Rajesh Ganesan

Orcid: 0000-0003-1875-548X

According to our database1, Rajesh Ganesan authored at least 29 papers between 2007 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
A Novel Team Formation Framework Based on Performance in a Cybersecurity Operations Center.
IEEE Trans. Serv. Comput., 2023

2022
Generating Realistic Fake Equations in Order to Reduce Intellectual Property Theft.
IEEE Trans. Dependable Secur. Comput., 2022

Maintaining the level of operational effectiveness of a CSOC under adverse conditions.
Int. J. Inf. Sec., 2022

2021
Fake Document Generation for Cyber Deception by Manipulating Text Comprehensibility.
IEEE Syst. J., 2021

2020
An Outsourcing Model for Alert Analysis in a Cybersecurity Operations Center.
ACM Trans. Web, 2020

Adaptive Alert Management for Balancing Optimal Performance among Distributed CSOCs using Reinforcement Learning.
IEEE Trans. Parallel Distributed Syst., 2020

Two Can Play That Game: An Adversarial Evaluation of a Cyber-Alert Inspection System.
ACM Trans. Intell. Syst. Technol., 2020

BOLD: Bio-Inspired Optimized Leader Election for Multiple Drones.
Sensors, 2020

2019
Optimizing Alert Data Management Processes at a Cyber Security Operations Center.
Proceedings of the Adversarial and Uncertain Reasoning for Adaptive Cyber Defense, 2019

A Two-Step Approach to Optimal Selection of Alerts for Investigation in a CSOC.
IEEE Trans. Inf. Forensics Secur., 2019

Understanding Tradeoffs Between Throughput, Quality, and Cost of Alert Analysis in a CSOC.
IEEE Trans. Inf. Forensics Secur., 2019

Optimal Assignment of Sensors to Analysts in a Cybersecurity Operations Center.
IEEE Syst. J., 2019

A methodology for ensuring fair allocation of CSOC effort for alert investigation.
Int. J. Inf. Sec., 2019

Solving Large-Scale 0-1 Knapsack Problems and its Application to Point Cloud Resampling.
CoRR, 2019

2018
Dynamic Optimization of the Level of Operational Effectiveness of a CSOC Under Adverse Conditions.
ACM Trans. Intell. Syst. Technol., 2018

VULCON: A System for Vulnerability Prioritization, Mitigation, and Management.
ACM Trans. Priv. Secur., 2018

Adaptive reallocation of cybersecurity analysts to sensors for balancing risk between sensors.
Serv. Oriented Comput. Appl., 2018

A methodology to measure and monitor level of operational effectiveness of a CSOC.
Int. J. Inf. Sec., 2018

Generating Hard to Comprehend Fake Documents for Defensive Cyber Deception.
IEEE Intell. Syst., 2018

A Strategy for Effective Alert Analysis at a Cyber Security Operations Center.
Proceedings of the From Database to Cyber Security, 2018

2017
Optimal Scheduling of Cybersecurity Analysts for Minimizing Risk.
ACM Trans. Intell. Syst. Technol., 2017

Detecting Stealthy Botnets in a Resource-Constrained Environment using Reinforcement Learning.
Proceedings of the 2017 Workshop on Moving Target Defense, 2017

2016
Dynamic Scheduling of Cybersecurity Analysts for Minimizing Risk Using Reinforcement Learning.
ACM Trans. Intell. Syst. Technol., 2016

Stepping up security with password management control.
Netw. Secur., 2016

2015
A reinforcement learning approach to convoy scheduling on a contested transportation network.
Optim. Lett., 2015

2012
Work in progress: STEM capacity building and STEM outreach in India: A report on a recent NSF sponsored GK-12 George Mason trip to India.
Proceedings of the IEEE Frontiers in Education Conference, 2012

2011
Work in progress - SUNRISE: Schools, university 'N' (and) resources in the sciences and engineering-a NSF/GMU GK-12 fellows project.
Proceedings of the 2011 Frontiers in Education Conference, 2011

2010
Improving quality of prediction in highly dynamic environments using approximate dynamic programming.
Qual. Reliab. Eng. Int., 2010

2007
A Multiresolution Analysis-Assisted Reinforcement Learning Approach to Run-by-Run Control.
IEEE Trans Autom. Sci. Eng., 2007


  Loading...