Venkatesan, Sridhar
73  Ergebnisse:
Personensuche X
?
1

An Improved Nested Training Approach to Mitigate Clean-labe..:

, In: MILCOM 2023 - 2023 IEEE Military Communications Conference (MILCOM),
 
?
2

Data-Driven Constraint Mining for Realizable Adversarial Sa..:

, In: MILCOM 2023 - 2023 IEEE Military Communications Conference (MILCOM),
 
?
3

Data Sanitization Approach to Mitigate Clean-Label Attacks ..:

, In: MILCOM 2022 - 2022 IEEE Military Communications Conference (MILCOM),
Ho, Samson ; Reddy, Achyut ; Venkatesan, Sridhar... - p. 993-998 , 2022
 
?
4

R-Sentry: Deception based ransomware detection using file a..:

Sheen, Shina ; Asmitha, K A ; Venkatesan, Sridhar
Computers and Electrical Engineering.  103 (2022)  - p. 108346 , 2022
 
?
5

Combinatorial Boosting of Ensembles of Diversified Classifi..:

, In: MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM),
Izmailov, Rauf ; Lin, Peter ; Venkatesan, Sridhar. - p. 880-885 , 2021
 
?
6

Combinatorial Boosting of Classifiers for Moving Target Def..:

, In: Proceedings of the 8th ACM Workshop on Moving Target Defense,
 
?
7

Learning and Planning in the Feature Deception Problem:

, In: Lecture Notes in Computer Science; Decision and Game Theory for Security,
 
?
9

A Quantitative Framework to Model Reconnaissance by Stealth..:

, In: 2020 IEEE Conference on Communications and Network Security (CNS),
 
?
10

Harnessing the Power of Deception in Attack Graph-Based Sec..:

, In: Lecture Notes in Computer Science; Decision and Game Theory for Security,
Milani, Stephanie ; Shen, Weiran ; Chan, Kevin S.... - p. 147-167 , 2020
 
?
11

Generating targeted e-mail at scale using neural machine tr..:

, In: Proceedings of the 2019 Workshop on DYnamic and Novel Advances in Machine Learning and Intelligent Cyber Security,
 
?
12

Adaptive Cyber Defenses for Botnet Detection and Mitigation:

, In: Adversarial and Uncertain Reasoning for Adaptive Cyber Defense; Lecture Notes in Computer Science,
 
?
13

Identifying Stealthy Attackers in a Game Theoretic Framewor..:

, In: Lecture Notes in Computer Science; Decision and Game Theory for Security,
 
?
14

VulnerVAN: A Vulnerable Network Generation Tool:

, In: MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM),
 
?
15

Moving Target Defense Quantification:

, In: Adversarial and Uncertain Reasoning for Adaptive Cyber Defense; Lecture Notes in Computer Science,
 
1-15