, Penang-Malaysia, eISBN : 978-967-394-214-5, Pages. 130– 139

“Efficient Path Selection with Priority Constraints using Genetic Algorithm,” International Workshop on Graph Algorithms (IWGA2015),13 May 2015, eISBN : 978-967-394-214-5, Pages : 231 – 241

T.-C. Conceptual Approach for Routing in Vehicular Ad Hoc Networks 2014 IAES International Conference on Electrical Engineering, Computer Science and Informatics (EECSI 2014), Yogyakarta, Indonesia, 2014, pp.172-177.

Dynamic Queue Velocity-based Probability Function for Congestion Avoidance in High-speed Networks,” 2015 IEEE International Broadband and Photonics Conference

“Fuzzy Logic Controller of Gentle Random Early Detection Based on Average Queue Length and Delay Rate”,International Journal of Fuzzy Systems, ISSN.1562-2479 [Indexed Scopus] pdf

A New Technique to Improve MCS Conferencing System Bandwidth Utilization. Journal of Convergence Technology 9(4), 1. [Scopus] pdf

Connection Failure Message-based Approach for Detecting Sequential and Random TCP Scanning, Indian Journal of Science and Technology, Vol 7(5), 628–636, ISSN (Print) : 0974-6846, May 2014 [Indexed ISI] pdf

Semi-Fluid content distribution model for fast data dissemination in heterogeneous overlay networks. Peer-to-Peer Networking and Applications 7(2): 159-174 (2014) [Indexed ISI]

ICMPv6 Flood Attack Detection using DENFIS Algorithms, Indian Journal of Science and Technology, Vol 7(2), 168–173, ISSN (Print): 0974-6846, February 2014 [Indexed ISI] pdf

“Relative Velocity-based Forwarding Strategy for Vehicular Ad Hoc Networks”, Information-An International Interdisciplinary Journal, ISSN 1343-4500 [Indexed ISI]

The Existence of IPv4 Attacks in IPv6 : Proof Study, Sylwan Journal [Indexed ISI]

A Survey of Intrusion Alert Correlation and Its Design Considerations, IETE Technical Review, Taylor & Francis, Vol 31, No. 3, May-June 2014 [Indexed ISI] pdf

Based On Icmpv6 Flooding Attack, Journal Of Theoretical And Applied Information Technology, Vol. 64 No.3,  30th June 2014. [Indexed Scopus] pdf

 A Survey on Analytical Modeling and Mitigation Techniques for the Energy Hole Problem in Corona-Based Wireless Sensor Network, Wireless Personal Communications, Springer US, 2014 [Indexed ISI]

A Framework for Analytic Hierarchy Process-Entropy Network Security Situation Assessment and Adaptive Grey Verhulst-Kalman Prediction in Intrusion Prevention System, Australian Journal of Basic and Applied Sciences,  8(14) Special 2014, Pages: 34-39 [Indexed ISI] pdf

Propose approach for UDP random and sequential scanning detection based on the connection failure messages, International Review on Computers and Software (IRECOS) pdf

Review Study on Techniques for Network worm Signatures Automation, Advances in Information Sciences and Service Sciences (AISS), November 2013 [Indexed Scopus] pdf

Review of Cross-layer solution for packet loss, International Journal of Advancements in Computing Technology (IJACT), Vol. 5, No. 10, pp. 88-97, June 2013 [Citation Indexed by SCOPUS]. pdf