International Journal Articles
Gunjan Kumar Saini and Gaurav Somani, "Is There a DDoS?: System+Application Variable Monitoring to Ascertain the Attack Presence," in IEEE Transactions on Network and Service Management, doi: 10.1109/TNSM.2024.3451613 (IF= 4.7).
Anmol Kumar, Gaurav Somani, and Mayank Agrawal, "Comparing HAProxy Scheduling Algorithms During the DDoS Attacks" , IEEE Networking Letters, 2024 (in press).
Hawa Singh Gurjar and Gaurav Somani, Amplification/Reflection attack suppression using victim separation, IEEE Networking Letters, 2023.
Anmol Kumar, Gaurav Somani, DDoS at a glance: attack launch to solutions", IEEE IT Professional Magazine, 2023 (IF 2.59).
Anmol Kumar, Gaurav Somani, Service separation assisted DDoS attack mitigation in cloud targets, Journal of Information Security and Applications, 2023 (IF= 4.96).
Bharat Manral, Gaurav Somani, Establishing forensics capabilities in the presence of superuser insider threats, Digital Investigation Journal, Elsevier, 2021. (IF=2.86).
Arpita Patidar, Gaurav Somani, Serving While Attacked: DDoS Attack Effect Minimization Using Page Separation and Container Allocation Strategy, Journal of Information Security and Applications, 2021, (IF=4.96).
Shweta Saharan, Gaurav Somani, Gaurav Gupta, Robin Verma, Manoj Singh Gaur, and Rajkumar Buyya, "QuickDedup - Ecient Deduplication of VM Images", Journal of Parallel and Distributed Computing (JPDC), Elsevier, Volume 139, pp 18-31, 2020 (CORE A*, IF=4.542).
Bharat Manral, Gaurav Somani, KK Raymond Choo, Mauro Conti, Manoj Singh Gaur, "A Systematic Survey on Cloud Forensics Challenges, Solutions, and Future Directions", ACM Computing Surveys, Volume 52 (6), 2019 (CORE A*, IF= 14.324).
Jyoti Gajrani, Meenakshi Tripathi, Akka Zemmari, Vijay Laxmi, Gaurav Somani, Manoj Singh Gaur, "Vulvet: Vetting of Vulnerabilities in Android Apps to Thwart Exploitation", ACM Digital Threats: Research and Practice Journal (DTRAP), 2020.
Gaurav Somani, Manoj S Gaur, Dheeraj Sanghi, Mauro Conti, and Muttukrishnan Rajarajan, Scale Inside-out: Rapid Mitigation of Cloud DDoS Attacks, IEEE Transactions on Dependable and Secure Computing, 2018 (IF= 6.791).
Gaurav Somani, Manoj Singh Gaur, Dheeraj Sanghi, Mauro Conti, and Rajkumar Buyya, DDoS Attacks in Cloud Computing: Issues, Taxonomy, and Future Directions, (Elsevier), Computer Communications, Volume 107, 2017. (IF = 5.047) (Best Survey Paper Award 2020 and listed by Elsevier as one of the most cited and downloaded paper in the journal).
Gaurav Somani, Manoj Singh Gaur, Dheeraj Sanghi, Mauro Conti, Muttukrishnan Rajarajan, and Rajkumar Buyya, Combating DDoS Attacks in Cloud: Current Requirements and Future Trends, IEEE Cloud Computing, vol. 4, no. 1, pp. 22-32, Jan.-Feb. 2017. (IF=4.393)
Gaurav Somani, Manoj Singh Gaur, Dheeraj Sanghi, Mauro Conti, and Muttukrishnan Rajarajan, DDoS Victim Service Containment to Minimize Internal Collateral Damages in Cloud Computing, (Elsevier) Computers and Electrical Engineering, 2017. (IF = 4.152))
Gaurav Somani, Manoj Singh Gaur, Dheeraj Sanghi, Mauro Conti, and Rajkumar Buyya, Resizing Services to Support Quick DDoS Mitigation in Cloud Computing Environment, (Springer), Annals of Telecommunications, vol. 72, 2017. (IF = 1.901)
Gaurav Somani, Manoj Singh Gaur, Dheeraj Sanghi and Mauro Conti, DDoS attacks in Cloud Computing: Collateral Damage to Non-targets, (Elsevier) Computer Networks, volume 109 (2), 2016. (IF = 5.493)
Nathani, Amit, Sanjay Chaudhary, and Gaurav Somani. Policy based resource allocation in IaaS cloud, (Elsevier) Future Generation Computer Systems, vol. 28, no. 1 (2012): 94-103. (listed by Elsevier as one of the most downloaded paper in the journal). (IF = 7.307)
Journal Editorial
Gaurav Somani, Xinghui Zhao, Satish Narayana Srirama, Rajkumar Buyya: Editorial: Integration of Cloud, Internet of Things and Big Data Analytics, Software: Practice and Experience, Volume 49 Number 4, 2019. Wiley (IF=2.028).
