Munesh Singh
YOU?
Author Swipe
View article: SwoRD- Switch flow table overflow and Resource Depletion attack detection in SDN
SwoRD- Switch flow table overflow and Resource Depletion attack detection in SDN Open
Low-rate attacks targeting flow tables have emerged as a major threat to Software-Defined Networking (SDN). These attacks disrupt services to the genuine users by overwhelming TCAM-enabled SDN switches with illegiti- mate packets, exploiti…
View article: Unravelling the composition and provenance of mud plasters in the Aurangabad Caves: a multifaceted analytical approach
Unravelling the composition and provenance of mud plasters in the Aurangabad Caves: a multifaceted analytical approach Open
This research investigates India's mud plaster heritage, focusing on the composition and provenance of materials used in historical structures, with a case study of the Aurangabad Caves (6th–8th AD). These caves, located in the Sahayadri r…
View article: Towards Adaptive Rule Replacement for Mitigating Inference Attacks in Serverless SDN Framework
Towards Adaptive Rule Replacement for Mitigating Inference Attacks in Serverless SDN Framework Open
In the rapidly evolving landscape of Software-Defined Networking (SDN), the enhancement of security measures against sophisticated cyber threats is paramount. Among these threats, inference attacks pose a significant risk by allowing adver…
View article: Towards Adaptive Rule Replacement for Mitigating Inference Attacks in Sdn ⋆
Towards Adaptive Rule Replacement for Mitigating Inference Attacks in Sdn ⋆ Open
View article: FloRa: Flow Table Low-Rate Overflow Reconnaissance and Detection in SDN
FloRa: Flow Table Low-Rate Overflow Reconnaissance and Detection in SDN Open
Software Defined Networking (SDN) has evolved to revolutionize next-generation networks, offering programmability for on-the-fly service provisioning, primarily supported by the OpenFlow (OF) protocol. The limited storage capacity of Terna…
View article: SubLock: Sub-Circuit Replacement based Input Dependent Key-based Logic Locking for Robust IP Protection
SubLock: Sub-Circuit Replacement based Input Dependent Key-based Logic Locking for Robust IP Protection Open
Intellectual Property (IP) piracy, overbuilding, reverse engineering, and hardware Trojan are serious security concerns during integrated circuit (IC) development. Logic locking has proven to be a solid defence for mitigating these threats…
View article: The Ecological Tapestry of Lonar Crater: Biodiversity, Conservation Challenges, and Preservation Strategies of the Ecosystem
The Ecological Tapestry of Lonar Crater: Biodiversity, Conservation Challenges, and Preservation Strategies of the Ecosystem Open
The Lonar Crater, a geological marvel located in Buldana District of India’s Maharashtra state, stands as a unique testament to Earth's natural history, formed around 30,000-50,000 years ago by a meteorite impact on Deccan Plateau basalts.…
View article: An Intelligent-IoT-Based Data Analytics for Freshwater Recirculating Aquaculture System
An Intelligent-IoT-Based Data Analytics for Freshwater Recirculating Aquaculture System Open
Smart farming is essential for a nation whose economy largely depends on agro products. In the last few years, rapid urbanization and deforestation have impacted farmers. Due to the lack of rainwater harvesting and changing weather pattern…
View article: Retraction Note: Communicable disease pandemic: a simulation model based on community transmission and social distancing
Retraction Note: Communicable disease pandemic: a simulation model based on community transmission and social distancing Open
View article: RETRACTED ARTICLE: Communicable disease pandemic: a simulation model based on community transmission and social distancing
RETRACTED ARTICLE: Communicable disease pandemic: a simulation model based on community transmission and social distancing Open
View article: Time-domain Feature and Ensemble Model based Classification of EMG Signals for Hand Gesture Recognition
Time-domain Feature and Ensemble Model based Classification of EMG Signals for Hand Gesture Recognition Open
The electromyography (EMG) signal is the electrical current generated in muscles due to the inter-change of ions during their contractions. It has many applications in clinical diagnostics and the biomedical field. This paper has experimen…
View article: Communicable Disease Pandemic: A Simulation Model Based on Community Transmission and Social Distancing
Communicable Disease Pandemic: A Simulation Model Based on Community Transmission and Social Distancing Open
Communicable disease pandemic is a severe disease outbreak all over the countires and continents. Swine Flu, HIV/AIDS, COVID-19 (COrona VIrus Disease-19), etc. are some of the global pandemics in the world. The major cause of becoming pand…
View article: Three-class brain tumor classification using deep dense inception residual network
Three-class brain tumor classification using deep dense inception residual network Open
View article: A routing protocol for urban vehicular ad hoc networks to support non-safety applications
A routing protocol for urban vehicular ad hoc networks to support non-safety applications Open
The Urban Vehicular Ad Hoc Network (UVANET) provides non-safety applications like media sharing, internet service, file transfer, gaming, and so on. Routing plays an important role in providing better services to the users in UVANET. In th…
View article: Mud Plaster Wall Paintings of Bhaja Caves: Composition and Performance Characteristics
Mud Plaster Wall Paintings of Bhaja Caves: Composition and Performance Characteristics Open
The historic mud plaster of Bhaja caves dated back to 1 st century BC to 3 rd century AD were investigated for their mineralogical, micro -structural and chemical characterisation.The analytical studies were performed using petrological mi…