Sajjan Shiva
Sajjan Shiva
Professor of Computer Science, University of Memphis
Bestätigte E-Mail-Adresse bei - Startseite
Zitiert von
Zitiert von
A survey of game theory as applied to network security
S Roy, C Ellis, S Shiva, D Dasgupta, V Shandilya, Q Wu
2010 43rd Hawaii International Conference on System Sciences, 1-10, 2010
Comparative analysis of serial decision tree classification algorithms
MN Anyanwu, SG Shiva
International Journal of Computer Science and Security 3 (3), 230-240, 2009
AVOIDIT: A cyber attack taxonomy
C Simmons, C Ellis, S Shiva, D Dasgupta, Q Wu
9th Annual Symposium on Information Assurance (ASIA’14), 2-12, 2014
Computer design and architecture
SG Shiva
Game theory for cyber security
S Shiva, S Roy, D Dasgupta
Proceedings of the Sixth Annual Workshop on Cyber Security and Information …, 2010
Use of attack graphs in security systems
V Shandilya, CB Simmons, S Shiva
Journal of Computer Networks and Communications 2014, 2014
Flip-flops for multiple-valued logic
TA Irving, SG Shiva, HT Nagle
IEEE Transactions on Computers 100 (3), 237-246, 1976
Software reuse: Research and practice
SG Shiva, L Abou Shala
Fourth International Conference on Information Technology (ITNG'07), 603-609, 2007
On modeling and simulation of game theory-based defense mechanisms against DoS and DDoS attacks
Q Wu, S Shiva, S Roy, C Ellis, V Datla
Proceedings of the 2010 spring simulation multiconference, 1-8, 2010
Security and privacy in the internet of medical things: taxonomy and risk assessment
F Alsubaei, A Abuhussein, S Shiva
2017 IEEE 42nd Conference on Local Computer Networks Workshops (LCN …, 2017
Introduction to logic design
SG Shiva
CRC Press, 2018
Securing cloud infrastructure against co-resident DoS attacks using game theoretic defense mechanisms
HS Bedi, S Shiva
Proceedings of the international conference on advances in computing …, 2012
Computer hardware description languages—A tutorial
SG Shiva
Proceedings of the IEEE 67 (12), 1605-1615, 1979
Automatic hardware synthesis
SG Shiva
Proceedings of the IEEE 71 (1), 76-87, 1983
Game theory-based defense mechanisms against DDoS attacks on TCP/TCP-friendly flows
HS Bedi, S Roy, S Shiva
2011 IEEE symposium on computational intelligence in cyber security (CICS …, 2011
Evaluating security and privacy in cloud computing services: A Stakeholder's perspective
A Abuhussein, H Bedi, S Shiva
2012 international conference for internet technology and secured …, 2012
Pipelined and Parallel Computer Architecture
SG Shiva
Addison-Wesley Longman Publishing Co., Inc., 1997
Computer Organization, Design, and Architecture
SG Shiva
CRC Press, 2013
Advanced computer architectures
SG Shiva
CRC Press, 2018
Towards an effective crowdsourcing recommendation system: A survey of the state-of-the-art
E Aldhahri, V Shandilya, S Shiva
2015 IEEE Symposium on Service-Oriented System Engineering, 372-377, 2015
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20