Anoop Singhal

Orcid: 0000-0002-2602-3927

According to our database1, Anoop Singhal authored at least 106 papers between 1984 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Heterogeneous Domain Adaptation for Multistream Classification on Cyber Threat Data.
IEEE Trans. Dependable Secur. Comput., 2024

2023
Advanced Persistent Threat Detection Using Data Provenance and Metric Learning.
IEEE Trans. Dependable Secur. Comput., 2023

Tackling imbalanced data in cybersecurity with transfer learning: a case with ROP payload detection.
Cybersecur., 2023

Revealing Human Attacker Behaviors Using an Adaptive Internet of Things Honeypot Ecosystem.
Proceedings of the Advances in Digital Forensics XIX, 2023

The Design and Application of a Unified Ontology for Cyber Security.
Proceedings of the Information Systems Security - 19th International Conference, 2023

SMET: Semantic Mapping of CVE to ATT&CK and Its Application to Cybersecurity.
Proceedings of the Data and Applications Security and Privacy XXXVII, 2023

The Design of an Ontology for ATT&CK and its Application to Cybersecurity.
Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy, 2023

Security Analysis of Trust on the Controller in the Matter Protocol Specification.
Proceedings of the IEEE Conference on Communications and Network Security, 2023

2022
Deep learning for detecting logic-flaw-exploiting network attacks: An end-to-end approach.
J. Comput. Secur., 2022

Poisoning Attacks Against Machine Learning: Can Machine Learning Be Trustworthy?
Computer, 2022

Attacks on ML Systems: From Security Analysis to Attack Mitigation.
Proceedings of the Information Systems Security - 18th International Conference, 2022

Knowledge Mining in Cybersecurity: From Attack to Defense.
Proceedings of the Data and Applications Security and Privacy XXXVI, 2022

Generating Cyber-Physical System Risk Overlays for Attack and Fault Trees using Systems Theory.
Proceedings of the Sat-CPS@CODASPY 2022: Proceedings of the 2022 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems, 2022

2021
Network Attack Surface: Lifting the Concept of Attack Surface to the Network Level for Evaluating Networks' Resilience Against Zero-Day Attacks.
IEEE Trans. Dependable Secur. Comput., 2021

What are Attackers after on IoT Devices? An approach based on a multi-phased multi-faceted IoT honeypot ecosystem and data clustering.
CoRR, 2021

Security Auditing of Internet of Things Devices in a Smart Home.
Proceedings of the Advances in Digital Forensics XVII, 2021

Identifying Tactics of Advanced Persistent Threats with Limited Attack Traces.
Proceedings of the Information Systems Security - 17th International Conference, 2021

Deep Learning for Detecting Network Attacks: An End-to-End Approach.
Proceedings of the Data and Applications Security and Privacy XXXV, 2021

2020
Generating Comprehensive Data with Protocol Fuzzing for Applying Deep Learning to Detect Network Attacks.
CoRR, 2020

An Approach for Detection of Advanced Persistent Threat Attacks.
Computer, 2020

Forensic Analysis of Advanced Persistent Threat Attacks in Cloud Environments.
Proceedings of the Advances in Digital Forensics XVI, 2020

Automatic Recognition of Advanced Persistent Threat Tactics for Enterprise Security.
Proceedings of the IWSPA@CODASPY '20: Proceedings ofthe Sixth International Workshop on Security and Privacy Analytics, 2020

Security Metrics and Risk Analysis for Enterprise Systems.
Proceedings of the IWSPA@CODASPY '20: Proceedings ofthe Sixth International Workshop on Security and Privacy Analytics, 2020

Developing A Compelling Vision for Winning the Cybersecurity Arms Race.
Proceedings of the CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy, 2020

Evolving Advanced Persistent Threat Detection using Provenance Graph and Metric Learning.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020

2019
Threat Modeling for Cloud Infrastructures.
EAI Endorsed Trans. Security Safety, 2019

Mitigating the insider threat of remote administrators in clouds through maintenance task assignments.
J. Comput. Secur., 2019

Optimizing the network diversity to improve the resilience of networks against unknown attacks.
Comput. Commun., 2019

DETERMINING THE FORENSIC DATA REQUIREMENTS FOR INVESTIGATING HYPERVISOR ATTACKS.
Proceedings of the Advances in Digital Forensics XV, 2019

CASFinder: Detecting Common Attack Surface.
Proceedings of the Data and Applications Security and Privacy XXXIII, 2019

2018
Using Bayesian Networks for Probabilistic Identification of Zero-Day Attack Paths.
IEEE Trans. Inf. Forensics Secur., 2018

Probabilistic Inference of the Stealthy Bridges between Enterprise Networks in Cloud.
EAI Endorsed Trans. Security Safety, 2018

Surviving unpatchable vulnerabilities through heterogeneous network hardening options.
J. Comput. Secur., 2018

