Udaya Tupakula

Dr

  • 653 Citations
  • 14 h-Index
20022020

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Outputs

  • 653 Citations
  • 14 h-Index
  • 60 Conference proceeding contribution
  • 16 Article
  • 4 Chapter
  • 1 Conference paper
2002

An approach to counteract distributed denial of service attacks

Tupakula, U. K., Varadharajan, V. & Hofman, M., 2002, Proceedings of the IASTED International Conference, Communications And Computer Networks. Hamza, M. H. (ed.). Anaheim, USA: ACTA Press, p. 158-163 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

2003

A controller agent model to counteract DoS attacks in multiple domains

Tupakula, U. K. & Varadharajan, V., 2003, Integrated network management VIII: managing it all. Goldszmidt, G. & Schönwälder, J. (eds.). New York, NY: Springer, Springer Nature, Vol. 118. p. 113-116 4 p. (IFIP Advances in Information and Communication Technology; vol. 118).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

Open Access
File
4 Citations (Scopus)
3 Downloads (Pure)

Analysis of Automated Model against DDoS Attacks

Tupakula, U. K. & Varadharajan, V., 2003, 2003 Australian Telecommunications Networks and Applications Conference ATNAC. Craze, S. (ed.). Perth, WA, Australia: Australian Telecommunications CRC (CDROM), p. 1-5 5 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

A Practical method to counteract denial of service attacks

Tupakula, U. K. & Varadharajan, V., 2003, Proceedings of the 26th Australasian computer science conference. Oudshoorn, M. J. (ed.). Sydney: Australian Computer Society, Vol. 16. 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

Counteracting DDoS attacks in multiple ISP domains using routing arbiter architecture

Tupakula, U. K. & Varadharajan, V., Oct 2003, The 11th IEEE International Conference on Networks, 2003. ICON2003.. Landfeldt, B. & Moors, T. (eds.). Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 455-460 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

9 Citations (Scopus)

Network DoS Attacks: A New Packet Marking Scheme and Architectural Design

Tupakula, U. K. & Varadharajan, V., 2003, Proceedings of 2nd Workshop on Security and Network Architecture SAR 2003. France: Loria, p. 1-10 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

2004

Counteracting TCP SYN DDoS attacks using automated model

Tupakula, U. K., Varadharajan, V. & Gajam, A. K., 2004, GLOBECOM'04 - IEEE Global Telecommunications Conference. Oraintara, S. (ed.). Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 2240-2244 5 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

4 Citations (Scopus)

Tracing DDoS floods: An automated approach

Tupakula, U. K. & Varadharajan, V., Mar 2004, In : Journal of Network and Systems Management. 12, 1, p. 111-135 25 p.

Research output: Contribution to journalArticle

8 Citations (Scopus)
2006

Analysis of Traceback Techniques

Tupakula, U. K. & Varadharajan, V., 2006, ACSW Frontiers 2006 - Proc. of the Fourth Australasian Symposium on Grid Computing and e-Research, AusGrid 2006 and the Fourth Australasian Information Security Workshop (Network Security), AISW 2006. Buyya, R., Ma, T., Safavi-Naini, R., Steketee, C. & Susilo, W. (eds.). Sydney, Australia: Australian Computer Society, Vol. 54. p. 115-124 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

4 Citations (Scopus)

Fellowship: Defense against flooding and packet drop attacks in MANET

Balakrishnan, V., Varadharajan, V. & Tupakula, U. K., 2006, Proceedings of the 10th IEEE/IFIP network operations and management symposium (NOMS 2006). Festor, O. & State, R. (eds.). Bellingham, WA: Institute of Electrical and Electronics Engineers (IEEE), p. 1-4 4 p. 1687659

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

Open Access
File
18 Citations (Scopus)

Framework for defending against denial of service attacks in wireless networks

Tupakula, U. K., Varadharajan, V., Gajam, A. K. & Vuppala, S. K., 2006, Proceedings of the 2nd international conference on wireless communication and sensor networks (WCSN 2006). Tiwari, M. D., Tiwary, U. S., Nandi, G. C. & Radhakrishna, M. (eds.). India: Macmillan India Ltd, p. 281-290 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

2007

DDoS: design, implementation and analysis of automated model

Tupakula, U. K., Varadharajan, V., Gajam, A. K., Vuppala, S. K. & Rao, P. N. S., 2007, In : International Journal of Wireless and Mobile Computing. 2, 1, p. 72-85 14 p.

