Sudip Mittal
Sudip Mittal
Verified email at uncw.edu - Homepage
Title
Cited by
Cited by
Year
Cybertwitter: Using twitter to generate alerts for cybersecurity threats and vulnerabilities
S Mittal, PK Das, V Mulwad, A Joshi, T Finin
2016 IEEE/ACM International Conference on Advances in Social Networks …, 2016
912016
OBD_SecureAlert: An anomaly detection system for vehicles
SN Narayanan, S Mittal, A Joshi
2016 IEEE International Conference on Smart Computing (SMARTCOMP), 1-6, 2016
562016
The pin-bang theory: Discovering the pinterest world
S Mittal, N Gupta, P Dewan, P Kumaraguru
arXiv preprint arXiv:1307.4952, 2013
332013
Using data analytics to detect anomalous states in vehicles
SN Narayanan, S Mittal, A Joshi
arXiv preprint arXiv:1512.08048, 2015
282015
Automatic extraction of metrics from SLAs for cloud service management
S Mittal, KP Joshi, C Pearce, A Joshi
2016 IEEE International Conference on Cloud Engineering (IC2E), 139-142, 2016
272016
Security and privacy in smart farming: Challenges and opportunities
M Gupta, M Abdelsalam, S Khorsandroo, S Mittal
IEEE Access 8, 34564-34584, 2020
252020
Generating digital twin models using knowledge graphs for industrial production lines
A Banerjee, R Dalal, S Mittal, KP Joshi
9th International ACM Web Science Conference 2017 - Industrial Knowledge Graphs, 2017
252017
Thinking, fast and slow: Combining vector spaces and knowledge graphs
S Mittal, A Joshi, T Finin
arXiv preprint arXiv:1708.03310, 2017
202017
Semantic approach to automating management of big data privacy policies
KP Joshi, A Gupta, S Mittal, C Pearce, A Joshi, T Finin
2016 IEEE International Conference on Big Data (Big Data), 482-491, 2016
202016
Pinned it! A large scale study of the Pinterest network
S Mittal, N Gupta, P Dewan, P Kumaraguru
Proceedings of the 1st IKDD Conference on Data Sciences, 1-10, 2014
162014
RelExt: Relation Extraction using Deep Learning approaches for Cybersecurity Knowledge Graph Improvement
A Pingle, A Piplai, S Mittal, A Joshi, J Holt, R Zak
International Conference on Advances in Social Networks Analysis and Mining …, 2019
152019
Alda: Cognitive assistant for legal document analytics
KP Joshi, A Gupta, S Mittal, C Pearce, A Joshi, T Finin
AAAI 2016, 2016
152016
Enabling and enforcing social distancing measures using smart city and its infrastructures: a COVID-19 Use case
M Gupta, M Abdelsalam, S Mittal
arXiv preprint arXiv:2004.09246, 2020
132020
Semantically rich, oblivious access control using abac for secure cloud storage
M Joshi, S Mittal, KP Joshi, T Finin
2017 IEEE international conference on edge computing (EDGE), 142-149, 2017
132017
Parallelizing natural language techniques for knowledge extraction from cloud service level agreements
S Mittal, KP Joshi, C Pearce, A Joshi
2015 IEEE International Conference on Big Data (Big Data), 2831-2833, 2015
132015
Cyber-all-intel: An AI for security related threat intelligence
S Mittal, A Joshi, T Finin
arXiv preprint arXiv:1905.02895, 2019
122019
Streamlining management of multiple cloud services
A Gupta, S Mittal, KP Joshi, C Pearce, A Joshi
2016 IEEE 9th International Conference on Cloud Computing (CLOUD), 481-488, 2016
112016
Preventing poisoning attacks on AI based threat intelligence systems
N Khurana, S Mittal, A Piplai, A Joshi
2019 IEEE 29th Machine Learning for Signal Processing (MLSP), 1-6, 2019
102019
Anomaly detection models for smart home security
S Ramapatruni, SN Narayanan, S Mittal, A Joshi, K Joshi
2019 IEEE 5th Intl Conference on Big Data Security on Cloud (BigDataSecurity …, 2019
102019
Broker bots: analyzing automated activity during high impact events on twitter
S Mittal, P Kumaraguru
arXiv preprint arXiv:1406.4286, 2014
92014
The system can't perform the operation now. Try again later.
Articles 1–20