Sridhar Venkatesan
Sridhar Venkatesan
Perspecta Labs
Bestätigte E-Mail-Adresse bei gmu.edu - Startseite
Titel
Zitiert von
Zitiert von
Jahr
A moving target defense approach to mitigate DDoS attacks against proxy-based architectures
S Venkatesan, M Albanese, K Amin, S Jajodia, M Wright
2016 IEEE conference on communications and network security (CNS), 198-206, 2016
522016
Moving target defense against DDoS attacks: An empirical game-theoretic analysis
M Wright, S Venkatesan, M Albanese, MP Wellman
Proceedings of the 2016 ACM Workshop on Moving Target Defense, 93-104, 2016
302016
A moving target defense approach to disrupting stealthy botnets
S Venkatesan, M Albanese, G Cybenko, S Jajodia
Proceedings of the 2016 ACM Workshop on Moving Target Defense, 37-46, 2016
292016
Detecting stealthy botnets in a resource-constrained environment using reinforcement learning
S Venkatesan, M Albanese, A Shah, R Ganesan, S Jajodia
Proceedings of the 2017 Workshop on Moving Target Defense, 75-85, 2017
212017
Advancing wsn physical security adopting tpm-based architectures
M Barbareschi, E Battista, A Mazzeo, S Venkatesan
Proceedings of the 2014 IEEE 15th International Conference on Information …, 2014
192014
Defending from stealthy botnets using moving target defenses
M Albanese, S Jajodia, S Venkatesan
IEEE Security & Privacy 16 (1), 92-97, 2018
182018
An efficient IND-CCA2 secure variant of the Niederreiter encryption scheme in the standard model
KP Mathew, S Vasant, S Venkatesan, CP Rangan
Australasian Conference on Information Security and Privacy, 166-179, 2012
152012
A hardware accelerator for data classification within the sensing infrastructure
M Barbareschi, E Battista, N Mazzocca, S Venkatesan
Proceedings of the 2014 IEEE 15th International Conference on Information …, 2014
132014
A framework for moving target defense quantification
W Connell, M Albanese, S Venkatesan
IFIP International Conference on ICT Systems Security and Privacy Protection …, 2017
122017
Key Predistribution Scheme for Grid Based Wireless Sensor Networks using Quadruplex Polynomial Shares per Node
V Sridhar, V Raghavendar
Procedia Computer Science 5, 132-140, 2011
82011
On detecting manifestation of adversary characteristics
S Venkatesan, S Sugrim, R Izmailov, CYJ Chiang, R Chadha, B Doshi, ...
MILCOM 2018-2018 IEEE military communications conference (MILCOM), 431-437, 2018
72018
Disrupting stealthy botnets through strategic placement of detectors
S Venkatesan, M Albanese, S Jajodia
2015 IEEE Conference on Communications and Network Security (CNS), 95-103, 2015
72015
A quantitative risk assessment framework for adaptive intrusion detection in the cloud
LH Pham, M Albanese, S Venkatesan
2016 IEEE Conference on Communications and Network Security (CNS), 489-497, 2016
62016
Identifying stealthy attackers in a game theoretic framework using deception
A Basak, C Kamhoua, S Venkatesan, M Gutierrez, AH Anwar, ...
International Conference on Decision and Game Theory for Security, 21-32, 2019
52019
Measuring the effectiveness of network deception
S Sugrim, S Venkatesan, JA Youzwak, CYJ Chiang, R Chadha, ...
2018 IEEE International Conference on Intelligence and Security Informatics …, 2018
42018
On defensive cyber deception: A case study using SDN
CYJ Chiang, S Venkatesan, S Sugrim, JA Youzwak, R Chadha, EI Colbert, ...
MILCOM 2018-2018 IEEE Military Communications Conference (MILCOM), 110-115, 2018
42018
A code-based 1-out-of-N oblivious transfer based on mceliece assumptions
S Vasant, S Venkatesan, CP Rangan
International Conference on Information Security Practice and Experience …, 2012
4*2012
Learning and planning in feature deception games
ZR Shi, AD Procaccia, KS Chan, S Venkatesan, N Ben-Asher, NO Leslie, ...
arXiv preprint arXiv:1905.04833, 2019
32019
Adaptive cyber defenses for botnet detection and mitigation
M Albanese, S Jajodia, S Venkatesan, G Cybenko, T Nguyen
Adversarial and Uncertain Reasoning for Adaptive Cyber Defense, 156-205, 2019
32019
Moving target defense quantification
M Albanese, W Connell, S Venkatesan, G Cybenko
Adversarial and Uncertain Reasoning for Adaptive Cyber Defense, 94-111, 2019
32019
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20