Research output: Contribution to journalArticle

4 Citations (Scopus)

Mitigating flooding attacks in mobile ad-hoc networks supporting anonymous communications

Balakrishnan, V., Varadharajan, V., Tupakula, U. & Moe, M. E. G., 2007, The 2nd International Conference on Wireless Broadband and Ultra Wideband Communications, AusWireless 2007. O'Conner, L. (ed.). Los Alamitos, CA: Institute of Electrical and Electronics Engineers (IEEE), p. 1-6 6 p. 4299678

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

Open Access
File
14 Citations (Scopus)
27 Downloads (Pure)

TEAM: Trust enhanced security architecture for mobile ad-hoc networks

Balakrishnan, V., Varadharajan, V., Tupakula, U. & Lucs, P., 2007, ICON 2007 - Proceedings of the 2007 15th IEEE International Conference on Networks. Jayasuriya, A. (ed.). Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 182-187 6 p. 4444083

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

Open Access
File
14 Citations (Scopus)
27 Downloads (Pure)

Trust and recommendations in mobile ad hoc networks

Balakrishnan, V., Varadharajan, V., Tupakula, U. K. & Lucs, P., 2007, 3rd International Conference on Networking and Services, ICNS 2007. Van de Velde, G., Dini, P., Freire, M., Liakopoulos, A., Popoviciu, C., Simeonidou, D. & Zerfos, P. (eds.). Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 1-6 6 p. 4438313

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

Open Access
File
23 Citations (Scopus)
29 Downloads (Pure)

Trust enhanced secure mobile ad-hoc network routing

Balakrishnan, V., Varadharajan, V., Lucs, P. & Tupakula, U. K., 2007, Proceedings - 21st International Conference on Advanced Information Networking and ApplicationsWorkshops/Symposia, AINAW'07. O'Conner, L. (ed.). Los Alamitos, CA: Institute of Electrical and Electronics Engineers (IEEE), Vol. 1. p. 27-33 7 p. 4224078

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

Open Access
File
26 Citations (Scopus)
5 Downloads (Pure)

Trust integrated cooperation architecture for mobile ad-hoc networks

Balakrishnan, V., Varadharajan, V., Tupakula, U. & Lucs, P., 2007, Proceedings of 4th IEEE Internatilonal Symposium on Wireless Communication Systems 2007, ISWCS. Patzold, M., Jiang, Y. & Zhang, Y. (eds.). Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 592-596 5 p. 4392409

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

Open Access
File
4 Citations (Scopus)
2008

A hybrid model against TCP SYN and reflection DDoS attacks

Tupakula, U. K. & Varadharajan, V., May 2008, In : Computer Systems Science and Engineering. 23, 3, p. 153-166 14 p.

Research output: Contribution to journalArticle

2 Citations (Scopus)

Distributed denial of service attacks in networks

Tupakula, U. K. & Varadharajan, V., 2008, Handbook of research on information security and assurance. Gupta, J. N. D. & Sharma, S. K. (eds.). USA, London UK: IGI Global, p. 85-97 13 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Subjective logic based trust model for mobile ad hoc networks

Balakrishnan, V., Varadharajan, V. & Tupakula, U., 2008, Proceedings of the 4th International Conference on Security and Privacy in Communication Networks, SecureComm'08. Sevi, A. (ed.). New York: Association for Computing Machinery (ACM), p. 1-11 11 p. 30

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

22 Citations (Scopus)
2009

DoSTRACK: A system for defending against DoS attacks

Tupakula, U. K., Varadharajan, V. & Pandalaneni, S. R., 2009, 24th Annual ACM Symposium on Applied Computing, SAC 2009. Shin, S. Y. & Ossowski, S. (eds.). New York: ACM, p. 47-53 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

2 Citations (Scopus)

SBAC: Service Based Access Control

Tupakula, U. K., Varadharajan, V. & Vuppala, S. K., 2009, Proceedings - 2009 14th IEEE International Conference on Engineering of Complex Computer Systems, ICECCS 2009. Los Alamitos, CA, USA: Institute of Electrical and Electronics Engineers (IEEE), p. 202-209 8 p. 5090528

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

Open Access
File
10 Citations (Scopus)
4 Downloads (Pure)

Trust Management in Mobile Ad Hoc Networks

Balakrishnan, V., Varadharajan, V. & Tupakula, U., 2009, Guide to wireless ad hoc networks. Misra, S., Woungang, I. & Misra, S. C. (eds.). London: Springer, Springer Nature, p. 473-502 30 p. (Computer Communications and Networks Series).

