Segui
Sridhar Venkatesan
Sridhar Venkatesan
Peraton Labs
Email verificata su peratonlabs.com - Home page
Titolo
Citata da
Citata da
Anno
A moving target defense approach to mitigate DDoS attacks against proxy-based architectures
S Venkatesan, M Albanese, K Amin, S Jajodia, M Wright
2016 IEEE conference on communications and network security (CNS), 198-206, 2016
812016
Moving target defense against DDoS attacks: An empirical game-theoretic analysis
M Wright, S Venkatesan, M Albanese, MP Wellman
Proceedings of the 2016 ACM Workshop on Moving Target Defense, 93-104, 2016
562016
A moving target defense approach to disrupting stealthy botnets
S Venkatesan, M Albanese, G Cybenko, S Jajodia
Proceedings of the 2016 ACM Workshop on Moving Target Defense, 37-46, 2016
502016
Defending from stealthy botnets using moving target defenses
M Albanese, S Jajodia, S Venkatesan
IEEE Security & Privacy 16 (1), 92-97, 2018
432018
Harnessing the power of deception in attack graph-based security games
S Milani, W Shen, KS Chan, S Venkatesan, NO Leslie, C Kamhoua, ...
Decision and Game Theory for Security: 11th International Conference …, 2020
332020
Detecting stealthy botnets in a resource-constrained environment using reinforcement learning
S Venkatesan, M Albanese, A Shah, R Ganesan, S Jajodia
Proceedings of the 2017 Workshop on Moving Target Defense, 75-85, 2017
322017
R-Sentry: Deception based ransomware detection using file access patterns
S Sheen, KA Asmitha, S Venkatesan
Computers and Electrical Engineering 103, 108346, 2022
262022
Poisoning attacks and data sanitization mitigations for machine learning models in network intrusion detection systems
S Venkatesan, H Sikka, R Izmailov, R Chadha, A Oprea, MJ De Lucia
MILCOM 2021-2021 IEEE Military Communications Conference (MILCOM), 874-879, 2021
252021
Advancing wsn physical security adopting tpm-based architectures
M Barbareschi, E Battista, A Mazzeo, S Venkatesan
Proceedings of the 2014 IEEE 15th International Conference on Information …, 2014
232014
On defensive cyber deception: A case study using SDN
CYJ Chiang, S Venkatesan, S Sugrim, JA Youzwak, R Chadha, EI Colbert, ...
MILCOM 2018-2018 IEEE Military Communications Conference (MILCOM), 110-115, 2018
222018
Identifying stealthy attackers in a game theoretic framework using deception
A Basak, C Kamhoua, S Venkatesan, M Gutierrez, AH Anwar, ...
Decision and Game Theory for Security: 10th International Conference …, 2019
212019
Measuring the effectiveness of network deception
S Sugrim, S Venkatesan, JA Youzwak, CYJ Chiang, R Chadha, ...
2018 IEEE international conference on Intelligence and Security Informatics …, 2018
182018
A framework for moving target defense quantification
W Connell, M Albanese, S Venkatesan
IFIP International Conference on ICT Systems Security and Privacy Protection …, 2017
172017
An efficient IND-CCA2 secure variant of the Niederreiter encryption scheme in the standard model
K Preetha Mathew, S Vasant, S Venkatesan, C Pandu Rangan
Information Security and Privacy: 17th Australasian Conference, ACISP 2012 …, 2012
172012
Learning and planning in the feature deception problem
ZR Shi, AD Procaccia, KS Chan, S Venkatesan, N Ben-Asher, NO Leslie, ...
Decision and Game Theory for Security: 11th International Conference …, 2020
162020
A hardware accelerator for data classification within the sensing infrastructure
M Barbareschi, E Battista, N Mazzocca, S Venkatesan
Proceedings of the 2014 IEEE 15th International Conference on Information …, 2014
162014
Disrupting stealthy botnets through strategic placement of detectors
S Venkatesan, M Albanese, S Jajodia
2015 IEEE Conference on Communications and Network Security (CNS), 95-103, 2015
152015
On detecting manifestation of adversary characteristics
S Venkatesan, S Sugrim, R Izmailov, CYJ Chiang, R Chadha, B Doshi, ...
MILCOM 2018-2018 IEEE military communications conference (MILCOM), 431-437, 2018
142018
Adaptive cyber defenses for botnet detection and mitigation
M Albanese, S Jajodia, S Venkatesan, G Cybenko, T Nguyen
Adversarial and Uncertain Reasoning for Adaptive Cyber Defense: Control-and …, 2019
112019
Data sanitization approach to mitigate clean-label attacks against malware detection systems
S Ho, A Reddy, S Venkatesan, R Izmailov, R Chadha, A Oprea
MILCOM 2022-2022 IEEE Military Communications Conference (MILCOM), 993-998, 2022
102022
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20