Pratik Satam

Orcid: 0000-0003-3139-8333

According to our database1, Pratik Satam authored at least 32 papers between 2015 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Photogrammetry for Digital Twinning Industry 4.0 (I4) Systems.
CoRR, 2024

GPS-IDS: An Anomaly-based GPS Spoofing Attack Detection Framework for Autonomous Vehicles.
CoRR, 2024

2023
HW-V2W-Map: Hardware Vulnerability to Weakness Mapping Framework for Root Cause Analysis with GPT-assisted Mitigation Suggestion.
CoRR, 2023

DT4I4-Secure: Digital Twin Framework for Industry 4.0 Systems Security.
Proceedings of the 14th IEEE Annual Ubiquitous Computing, 2023

Quantized Transformer Language Model Implementations on Edge Devices.
Proceedings of the International Conference on Machine Learning and Applications, 2023

2022
Selecting Post-Processing Schemes for Accurate Detection of Small Objects in Low-Resolution Wide-Area Aerial Imagery.
Remote. Sens., 2022

An explainable and efficient deep learning framework for video anomaly detection.
Clust. Comput., 2022

Security framework for smart cyber infrastructure.
Clust. Comput., 2022

AI-based Arabic Language and Speech Tutor.
Proceedings of the 19th IEEE/ACS International Conference on Computer Systems and Applications, 2022

A BERT-based Deep Learning Approach for Reputation Analysis in Social Media.
Proceedings of the 19th IEEE/ACS International Conference on Computer Systems and Applications, 2022

2021
WIDS: An Anomaly Based Intrusion Detection System for Wi-Fi (IEEE 802.11) Protocol.
IEEE Trans. Netw. Serv. Manag., 2021

Multi-Layer Mapping of Cyberspace for Intrusion Detection.
Proceedings of the 18th IEEE/ACS International Conference on Computer Systems and Applications, 2021

2020
Artificial Neural Networks-Based Intrusion Detection System for Internet of Things Fog Nodes.
IEEE Access, 2020

Spatio-Temporal Processing for Automatic Vehicle Detection in Wide-Area Aerial Video.
IEEE Access, 2020

Effective Wireless Communication Architecture for Resisting Jamming Attacks.
IEEE Access, 2020

Resilient Machine Learning (rML) Ensemble Against Adversarial Machine Learning Attacks.
Proceedings of the Dynamic Data Driven Applications Systems, 2020

Multi-level Bluetooth Intrusion Detection System.
Proceedings of the 17th IEEE/ACS International Conference on Computer Systems and Applications, 2020

2019
A Methodology to Design Intrusion Detection Systems (IDS) for IoT/Networking Protocols.
PhD thesis, 2019

2018
Bluetooth Intrusion Detection System (BIDS).
Proceedings of the 15th IEEE/ACS International Conference on Computer Systems and Applications, 2018

Malicious HTML File Prediction: A Detection and Classification Perspective with Noisy Data.
Proceedings of the 15th IEEE/ACS International Conference on Computer Systems and Applications, 2018

2017
Real-Time IRC Threat Detection Framework.
Proceedings of the 2nd IEEE International Workshops on Foundations and Applications of Self* Systems, 2017

Anomaly Based Wi-Fi Intrusion Detection System.
Proceedings of the 2nd IEEE International Workshops on Foundations and Applications of Self* Systems, 2017

Autoinfotainment Security Development Framework (ASDF) for Smart Cars.
Proceedings of the 2017 International Conference on Cloud and Autonomic Computing, 2017

SDR-Based Resilient Wireless Communications.
Proceedings of the 2017 International Conference on Cloud and Autonomic Computing, 2017

2016
Secure and Resilient Cloud Services for Enhanced Living Environments.
IEEE Cloud Comput., 2016

Anomaly behavior analysis of website vulnerability and security.
Proceedings of the 13th IEEE/ACS International Conference of Computer Systems and Applications, 2016

2015
Wireless Anomaly Detection Based on IEEE 802.11 Behavior Analysis.
IEEE Trans. Inf. Forensics Secur., 2015

Anomaly Behavior Analysis of DNS Protocol.
J. Internet Serv. Inf. Secur., 2015

Cross Layer Anomaly Based Intrusion Detection System.
Proceedings of the 2015 IEEE International Conference on Self-Adaptive and Self-Organizing Systems Workshops, 2015

Teaching and Training Cybersecurity as a Cloud Service.
Proceedings of the 2015 International Conference on Cloud and Autonomic Computing, 2015

CLaaS: Cybersecurity Lab as a Service - Design, Analysis, and Evaluation.
Proceedings of the 2015 International Conference on Cloud and Autonomic Computing, 2015

DNS-IDS: Securing DNS in the Cloud Era.
Proceedings of the 2015 International Conference on Cloud and Autonomic Computing, 2015


  Loading...