default search action
Ashok Singh Sairam
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j17]Abha Kumari, Arghyadip Roy, Ashok Singh Sairam:
Optimizing SDN Controller Load Balancing Using Online Reinforcement Learning. IEEE Access 12: 131591-131604 (2024) - 2023
- [c23]Puspanjali Ghoshal, Ashok Singh Sairam:
Relationship between Noise addition and Compression based methods for Differential Privacy in Multi-Agent Systems. ANTS 2023: 1-3 - [c22]Abhradeep Datta, B. Monish Kumar, Ashok Singh Sairam:
Detecting toxic comments from highly skewed social media data. ANTS 2023: 744-749 - 2022
- [j16]Akash Yadav, Sumit Mishra, Ashok Singh Sairam:
A multi-objective worker selection scheme in crowdsourced platforms using NSGA-II. Expert Syst. Appl. 201: 116991 (2022) - [j15]Pratima Biswas, Sourav Kumar Dandapat, Ashok Singh Sairam:
Ripple: An approach to locate k nearest neighbours for location-based services. Inf. Syst. 105: 101933 (2022) - [j14]Akash Yadav, Joydeep Chandra, Ashok Singh Sairam:
A Budget and Deadline Aware Task Assignment Scheme for Crowdsourcing Environment. IEEE Trans. Emerg. Top. Comput. 10(2): 1020-1034 (2022) - [c21]Abha Kumari, Ashok Singh Sairam:
LALB: An SDN Architecture for Dynamic Load Balancing. ANTS 2022: 141-146 - 2021
- [j13]Abha Kumari, Ashok Singh Sairam:
Controller placement problem in software-defined networking: A survey. Networks 78(2): 195-223 (2021) - 2020
- [j12]Samant Saurabh, Sanjay Madria, Anirban Mondal, Ashok Singh Sairam, Saurabh Mishra:
An analytical model for information gathering and propagation in social networks using random graphs. Data Knowl. Eng. 129: 101852 (2020)
2010 – 2019
- 2019
- [c20]Ashok Singh Sairam, Arav Garg:
Detecting Semantic Attacks in Intelligent Transport System. ICITE 2019: 185-189 - [c19]Sumit Mishra, Akash Yadav, Ashok Singh Sairam:
Worker Selection in Crowd-sourced Platforms using Non-dominated Sorting. TENCON 2019: 41-45 - [c18]Abha Kumari, Joydeep Chandra, Ashok Singh Sairam:
Predictive Flow Modeling in Software Defined Network. TENCON 2019: 1494-1498 - [i2]Abha Kumari, Ashok Singh Sairam:
A Survey of Controller Placement Problem in Software Defined Networks. CoRR abs/1905.04649 (2019) - 2018
- [j11]Pratima Biswas, Ashok Singh Sairam:
Modeling privacy approaches for location based services. Comput. Networks 140: 1-14 (2018) - [j10]Ayush Garg, Akash Yadav, Axel Sikora, Ashok Singh Sairam:
Wireless Precision Time Protocol. IEEE Commun. Lett. 22(4): 812-815 (2018) - [j9]Sangita Roy, Ashok Singh Sairam:
Distributed star coloring of network for IP traceback. Int. J. Inf. Sec. 17(3): 315-326 (2018) - [c17]Abha Kumari, Joydeep Chandra, Ashok Singh Sairam:
Optimizing flow setup time in software defined network. COMSNETS 2018: 543-545 - [c16]Ashok Singh Sairam, Sagar Kumar Verma:
Using Bounded Binary Particle Swarm Optimization to Analyze Network Attack Graphs. ICDCN 2018: 41:1-41:9 - [c15]Sangita Roy, Hardik Chawla, Ashok Singh Sairam:
IP Traceback in Dynamic Networks. ISEA-ISAP 2018: 153-165 - 2017
- [c14]Akash Yadav, Ashok Singh Sairam, Anand Kumar:
Concurrent Team Formation for Multiple Tasks in Crowdsourcing Platform. GLOBECOM 2017: 1-7 - [i1]Pratima Biswas, Ashok Singh Sairam:
Modeling and Performance Comparison of Privacy Approaches for Location Based Services. CoRR abs/1711.04974 (2017) - 2016
- [j8]Samant Saurabh, Ashok Singh Sairam:
