Follow
Ritu Chadha
Ritu Chadha
Senior Research Director, Peraton Labs
Verified email at peratonlabs.com
Title
Cited by
Cited by
Year
System and method for correlating historical attacks with diverse indicators to generate indicator profiles for detecting and predicting future network attacks
A Vashist, R Chadha, A Ghosh, A Poylisher, Y Sawaya, A Yamada, ...
US Patent 9,386,030, 2016
1352016
Limitations of the lipschitz constant as a defense against adversarial examples
T Huster, CYJ Chiang, R Chadha
ECML PKDD 2018 Workshops: Nemesis 2018, UrbReas 2018, SoGood 2018, IWAISe …, 2019
1112019
Cyber deception: Virtual networks to defend insider reconnaissance
S Achleitner, T La Porta, P McDaniel, S Sugrim, SV Krishnamurthy, ...
Proceedings of the 8th ACM CCS international workshop on managing insider …, 2016
1022016
Policy-based mobile ad hoc network management
R Chadha, H Cheng, YH Cheng, J Chiang, A Ghetie, G Levin, H Tanna
Proceedings. Fifth IEEE International Workshop on Policies for Distributed …, 2004
992004
Deceiving network reconnaissance using SDN-based virtual topologies
S Achleitner, TF La Porta, P McDaniel, S Sugrim, SV Krishnamurthy, ...
IEEE Transactions on Network and Service Management 14 (4), 1098-1112, 2017
922017
Cybervan: A cyber security virtual assured network testbed
R Chadha, T Bowen, CYJ Chiang, YM Gottlieb, A Poylisher, A Sapello, ...
Milcom 2016-2016 ieee military communications conference, 1125-1130, 2016
702016
ACyDS: An adaptive cyber deception system
CYJ Chiang, YM Gottlieb, SJ Sugrim, R Chadha, C Serban, A Poylisher, ...
MILCOM 2016-2016 IEEE Military Communications Conference, 800-805, 2016
532016
Policy-driven mobile ad hoc network management
R Chadha, L Kant
John Wiley & Sons, 2007
522007
Cognitive network load prediction method and apparatus
A Vashist, A Poylisher, SC Mau, A Ghosh, R Chadha
US Patent App. 13/004,324, 2012
452012
Policy-based mobile ad hoc network management for DRAMA
R Chadha, YH Cheng, J Chiang, G Levin, SW Li, A Poylisher
IEEE MILCOM 2004. Military Communications Conference, 2004. 3, 1317-1323, 2004
452004
Policy-based networking
R Chadha, G Lapiotis, S Wright
IEEE Network Magazine 16, 8-9, 2002
422002
Cognitive radio rides on the cloud
F Ge, H Lin, A Khajeh, CJ Chiang, ME Ahmed, WB Charles, W Feng, ...
2010-MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE, 1448-1453, 2010
412010
Sophisticated access control via SMT and logical frameworks
K Arkoudas, R Chadha, J Chiang
ACM Transactions on Information and System Security (TISSEC) 16 (4), 1-31, 2014
362014
Correctness of unification without occur check in Prolog
R Chadha, DA Plaisted
The Journal of Logic Programming 18 (2), 99-122, 1994
361994
An integrated testbed for virtual ad hoc networks
PK Biswas, C Serban, A Poylisher, J Lee, SC Mau, R Chadha, ...
2009 5th International Conference on Testbeds and Research Infrastructures …, 2009
352009
Special issue on policy based networking
S Wright, R Chadha, G Lapiotis
IEEE Network 16 (2), 8-56, 2002
342002
Gnu radio-based digital communications: Computational analysis of a gmsk transceiver
F Ge, CJ Chiang, YM Gottlieb, R Chadha
2011 IEEE Global Telecommunications Conference-GLOBECOM 2011, 1-6, 2011
312011
Performance analysis of drama: a distributed policy-based system for manet management
CYJ Chiang, S Demers, P Gopalakrishnan, L Kant, A Poylisher, ...
MILCOM 2006-2006 IEEE Military Communications conference, 1-8, 2006
312006
Real Time Monitoring, Onset Detection And Control Of Congestive Phase-Transitions in Communication Networks
SC Mau, A Poylisher, A Vashist, R Chadha, CYJ Chiang
US Patent App. 12/957,459, 2011
282011
Poisoning attacks and data sanitization mitigations for machine learning models in network intrusion detection systems
S Venkatesan, H Sikka, R Izmailov, R Chadha, A Oprea, MJ De Lucia
MILCOM 2021-2021 IEEE Military Communications Conference (MILCOM), 874-879, 2021
262021
The system can't perform the operation now. Try again later.
Articles 1–20