Book Chapters
Anmol Kumar and Gaurav Somani, Cyber Attack Victim Separation: New Dimensions to Minimize Attack Effects by Resource Management, Book: Resource Management in Distributed Systems, Book Series: Studies in Big Data, Vol. 151, Eds: Anwesha Mukherjee et al, 978-981-97-2643-1, Springer, 2024.
Gunjan Kumar Saini and Gaurav Somani, Resource Targeted Cybersecurity Attacks in Cloud Computing Environments, Book: Resource Management in Distributed Systems, Book Series: Studies in Big Data, Vol. 151, Eds: Anwesha Mukherjee et al, 978-981-97-2643-1, Springer, 2024.
Anmol Kumar and Gaurav Somani, "Security Infrastructure for cyber attack targeted networks and services" in "Recent Advancements in ICT infrastructure and applications", Publisher: Springer, Book Series: Studies in Infrastructure and Control, 2022.
Gulshan Kumar Singh and Gaurav Somani, Cross-VM Attacks: Attack Taxonomy, Defense Mechanisms, and New Directions in Versatile Cybersecurity, Publisher: Springer International Publishing, Series: Advances in Information Security, 2018.
Prateek Khandelwal and Gaurav Somani, VM Placement in Infrastructure Clouds in End-to-End Cloud Computing Architecture Design, Book Series: Advances in Systems Analysis, Software Engineering, and High Performance Computing (ASASEHPC), IGI Global, 2016.
Aditya Kaushal Ranjan and Gaurav Somani, Access Control and Authentication in Internet of Things, in Connectivity Frameworks for Smart Devices: The Internet of Things from a Distributed Computing Perspective, July, 2016.
Gaurav Somani, Manoj Singh Gaur and Dheeraj Sanghi, DDoS Protection and Security Assurance in Cloud in Guide to Security Assurance for Cloud Computing, Computer and Communications and Networks, Springer, September, 2015.
Shweta Saharan and Gaurav Somani, Security of Cloud Storage in Guide to Security Assurance for Cloud Computing, Book Series: Computer and Communications and Networks, Springer, September, 2015.
Refereed International Conferences
Gunjan Kumar Saini and Gaurav Somani, DDoS detection in cloud using target OS parameters and page transitions", 4th International Conference on Information Security, Privacy and Digital Forensics (ICISPD 2025), Sardar Vallabhbhai National Institute of Technology, Surat, 21-23 November 2025.
Shivam Kumar and Gaurav Somani, “ContainerScale: Dynamic Container Scaling to Mitigate DDoS Attack”, 17th International Conference on Contemporary Computing (IC3), New Delhi, IEEE, 2025.
Anmol Kumar and Gaurav Somani, "On the timing of applying resource separation during DDoS attacks", 4th Workshop on Secure IoT, Edge and Cloud Systems (Colocated with The 23rd IEEE/ACM International Symposium on Cluster, Cloud and Internet Computing, CCGRID, May 1-4, 2023, IISc Bangalore, INDIA.
Anmol Kumar and Gaurav Somani, "DDoS attack mitigation in cloud targets using scale-inside out assisted container separation" IEEE Infocom Workshop: ICCN 2022: IEEE International Workshop on Intelligent Cloud Computing and Networking, London, UK.
Gulshan Kumar Singh and Gaurav Somani, "Detecting Cloud originated DDoS attacks at the source using Out-cloud attack detection (OCAD)", 18th Int'l Conf. on Information Systems Security (ICISS), IIT Tirupati, Dec 17-20, India, 2022 (Scopus)
Tejpal Kumar and Gaurav Somani, "Origin information assisted hybrid analysis to detect APT malware", 17th Int'l Conf. on Information Systems Security (ICISS), IIT Patna, Dec 17-20, India, 2021.
Venkatesh Gauri Shankar, Gaurav Somani, Manoj Singh Gaur, Vijay Laxmi and Mauro Conti, AndroTaint: An Efficient Android Malware Detection Framework using Dynamic Taint Analysis, 1st Asia Security & Privacy (Asia S&P 2017), Surat, India, Jan 2017.
Bhupendra Singh, Ravi Saharan, Gaurav Somani and Gaurav Gupta, Secure Deletion and Its Countermeasures on Solid State Drives, Twelfth IFIP WG 11.9 International Conference on Digital Forensics, New Delhi, India, 2015.
Gaurav Somani, Abhinav Johri, Mohit Taneja and Utkarsh Pyne, Manoj S Gaur, Dheeraj Sanghi, DDoS Mitigation using DDoS Aware Resource Allocation in Cloud (DARAC), Eleventh Int'l Conf. on Information Systems Security (ICISS), Kolkata, Dec 17-20, India, 2015.
Venkatesh Gauri Shanker and Gaurav Somani, Anti-Hijack: Runtime Detection of Malware Initiated Hijacking in Android, 1st International Conference on Information Security and Privacy (ICISP 2015), Nagpur, India, 11-12 December 2015 (Best Paper Award).
