default search action
Preeti Mishra
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j18]Preeti Mishra, Tanmay Jain, Palak Aggarwal, Gunjan Paul, Brij B. Gupta, Razaz Waheeb Attar, Akshat Gaurav:
CloudIntellMal: An advanced cloud based intelligent malware detection framework to analyze android applications. Comput. Electr. Eng. 119: 109483 (2024) - [j17]Avantika Gaur, Preeti Mishra, Vinod P., Arjun Singh, Vijay Varadharajan, Uday Kiran Tupakula, Mauro Conti:
vDefender: An explainable and introspection-based approach for identifying emerging malware behaviour at hypervisor-layer in virtualization environment. Comput. Electr. Eng. 120: 109742 (2024) - [j16]Arjun Singh, Preeti Mishra, P. Vinod, Avantika Gaur, Mauro Conti:
SFC-NIDS: a sustainable and explainable flow filtering based concept drift-driven security approach for network introspection. Clust. Comput. 27(7): 9757-9782 (2024) - 2023
- [j15]Prithviraj Singh Bisht, Preeti Mishra, Pushpanjali Chauhan, R. C. Joshi:
HyperGuard: on designing out-VM malware analysis approach to detect intrusions from hypervisor in cloud environment. Int. J. Grid Util. Comput. 14(4): 356-367 (2023) - [j14]Garima Garg, Shivam Gupta, Preeti Mishra, Ankit Vidyarthi, Aman Singh, Asmaa Ali:
CROPCARE: An Intelligent Real-Time Sustainable IoT System for Crop Disease Detection Using Mobile Vision. IEEE Internet Things J. 10(4): 2840-2851 (2023) - [c11]Aditya Nautiyal, Shubhangi Saklani, Aditi Pant, Yutika Agarwal, Avantika Gaur, Preeti Mishra:
VNSecure: An explainable virtual network attack detection framework at VMM-Layer in virtualization environment. IC3 2023: 153-160 - 2022
- [j13]Preeti Mishra, Akansh Gupta, Palak Aggarwal, Emmanuel S. Pilli:
vServiceInspector: Introspection-assisted evolutionary bag-of-ngram approach to detect malware in cloud servers. Ad Hoc Networks 131: 102836 (2022) - [j12]Senthil Kumar Jagatheesaperumal, Preeti Mishra, Nour Moustafa, Rahul Chauhan:
A holistic survey on the use of emerging technologies to provision secure healthcare solutions. Comput. Electr. Eng. 99: 107691 (2022) - [j11]Preeti Mishra, Ankit Vidyarthi, Pierluigi Siano:
Guest Editorial: Security and Privacy for Cloud-Assisted Internet of Things (IoT) and Smart Grid. IEEE Trans. Ind. Informatics 18(7): 4966-4968 (2022) - [c10]Mohit Bhatt, Avantika Gaur, Saksham Badoni, Preeti Mishra:
Advanced malware and their impact on virtualization: A case study on hybrid feature extraction using deep memory introspection. IC3 2022: 74-80 - 2021
- [j10]Aayush Vishnoi, Preeti Mishra, Charu Negi, Sateesh Kumar Peddoju:
Android Malware Detection Techniques in Traditional and Cloud Computing Platforms: A State-of-the-Art Survey. Int. J. Cloud Appl. Comput. 11(4): 113-135 (2021) - [j9]Charu Negi, Preeti Mishra, Pooja Chaudhary, Harsh Vardhan:
A Review and Case Study on Android Malware: Threat Model, Attacks, Techniques and Tools. J. Cyber Secur. Mobil. 10(1): 231-260 (2021) - [j8]Preeti Mishra, Palak Aggarwal, Ankit Vidyarthi, Pawan Singh, Baseem Khan, Hassan Haes Alhelou, Pierluigi Siano:
VMShield: Memory Introspection-Based Malware Detection to Secure Cloud-Based Services Against Stealthy Attacks. IEEE Trans. Ind. Informatics 17(10): 6754-6764 (2021) - [c9]Divya Kapil, Preeti Mishra:
Virtual Machine Introspection in Virtualization: A Security Perspective. IC3 2021: 117-124 - [c8]Sarishma, Abhishek Gupta, Preeti Mishra:
