Priyanka Verma

Priyanka Verma
University of Limerick | UL · Department of Electronic and Computer Engineering

Doctor of Engineering

About

19
Publications
9,368
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
82
Citations
Introduction
Priyanka Verma is a Research Fellow at the University of Limerick. Previously she worked at University of Galway’s Data Science Institute, funded under the competitive SMART 4.0 Marie Skłodowska-Curie Action. Her main areas of research are focused on Ai in cybersecurity.
Additional affiliations
February 2022 - January 2024
University of Galway
Position
  • SMART 4.0 Marie Skłodowska-Curie Fellow
July 2015 - August 2020
ABV-Indian Institute of Information Technology and Management Gwalior
Position
  • Researcher

Publications

Publications (19)
Article
Full-text available
This paper introduces a sophisticated approach to network security, with a primary emphasis on utilizing deep learning for intrusion detection. In real-world scenarios, the high dimensionality of training data poses challenges for simple deep learning models and can lead to vanishing gradient issues with complex neural networks. Additionally, uploa...
Article
Full-text available
Cloud computing (CC) offers on‐demand computing and resources to users, and organizations, and is also used in many human‐centric intelligent systems. Attacks in cloud networks cause huge damage to service providers and users. Distributed Denial of Service (DDoS) is one of them that greatly impacts the cloud network. The unavailability of resources...
Article
Full-text available
In the realm of smart manufacturing, predictive maintenance plays a pivotal role in ensuring equipment reliability, minimizing downtime, optimizing costs, and reducing product failure rate by detecting faulty products in the early stage. However, the efficacy of predictive maintenance hinges on the quality of training data employed for predictive m...
Article
Full-text available
The emergence of Industry 4.0 has transformed modern-day factories into high-tech industrial sites through rapid automation and increased access to real-time data. Deep learning approaches possessing superior capabilities for intelligent, data-driven fault diagnosis have become critical in ensuring process safety and reliability in these industrial...
Article
Full-text available
The diverse nature and increasing reliance on virtual systems, cloud computing offers countless services to clients. However, this reliance also makes these services vulnerable to Distributed Denial of Service (DDoS) attacks. Detection of such attacks and mitigating their effects is crucial. Recent studies have found that ensemble techniques, like...
Chapter
The present era of technology improves the health care services and Wireless Body Area Network (WBAN) is one of them. It is a technology which uses wireless sensors to gather the vital signs from human body for monitoring. The WBAN is often connected with cloud to overcome processing and storage limitations. However, using cloud with WBAN opens up...
Article
Full-text available
In recent years Cyber-Physical Systems (CPS) and Industrial Internet of Things (IIoT) have gained significant attraction; however, it remains a vulnerable target for cyberattacks. Machine learning techniques have garnered interest in security applications due to their rapid processing capabilities and real-time predictions. However, imbalanced data...
Article
Full-text available
5G emerges as the bedrock for the Industrial Internet of Things (IIoT), it facilitates the seamless, low-latency fusion of artificial intelligence and cloud computing, thereby fortifying the entire industrial procedure within a framework of smart and intelligent IIoT ecosystems. Concurrently, the continuously changing landscape of cybersecurity thr...
Article
Full-text available
The rapid development in manufacturing industries due to the introduction of IIoT devices has led to the emergence of Industry 4.0 which results in an industry with intelligence, increased efficiency and reduction in the cost of manufacturing. However, the introduction of IIoT devices opens up the door for a variety of cyber threats in smart indust...
Article
In today’s world, the growth of computer networks is exponential as networking is an essential part of the latest technologies like Internet of Things (IoT), cloud computing, edge computing, etc., with the adoption of new technologies; security has become an important issue for such techniques. These networks need to be saved from a wide range of a...
Article
Worldwide acceptance of cloud computing is increasing day by day because it provides large amount of IT resources in a very simplified and economic manner. Cloud provides high security to its customers, but still there are some vulnerabilities present in cloud that attracts many attackers. Distributed denial-of-service (DDoS) attack is one of the n...
Article
Full-text available
Objectives: Cloud is becoming a very assertive computing platform now a days due to the availability of resources in a customized manner. But DDoS attack is a very dangerous as it directly affects the availability of resources. So the objective of the paper is to mitigate DDoS attack in cloud network using threshold based technique. Methods/Statist...

Network

Cited By