Research output: Chapter in Book/Report/Conference proceedingChapter

2010

Detecting security attacks in trusted virtual domains

Tupakula, U. K. & Varadharajan, V., 2010, Proceedings - IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, EUC 2010. Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 529-535 7 p. 5703572

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

Open Access
File
2 Citations (Scopus)
2 Downloads (Pure)

Security in mobile AD HOC networks

Balakrishnan, V., Varadharajan, V. & Tupakula, U., 1 Jan 2010, Selected topics in communication networks and distributed systems. Misra, S., Misra, S. C. & Woungang, I. (eds.). Singapore: World Scientific Publishing, p. 671-708 38 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

SMRTI: Secure mobile ad hoc network routing with trust intrigue

Balakrishnan, V., Varadharajan, V., Lucs, P. & Tupakula, U., 22 Feb 2010, Mobile Intelligence. Yang, L. T., Waluyo, A. B., Ma, J., Tan, L. & Srinivasan, B. (eds.). Hoboken, N.J: John Wiley & Sons, p. 412-436 25 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

2011

Counteracting DDoS attacks in WLAN

Tupakula, U., Varadharajan, V. & Vuppala, S. K., 2011, Proceedings of the 4th International Conference on Security of Information and Networks. New York: Association for Computing Machinery, p. 119-126 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

Intrusion detection techniques for infrastructure as a service cloud

Tupakula, U., Varadharajan, V. & Akku, N., 2011, Proceedings - IEEE 9th International Conference on Dependable, Autonomic and Secure Computing, DASC 2011. Chen, J., Dou, W., Liu, J., Yang, L. T. & Ma, J. (eds.). Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 744-751 8 p. 6118908

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

33 Citations (Scopus)

On the design of virtual machine intrusion detection system

Tupakula, U. & Varadharajan, V., 2011, Proceedings of the 12th IFIP/IEEE International Symposium on Integrated Network Management, IM 2011. Los Alamitos, Calif.: Institute of Electrical and Electronics Engineers (IEEE), p. 682-685 4 p. 5990655

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

Security architecture for virtual machines

Tupakula, U., Varadharajan, V. & Bichhawat, A., 2011, Algorithms and Architectures for Parallel Processing - 11th International Conference, ICA3PP 2011, Proceedings, Part 1. Xiang, Y., Cuzzocrea, A., Hobbs, M. & Zhou, W. (eds.). Heidelberg, Germany: Springer, Springer Nature, Vol. 7016 LNCS. p. 218-229 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7016 LNCS, no. PART 1).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

1 Citation (Scopus)

Security techniques for beyond 3G wireless mobile networks

Tupakula, U., Varadharajan, V. & Vuppala, S. K., 2011, Proceedings - 2011 IFIP 9th International Conference on Embedded and Ubiquitous Computing, EUC 2011. Los Alamitos, Calif.: Institute of Electrical and Electronics Engineers (IEEE), p. 136-143 8 p. 6104518

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

4 Citations (Scopus)

Security techniques for zero day attacks

Tupakula, U. & Varadharajan, V., 2011, IWCMC 2011 - 7th International Wireless Communications and Mobile Computing Conference. Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 442-447 6 p. 5982574

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

Techniques for analysing PDF malware

Ulucenk, C., Varadharajan, V., Balakrishnan, V. & Tupakula, U., 2011, Proceedings of the 18th Asia-Pacific Software Engineering Conference, APSEC 2011. Los Alamitos, Calif.: Institute of Electrical and Electronics Engineers (IEEE), p. 41-48 8 p. 6130668

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

3 Citations (Scopus)

TVDSEC: Trusted Virtual Domain SECurity

Tupakula, U. & Varadharajan, V., 2011, Proceedings - 2011 4th IEEE International Conference on Utility and Cloud Computing, UCC 2011. Buyya, R., Pallickara, S. & Fox, G. (eds.). Los Alamitos, California: Institute of Electrical and Electronics Engineers (IEEE), p. 57-64 8 p. 6123481

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

6 Citations (Scopus)

TVLAN: trusted and virtualised local area networks

Tupakula, U. & Varadharajan, V., 2011, TrustCom 2011: 2011 international joint conference of IEEE TrustCom-11/IEEE ICESS-11/FCST-11: 16-18 November 2011, Changsha, Hunan, P. R. China. Wang, G., Tate, S. R., Chen, J-J. & Sakurai, K. (eds.). Los Alamitos, Calif: Institute of Electrical and Electronics Engineers (IEEE), p. 606-612 7 p. 6120871

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

1 Citation (Scopus)
2012

Distributed service control technique for detecting security attacks

Tupakula, U. & Varadharajan, V., 2012, Proceedings of the 2012 IEEE Network Operations and Management Symposium, NOMS 2012. De Turck, F., Gaspary, L. P. & Medhi, D. (eds.). Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 574-577 4 p. 6211959

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

Dynamic state-based security architecture for detecting security attacks in virtual machines

Tupakula, U. K. & Varadharajan, V., Apr 2012, In : Computer Journal. 55, 4, p. 397-409 13 p.