Gaurav Somani, Manoj S Gaur, Dheeraj Sanghi, DDoS/EDoS attack in Cloud: Affecting everyone out there!, Eighth Int'l Conf. on Security of Information and Networks (SIN), ACM, Sochi, Russia, September 2015.
Bhardwaj, Varun, Sharma, Anamika and Gaurav Somani, Client-Side Veri able Accounting in infrastructure Cloud. In Advances in Computing, Communications and Informatics (ICACCI), 2015 International Conference on, Cochin, India, IEEE, 2015.
Gaurav Somani, Mayank Indoria, Binny Tewani and Srimanikantha Tangudu. VMBooter: A Specialized Virtual Machine Boot Server In An Infrastructure Cloud. In Interdisciplinary Advances in Applied Computing (ICONIAAC), International Conference on, ACM, 2014.
Kaur, Prabhjeet, and Gaurav Somani.Secure VM Backup and Vulnerability Removal in Infrastructure Clouds. In Advances in Computing, Communications and Informatics (ICACCI), 2014 International Conference on, IEEE, 2014.
Jaiman, Vikas, and Gaurav Somani. An Order Preserving Encryption Scheme for Cloud Computing. In Proceedings of the Seventh International Conference on Security of Information and Networks (SIN), Glasgow, UK. ACM, 2014.
Saini, Bhavna, and Gaurav Somani. Index Page Based EDoS Attacks in Infrastructure Cloud. In Recent Trends in Computer Networks and Distributed Systems Security, pp. 382-395. Springer Berlin Heidelberg, 2014(Scopus).
Chokhani, Pratick, and Gaurav Somani. Dynamic resource allocation using auto-negotiation in Haizea. In Contemporary Computing (IC3), 2013 Sixth International Conference on, pp. 232-238. IEEE, 2013.
Malhotra, Akshita, and Gaurav Somani. VMCloner: A Fast and Flexible Virtual Machine Cloner. In Cloud and Green Computing (CGC), 2013 Third International Conference on, pp. 181-187, Karlsluhe, Germany. IEEE, 2013.
Gaurav Somani, Akash Agarwal, and Shrutika Ladha. Overhead Analysis of Security Primitives in Cloud. In Cloud and Services Computing (ISCOS), 2012 International Symposium on, pp. 129-135. IEEE, 2012.
Vora, Dhairya, Sanjay Chaudhary, Minal Bhise, Vikas Kumar, and Gaurav Somani. Allocation of slotted deadline sensitive leases in infrastructure cloud. In Distributed Computing and Internet Technology (ICDCIT), pp. 242-252. Springer Berlin Heidelberg, 2012.
Akhani, Janki, Sanjay Chuadhary, and Gaurav Somani. Negotiation for resource allocation in IaaS cloud. In Proceedings of the Fourth Annual ACM Bangalore Conference, COMPUTE, p. 15. ACM, 2011.
Gaurav Somani and Sanjay Chaudhary. Load balancing in Xen virtual machine monitor. In Contemporary Computing(IC3), pp. 62-70. Springer Berlin Heidelberg, 2010.
Gaurav Somani and Sanjay Chaudhary. Performance isolation and scheduler behavior." In Parallel Distributed and Grid Computing (PDGC), 2010 1st International Conference on, pp. 272-277. IEEE, 2010.
Gaurav Somani and Sanjay Chaudhary. Application performance isolation in virtualization." In Cloud Computing, 2009. CLOUD'09. IEEE International Conference on, pp. 41-48. IEEE, 2009 (Top conference in Cloud Computing).
Tripathi, Jai Narayan, Gaurav Somani, Kamlesh Mundra, Shyam Sunder Verma, and Hiren Joshi. Soft-Reconguration Management for Operating Systems with Multiprocessor Architecture." In Advanced Computing and Communications, 2007. ADCOM 2007. International Conference on, pp. 573-577. IEEE, 2007.
52. Book: Research Advances in Cloud Computing
Editors: Sanjay Chaudhary, Gaurav Somani, and Rajkumar Buyya.
Publisher: Springer Science, Singapore, 2017 .
http://www.springer.com/in/book/9789811050251
>54K accesses
53. Book: Versatile Cybersecurity
Editors: Mauro Conti, Gaurav Somani, and Radha Poovendran. Publisher: Springer International (2018).
https://www.springer.com/us/book/9783319976426
>10K accesses
54. Book: Scheduling and Isolation in Virtualization
Publisher: VDM Verlag Dr. Muller Publishers, Germany, Sept. 2010.
This book is used as a text/reference book by Cork Institute of Technology, Ireland in their MSc Cloud Computing program and SRM University, India in their MTech Cloud Computing program.
http://www.amazon.com/Scheduling-Isolation-Virtualization-scheduling-isolation/dp/3639295137