Publications

International Journal Publications

  1. G. Garg, S. Gupta, Preeti Mishra, A. Vidyarthi, A. Singh and A. Ali, "CROPCARE: An Intelligent Real-Time Sustainable IoT System for Crop Disease Detection Using Mobile Vision," in IEEE Internet of Things Journal, pg. 1-12, 2023, DOI: 10.1109/JIOT.2023.3109019 [SCI, IF: 9.471]

    https://ieeexplore.ieee.org/document/9526759
  2. Prithviraj Singh Bisht, Preeti Mishra, Pushpanjali Chauhan, R. C. Joshi, "HyperGuard: On designing Out-VM Malware Analysis Approach to Detect Intrusions from Hypervisor in Cloud Environment," International Journal of Grid and Utility Computing (IJGUC), vol. 14, no. 4, pp. 1—12, 2023. ISSN: 1741-847X / 1741-8488. (ESCI and Scopus Indexed)

    https://www.inderscience.com/info/ingeneral/forthcoming.php?jcode=IJGUC
  3. Preeti Mishra, A. Gupta, P. Aggarwal and E. Pilli, "vServiceInspector: Introspection-assisted evolutionary bag-of-ngram approach to detect malware in cloud servers", Ad hoc Networks, Elsevier, vol. 131, pp. 1—9, 2022. [SCI, IF: 4.816]

    https://www.sciencedirect.com/science/article/abs/pii/S1570870522000439
  4. Senthil Kumar J, Preeti Mishra, Nour Moustafa, and Rahul Chauhan, “A Holistic Survey on the Use of Emerging Technologies to Provision Secure Healthcare Solutions,” Computers & Electrical Engineering, pg. 1-26, 2022. ISSN: 0045-7906 [SCI, IF: 3.8]

    https://www.sciencedirect.com/science/article/abs/pii/S0045790622000131
  5. Preeti Mishra, P. Aggarwal, A. Vidyarthi, P. Singh, B. Khan, H. H. Alhelou, P. Siano, "VMShield: Memory Introspection-based Malware Detection to Secure Cloud-based Services against Stealthy Attacks," in IEEE Transactions on Industrial Informatics, vol. 7, no. 10, pp. 6754 – 6764, 2021. [SCI, IF: 9.11].

    https://ieeexplore.ieee.org/document/9312437
  6. Preeti Mishra, V. Varadharajan, E. S. Pilli, and U. Tupakula, "VMGuard: VMI- assisted security architecture for intrusion detection in cloud environment," IEEE Transactions on Cloud Computing, IEEE, vol. 8, no 3, pp. 957-971, 2020 [SCI, IF: 5.967].

    https://ieeexplore.ieee.org/document/8344510
  7. Preeti Mishra, V. Varadharajan, E. S. Pilli, and U. Tupakula, "Detailed Investigation and Analysis of using Machine Learning Techniques for Intrusion Detection, " IEEE Communication Surveys and Tutorials, vol. 21, no. 1, pp. 686 - 728, 2019 [SCI, IF: 35.6] 500+ citations

    https://ieeexplore.ieee.org/document/8386762
  8. Preeti Mishra, E. S. Pilli, V. Varadharajan, and U. Tupakula, "Intrusion detection techniques in cloud environment: A survey," Journal of Network and Computer Applications, Elsevier, vol. 77, pp. 18-47, 2017 [SCI, IF: 5.57]

  9. Preeti Mishra, E. S. Pilli, V. Varadharajan, and U. Tupakula, "VAED: VMI-assisted evasion detection approach for infrastructure as a service cloud," Concurrency and Computation: Practice and Experience, Wiley, vol. 29, no. 12, pp. 1-21, 2017. [SCI, IF: 1.447]

    https://onlinelibrary.wiley.com/doi/abs/10.1002/cpe.4133
  10. Preeti Mishra, E. S. Pilli, V. Varadharajan, and U. Tupakula, "PSI-NetVisor: Program Semantic Aware Intrusion Detection at Network and Hypervisor Layer in Cloud, " Journal of Intelligent and Fuzzy Systems, vol. 32, no. 4, pp. 2909-2921, 2017. [SCI, IF: 1.857]

    https://content.iospress.com/articles/journal-of-intelligent-and-fuzzy-systems/ifs169234
  11. Preeti Mishra, I. Verma, S. Gupta, "KVMInspector: KVM based Introspection Approach to Detect Malware in Cloud Environment", Int. J. of Information Security and Applications, vol. 51, pp. 1--12, 2020. [SCI, IF: 2.327], ISSN: 2214-2126