Research output: Contribution to journalArticle

5 Citations (Scopus)

Intrusion detection techniques for virtual domains

Tupakula, U., Varadharajan, V. & Dutta, D., 2012, 2012 19th International Conference on High Performance Computing, HiPC 2012. Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 1-9 9 p. 6507491

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

3 Citations (Scopus)

TREASURE: trust enhanced security for cloud environments

Varadharajan, V. & Tupakula, U., 2012, Proceedings: the 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2012), the 11th IEEE International Conference on Ubiquitous Computing and Communications (IUCC 2012): 25-27 June 2012, Liverpool, UK. Min, G., Wu, Y., Liu, L. C., Jin, X., Jarvis, S. & Al-Dubai, A. Y. (eds.). Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 145-152 8 p. 6295969

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

6 Citations (Scopus)
2013

Integrated Security Architecture for Virtual Machines

Varadharajan, V. & Tupakula, U., 2013, Security and privacy in communication networks: 9th International ICST Conference, SecureComm 2013 Sydney, NSW Australia, September 2013 Revised Selected Papers. Zia, T., Zomaya, A., Varadharajan, V. & Mao, M. (eds.). Cham: Springer, Springer Nature, p. 140-153 14 p. (Lecture Notes of the Institute for Computer Sciences Social Informatics and Telecommunications Engineering; vol. 127).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

On malware characterization and attack classification

Lee, A., Varadharajan, V. & Tupakula, U., 2013, Proceedings of the First Australasian Web Conference (AWC 2013). Ashman, H., Sheng, Q. Z. & Trotman, A. (eds.). Sydney: Australian Computer Society, p. 43-48 6 p. (Conferences in Research and Practice in Information Technology (CRPIT); vol. 144).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

On the security of tenant transactions in the cloud

Varadharajan, V. & Tupakula, U., 2013, Proceedings: IEEE Fifth International Conference on Cloud Computing Technology and Science. Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 525-530 6 p. (Proceedings of the International Conference on Cloud Computing Technology and Science, CloudCom).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

1 Citation (Scopus)

Securing mobile devices from DoS attacks

Tupakula, U. & Varadharajan, V., 2013, Proceedings - 16th IEEE International Conference on Computational Science and Engineering, CSE 2013. Chen, J., Cuzzocrea, A. & Yang, L. T. (eds.). Piscataway, NJ: Institute of Electrical Engineers, p. 34-41 8 p. 6755194

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

2 Citations (Scopus)

Security techniques for counteracting attacks in mobile healthcare services

Tupakula, U. & Varadharajan, V., 2013, In : Procedia Computer Science. 21, p. 374-381 8 p.

Research output: Contribution to journalConference paper

7 Citations (Scopus)

Trust enhanced security architecture for detecting insider threats

Tupakula, U. & Varadharajan, V., 2013, Proceedings: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013, 11th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA-13, 12th IEEE International Conference on Ubiquitous Computing and Communications, IUCC-2013, 16-18 July 2013, Melbourne, Victoria, Australia. Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 552-559 8 p. 6680886

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

1 Citation (Scopus)
2014

Antivirus security: Naked during updates

Min, B., Varadharajan, V., Tupakula, U. & Hitchens, M., Oct 2014, In : Software - Practice and Experience. 44, 10, p. 1201-1222 22 p.

Research output: Contribution to journalArticle

11 Citations (Scopus)
18 Citations (Scopus)

Hypervisor-based security architecture for validating DNS services (Poster)

Jayarathna, D., Tupakula, U. & Varadharajan, V., 2014, Information Security 2014 - Proceedings of the Twelfth Australasian Information Security Conference, AISC 2014. Parampalli, U. & Welch, I. (eds.). Sydney, Australia: Australian Computer Society, Vol. 149. p. 83-86 4 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

2 Citations (Scopus)

Secure monitoring for dementia patients

Tupakula, U. & Varadharajan, V., 2014, Proceedings of the 29th Annual ACM Symposium on Applied Computing, SAC 2014. New York: Association for Computing Machinery, p. 14-19 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

2 Citations (Scopus)