{"id":60,"date":"2021-01-22T06:13:39","date_gmt":"2021-01-22T06:13:39","guid":{"rendered":"http:\/\/blog.rajorshibiswas.com\/?page_id=60"},"modified":"2021-01-23T08:46:02","modified_gmt":"2021-01-23T08:46:02","slug":"publications","status":"publish","type":"page","link":"https:\/\/www.rajorshibiswas.com\/index.php\/publications\/","title":{"rendered":"Publications"},"content":{"rendered":"<h2><span style=\"color: #ff0000;\">Conferences<\/span><\/h2>\n\n<table id=\"tablepress-2\" class=\"tablepress tablepress-id-2\">\n<thead>\n<tr class=\"row-1\">\n\t<th class=\"column-1\">Publication<\/th><th class=\"column-2\">Year<\/th><th class=\"column-3\">Download<\/th>\n<\/tr>\n<\/thead>\n<tbody class=\"row-hover\">\n<tr class=\"row-2\">\n\t<td class=\"column-1\">R. Biswas and J. Wu, \"Protecting Resources Against Volumetric and Non-volumetric Network Attacks\", IEEE International Conference on Parallel and Distributed Systems (ICPADS), 14-16 December 2021, Beijing<\/td><td class=\"column-2\">2021<\/td><td class=\"column-3\"><\/td>\n<\/tr>\n<tr class=\"row-3\">\n\t<td class=\"column-1\">R. Biswas and J. Wu, \"Minimizing the Number of Rules to Mitigate Link Congestion in SDN-based Datacenters,\" 2021 IEEE International Conference on Networking, Architecture and Storage (NAS), 2021, pp. 1-8, doi: 10.1109\/NAS51552.2021.9605365.<\/td><td class=\"column-2\">2021<\/td><td class=\"column-3\"><a href=\"\">PDF<\/a><br \/>\n<a href=\"\">Slides<\/a><br \/>\n<a href=\"https:\/\/ieeexplore.ieee.org\/document\/9605365\"<\/a><\/td>\n<\/tr>\n<tr class=\"row-4\">\n\t<td class=\"column-1\">R. Biswas, J. Wu and Y. Chen, \"Optimal Monitor Placement Policy Against Distributed Denial-of-Service Attack in Datacenter,\" 2019 Resilience Week (RWS), San Antonio, TX, USA, 2019, pp. 64-70, doi: 10.1109\/RWS47064.2019.8972010.<\/td><td class=\"column-2\">2019<\/td><td class=\"column-3\"><a href=\"http:\/\/www.rajorshibiswas.com\/wp-content\/uploads\/2021\/01\/08972010.pdf\">PDF<\/a><br \/>\n<a href=\"http:\/\/www.rajorshibiswas.com\/wp-content\/uploads\/2021\/02\/DDOS-Datacenter.pptx\">Slides<\/a><br \/>\n<a href=\"https:\/\/ieeexplore.ieee.org\/document\/8972010\">IEEEexplore<\/a><\/td>\n<\/tr>\n<tr class=\"row-5\">\n\t<td class=\"column-1\">R. Biswas, J. Wu and A. Srinivasan, \"Cost-Aware Optimal Filter Assignment Policy Against Distributed Denial-of-Service Attack,\" 2019 Resilience Week (RWS), San Antonio, TX, USA, 2019, pp. 57-63, doi: 10.1109\/RWS47064.2019.8972008.<\/td><td class=\"column-2\">2019<\/td><td class=\"column-3\"><a href=\"http:\/\/www.rajorshibiswas.com\/wp-content\/uploads\/2021\/01\/08972008.pdf\">PDF<\/a><br \/>\n<a href=\"http:\/\/www.rajorshibiswas.com\/wp-content\/uploads\/2021\/02\/DDOS.pptx\">Slides<\/a><br \/>\n<a href=\"https:\/\/ieeexplore.ieee.org\/document\/8972008\">IEEEexplore<\/a><\/td>\n<\/tr>\n<tr class=\"row-6\">\n\t<td class=\"column-1\">R. Biswas, J. Wu and X. Li, \"A Capacity-Aware Distributed Denial-of-Service Attack in Low-Power and Lossy Networks,\" 2019 IEEE 40th Sarnoff Symposium, Newark, NJ, USA, 2019, pp. 1-6, doi: 10.1109\/Sarnoff47838.2019.9067822.<\/td><td class=\"column-2\">2019<\/td><td class=\"column-3\"><a href=\"http:\/\/www.rajorshibiswas.com\/wp-content\/uploads\/2021\/01\/09067822.pdf\">PDF<\/a><br \/>\n<a href=\"http:\/\/www.rajorshibiswas.com\/wp-content\/uploads\/2021\/02\/Sarnoff-2019-4.pptx\">Slides<\/a><br \/>\n<a href=\"https:\/\/ieeexplore.ieee.org\/document\/9067822\">IEEEexplore<\/a><\/td>\n<\/tr>\n<tr class=\"row-7\">\n\t<td class=\"column-1\">R. Biswas, J. Wu, W. Chang and P. Ostovari, \u201cOptimal Filter Assignment Policy against Transit-Link Distributed Denial-of-Service Attack,\u201d 2019 IEEE Global Communications Conference (GLOBECOM), Waikoloa, HI, USA, 2019, pp. 1-6, doi: 10.1109\/GLOBECOM38437.2019.9013985.<\/td><td class=\"column-2\">2019<\/td><td class=\"column-3\"><a href=\"http:\/\/www.rajorshibiswas.com\/wp-content\/uploads\/2021\/01\/09013985.pdf\">PDF<\/a><br \/>\n<a href=\"http:\/\/www.rajorshibiswas.com\/wp-content\/uploads\/2021\/02\/GLOBECOM_2019.pptx\">Slides<\/a><br \/>\n<a href=\"https:\/\/ieeexplore.ieee.org\/document\/9013985\">IEEEexplore<\/a><\/td>\n<\/tr>\n<tr class=\"row-8\">\n\t<td class=\"column-1\">R. Biswas, J. Wu and X. Du, \"Mitigation of the Spectrum Sensing Data Falsifying Attack in Cognitive Radio Networks,\" ICC 2019 - 2019 IEEE International Conference on Communications (ICC), Shanghai, China, 2019, pp. 1-6, doi: 10.1109\/ICC.2019.8761089.<\/td><td class=\"column-2\">2019<\/td><td class=\"column-3\"><a href=\"http:\/\/www.rajorshibiswas.com\/wp-content\/uploads\/2021\/01\/08761089.pdf\">PDF<\/a><br \/>\n<a href=\"http:\/\/www.rajorshibiswas.com\/wp-content\/uploads\/2021\/02\/ICC_SSDF-Proofread.pptx\">Slides<\/a><br \/>\n<a href=\"https:\/\/ieeexplore.ieee.org\/document\/8761089\">IEEEexplore<\/a><\/td>\n<\/tr>\n<tr class=\"row-9\">\n\t<td class=\"column-1\">R. Biswas and J. Wu, \"Co-Existence of LTE-U and Wi-Fi with Direct Communication,\" ICC 2019 - 2019 IEEE International Conference on Communications (ICC), Shanghai, China, 2019, pp. 1-6, doi: 10.1109\/ICC.2019.8761064.<br \/>\n<\/td><td class=\"column-2\">2019<\/td><td class=\"column-3\"><a href=\"http:\/\/www.rajorshibiswas.com\/wp-content\/uploads\/2021\/01\/08761064.pdf\">PDF<\/a><br \/>\n<a href=\"http:\/\/www.rajorshibiswas.com\/wp-content\/uploads\/2021\/02\/ICC_LTE_WIFI_5.pptx\">Slides<\/a><br \/>\n<a href=\"https:\/\/ieeexplore.ieee.org\/document\/8761064\">IEEEexplore<\/a><\/td>\n<\/tr>\n<tr class=\"row-10\">\n\t<td class=\"column-1\">R. Biswas and J. Wu, \"Filter Assignment Policy Against Distributed Denial-of-Service Attack,\" 2018 IEEE 24th International Conference on Parallel and Distributed Systems (ICPADS), Singapore, Singapore, 2018, pp. 537-544, doi: 10.1109\/PADSW.2018.8644584.<\/td><td class=\"column-2\">2018<\/td><td class=\"column-3\"><a href=\"http:\/\/www.rajorshibiswas.com\/wp-content\/uploads\/2021\/01\/08644584.pdf\">PDF<\/a><br \/>\n<a href=\"http:\/\/www.rajorshibiswas.com\/wp-content\/uploads\/2021\/02\/ICPADS_8.pptx\">Slides<\/a><br \/>\n<a href=\"https:\/\/ieeexplore.ieee.org\/document\/8644584\">IEEEexplore<\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<!