Increasing Accuracy and Reliability of IP Traceback for DDoS Attack Using Completion Condition. Int. J. Netw. Secur. 18(2): 224-234 (2016) - [j7]Samant Saurabh, Ashok Singh Sairam:
Increasing the effectiveness of packet marking schemes using wrap-around counting Bloom filter. Secur. Commun. Networks 9(16): 3467-3482 (2016) - [c13]Ravi Sharma, Ashok Singh Sairam, Akash Yadav, Axel Sikora:
Tunable synchronization in duty-cycled wireless sensor networks. ANTS 2016: 1-6 - [c12]Akash Yadav, Ashok Singh Sairam, Rituraj Singh:
Efficient user assignment in crowd sourcing applications. ICACCI 2016: 1199-1205 - 2015
- [j6]Ashok Singh Sairam, Sangita Roy, Rishikesh Sahay:
Coloring networks for attacker identification and response. Secur. Commun. Networks 8(5): 751-768 (2015) - [c11]Ashok Singh Sairam, Sangita Roy, Sanjay Kumar Dwivedi:
Using CAPTCHA Selectively to Mitigate HTTP-Based Attacks. GLOBECOM 2015: 1-6 - [c10]Sangita Roy, Ashok Singh Sairam:
Network Attack Detection and Mitigation. SASO Workshops 2015: 168-173 - 2014
- [j5]Samant Saurabh, Ashok Singh Sairam:
ICMP based IP traceback with negligible overhead for highly distributed reflector attack using bloom filters. Comput. Commun. 42: 60-69 (2014) - [j4]Arka Prokash Mazumdar, Anandghan Waghmare, Ashok Singh Sairam:
Modelling energy efficiency of OR protocols in wireless networks. Int. J. Ad Hoc Ubiquitous Comput. 16(1): 42-57 (2014) - [j3]Samant Saurabh, Sangita Roy, Ashok Singh Sairam:
Extended deterministic edge router marking. Int. J. Commun. Networks Distributed Syst. 13(2): 169-186 (2014) - [c9]Ashok Singh Sairam, Rahul Kumar, Pratima Biswas:
Implementation of an Adaptive Traffic-aware Firewall. SIN 2014: 385 - 2013
- [j2]Arka Prokash Mazumdar, Ashok Singh Sairam:
TOAR: transmission-aware opportunistic ad hoc routing protocol. EURASIP J. Wirel. Commun. Netw. 2013: 237 (2013) - [j1]Samant Saurabh, Ashok Singh Sairam:
Professors - the new YouTube stars: education through Web 2.0 and social network. Int. J. Web Based Communities 9(2): 212-232 (2013) - [c8]Sangita Roy, Anurag Singh, Ashok Singh Sairam:
IP traceback in star colored networks. COMSNETS 2013: 1-9 - [c7]Anandghan Waghmare, Arka Prokash Mazumdar, Ashok Singh Sairam:
Time synchronization protocol for 6LoWPAN. ICACCI 2013: 1855-1860 - 2012
- [c6]Sangita Roy, Jyotirmayee Parida, Avinash Kumar Singh, Ashok Singh Sairam:
Audio steganography using LSB encoding technique with increased capacity and bit error rate optimization. CCSEIT 2012: 372-376 - [c5]Samant Saurabh, Ashok Singh Sairam:
Linear and Remainder Packet Marking for fast IP traceback. COMSNETS 2012: 1-8 - [c4]Vishwanath Pratap Singh, Arka Prokash Mazumdar, Ashok Singh Sairam:
On energy consumption analysis for ad hoc routing protocols. ICACCI 2012: 300-306 - [c3]Sriparna Saha, Ashok Singh Sairam, Amulya Yadav, Asif Ekbal:
Genetic algorithm combined with support vector machine for building an intrusion detection system. ICACCI 2012: 566-572 - 2011
- [c2]Samant Saurabh, Ashok Singh Sairam:
FC-DERM: Fragmentation compatible deterministic edge router marking. APCC 2011: 800-805
2000 – 2009
- 2006
- [c1]Ashok Singh Sairam, Gautam Barua:
Effective bandwidth utilisation in multihoming networks. COMSWARE 2006: 1-8
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:14 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint