System and method for correlating historical attacks with diverse indicators to generate indicator profiles for detecting and predicting future network attacks A Vashist, R Chadha, A Ghosh, A Poylisher, Y Sawaya, A Yamada, ... US Patent 9,386,030, 2016 | 135 | 2016 |
Limitations of the lipschitz constant as a defense against adversarial examples T Huster, CYJ Chiang, R Chadha ECML PKDD 2018 Workshops: Nemesis 2018, UrbReas 2018, SoGood 2018, IWAISe …, 2019 | 111 | 2019 |
Cyber deception: Virtual networks to defend insider reconnaissance S Achleitner, T La Porta, P McDaniel, S Sugrim, SV Krishnamurthy, ... Proceedings of the 8th ACM CCS international workshop on managing insider …, 2016 | 102 | 2016 |
Policy-based mobile ad hoc network management R Chadha, H Cheng, YH Cheng, J Chiang, A Ghetie, G Levin, H Tanna Proceedings. Fifth IEEE International Workshop on Policies for Distributed …, 2004 | 99 | 2004 |
Deceiving network reconnaissance using SDN-based virtual topologies S Achleitner, TF La Porta, P McDaniel, S Sugrim, SV Krishnamurthy, ... IEEE Transactions on Network and Service Management 14 (4), 1098-1112, 2017 | 92 | 2017 |
Cybervan: A cyber security virtual assured network testbed R Chadha, T Bowen, CYJ Chiang, YM Gottlieb, A Poylisher, A Sapello, ... Milcom 2016-2016 ieee military communications conference, 1125-1130, 2016 | 70 | 2016 |
ACyDS: An adaptive cyber deception system CYJ Chiang, YM Gottlieb, SJ Sugrim, R Chadha, C Serban, A Poylisher, ... MILCOM 2016-2016 IEEE Military Communications Conference, 800-805, 2016 | 53 | 2016 |
Policy-driven mobile ad hoc network management R Chadha, L Kant John Wiley & Sons, 2007 | 52 | 2007 |
Cognitive network load prediction method and apparatus A Vashist, A Poylisher, SC Mau, A Ghosh, R Chadha US Patent App. 13/004,324, 2012 | 45 | 2012 |
Policy-based mobile ad hoc network management for DRAMA R Chadha, YH Cheng, J Chiang, G Levin, SW Li, A Poylisher IEEE MILCOM 2004. Military Communications Conference, 2004. 3, 1317-1323, 2004 | 45 | 2004 |
Policy-based networking R Chadha, G Lapiotis, S Wright IEEE Network Magazine 16, 8-9, 2002 | 42 | 2002 |
Cognitive radio rides on the cloud F Ge, H Lin, A Khajeh, CJ Chiang, ME Ahmed, WB Charles, W Feng, ... 2010-MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE, 1448-1453, 2010 | 41 | 2010 |
Sophisticated access control via SMT and logical frameworks K Arkoudas, R Chadha, J Chiang ACM Transactions on Information and System Security (TISSEC) 16 (4), 1-31, 2014 | 36 | 2014 |
Correctness of unification without occur check in Prolog R Chadha, DA Plaisted The Journal of Logic Programming 18 (2), 99-122, 1994 | 36 | 1994 |
An integrated testbed for virtual ad hoc networks PK Biswas, C Serban, A Poylisher, J Lee, SC Mau, R Chadha, ... 2009 5th International Conference on Testbeds and Research Infrastructures …, 2009 | 35 | 2009 |
Special issue on policy based networking S Wright, R Chadha, G Lapiotis IEEE Network 16 (2), 8-56, 2002 | 34 | 2002 |
Gnu radio-based digital communications: Computational analysis of a gmsk transceiver F Ge, CJ Chiang, YM Gottlieb, R Chadha 2011 IEEE Global Telecommunications Conference-GLOBECOM 2011, 1-6, 2011 | 31 | 2011 |
Performance analysis of drama: a distributed policy-based system for manet management CYJ Chiang, S Demers, P Gopalakrishnan, L Kant, A Poylisher, ... MILCOM 2006-2006 IEEE Military Communications conference, 1-8, 2006 | 31 | 2006 |
Real Time Monitoring, Onset Detection And Control Of Congestive Phase-Transitions in Communication Networks SC Mau, A Poylisher, A Vashist, R Chadha, CYJ Chiang US Patent App. 12/957,459, 2011 | 28 | 2011 |
Poisoning attacks and data sanitization mitigations for machine learning models in network intrusion detection systems S Venkatesan, H Sikka, R Izmailov, R Chadha, A Oprea, MJ De Lucia MILCOM 2021-2021 IEEE Military Communications Conference (MILCOM), 874-879, 2021 | 26 | 2021 |