Sajjan Shiva
Sajjan Shiva
Professor of Computer Science, University of Memphis
Verified email at memphis.edu - Homepage
Title
Cited by
Cited by
Year
A survey of game theory as applied to network security
S Roy, C Ellis, S Shiva, D Dasgupta, V Shandilya, Q Wu
2010 43rd Hawaii International Conference on System Sciences, 1-10, 2010
4762010
Comparative analysis of serial decision tree classification algorithms
MN Anyanwu, SG Shiva
International Journal of Computer Science and Security 3 (3), 230-240, 2009
2282009
AVOIDIT: A cyber attack taxonomy
C Simmons, C Ellis, S Shiva, D Dasgupta, Q Wu
9th Annual Symposium on Information Assurance (ASIA’14), 2-12, 2014
1462014
Computer design and architecture
SG Shiva
852000
Game theory for cyber security
S Shiva, S Roy, D Dasgupta
Proceedings of the Sixth Annual Workshop on Cyber Security and Information …, 2010
772010
Flip-flops for multiple-valued logic
TA Irving, SG Shiva, HT Nagle
IEEE Transactions on Computers 100 (3), 237-246, 1976
581976
Use of attack graphs in security systems
V Shandilya, CB Simmons, S Shiva
Journal of Computer Networks and Communications 2014, 2014
572014
On modeling and simulation of game theory-based defense mechanisms against DoS and DDoS attacks
Q Wu, S Shiva, S Roy, C Ellis, V Datla
Proceedings of the 2010 spring simulation multiconference, 1-8, 2010
562010
Software reuse: Research and practice
SG Shiva, L Abou Shala
Fourth International Conference on Information Technology (ITNG'07), 603-609, 2007
552007
Introduction to logic design
SG Shiva
CRC Press, 2018
452018
Computer hardware description languages—A tutorial
SG Shiva
Proceedings of the IEEE 67 (12), 1605-1615, 1979
451979
Securing cloud infrastructure against co-resident DoS attacks using game theoretic defense mechanisms
HS Bedi, S Shiva
Proceedings of the international conference on advances in computing …, 2012
442012
Security and privacy in the internet of medical things: taxonomy and risk assessment
F Alsubaei, A Abuhussein, S Shiva
2017 IEEE 42nd Conference on Local Computer Networks Workshops (LCN …, 2017
422017
Automatic hardware synthesis
SG Shiva
Proceedings of the IEEE 71 (1), 76-87, 1983
421983
Game theory-based defense mechanisms against DDoS attacks on TCP/TCP-friendly flows
HS Bedi, S Roy, S Shiva
2011 IEEE symposium on computational intelligence in cyber security (CICS …, 2011
402011
Evaluating security and privacy in cloud computing services: A Stakeholder's perspective
A Abuhussein, H Bedi, S Shiva
2012 international conference for internet technology and secured …, 2012
372012
Pipelined and Parallel Computer Architecture
SG Shiva
Addison-Wesley Longman Publishing Co., Inc., 1997
351997
Computer Organization, Design, and Architecture
SG Shiva
CRC Press, 2013
292013
Advanced computer architectures
SG Shiva
CRC Press, 2018
272018
Towards an effective crowdsourcing recommendation system: A survey of the state-of-the-art
E Aldhahri, V Shandilya, S Shiva
2015 IEEE Symposium on Service-Oriented System Engineering, 372-377, 2015
272015
The system can't perform the operation now. Try again later.
Articles 1–20