Follow
Keshav Sood
Keshav Sood
Lecturer in Cyber Security, Deakin University, Centre for Cyber Security Research & Innovation
Verified email at deakin.edu.au - Homepage
Title
Cited by
Cited by
Year
Software-defined wireless networking opportunities and challenges for Internet-of-Things: A review
K Sood, S Yu, Y Xiang
IEEE Internet of Things Journal 3 (4), 453-463, 2015
2042015
Performance Analysis of Software-Defined Network Switch Using Model
K Sood, S Yu, Y Xiang
IEEE Communications Letters 20 (12), 2522-2525, 2016
552016
Dynamic access point association using software defined networking
K Sood, S Liu, S Yu, Y Xiang
2015 International Telecommunication Networks and Applications Conference …, 2015
362015
The controller placement problem or the controller selection problem?
K Sood, Y Xiang
Journal of communications and information networks 2 (3), 1-9, 2017
292017
An effective and feasible traceback scheme in mobile internet environment
S Yu, K Sood, Y Xiang
IEEE communications letters 18 (11), 1911-1914, 2014
232014
Adaptive service function chaining mappings in 5G using deep Q-learning
G Li, B Feng, H Zhou, Y Zhang, K Sood, S Yu
Computer Communications 152, 305-315, 2020
202020
A general QoS aware flow-balancing and resource management scheme in distributed software-defined networks
K Sood, S Yu, Y Xiang, H Cheng
IEEE access 4, 7176-7185, 2016
202016
Privacy issues in social networks and analysis: a comprehensive survey
VVH Pham, S Yu, K Sood, L Cui
IET networks 7 (2), 74-84, 2018
192018
Cooperative Edge Caching: A Multi-Agent Deep Learning Based Approach
Y Zhang, B Feng, W Quan, A Tiang, K Sood, Y Lin, H Zhang
IEEE Access, 133212 - 133224, 2020
182020
Alleviating heterogeneity in SDN-IoT networks to maintain QoS and enhance security
K Sood, KK Karmakar, S Yu, V Varadharajan, SR Pokhrel, Y Xiang
IEEE Internet of Things Journal 7 (7), 5964-5975, 2019
162019
Control layer resource management in SDN-IoT networks using multi-objective constraint
K Sood, S Yu, Y Xiang, S Peng
2016 IEEE 11th Conference on Industrial Electronics and Applications (ICIEA …, 2016
162016
RPPTD: robust privacy-preserving truth discovery scheme
J Chen, Y Liu, Y Xiang, K Sood
IEEE systems journal, 2021
152021
Analysis of policy-based security management system in software-defined networks
K Sood, KK Karmakar, V Varadharajan, U Tupakula, S Yu
IEEE Communications Letters 23 (4), 612-615, 2019
152019
Pasport: A secure and private location proof generation and verification framework
MR Nosouhi, K Sood, S Yu, M Grobler, J Zhang
IEEE Transactions on Computational Social Systems 7 (2), 293-307, 2020
132020
ERM: An accurate approach to detect DDoS attacks using entropy rate measurement
L Zhou, K Sood, Y Xiang
IEEE Communications Letters 23 (10), 1700-1703, 2019
132019
Topology-oriented virtual network embedding approach for data centers
Y Yuan, C Wang, S Peng, K Sood
IEEE access 7, 2429-2438, 2018
132018
A survey on big data stream processing in SDN supported cloud environment
A Al-Mansoori, S Yu, Y Xiang, K Sood
Proceedings of the Australasian computer science week multiconference, 1-11, 2018
102018
Reliability-aware virtual network function placement in carrier networks
L Fang, X Zhang, K Sood, Y Wang, S Yu
Journal of Network and Computer Applications 154, 102536, 2020
92020
Are current resources in SDN allocated to maximum performance and minimize costs and maintaining QoS problems?
K Sood, S Yu, Y Xiang
Proceedings of the Australasian Computer Science Week Multiconference, 1-6, 2017
72017
Hsdc–net: secure anonymous messaging in online social networks
MR Nosouhi, S Yu, K Sood, M Grobler
2019 18th IEEE International Conference On Trust, Security And Privacy In …, 2019
62019
The system can't perform the operation now. Try again later.
Articles 1–20