Toward Cyberresiliency in the Context of Cloud Computing [Resilient Security].
IEEE Secur. Priv., 2018

A Layered Graphical Model for Cloud Forensic Mission Attack Impact Analysis.
Proceedings of the Advances in Digital Forensics XIV, 2018

Assessing Attack Impact on Business Processes by Interconnecting Attack Graphs and Entity Dependency Graphs.
Proceedings of the Data and Applications Security and Privacy XXXII, 2018

Modeling and Mitigating the Insider Threat of Remote Administrators in Clouds.
Proceedings of the Data and Applications Security and Privacy XXXII, 2018

Network Security Metrics: From Known Vulnerabilities to Zero Day Attacks.
Proceedings of the From Database to Cyber Security, 2018

2017
Enterprise-Level Cyber Situation Awareness.
Proceedings of the Theory and Models for Cyber Situation Awareness, 2017

Identifying Evidence for Cloud Forensic Analysis.
Proceedings of the Advances in Digital Forensics XIII - 13th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 30, 2017

Towards Actionable Mission Impact Assessment in the Context of Cloud Computing.
Proceedings of the Data and Applications Security and Privacy XXXI, 2017

Securing Networks Against Unpatchable and Unknown Vulnerabilities Using Heterogeneous Hardening Options.
Proceedings of the Data and Applications Security and Privacy XXXI, 2017

A layered graphical model for mission attack impact analysis.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

SafeConfig'17: Applying the Scientific Method to Active Cyber Defense Research.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

Network Security Metrics
Springer, ISBN: 978-3-319-66504-7, 2017

Identifying Evidence for Cloud Forensic Analysis.
Proceedings of the Research Advances in Cloud Computing, 2017

2016
Network Diversity: A Security Metric for Evaluating the Resilience of Networks Against Zero-Day Attacks.
IEEE Trans. Inf. Forensics Secur., 2016

SafeConfig'16: Testing and Evaluation for Active & Resilient Cyber Systems Panel Verification of Active and Resilient Systems: Practical or Utopian?
Proceedings of the 2016 ACM Workshop on Automated Decision Making for Active Cyber Defense, 2016

A Probabilistic Network Forensic Model for Evidence Analysis.
Proceedings of the Advances in Digital Forensics XII, 2016

Threat Modeling for Cloud Data Center Infrastructures.
Proceedings of the Foundations and Practice of Security - 9th International Symposium, 2016

Diversifying Network Services Under Cost Constraints for Better Resilience Against Unknown Attacks.
Proceedings of the Data and Applications Security and Privacy XXX, 2016

Towards probabilistic identification of zero-day attack paths.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

SafeConfig'16: Testing and Evaluation for Active and Resilient Cyber Systems.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Who Touched My Mission: Towards Probabilistic Mission Impact Assessment.
Proceedings of the 2015 Workshop on Automated Decision Making for Active Cyber Defense, 2015

A Logic-Based Network Forensic Model for Evidence Analysis.
Proceedings of the Advances in Digital Forensics XI, 2015

POSTER: A Logic Based Network Forensics Model for Evidence Analysis.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Metrics of Security.
Proceedings of the Cyber Defense and Situational Awareness, 2014

k-Zero Day Safety: A Network Security Metric for Measuring the Risk of Unknown Vulnerabilities.
IEEE Trans. Dependable Secur. Comput., 2014

Relating Admissibility Standards for Digital Evidence to Attack Scenario Reconstruction.
J. Digit. Forensics Secur. Law, 2014

A Model Towards Using Evidence from Security Events for Network Attack Analysis.
Proceedings of the WOSIS 2014, 2014

Inferring the Stealthy Bridges Between Enterprise Network Islands in Cloud Using Cross-Layer Bayesian Networks.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

Modeling Network Diversity for Evaluating the Robustness of Networks against Zero-Day Attacks.
Proceedings of the Computer Security - ESORICS 2014, 2014

Towards Data Confidentiality and a Vulnerability Analysis Framework for Cloud Computing.
Proceedings of the Secure Cloud Computing, 2014

2013
Aggregating vulnerability metrics in enterprise networks using attack graphs.
J. Comput. Secur., 2013

VULCAN: Vulnerability Assessment Framework for Cloud Computing.
Proceedings of the IEEE 7th International Conference on Software Security and Reliability, 2013

A Unified Framework for Measuring a Network's Mean Time-to-Compromise.
Proceedings of the IEEE 32nd Symposium on Reliable Distributed Systems, 2013

An Efficient Approach to Assessing the Risk of Zero-Day Vulnerabilities.
Proceedings of the SECRYPT 2013, 2013

Creating Integrated Evidence Graphs for Network Forensics.
Proceedings of the Advances in Digital Forensics IX, 2013

An Efficient Framework for Evaluating the Risk of Zero-Day Vulnerabilities.
Proceedings of the E-Business and Telecommunications - International Joint Conference, 2013

