Folgen
Ankit Shah
Titel
Zitiert von
Zitiert von
Jahr
Vulcon: A system for vulnerability prioritization, mitigation, and management
KA Farris, A Shah, G Cybenko, R Ganesan, S Jajodia
ACM Transactions on Privacy and Security (TOPS) 21 (4), 1-28, 2018
782018
Dynamic scheduling of cybersecurity analysts for minimizing risk using reinforcement learning
R Ganesan, S Jajodia, A Shah, H Cam
ACM Transactions on Intelligent Systems and Technology (TIST) 8 (1), 1-21, 2016
612016
A reinforcement learning approach for rebalancing electric vehicle sharing systems
A Bogyrbayeva, S Jang, A Shah, YJ Jang, C Kwon
IEEE Transactions on Intelligent Transportation Systems 23 (7), 8704-8714, 2021
312021
Detecting Stealthy Botnets in a Resource-Constrained Environment Using Reinforcement Learning
S Venkatesan, M Albanese, A Shah, R Ganesan, S Jajodia
Proceedings of the 4th ACM Workshop on Moving Target Defense, 75-85, 2017
302017
A methodology to measure and monitor level of operational effectiveness of a CSOC
A Shah, R Ganesan, S Jajodia, H Cam
International Journal of Information Security 17 (2), 121-134, 2018
292018
Understanding tradeoffs between throughput, quality, and cost of alert analysis in a csoc
A Shah, R Ganesan, S Jajodia, H Cam
IEEE Transactions on Information Forensics and Security 14 (5), 1155-1170, 2018
252018
Towards optimal foreign object debris detection in an airport environment
M Noroozi, A Shah
Expert Systems with Applications 213, 118829, 2023
162023
Vulnerability selection for remediation: An empirical analysis
A Shah, KA Farris, R Ganesan, S Jajodia
The Journal of Defense Modeling and Simulation 19 (1), 13-22, 2022
132022
A methodology for ensuring fair allocation of CSOC effort for alert investigation
A Shah, R Ganesan, S Jajodia
International Journal of Information Security 18, 199-218, 2019
132019
Dynamic optimization of the level of operational effectiveness of a CSOC under adverse conditions
A Shah, R Ganesan, S Jajodia, H Cam
ACM Transactions on Intelligent Systems and Technology (TIST) 9 (5), 1-20, 2018
132018
Optimal assignment of sensors to analysts in a cybersecurity operations center
A Shah, R Ganesan, S Jajodia, H Cam
IEEE Systems Journal 13 (1), 1060-1071, 2018
112018
A two-step approach to optimal selection of alerts for investigation in a CSOC
A Shah, R Ganesan, S Jajodia, H Cam
IEEE Transactions on Information Forensics and Security 14 (7), 1857-1870, 2018
102018
An outsourcing model for alert analysis in a cybersecurity operations center
A Shah, R Ganesan, S Jajodia, H Cam
ACM Transactions on the Web (TWEB) 14 (1), 1-22, 2020
82020
Adaptive reallocation of cybersecurity analysts to sensors for balancing risk between sensors
A Shah, R Ganesan, S Jajodia, H Cam
Service Oriented Computing and Applications 12, 123-135, 2018
82018
A strategy for effective alert analysis at a cyber security operations center
R Ganesan, A Shah
From Database to Cyber Security: Essays Dedicated to Sushil Jajodia on the …, 2018
82018
Optimizing alert data management processes at a cyber security operations center
R Ganesan, A Shah, S Jajodia, H Cam
Adversarial and Uncertain Reasoning for Adaptive Cyber Defense: Control-and …, 2019
72019
A novel metric for measuring operational effectiveness of a cybersecurity operations center
L Wang, S Jajodia, A Singhal, R Ganesan, A Shah, S Jajodia, H Cam
Network Security Metrics, 177-207, 2017
72017
Deep VULMAN: A deep reinforcement learning-enabled cyber vulnerability management framework
S Hore, A Shah, ND Bastian
Expert Systems with Applications 221, 119734, 2023
62023
Deep PackGen: A Deep Reinforcement Learning Framework for Adversarial Network Packet Generation
S Hore, J Ghadermazi, D Paudel, A Shah, TK Das, ND Bastian
arXiv preprint arXiv:2305.11039, 2023
62023
An AI-Assisted Systematic Literature Review of the Impact of Vehicle Automation on Energy Consumption
M Noroozi, HR Moghaddam, A Shah, H Charkhgard, S Sarkar, TK Das, ...
IEEE Transactions on Intelligent Vehicles, 2023
62023
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20