Follow
Keshav Sood
Keshav Sood
Lecturer in Cyber Security, SMIEEE, Deakin University
Verified email at deakin.edu.au - Homepage
Title
Cited by
Cited by
Year
Software-defined wireless networking opportunities and challenges for Internet-of-Things: A review
K Sood, S Yu, Y Xiang
IEEE Internet of Things Journal 3 (4), 453-463, 2015
2612015
Performance Analysis of Software-Defined Network Switch Using Model
K Sood, S Yu, Y Xiang
IEEE Communications Letters 20 (12), 2522-2525, 2016
652016
Cooperative edge caching: A multi-agent deep learning based approach
Y Zhang, B Feng, W Quan, A Tian, K Sood, Y Lin, H Zhang
IEEE Access 8, 133212-133224, 2020
642020
Alleviating heterogeneity in SDN-IoT networks to maintain QoS and enhance security
K Sood, KK Karmakar, S Yu, V Varadharajan, SR Pokhrel, Y Xiang
IEEE Internet of Things Journal 7 (7), 5964-5975, 2019
462019
Dynamic access point association using software defined networking
K Sood, S Liu, S Yu, Y Xiang
2015 International Telecommunication Networks and Applications Conference …, 2015
392015
The controller placement problem or the controller selection problem?
K Sood, Y Xiang
Journal of communications and information networks 2, 1-9, 2017
382017
RPPTD: robust privacy-preserving truth discovery scheme
J Chen, Y Liu, Y Xiang, K Sood
IEEE systems journal 16 (3), 4525-4531, 2021
342021
Adaptive service function chaining mappings in 5G using deep Q-learning
G Li, B Feng, H Zhou, Y Zhang, K Sood, S Yu
Computer Communications 152, 305-315, 2020
332020
Privacy issues in social networks and analysis: a comprehensive survey
VVH Pham, S Yu, K Sood, L Cui
IET networks 7 (2), 74-84, 2018
302018
Pasport: A secure and private location proof generation and verification framework
MR Nosouhi, K Sood, S Yu, M Grobler, J Zhang
IEEE Transactions on Computational Social Systems 7 (2), 293-307, 2020
292020
Enabling machine learning with service function chaining for security enhancement at 5G edges
B Feng, H Zhou, G Li, Y Zhang, K Sood, S Yu
IEEE Network 35 (5), 196-201, 2021
282021
Efficient federated DRL-based cooperative caching for mobile edge networks
A Tian, B Feng, H Zhou, Y Huang, K Sood, S Yu, H Zhang
IEEE Transactions on Network and Service Management 20 (1), 246-260, 2022
272022
ERM: An accurate approach to detect DDoS attacks using entropy rate measurement
L Zhou, K Sood, Y Xiang
IEEE Communications Letters 23 (10), 1700-1703, 2019
262019
Towards spoofing resistant next generation IoT networks
MR Nosouhi, K Sood, M Grobler, R Doss
IEEE Transactions on Information Forensics and Security 17, 1669-1683, 2022
252022
Intrusion detection scheme with dimensionality reduction in next generation networks
K Sood, MR Nosouhi, DDN Nguyen, F Jiang, M Chowdhury, R Doss
IEEE Transactions on Information Forensics and Security 18, 965-979, 2023
242023
A general QoS aware flow-balancing and resource management scheme in distributed software-defined networks
K Sood, S Yu, Y Xiang, H Cheng
IEEE access 4, 7176-7185, 2016
242016
An effective and feasible traceback scheme in mobile internet environment
S Yu, K Sood, Y Xiang
IEEE communications letters 18 (11), 1911-1914, 2014
222014
Reliability-aware virtual network function placement in carrier networks
L Fang, X Zhang, K Sood, Y Wang, S Yu
Journal of Network and Computer Applications 154, 102536, 2020
212020
Analysis of policy-based security management system in software-defined networks
K Sood, KK Karmakar, V Varadharajan, U Tupakula, S Yu
IEEE Communications Letters 23 (4), 612-615, 2019
212019
A bytecode-based approach for smart contract classification
C Shi, Y Xiang, J Yu, L Gao, K Sood, RRM Doss
2022 IEEE International Conference on Software Analysis, Evolution and …, 2022
202022
The system can't perform the operation now. Try again later.
Articles 1–20