Ghanshyam S. Bopche

Orcid: 0000-0003-0691-8931

According to our database1, Ghanshyam S. Bopche authored at least 14 papers between 2014 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Generation of Believable Fake Logic Circuits for Cyber Deception.
Proceedings of the 16th International Conference on COMmunication Systems & NETworkS, 2024

2023
Classification of Images Extracted from Scientific Documents for Cyber Deception.
Proceedings of the Recent Trends in Image Processing and Pattern Recognition, 2023

Boolean Similarity Measure for Assessing Temporal Variation in the Network Attack Surface.
Proceedings of the 15th International Conference on COMmunication Systems & NETworkS, 2023

RcAMA - An Recursive Composition Algebra-based Framework for Detection of Multistage Attacks.
Proceedings of the 15th International Conference on COMmunication Systems & NETworkS, 2023

2022
Credit Scoring Models Using Ensemble Learning and Classification Approaches: A Comprehensive Survey.
Wirel. Pers. Commun., 2022

2019
A Proximity-Based Measure for Quantifying the Risk of Vulnerabilities.
Proceedings of the Security in Computing and Communications - 7th International Symposium, 2019

Differential Attack Graph-Based Approach for Assessing Change in the Network Attack Surface.
Proceedings of the Information Systems Security - 15th International Conference, 2019

2018
Inter-path Diversity Metrics for Increasing Networks Robustness Against Zero-Day Attacks.
Proceedings of the Security in Computing and Communications - 6th International Symposium, 2018

Modeling and Analyzing Multistage Attacks Using Recursive Composition Algebra.
Proceedings of the Information Systems Security - 14th International Conference, 2018

2017
Graph similarity metrics for assessing temporal changes in attack surface of dynamic networks.
Comput. Secur., 2017

Diversity-aware, Cost-effective Network Security Hardening Using Attack Graph.
Proceedings of the Security in Computing and Communications - 5th International Symposium, 2017

2015
Exploiting Domination in Attack Graph for Enterprise Network Hardening.
Proceedings of the Security in Computing and Communications, 2015

Exploiting curse of diversity for improved network security.
Proceedings of the 2015 International Conference on Advances in Computing, 2015

2014
Attack Graph Generation, Visualization and Analysis: Issues and Challenges.
Proceedings of the Security in Computing and Communications, 2014


  Loading...