67 results on '"Sridhar Venkatesan"'
Search Results
2. An Improved Nested Training Approach to Mitigate Clean-label Attacks against Malware Classifiers.
3. Data-Driven Constraint Mining for Realizable Adversarial Samples.
4. Data Sanitization Approach to Mitigate Clean-Label Attacks Against Malware Detection Systems.
5. Poisoning Attacks and Data Sanitization Mitigations for Machine Learning Models in Network Intrusion Detection Systems.
6. Combinatorial Boosting of Ensembles of Diversified Classifiers for Defense Against Evasion Attacks.
7. Combinatorial Boosting of Classifiers for Moving Target Defense Against Adversarial Evasion Attacks.
8. A Quantitative Framework to Model Reconnaissance by Stealthy Attackers and Support Deception-Based Defenses.
9. Harnessing the Power of Deception in Attack Graph-Based Security Games.
10. Learning and Planning in the Feature Deception Problem.
11. VulnerVAN: A Vulnerable Network Generation Tool.
12. Identifying Stealthy Attackers in a Game Theoretic Framework Using Deception.
13. Adaptive Cyber Defenses for Botnet Detection and Mitigation.
14. Moving Target Defense Quantification.
15. On Defensive Cyber Deception: A Case Study Using SDN.
16. On Detecting Manifestation of Adversary Characteristics.
17. Measuring the Effectiveness of Network Deception.
18. R-Sentry: Deception based ransomware detection using file access patterns.
19. A Framework for Moving Target Defense Quantification.
20. Detecting Stealthy Botnets in a Resource-Constrained Environment using Reinforcement Learning.
21. Defending from Stealthy Botnets Using Moving Target Defenses.
22. A moving target defense approach to mitigate DDoS attacks against proxy-based architectures.
23. A quantitative risk assessment framework for adaptive Intrusion Detection in the cloud.
24. Moving Target Defense against DDoS Attacks: An Empirical Game-Theoretic Analysis.
25. A Moving Target Defense Approach to Disrupting Stealthy Botnets.
26. Disrupting stealthy botnets through strategic placement of detectors.
27. Learning and Planning in Feature Deception Games.
28. Advancing WSN physical security adopting TPM-based architectures.
29. A hardware accelerator for data classification within the sensing infrastructure.
30. An Efficient IND-CCA2 Secure Variant of the Niederreiter Encryption Scheme in the Standard Model.
31. A Code-Based 1-out-of-N Oblivious Transfer Based on McEliece Assumptions.
32. DeBot: A novel network-based mechanism to detect exfiltration by architectural stealthy botnets.
33. Detector Placement Strategies
34. Scalable Algorithms for Identifying Stealthy Attackers in a Game‐Theoretic Framework Using Deception
35. Combinatorial Boosting of Classifiers for Moving Target Defense Against Adversarial Evasion Attacks
36. VulnerVAN: Automating the Generation of Vulnerable Network Scenarios for Cybersecurity Events and Training Exercises VulnerVAN: Automating the Generation of Vulnerable Network Scenarios for Cybersecurity Events and Training Exercises Technical Report VulnerVAN: Automating the Generation of Vulnerable Network Scenarios for Cybersecurity Events and Training Exercises
37. A Quantitative Framework to Model Reconnaissance by Stealthy Attackers and Support Deception-Based Defenses
38. Defending from Stealthy Botnets Using Moving Target Defenses
39. Harnessing the Power of Deception in Attack Graph-Based Security Games
40. Learning and Planning in the Feature Deception Problem
41. A Framework for Studying Autonomic Computing Models in Cyber Deception
42. Generating targeted e-mail at scale using neural machine translation
43. VulnerVAN: A Vulnerable Network Generation Tool
44. Identifying Stealthy Attackers in a Game Theoretic Framework Using Deception
45. Adaptive Cyber Defenses for Botnet Detection and Mitigation
46. Measuring the Effectiveness of Network Deception
47. On Defensive Cyber Deception: A Case Study Using SDN
48. On Detecting Manifestation of Adversary Characteristics
49. Detecting Stealthy Botnets in a Resource-Constrained Environment using Reinforcement Learning
50. Moving Target Defense against DDoS Attacks
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.