    https://www.sciencedirect.com/science/article/abs/pii/S2214212619303898
  12. C. Negi, Preeti Mishra, P. Chaudhary, H. Vardhan, “A Review and Case Study on Android Malware: Threat Model, Attacks, Techniques and Tools”, Journal of Cyber Security and Mobility, vol. 10, no. 1, pp. 1—21, 2021. DOI: 10.13052/jcsm2245-1439.1018

    https://journals.riverpublishers.com/index.php/JCSANDM/article/view/5261
  13. A. Vishnoi, Preeti Mishra, C. Negi, S. K. Peddoju, “Android Malware Detection Techniques in Traditional and Cloud Computing Platforms: A State-of-the-art Survey”, International Journal of Cloud Applications and Computing (IJCAC), IGI Global, vo. 11, no. 4, pp. 1—23, 2021. DOI: 10.4018/IJCAC.2021100107

    https://www.igi-global.com/gateway/article/288777
  14. U. Tupakula, V. Varadharajan, Preeti Mishra "Securing SDN Controller and Switches from Attacks", Int. J. High Performance Computing and Networking, vol. 14, no. 1, pp. 77-91, 2019.

    https://www.inderscienceonline.com/doi/abs/10.1504/IJHPCN.2019.099746
  15. P. Bisht, N. Negi, Preeti Mishra, P. Chauhan, "A Comparative Study on Various Data Mining Tools for Intrusion Detection," International Journal of Scientific & Engineering Research, vol. 9, no. 5, pp. 1--8, 2018.

    https://www.ijser.org/researchpaper/A-Comparative-Study-on-Various-Data-Mining-Tools-for-Intrusion-Detection.pdf
  16. Prithviraj Singh Bisht, Preeti Mishra, Pushpanjali Chauhan, R. C. Joshi, "HyperGuard: On designing Out-VM Malware Analysis Approach to Detect Intrusions from Hypervisor in Cloud Environment," International Journal of Grid and Utility Computing (IJGUC), pp. 1—12, 2020. ISSN: 1741-847X / 1741-8488. (In-Press, ESCI and Scopus Indexed)

    https://www.inderscience.com/info/ingeneral/forthcoming.php?jcode=IJGUC

Publications in International Conference

  1. A.Nautiyal, S.Saklani, A.Pant, Y.Agarwal, A.Gaur, and P.Mishra VNSecure: An explainable virtual network attack detection framework at VMM-Layer in virtualization environment,” In proceeding of the 2023 Fifteen International Conference on Contemporary Computing (IC3-2023). Association for Computing Machinery, New York, NY, USA https://doi.org/10.1145/3607947.3607974

  2. A. Gaur, A. Singh, A. Nautiyal, G. Kothari, P. Mishra, A. Jha. “DeepHyperv: A deep neural network based virtual memory analysis for malware detection at hypervisor-layer”, In “AICAPS 2023” pp. 1-6, 2023. DOI: 10.1109/AICAPS57044.2023.10074347

  3. M. Bhatt, A. Gaur, S. Badoni, and Preeti Mishra, “Advanced malware and their impact on virtualization: A case study on hybrid feature extraction using deep memory introspection,” Proceedings of the 2022 Fourteenth International Conference on Contemporary Computing, Aug. 2022, pp. 74--80. DOI: 10.1145/3549206.3549223.

  4. S., A. Gupta, Preeti Mishra, “Blockchain Based Framework to Maintain Chain of Custody (CoC) in a Forensic Investigation,” In: Advances in Computing and Data Sciences. ICACDS 2021. Communications in Computer and Information Science, vol 1440, Springer, Cham. https://doi.org/10.1007/978-3-030-81462-5_4.

  5. R. Sharma, S. Dangi and Preeti Mishra, "A Comprehensive Review on Encryption based Open Source Cyber Security Tools," 2021 6th International Conference on Signal Processing, Computing and Control (ISPCC), 2021, pp. 614-619, doi: 10.1109/ISPCC53510.2021.9609369.

  6. Aparna Tomar, Diksha Jeena, Preeti Mishra, Rahul Bisht, “Docker Security: A Threat Model, Attack Taxonomy and Real-Time Attack Scenario of DoS”, 10th International Conference on Cloud Computing, Data Science & Engineering Confluence-2020, pp. 150—155, 2020.

  7. Shivam Gupta, Garima Garg, Preeti Mishra and R. C. Joshi, “CDMD: An Efficient Crop Disease Detection and Pesticide Recommendation System using Mobile Vision and Deep Learning,” International conference on big data machine learning & their applications (ICBMA), 2020, pp. 295-305. Scopus Indexed

  8. Vidur Agarwal, Preeti Mishra and Sachin Kumar, Emmanuel S. Pilli, “A Review on Attacking & Security Tools at Network-layer of IoT,” International Conference on Optical and Wireless Technologies, 2020, pp. 1—10. (accepted) Scopus Indexed

  9. Ankit Sinha, Sachin Kuma, Preeti Mishra, Umang Garg, and Arpit Agarwal, “A Review and Case Study on Attacking and Security Tools at Application-Layer of IoT,” 5th International Conference on Internet of Things and Connected Technologies (ICIoTCT), 2020, pp. 1—13. (accepted) Scopus Indexed

  10. Preeti Mishra, Sachin Kumar, Umang Garg, Emmanuel S. Pilli, “Security Perspectives of Various IoT Cloud Platforms: A Review & Case Study,” International Conference on Computing, Communication, and Intelligent Systems (ICCCIS-2021), pp. 1—12, 2021 [Accepted]. Scopus indexed

  11. Preeti Mishra, K. Khurana, S. Gupta and M. K. Sharma, "VMAnalyzer: Malware Semantic Analysis using Integrated CNN and Bi-Directional LSTM for Detecting VM-level Attacks in Cloud," 2019 Twelfth International Conference on Contemporary Computing (IC3), Noida, India, 2019, pp. 1-6, doi: 10.1109/IC3.2019.8844877.

  12. Preeti Mishra, Ishita Verma, Saurabh Gupta, Varun Gupta and K. Kadarla, “vProVal: Introspection-based Process Validation for Detecting Malware in KVM-based Cloud Environment”, Fourth IEEE International Conference on Fog and Mobile Edge Computing (FMEC 2019), Rome, Italy, pp.271—277, 2019.

  13. Kamal Kumar Ghanshala, Preeti Mishra, R. C. Joshi, S. Sharma, "BNID: A Behavior-based Network Intrusion Detection at Network-Layer in Cloud Environment," IEEE Conference on Secure Cyber Computing & Communication, (ICSCCC 2018), NIT Jalandhar, pp:100--105, 2018.

  14. K. K. Ghanshala, S. Sharma, S. Mohan, L. Nautiyal, Preeti Mishra, R. C. Joshi, "Self-Organizing Sustainable Spectrum Management Methodology in Cognitive Radio Vehicular Adhoc Network (CRAVENET) Environment: A Reinforcement Learning Approach," IEEE Conference on Secure Cyber Computing & Communication, (ICSCCC 2018), NIT Jalandhar, pp:1--5, 2018. [In-Press]

  15. Preeti Mishra, E. S. Pilli, V. Varadharajan, and U. Tupakula, "Out-VM monitoring for malicious network packet detection in cloud environment," in IEEE ISEA Asia Security and Privacy Conference (Asia SP 2016), IEEE, NIT Surat, India, Jan 2017, pp. 1-10.

  16. Preeti Mishra, E. S. Pilli, V. Varadharajan, and U. Tupakula, "Securing Virtual Machines from Anomalies Using Program-Behavior Analysis in Cloud Environment," in IEEE 18th International Conference on High Performance Computing and Communications (HPCC 2016), Sydney, Australia, Dec 2016, pp. 991-998.

  17. Preeti Mishra, E. S. Pilli, V. Varadharajan, and U. Tupakula, "NvCloudIDS: A Security Architecture to Detect Intrusions at Network and Virtualization Layer in Cloud Environment," in IEEE 5th International Conference on Advances in Computing, Communications and Informatics (ICACCI 2016), Jaipur, India, Sept 2016, pp. 56-62.

  18. Preeti Mishra, E. S. Pilli, V. Varadharajan, and U. Tupakula, "Efficient approaches for intrusion detection in cloud environment," in IEEE International Conference on Computing, Communication and Automation (ICCCA 2016), Greater Noida, India, 2016, pp. 1211-1216.

