Search Results - "Paul, Subharthi"
-
1
Deciphering malware’s use of TLS (without decryption)
Published in Journal of Computer Virology and Hacking Techniques (01-08-2018)“…The use of TLS by malware poses new challenges to network threat detection because traditional pattern-matching techniques can no longer be applied to its…”
Get full text
Journal Article -
2
An Internet of Things Framework for Smart Energy in Buildings: Designs, Prototype, and Experiments
Published in IEEE internet of things journal (01-12-2015)“…Smart energy in buildings is an important research area of Internet of Things (IoT). As important parts of the smart grids, the energy efficiency of buildings…”
Get full text
Journal Article -
3
Architectures for the future networks and the next generation Internet: A survey
Published in Computer communications (15-01-2011)“…Networking research funding agencies in USA, Europe, Japan, and other countries are encouraging research on revolutionary networking architectures that may or…”
Get full text
Journal Article -
4
MILSA: A New Evolutionary Architecture for Scalability, Mobility, and Multihoming in the Future Internet
Published in IEEE journal on selected areas in communications (01-10-2010)“…Many challenges to the Internet including global routing scalability have drawn significant attention from both industry and academia, and have generated…”
Get full text
Journal Article -
5
A Survey of Energy Efficiency in Buildings and Microgrids using Networking Technologies
Published in IEEE Communications surveys and tutorials (01-01-2014)“…Intelligent buildings and microgrids are important parts of the future smart grid. The adoption and development process of the intelligent buildings has been…”
Get full text
Journal Article -
6
Application delivery in multi-cloud environments using software defined networking
Published in Computer networks (Amsterdam, Netherlands : 1999) (05-08-2014)“…Today, most large Application Service Providers (ASPs) such as Google, Microsoft, Yahoo, Amazon and Facebook operate multiple geographically distributed…”
Get full text
Journal Article -
7
Energy Sensing and Monitoring Framework with an Integrated Communication Backbone in the Energy Efficient Intelligent Buildings
Published 25-03-2016“…Applied Mechanics and Materials (Volumes 303 - 306), pp. 1460-1464, February, 2013 Building environments are significant sources of global energy consumption…”
Get full text
Journal Article -
8
An Internet of Things Framework for Smart Energy in Buildings: Designs, Prototype, and Experiments
Published 25-03-2016“…IEEE Internet of Things Journal, 2015, DOI: 10.1109/JIOT.2015.2413397 Smart energy in buildings is an important research area of Internet of Things (IoT)…”
Get full text
Journal Article -
9
MILSA: A Mobility and Multihoming Supporting Identifier Locator Split Architecture for Naming in the Next Generation Internet
Published in IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference (01-01-2008)“…Naming and addressing are important issues for next generation Internet (NGI). In this paper, we discuss a new mobility and multihoming supporting identifier…”
Get full text
Conference Proceeding -
10
-
11
Enhanced Evaluation of the Interdomain Routing System for Balanced Routing Scalability and New Internet Architecture Deployments
Published in IEEE systems journal (01-09-2015)“…Internet is facing many challenges that cannot be solved easily through ad hoc patches. To address these challenges, many research programs and projects have…”
Get full text
Journal Article -
12
Virtualization architecture using the ID/Locator split concept for Future Wireless Networks (FWNs)
Published in Computer networks (Amsterdam, Netherlands : 1999) (01-02-2011)“…Future Wireless Networks (FWNs) will be a convergence of many fixed and mobile networking technologies including cellular, wireless LANs, and traditional wired…”
Get full text
Journal Article -
13
Software Defined Application Delivery Networking
Published 01-01-2014“…In this thesis we present the architecture, design, and prototype implementation details of AppFabric. AppFabric is a next generation application delivery…”
Get full text
Dissertation -
14
-
15
OpenADN: A Case for Open Application Delivery Networking
Published in 2013 22nd International Conference on Computer Communication and Networks (ICCCN) (01-07-2013)“…There are two key issues that prevent Application Service Providers (ASPs) from fully leveraging the cloud "advantage." First, in modern enterprise and…”
Get full text
Conference Proceeding -
16
Network virtualization and software defined networking for cloud computing: a survey
Published in IEEE communications magazine (01-11-2013)“…Network virtualization is the key to the current and future success of cloud computing. In this article, we explain key reasons for virtualization and briefly…”
Get full text
Magazine Article -
17
An Identifier/Locator Split Architecture for Exploring Path Diversity through Site Multi-Homing - A Hybrid Host-Network Cooperative Approach
Published in 2010 IEEE International Conference on Communications (01-05-2010)“…In this paper, we take a fresh look at stub-site multihoming within the paradigms of an identifier/locator split architecture. More specifically, we…”
Get full text
Conference Proceeding -
18
A survey of the research on future internet architectures
Published in IEEE communications magazine (01-07-2011)“…The current Internet, which was designed over 40 years ago, is facing unprecedented challenges in many aspects, especially in the commercial context. The…”
Get full text
Magazine Article -
19
Enhanced MILSA Architecture for Naming, Addressing, Routing and Security Issues in the Next Generation Internet
Published in 2009 IEEE International Conference on Communications (01-06-2009)“…MILSA (Mobility and Multihoming supporting Identifier Locator Split Architecture) has been proposed to address the naming and addressing challenges for NGI…”
Get full text
Conference Proceeding -
20
Deciphering Malware's use of TLS (without Decryption)
Published 06-07-2016“…The use of TLS by malware poses new challenges to network threat detection because traditional pattern-matching techniques can no longer be applied to its…”
Get full text
Journal Article