2012
Mapping evidence graphs to attack graphs.
Proceedings of the 2012 IEEE International Workshop on Information Forensics and Security, 2012

Aggregating CVSS Base Scores for Semantics-Rich Network Security Metrics.
Proceedings of the IEEE 31st Symposium on Reliable Distributed Systems, 2012

Using Attack Graphs in Forensic Examinations.
Proceedings of the Seventh International Conference on Availability, 2012

2011
Quantitative Security Risk Assessment of Enterprise Networks.
Springer Briefs in Computer Science, Springer, ISBN: 978-1-4614-1860-3, 2011

Guest Editorial: Security and Dependability in SOA and Business Processes.
IEEE Trans. Serv. Comput., 2011

Forensic Web Services Framework.
IT Prof., 2011

Automatic security analysis using security metrics.
Proceedings of the MILCOM 2011, 2011

Specifying Time-Out Points in Surgical EMRs-Work in Progress.
Proceedings of the ENTERprise Information Systems - International Conference, 2011

2010
Data Mining for Intrusion Detection.
Proceedings of the Data Mining and Knowledge Discovery Handbook, 2nd ed., 2010

Measuring Security Risk of Networks Using Attack Graphs.
Int. J. Next Gener. Comput., 2010

Fine-grained Sharing of Health Records using XSPA Profile for XACML - An Extended Abstract.
Proceedings of the 1st USENIX Workshop on Health Security and Privacy, 2010

<i>k</i>-Zero Day Safety: Measuring the Security Risk of Networks against Unknown Attacks.
Proceedings of the Computer Security, 2010

Ontologies for modeling enterprise level security metrics.
Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, 2010

2009
Techniques for enterprise network security metrics.
Proceedings of the Fifth Cyber Security and Information Intelligence Research Workshop, 2009

2008
Implementing interactive analysis of attack graphs using relational databases.
J. Comput. Secur., 2008

Forensic Web Services.
Proceedings of the Advances in Digital Forensics IV, 2008

An Attack Graph-Based Probabilistic Security Metric.
Proceedings of the Data and Applications Security XXII, 2008

Web Services Security: Techniques and Challenges (Extended Abstract).
Proceedings of the Data and Applications Security XXII, 2008

Measuring network security using dynamic bayesian network.
Proceedings of the 4th ACM Workshop on Quality of Protection, 2008

2007
Data Warehousing and Data Mining Techniques for Cyber Security
Advances in Information Security 31, Springer, ISBN: 978-0-387-26409-7, 2007

Web Services Security: Challenges and Techniques.
Proceedings of the 8th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2007), 2007

Measuring the Overall Security of Network Configurations Using Attack Graphs.
Proceedings of the Data and Applications Security XXI, 2007

Toward measuring network security using attack graphs.
Proceedings of the 3th ACM Workshop on Quality of Protection, 2007

2006
Data warehousing and data mining techniques for intrusion detection systems.
Distributed Parallel Databases, 2006

Interactive Analysis of Attack Graphs Using Relational Queries.
Proceedings of the Data and Applications Security XX, 2006

2005
Data Mining for Intrusion Detection.
Proceedings of the Data Mining and Knowledge Discovery Handbook., 2005

2004
Design of a data warehouse system for network/web services.
Proceedings of the 2004 ACM CIKM International Conference on Information and Knowledge Management, 2004

1998
ANSWER: Network Monitoring Using Object-Oriented Rules.
Proceedings of the Fifteenth National Conference on Artificial Intelligence and Tenth Innovative Applications of Artificial Intelligence Conference, 1998

1996
A model based reasoning approach to network monitoring.
Proceedings of the Workshop on Databases - Active and Real-Time, 1996

1995
Object oriented data modeling for VLSI/CAD.
Proceedings of the 8th International Conference on VLSI Design (VLSI Design 1995), 1995

1993
HS: a hierarchical search package for CAD data.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 1993

DDB: An Object Oriented Design Data Manager for VLSI CAD.
Proceedings of the 1993 ACM SIGMOD International Conference on Management of Data, 1993

Can OODB Technology Solve CAD Design Data Management Problems? (Panel Abstract).
Proceedings of the Ninth International Conference on Data Engineering, 1993

1989
A data model and architecture for VLSI/CAD databases.
Proceedings of the 1989 IEEE International Conference on Computer-Aided Design, 1989

1987
Performance Analysis of Resiliency Mechanisms in Distributed Datbase Systems.
Proceedings of the Third International Conference on Data Engineering, 1987

1985
An Analysis of the Effect of Network Parameters on the Performance of Distributed Database Systems.
IEEE Trans. Software Eng., 1985

1984
An Adaptive Concurrency Control Strategy for Distributed Database Systems.
Proceedings of the First International Conference on Data Engineering, 1984


  Loading...