Ritu Chadha

According to our database1, Ritu Chadha authored at least 71 papers between 1988 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Data-Driven Constraint Mining for Realizable Adversarial Samples.
Proceedings of the IEEE Military Communications Conference, 2023

2022
Data Sanitization Approach to Mitigate Clean-Label Attacks Against Malware Detection Systems.
Proceedings of the IEEE Military Communications Conference, 2022

2021
Poisoning Attacks and Data Sanitization Mitigations for Machine Learning Models in Network Intrusion Detection Systems.
Proceedings of the 2021 IEEE Military Communications Conference, 2021

2020
Attack-Resistant Routing : a Framework for Enhancing Routing Robustness in Wireless Ad-hoc Networks.
Proceedings of the NOMS 2020, 2020

A Quantitative Framework to Model Reconnaissance by Stealthy Attackers and Support Deception-Based Defenses.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020

A Framework for Studying Autonomic Computing Models in Cyber Deception.
Proceedings of the Adaptive Autonomous Secure Cyber Systems., 2020

2019
VulnerVAN: A Vulnerable Network Generation Tool.
Proceedings of the 2019 IEEE Military Communications Conference, 2019

2018
DeBot: A novel network-based mechanism to detect exfiltration by architectural stealthy botnets.
Secur. Priv., 2018

Limitations of the Lipschitz Constant as a Defense Against Adversarial Examples.
Proceedings of the ECML PKDD 2018 Workshops, 2018

On Detecting Manifestation of Adversary Characteristics.
Proceedings of the 2018 IEEE Military Communications Conference, 2018

Enablers of Adversarial Attacks in Machine Learning.
Proceedings of the 2018 IEEE Military Communications Conference, 2018

Towards the Development of Robust Deep Neural Networks in Adversarial Settings.
Proceedings of the 2018 IEEE Military Communications Conference, 2018

On Defensive Cyber Deception: A Case Study Using SDN.
Proceedings of the 2018 IEEE Military Communications Conference, 2018

Measuring the Effectiveness of Network Deception.
Proceedings of the 2018 IEEE International Conference on Intelligence and Security Informatics, 2018

2017
Deceiving Network Reconnaissance Using SDN-Based Virtual Topologies.
IEEE Trans. Netw. Serv. Manag., 2017

Application of Learning Using Privileged Information(LUPI): Botnet Detection.
Proceedings of the 26th International Conference on Computer Communication and Networks, 2017

2016
ACyDS: An adaptive cyber deception system.
Proceedings of the 2016 IEEE Military Communications Conference, 2016

CyberVAN: A Cyber Security Virtual Assured Network testbed.
Proceedings of the 2016 IEEE Military Communications Conference, 2016

Mapping sample scenarios to operational models.
Proceedings of the 2016 IEEE Military Communications Conference, 2016

Enabling reproducible cyber research - four labeled datasets.
Proceedings of the 2016 IEEE Military Communications Conference, 2016

Automated cross layer feature selection for effective intrusion detection in networked systems.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

Cyber Deception: Virtual Networks to Defend Insider Reconnaissance.
Proceedings of the 8th ACM CCS International Workshop on Managing Insider Security Threats, 2016

2015
Testing android devices for tactical networks: A hybrid emulation testbed approach.
Proceedings of the 34th IEEE Military Communications Conference, 2015

Insider attack detection using weak indicators over network flow data.
Proceedings of the 34th IEEE Military Communications Conference, 2015

Nature inspired collaborative team autonomy (NICiTA).
Proceedings of the 34th IEEE Military Communications Conference, 2015

TREND: Trust estimation system for wireless networks via multi-pronged detection.
Proceedings of the 34th IEEE Military Communications Conference, 2015

2014
Sophisticated Access Control via SMT and Logical Frameworks.
ACM Trans. Inf. Syst. Secur., 2014

2013
Modular natural language interfaces to logic-based policy frameworks.
Comput. Stand. Interfaces, 2013

Reliability estimation in mobile ad hoc networks.
Proceedings of the 9th International Conference on Network and Service Management, 2013

2012
Automated Policy Analysis.
Proceedings of the 2012 IEEE International Symposium on Policies for Distributed Systems and Networks, 2012

Towards network invariant fault diagnosis in MANETs via statistical modeling: The global strength of local weak decisions.
Proceedings of the 2012 IEEE Network Operations and Management Symposium, 2012

TimeSync: enabling scalable, high-fidelity hybrid network emulation.
Proceedings of the 15th ACM International Conference on Modeling, 2012

Detecting communication anomalies in tactical networks via graph learning.
Proceedings of the 31st IEEE Military Communications Conference, 2012