Blockchain Based Framework to Maintain Chain of Custody (CoC) in a Forensic Investigation. ICACDS (1) 2021: 37-46 - 2020
- [j7]Preeti Mishra, Ishita Verma, Saurabh Gupta:
KVMInspector: KVM Based introspection approach to detect malware in cloud environment. J. Inf. Secur. Appl. 51: 102460 (2020) - [j6]Preeti Mishra, Vijay Varadharajan, Emmanuel S. Pilli, Udaya Kiran Tupakula:
VMGuard: A VMI-Based Security Architecture for Intrusion Detection in Cloud Environment. IEEE Trans. Cloud Comput. 8(3): 957-971 (2020)
2010 – 2019
- 2019
- [j5]Preeti Mishra, Vijay Varadharajan, Udaya Kiran Tupakula, Emmanuel S. Pilli:
A Detailed Investigation and Analysis of Using Machine Learning Techniques for Intrusion Detection. IEEE Commun. Surv. Tutorials 21(1): 686-728 (2019) - [j4]Udaya Kiran Tupakula, Vijay Varadharajan, Preeti Mishra:
Securing SDN controller and switches from attacks. Int. J. High Perform. Comput. Netw. 14(1): 77-91 (2019) - [c7]Marcella Carissimi, Ritesh Mukherjee, Vivek Tyagi, Fabio Disegni, Davide Manfrè, Cesare Torti, Daniele Gallinari, Sandro Rossi, Andrea Gambero, Donatella Brambilla, Paola Zuliani, Riccardo Zurla, Alessandro Cabrini, Guido Torelli, Marco Pasotti, Chantal Auricchio, Emanuela Calvetti, Laura Capecchi, Luigi Croce, Stefano Zanchi, Vikas Rana, Preeti Mishra:
2-Mb Embedded Phase Change Memory With 16-ns Read Access Time and 5-Mb/s Write Throughput in 90-nm BCD Technology for Automotive Applications. ESSCIRC 2019: 135-138 - [c6]Preeti Mishra, Ishita Verma, Saurabh Gupta, Varun S. Rana, Kavitha Kadarla:
vProVal: Introspection based Process Validation for Detecting Malware in KVM-based Cloud Environment. FMEC 2019: 271-277 - [c5]Preeti Mishra, Kashish Khurana, Saloni Gupta, Manish K. Sharma:
VMAnalyzer: Malware Semantic Analysis using Integrated CNN and Bi-Directional LSTM for Detecting VM-level Attacks in Cloud. IC3 2019: 1-6 - [c4]Preeti Mishra, Akash Negi, Emmanuel S. Pilli, Ramesh C. Joshi:
VMProtector: Malign Process Detection for Protecting Virtual Machines in Cloud Environment. ICACDS (1) 2019: 360-369 - 2017
- [j3]Preeti Mishra, Emmanuel S. Pilli, Vijay Varadharajan, Udaya Kiran Tupakula:
VAED: VMI-assisted evasion detection approach for infrastructure as a service cloud. Concurr. Comput. Pract. Exp. 29(12) (2017) - [j2]Preeti Mishra, Emmanuel S. Pilli, Vijay Varadharajan, Udaya Kiran Tupakula:
PSI-NetVisor: Program semantic aware intrusion detection at network and hypervisor layer in cloud. J. Intell. Fuzzy Syst. 32(4): 2909-2921 (2017) - [j1]Preeti Mishra, Emmanuel S. Pilli, Vijay Varadharajan, Udaya Kiran Tupakula:
Intrusion detection techniques in cloud environment: A survey. J. Netw. Comput. Appl. 77: 18-47 (2017) - [c3]Amita Kashyap, G. Sravan Kumar, Sunita Jangir, Emmanuel S. Pilli, Preeti Mishra:
IHIDS: Introspection-based hybrid intrusion detection system in cloud environment. ICACCI 2017: 687-693 - 2016
- [c2]Preeti Mishra, Emmanuel S. Pilli, Vijay Varadharajan, Udaya Kiran Tupakula:
Securing Virtual Machines from Anomalies Using Program-Behavior Analysis in Cloud Environment. HPCC/SmartCity/DSS 2016: 991-998 - [c1]Preeti Mishra, Emmanuel S. Pilli, Vijay Varadharajan, Udaya Kiran Tupakula:
NvCloudIDS: A security architecture to detect intrusions at network and virtualization layer in cloud environment. ICACCI 2016: 56-62
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-31 21:10 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint