292 results on '"Majumdar, Suryadipta"'
Search Results
2. Evaluating the Security Posture of 5G Networks by Combining State Auditing and Event Monitoring
3. DPOAD: Differentially Private Outsourcing of Anomaly Detection through Iterative Sensitivity Learning
4. On Reducing Underutilization of Security Standards by Deriving Actionable Rules: An Application to IoT
5. On Reducing Underutilization of Security Standards by Deriving Actionable Rules: An Application to IoT
6. MLFM: Machine Learning Meets Formal Method for Faster Identification of Security Breaches in Network Functions Virtualization (NFV)
7. CCSM: Building Cross-Cluster Security Models for Edge-Core Environments Involving Multiple Kubernetes Clusters
8. Towards an Attention-Based Accurate Intrusion Detection Approach
9. SECURITY AUDITING OF INTERNET OF THINGS DEVICES IN A SMART HOME
10. Proactive Security Auditing in Clouds
11. Runtime Security Policy Enforcement in Clouds
12. User-Level Runtime Security Auditing for the Cloud
13. Auditing Virtual Network Isolation Across Cloud Layers
14. Auditing Security Compliance of the Virtualized Infrastructure
15. Literature Review
16. Introduction
17. MLFM: Machine Learning Meets Formal Method for Faster Identification of Security Breaches in Network Functions Virtualization (NFV)
18. Traditional IOCs Meet Dynamic App-Device Interactions for IoT-Specific Threat Intelligence
19. Proactively Extracting IoT Device Capabilities: An Application to Smart Homes
20. Conclusion
21. Proactivizer: Transforming Existing Verification Tools into Efficient Solutions for Runtime Security Enforcement
22. Cloud Security Auditing: Major Approaches and Existing Challenges
23. SECURITY AUDITING OF INTERNET OF THINGS DEVICES IN A SMART HOME
24. Stealthy Probing-Based Verification (SPV): An Active Approach to Defending Software Defined Networks Against Topology Poisoning Attacks
25. Layered Security Analysis for Container Images: Expanding Lightweight Pre-Deployment Scanning
26. Proactively Extracting IoT Device Capabilities: An Application to Smart Homes
27. LeaPS: Learning-Based Proactive Security Auditing for Clouds
28. A Tenant-based Two-stage Approach to Auditing the Integrity of Virtual Network Function Chains Hosted on Third-Party Clouds
29. Proactive Verification of Security Compliance for Clouds Through Pre-computation: Application to OpenStack
30. Caught-in-Translation (CiT): Detecting Cross-Level Inconsistency Attacks in Network Functions Virtualization (NFV)
31. iCAT+: An Interactive Customizable Anonymization Tool Using Automated Translation Through Deep Learning
32. Introduction
33. Cloud Security Auditing
34. Runtime Security Policy Enforcement in Clouds
35. Auditing Security Compliance of the Virtualized Infrastructure
36. Literature Review
37. Conclusion
38. Proactive Security Auditing in Clouds
39. Cloud Security Auditing: Major Approaches and Existing Challenges
40. User-Level Runtime Security Auditing for the Cloud
41. Auditing Virtual Network Isolation Across Cloud Layers
42. Innovations in Digital Forensics
43. Caught-in-Translation (CiT): Detecting Cross-level Inconsistency Attacks in Network Functions Virtualization (NFV)
44. Stealthy Probing-Based Verification (SPV): An Active Approach to Defending Software Defined Networks Against Topology Poisoning Attacks
45. 5GFIVer: Functional Integrity Verification for 5G Cloud-Native Network Functions
46. ProSAS: Proactive Security Auditing System for Clouds
47. LeaPS: Learning-Based Proactive Security Auditing for Clouds
48. ProSPEC: Proactive Security Policy Enforcement for Containers
49. Proactive Verification of Security Compliance for Clouds Through Pre-computation: Application to OpenStack
50. Feature Reduction through Data Preprocessing for Intrusion Detection in IoT Networks
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.