  19. A. Kashyap, G. S. Kumar, S. Jangir, E. S. Pilli and Preeti Mishra, “IHIDS: Introspection-Based Hybrid Intrusion Detection System in Cloud Environment,” IEEE 6th International Conference on Advances in Computing, Communications and Informatics (ICACCI 2017), Karnataka, India, Sept 2017, pp. 1-7[Accepted].

  20. N. Chand, Preeti Mishra, C. Ramakrishna, E. S. Pilli and M. C. Govil, “A Comparative Analysis of SVM and its Stacking with other Classification Algorithm for Intrusion Detection,” International Conference on Advances in Computing, Communication & Automation (ICACCA 2016), Dehradun, India, April 2016, pp. 1-6.

  21. R. Sharma, P. Sharma, Preeti Mishra, and E. S. Pilli, “Towards MapReduce Based Classification Approaches for Intrusion Detection,” Sixth International Conf. on Cloud System and Big Data Engineering (Confluence 2016), Noida, India, Jan 2016, pp. 361-367.

  22. S. Gupta, E. S. Pilli, Preeti Mishra, S. Pundir, and R. C. Joshi, “Forensic Analysis of E-mail Address Spoofing,” in Fifth International Conference on Cloud Security and Big Data (Confluence 2014), Noida, India, Sept 2014, pp. 898 – 904.

  23. P. Mishra, E. S. Pilli, and R. C. Joshi, "Forensic Analysis of E-mail Date and Time Spoofing," in 3rd International Conference on Computer and Communication Technology (ICCCT), Allahabad, India, Nov. 2012, pp. 309-314.

  24. P. Mishra, A. Negi, E. S. Pilli, R. C. Joshi, “VMProtector: Malign Process Detection for Protecting Virtual Machines in Cloud Environment,” In: Advances in Computing and Data Sciences, ICACDS 2019. Communications in Computer and Information Science, vol. 1045, Springer, Singapore, pp. 360-369, 2019. https://doi.org/10.1007/978-981-13-9939-8_32

  25. P. Ranjan, P. Mishra, J. S. Rawat, E. S. Pilli, R. C. Joshi, “Improved Technique for Data Confidentiality in Cloud Environment,” Fifth International Conference on Networks & Communications (NetCom 2013), Chennai, India, LNEE, volume 284 December 2013, pp. 183-193, ISBN-978-3-319-03691, 2013. https://doi.org/10.1007/978-3-319-03692-2_15

Book Chapter Pusblished

  1. U. Garg, P. Mishra, R. C. Joshi, “A Layered Internet of Things (IoT) Security Framework: Attacks, Counter Measures and Challenges,” in Cloud Network Management, 1st ed.,Taylor & Francis CRC Press, ISBN- 978-0-367-25605-0, pp. 1--23 2020. DOI: 10.1201/9780429288630, 27 October 2020

  2. R. Chauhan, P. Mishra, R. C. Joshi, “A Novel Framework of smart cities for Indian subcontinent using Internet of Things (IoT): Opportunities and challenges,” in Cloud Network Management, 1st ed., Taylor & Francis CRC Press, ISBN- 978-0-367-25605-0, pp. 1--20 2020. DOI: 10.1201/9780429288630, 27 October 2020

  3. Rahul Chauhan, Preeti Mishra* and R. C. Joshi, “An Overview of Digital Image forensics technique: Image morphing & forgery detection algorithms,” in Information Security and Optimization, 1st ed., CRC Press, Taylor & Francis, pp. 1—14, 2020, ISBN: 9781003045854. DOI: 10.1201/9781003045854, 19 Nov 2020

  4. A. Nautiyal, S. Saklani, P. Mishra, S. Kumar, H. Bisht. “A state-of-the art survey on various attacks and security tools at virtualization-layer of cloud computing: A virtual network security perspective” In “Integration of Cloud Computing with Emerging Technologies: Issues, Challenges, and Practices”, 2023, pp. 1-12. (In Press)

  5. A. Singh, A. Gaur, G. Kothari, Y. Agarwal, Tejaswi, P. Mishra, S. K. Jagatheesaperumal. “Robust, Efficient and Interpretable Adversarial AI Models” In “Artificial Intelligence for Intrusion Detection Systems” in CRC Press, Taylor & Francis Group, 2023, pp. 1-38. (In Press)

Book Published (Authored)

  1. Preeti Mishra, Emmanuel S. Pilli, R. C. Joshi, “Cloud Security: Attacks, Techniques, Tools, and Challenges,” 1st ed., Taylor & Francis CRC Press, 2022. ISBN 978-0367435820