Priyanka VermaUniversity of Limerick | UL · Department of Electronic and Computer Engineering
Priyanka Verma
Doctor of Engineering
About
19
Publications
9,368
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
82
Citations
Introduction
Priyanka Verma is a Research Fellow at the University of Limerick. Previously she worked at University of Galway’s Data Science Institute, funded under the competitive SMART 4.0 Marie Skłodowska-Curie Action. Her main areas of research are focused on Ai in cybersecurity.
Skills and Expertise
Additional affiliations
February 2022 - January 2024
July 2015 - August 2020
Publications
Publications (19)
This paper introduces a sophisticated approach to network security, with a primary emphasis on utilizing deep learning for intrusion detection. In real-world scenarios, the high dimensionality of training data poses challenges for simple deep learning models and can lead to vanishing gradient issues with complex neural networks. Additionally, uploa...
Cloud computing (CC) offers on‐demand computing and resources to users, and organizations, and is also used in many human‐centric intelligent systems. Attacks in cloud networks cause huge damage to service providers and users. Distributed Denial of Service (DDoS) is one of them that greatly impacts the cloud network. The unavailability of resources...
In the realm of smart manufacturing, predictive maintenance plays a pivotal role in ensuring equipment reliability, minimizing downtime, optimizing costs, and reducing product failure rate by detecting faulty products in the early stage. However, the efficacy of predictive maintenance hinges on the quality of training data employed for predictive m...
The emergence of Industry 4.0 has transformed modern-day factories into high-tech industrial sites through rapid automation and increased access to real-time data. Deep learning approaches possessing superior capabilities for intelligent, data-driven fault diagnosis have become critical in ensuring process safety and reliability in these industrial...
The diverse nature and increasing reliance on virtual systems, cloud computing offers countless services to clients. However, this reliance also makes these services vulnerable to Distributed Denial of Service (DDoS) attacks. Detection of such attacks and mitigating their effects is crucial. Recent studies have found that ensemble techniques, like...
The present era of technology improves the health care services and Wireless Body Area Network (WBAN) is one of them. It is a technology which uses wireless sensors to gather the vital signs from human body for monitoring. The WBAN is often connected with cloud to overcome processing and storage limitations. However, using cloud with WBAN opens up...
In recent years Cyber-Physical Systems (CPS) and Industrial Internet of Things (IIoT) have gained significant attraction; however, it remains a vulnerable target for cyberattacks. Machine learning techniques have garnered interest in security applications due to their rapid processing capabilities and real-time predictions. However, imbalanced data...
5G emerges as the bedrock for the Industrial Internet of Things (IIoT), it facilitates the seamless, low-latency fusion of artificial intelligence and cloud computing, thereby fortifying the entire industrial procedure within a framework of smart and intelligent IIoT ecosystems. Concurrently, the continuously changing landscape of cybersecurity thr...
The rapid development in manufacturing industries due to the introduction of IIoT devices has led to the emergence of Industry 4.0 which results in an industry with intelligence, increased efficiency and reduction in the cost of manufacturing. However, the introduction of IIoT devices opens up the door for a variety of cyber threats in smart indust...
In today’s world, the growth of computer networks is exponential as networking is an essential part of the latest technologies like Internet of Things (IoT), cloud computing, edge computing, etc., with the adoption of new technologies; security has become an important issue for such techniques. These networks need to be saved from a wide range of a...
Worldwide acceptance of cloud computing is increasing day by day because it provides large amount of IT resources in a very simplified and economic manner. Cloud provides high security to its customers, but still there are some vulnerabilities present in cloud that attracts many attackers. Distributed denial-of-service (DDoS) attack is one of the n...
Objectives: Cloud is becoming a very assertive computing platform now a days due to the availability of resources in a customized manner. But DDoS attack is a very dangerous as it directly affects the availability of resources. So the objective of the paper is to mitigate DDoS attack in cloud network using threshold based technique. Methods/Statist...