TimeSync: Virtual time for scalable, high-fidelity hybrid network emulation.
Proceedings of the 31st IEEE Military Communications Conference, 2012

A GNU-based packet radio for network management field testing.
Proceedings of the 31st IEEE Military Communications Conference, 2012

TITAN: Integrated network management in tactical mobile ad hoc networks.
Proceedings of the 31st IEEE Military Communications Conference, 2012

Building an operation support system for a fast reconfigurable network experimentation testbed.
Proceedings of the 31st IEEE Military Communications Conference, 2012

Policy-based spectrum management architecture.
Proceedings of the 31st IEEE Military Communications Conference, 2012

2011
Using an adaptive management plane for policy-based network management traffic in MANETs.
Proceedings of the MILCOM 2011, 2011

QAM: A comprehensive QoS-aware Middleware suite for tactical communications.
Proceedings of the MILCOM 2011, 2011

Mission-driven tactical network management.
Proceedings of the MILCOM 2011, 2011

On the application of cognitive network design to MANET Network Management.
Proceedings of the MILCOM 2011, 2011

Leveraging social network for predicting demand and estimating available resources for communication network management.
Proceedings of the 12th IFIP/IEEE International Symposium on Integrated Network Management, 2011

GNU Radio-Based Digital Communications: Computational Analysis of a GMSK Transceiver.
Proceedings of the Global Communications Conference, 2011

An Application of Formal Methods to Cognitive Radios.
Proceedings of the First International Workshop on Design and Implementation of Formal Tools and Systems, 2011

Criticality avoidance: A new paradigm for congestion control based on science of phase transition.
Proceedings of the 7th International Conference on Network and Service Management, 2011

2010
Integrated network experimentation for QoS measurements in opaque MANETs.
Int. J. Netw. Manag., 2010

A virtual ad hoc network testbed.
Int. J. Commun. Networks Distributed Syst., 2010

Predicting End-to-end Network Load.
Proceedings of the Ninth International Conference on Machine Learning and Applications, 2010

Application of time series analysis to fault management in MANETs.
Proceedings of the 6th International Conference on Network and Service Management, 2010

2009
An integrated testbed for Virtual Ad Hoc Networks.
Proceedings of the 5th International ICST Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities, 2009

Enabling Distributed Management for Dynamic Airborne Networks.
Proceedings of the POLICY 2009, 2009

2008
MANET management: Industry challenges & potential solutions.
Proceedings of the 9th IEEE International Symposium on a World of Wireless, 2008

Hybrid testbeds for QoS management in opaque MANETS.
Proceedings of the 4th Annual International Conference on Wireless Internet, 2008

PBNM Technology Evaluation: Practical Criteria.
Proceedings of the 9th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2008), 2008

DRAMA: Distributed Policy Management for MANETs.
Proceedings of the 9th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2008), 2008

2007
On Automated Policy Generation for Mobile Ad Hoc Networks.
Proceedings of the 8th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2007), 2007

2006
Beyond the Hype: Policies for Military Network Operations.
Proceedings of the International Conference on Systems and Networks Communications (ICSNC 2006), October 29, 2006

2005
Feature Interactions in Overlay Networks.
Proceedings of the Feature Interactions in Telecommunications and Software Systems VIII, 2005

2004
Policy-Based Mobile Ad Hoc Network Management.
Proceedings of the 5th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2004), 2004

Managing mobile ad hoc networks.
Proceedings of the Managing Next Generation Convergence Networks and Services, 2004

Applications of policy-based network management.
Proceedings of the Managing Next Generation Convergence Networks and Services, 2004

2003
PECAN: Policy-Enabled Configuration Across Networks.
Proceedings of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2003), 2003

2002
Guest editorial - policy-based networking.
IEEE Netw., 2002

1994
Correctness of Unification Without Occur Check in Prolog.
J. Log. Program., 1994

Symbolic simulation: theory and application to protocol modeling and validation.
Proceedings of the 1994 International Conference on Network Protocols, 1994

1993
On the Mechanical Derivation of Loop Invariants.
J. Symb. Comput., 1993

Finding Logical Consequences Using Unskolemization.
Proceedings of the Methodologies for Intelligent Systems, 7th International Symposium, 1993

A Formal Model of SONET's Alarm-Surveillance Procedures and their Simulation.
Proceedings of the Formal Description Techniques, VI, Proceedings of the IFIP TC6/WG6.1 Sixth International Conference on Formal Description Techniques, 1993

1989
An O(N log N) expected time merge heuristic for the planar ETSP.
Proceedings of the Computer Trends in the 1990s, 1989

1988
Partitioning rectilinear figures into rectangles.
Proceedings of the Sixteenth ACM Annual Conference on Computer Science, 1988


  Loading...