-- #tablepress-2 from cache -->\n<h2><\/h2>\n<h2><span style=\"color: #ff0000;\">Journals<\/span><\/h2>\n\n<table id=\"tablepress-3\" class=\"tablepress tablepress-id-3\">\n<thead>\n<tr class=\"row-1\">\n\t<th class=\"column-1\">Publication<\/th><th class=\"column-2\">Year<\/th><th class=\"column-3\">Download<\/th>\n<\/tr>\n<\/thead>\n<tbody class=\"row-hover\">\n<tr class=\"row-2\">\n\t<td class=\"column-1\">R. Biswas, J. Wu, W. Chang and P. Ostovari \"Optimal Filter Assignment Policy Against Link Flooding Attack\u202f\" in High-Confidence Computing<\/td><td class=\"column-2\">2024<\/td><td class=\"column-3\"><\/td>\n<\/tr>\n<tr class=\"row-3\">\n\t<td class=\"column-1\">R. Biswas and J. Wu, \"Traffic Engineering to Minimize The Number of Rules in SDN Datacenters,\" in IEEE Transactions on Network Science and Engineering, doi: 10.1109\/TNSE.2021.3060372.<\/td><td class=\"column-2\">2021<\/td><td class=\"column-3\"><a href=\"http:\/\/www.rajorshibiswas.com\/wp-content\/uploads\/2021\/02\/TNSE__Traffic_Engineering_to_Minimizing_The_Number_of_Rules_in_SDN_Datacenters-1.pdf\">PDF<\/a><br \/>\n<a href=\"https:\/\/ieeexplore.ieee.org\/document\/9357928\">IEEEexplore<\/a><\/td>\n<\/tr>\n<tr class=\"row-4\">\n\t<td class=\"column-1\">R. Biswas, S. Kim and J. Wu, \"Sampling Rate Distribution for Flow Monitoring and DDoS Detection in Datacenter,\" in IEEE Transactions on Information Forensics and Security, vol. 16, pp. 2524-2534, 2021, doi: 10.1109\/TIFS.2021.3054522<\/td><td class=\"column-2\">2021<\/td><td class=\"column-3\"><a href=\"http:\/\/www.rajorshibiswas.com\/wp-content\/uploads\/2021\/01\/TIFS__Sampling_Rate_Distribution_for_Flow_Monitoring_and_DDoS_Detection_in_Datacenter-2.pdf\">PDF<\/a><br \/>\n<a href=\"https:\/\/ieeexplore.ieee.org\/document\/9335605\">IEEEexplore<\/a><\/td>\n<\/tr>\n<tr class=\"row-5\">\n\t<td class=\"column-1\">R. Biswas and J. Wu, \"Optimal Filter Assignment Policy Against Distributed Denial-of-Service Attack,\" in IEEE Transactions on Dependable and Secure Computing, doi: 10.1109\/TDSC.2020.2987301.<\/td><td class=\"column-2\">2020<\/td><td class=\"column-3\"><a href=\"http:\/\/www.rajorshibiswas.com\/wp-content\/uploads\/2021\/01\/09068462.pdf\">PDF<\/a><br \/>\n<a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/9068462\">IEEEexplore<\/a><\/td>\n<\/tr>\n<tr class=\"row-6\">\n\t<td class=\"column-1\">Y. Chen, J. Wu and R. Biswas, \"Grouping Service Chains of Multiple Flows in NFV-based Networks,\" in IEEE Transactions on Network Science and Engineering, doi: 10.1109\/TNSE.2020.3038781.<\/td><td class=\"column-2\">2020<\/td><td class=\"column-3\"><a href=\"http:\/\/www.rajorshibiswas.com\/wp-content\/uploads\/2021\/01\/09262079.pdf\">PDF<\/a><br \/>\n<a href=\"https:\/\/ieeexplore.ieee.org\/document\/9262079\">IEEEexplore<\/a><\/td>\n<\/tr>\n<tr class=\"row-7\">\n\t<td class=\"column-1\">R. Biswas, J. Wu and X. Du, and Y. Yang (2020) Mitigation of the spectrum sensing data falsifying attack in cognitive radio networks, Cyber-Physical Systems, DOI: 10.1080\/23335777.2020.1811387<br \/>\n<\/td><td class=\"column-2\">2020<\/td><td class=\"column-3\"><a href=\"http:\/\/www.rajorshibiswas.com\/wp-content\/uploads\/2021\/01\/Mitigation-of-the-spectrum-sensing-data-falsifying-attack-in-cognitive-radio-networks.pdf\">PDF<\/a><br \/>\n<a href=\"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/23335777.2020.1811387\">Journal Link<\/a><\/td>\n<\/tr>\n<tr class=\"row-8\">\n\t<td class=\"column-1\">R. Biswas and J. Wu, Minimizing The Number of Channel Switches of Mobile Users in Cognitive Radio Ad-Hoc Networks. J. Sens. Actuator Netw. 2020, 9, 23. https:\/\/doi.org\/10.3390\/jsan9020023<br \/>\n<\/td><td class=\"column-2\">2020<\/td><td class=\"column-3\"><a href=\"http:\/\/www.rajorshibiswas.com\/wp-content\/uploads\/2021\/01\/jsan-09-00023-v2.pdf\">PDF<\/a><br \/>\n<a href=\"https:\/\/www.mdpi.com\/2224-2708\/9\/2\/23\">MDPI Link<\/a><\/td>\n<\/tr>\n<tr class=\"row-9\">\n\t<td class=\"column-1\">R. Biswas &amp;  J Wu, Preserving source and destination location privacy with controlled routing protocol. International Journal of Security and Networks, 13(3), 187-198.<br \/>\n<\/td><td class=\"column-2\">2018<\/td><td class=\"column-3\"><a href=\"http:\/\/www.rajorshibiswas.com\/wp-content\/uploads\/2021\/01\/Biswas_IJSN_2018.pdf\">PDF<\/a><br \/>\n<a href=\"https:\/\/www.inderscienceonline.com\/doi\/abs\/10.1504\/IJSN.2018.093553\">Insider Science<\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<!-- #tablepress-3 from cache -->\n<h2><\/h2>\n<h2><span style=\"color: #ff0000;\">Book Chapters<\/span><\/h2>\n\n<table id=\"tablepress-4\" class=\"tablepress tablepress-id-4\">\n<thead>\n<tr class=\"row-1\">\n\t<th class=\"column-1\">Publication<\/th><th class=\"column-2\">Year<\/th><th class=\"column-3\">Download<\/th>\n<\/tr>\n<\/thead>\n<tbody class=\"row-hover\">\n<tr class=\"row-2\">\n\t<td class=\"column-1\">R. Biswas and J. Wu. \u201cCognitive Radio Network Technologies and Applications.\u201d Emerging Wireless Communication and Network Technologies. Springer, Singapore, 2018. 13-36.<\/td><td class=\"column-2\">2018<\/td><td class=\"column-3\"><a href=\"http:\/\/www.rajorshibiswas.com\/wp-content\/uploads\/2021\/01\/Biswas-Wu2018_Chapter_CognitiveRadioNetworkTechnolog.pdf\">PDF<\/a><br \/>\n<a href=\"https:\/\/link.springer.com\/chapter\/10.1007\/978-981-13-0396-8_2\">Springer Link<\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<!-- #tablepress-4 from cache -->\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Conferences Journals Book Chapters &nbsp; &nbsp;<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"_links":{"self":[{"href":"https:\/\/www.rajorshibiswas.com\/index.php\/wp-json\/wp\/v2\/pages\/60"}],"collection":[{"href":"https:\/\/www.rajorshibiswas.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.rajorshibiswas.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.rajorshibiswas.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.rajorshibiswas.com\/index.php\/wp-json\/wp\/v2\/comments?post=60"}],"version-history":[{"count":23,"href":"https:\/\/www.rajorshibiswas.com\/index.php\/wp-json\/wp\/v2\/pages\/60\/revisions"}],"predecessor-version":[{"id":222,"href":"https:\/\/www.rajorshibiswas.com\/index.php\/wp-json\/wp\/v2\/pages\/60\/revisions\/222"}],"wp:attachment":[{"href":"https:\/\/www.rajorshibiswas.com\/index.php\/wp-json\/wp\/v2\/media?parent=60"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}