Upadhyaya, Shambhu
85  results:
Search for persons X
?
1

Apt Detection of Ransomware - An Approach to Detect Advance..:

, In: 2023 IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom),
 
?
2

A Game Theoretic Approach to the Design of Mitigation Strat..:

, In: Communications in Computer and Information Science; Information Systems Security and Privacy,
Baksi, Rudra Prasad ; Upadhyaya, Shambhu - p. 104-124 , 2023
 
?
 
?
5

An Analysis of Complexity of Insider Attacks to Databases:

Kul, Gökhan ; Upadhyaya, Shambhu ; Hughes, Andrew
ACM Transactions on Management Information Systems (TMIS).  12 (2020)  1 - p. 1-18 , 2020
 
?
6

Decepticon: A Hidden Markov Model Approach to Counter Advan..:

, In: Communications in Computer and Information Science; Secure Knowledge Management In Artificial Intelligence Era,
 
?
7

An Analysis of Complexity of Insider Attacks to Databases:

Kul, Gökhan ; Upadhyaya, Shambhu ; Hughes, Andrew
ACM Transactions on Management Information Systems.  12 (2020)  1 - p. 1-18 , 2020
 
?
8

Similarity Metrics for SQL Query Clustering:

Kul, Gokhan ; Luong, Duc Thanh Anh ; Xie, Ting...
IEEE Transactions on Knowledge and Data Engineering.  30 (2018)  12 - p. 2408-2420 , 2018
 
?
9

Continuous Authentication Using Behavioral Biometrics:

, In: Proceedings of the 3rd ACM on International Workshop on Security And Privacy Analytics,
Upadhyaya, Shambhu J. - p. 29 ff. , 2017
 
?
10

Complexity of Insider Attacks to Databases:

, In: Proceedings of the 2017 International Workshop on Managing Insider Security Threats,
 
?
11

Ettu : Analyzing Query Intents in Corporate Databases:

, In: Proceedings of the 25th International Conference Companion on World Wide Web,
Kul, Gokhan ; Luong, Duc ; Xie, Ting... - p. 463-466 , 2016
 
?
12

Guest Editorial: Introduction to the Special Issue on Emerg..:

Kermani, Mehran Mozaffari ; Savas, Erkay ; Upadhyaya, Shambhu J.
IEEE Transactions on Emerging Topics in Computing.  4 (2016)  3 - p. 318-320 , 2016
 
?
14

Adaptive techniques for intra-user variability in keystroke..:

, In: 2016 IEEE 8th International Conference on Biometrics Theory, Applications and Systems (BTAS),
 
?
15

A Preliminary Cyber Ontology for Insider Threats in the Fin..:

, In: Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats,
Kul, Gokhan ; Upadhyaya, Shambhu - p. 75-78 , 2015
 
1-15