Search

Your search keyword '"Majumdar, Suryadipta"' showing total 292 results

Search Constraints

Start Over You searched for: Author "Majumdar, Suryadipta" Remove constraint Author: "Majumdar, Suryadipta"
292 results on '"Majumdar, Suryadipta"'

Search Results

1. Evaluating the Security Posture of 5G Networks by Combining State Auditing and Event Monitoring

3. DPOAD: Differentially Private Outsourcing of Anomaly Detection through Iterative Sensitivity Learning

4. On Reducing Underutilization of Security Standards by Deriving Actionable Rules: An Application to IoT

6. MLFM: Machine Learning Meets Formal Method for Faster Identification of Security Breaches in Network Functions Virtualization (NFV)

8. Towards an Attention-Based Accurate Intrusion Detection Approach

9. SECURITY AUDITING OF INTERNET OF THINGS DEVICES IN A SMART HOME

10. Proactive Security Auditing in Clouds

11. Runtime Security Policy Enforcement in Clouds

12. User-Level Runtime Security Auditing for the Cloud

13. Auditing Virtual Network Isolation Across Cloud Layers

14. Auditing Security Compliance of the Virtualized Infrastructure

15. Literature Review

16. Introduction

19. Proactively Extracting IoT Device Capabilities: An Application to Smart Homes

20. Conclusion

21. Proactivizer: Transforming Existing Verification Tools into Efficient Solutions for Runtime Security Enforcement

22. Cloud Security Auditing: Major Approaches and Existing Challenges

24. Stealthy Probing-Based Verification (SPV): An Active Approach to Defending Software Defined Networks Against Topology Poisoning Attacks

27. LeaPS: Learning-Based Proactive Security Auditing for Clouds

29. Proactive Verification of Security Compliance for Clouds Through Pre-computation: Application to OpenStack

30. Caught-in-Translation (CiT): Detecting Cross-Level Inconsistency Attacks in Network Functions Virtualization (NFV)

31. iCAT+: An Interactive Customizable Anonymization Tool Using Automated Translation Through Deep Learning

32. Introduction

33. Cloud Security Auditing

34. Runtime Security Policy Enforcement in Clouds

35. Auditing Security Compliance of the Virtualized Infrastructure

36. Literature Review

37. Conclusion

38. Proactive Security Auditing in Clouds

40. User-Level Runtime Security Auditing for the Cloud

41. Auditing Virtual Network Isolation Across Cloud Layers

46. ProSAS: Proactive Security Auditing System for Clouds

Catalog

Books, media, physical & digital resources