S. Raj Rajagopalan

According to our database1, S. Raj Rajagopalan authored at least 31 papers between 2002 and 2024.

Collaborative distances:
  • Dijkstra number2 of two.
  • Erdős number3 of three.



In proceedings 
PhD thesis 


On csauthors.net:


A Preliminary Study on Using Large Language Models in Software Pentesting.
CoRR, 2024

Hiding in Plain Sight: Towards the Science of Linguistic Steganography.
CoRR, 2023

Guest Editors' Introduction: Circuits and Systems for VLSI IoT Devices.
IEEE Des. Test, 2019

Humans Are Dynamic - Our Tools Should Be Too.
IEEE Internet Comput., 2017

Enhanced Security of Building Automation Systems Through Microkernel-Based Controller Platforms.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems Workshops, 2017

The Human Capital Model for Security Research: New Insights into Technology Transition.
Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, 2017

Hive oversight for network intrusion early warning using DIAMoND: a bee-inspired method for fully distributed cyber defense.
IEEE Commun. Mag., 2016

Turning Contradictions into Innovations or: How We Learned to Stop Whining and Improve Security Operations.
Proceedings of the Twelfth Symposium on Usable Privacy and Security, 2016

TIPPERS: A privacy cognizant IoT environment.
Proceedings of the 2016 IEEE International Conference on Pervasive Computing and Communication Workshops, 2016

Stopping Amplified DNS DDoS Attacks through Distributed Query Rate Sharing.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016

A Human Capital Model for Mitigating Security Analyst Burnout.
Proceedings of the Eleventh Symposium On Usable Privacy and Security, 2015

DIAMoND: Distributed Intrusion/Anomaly Monitoring for Nonparametric Detection.
Proceedings of the 24th International Conference on Computer Communication and Networks, 2015

Secure RTOS Architecture for Building Automation.
Proceedings of the First ACM Workshop on Cyber-Physical Systems-Security and/or PrivaCy, 2015

Surpass: System-initiated User-replaceable Passwords.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

An Anthropological Approach to Studying CSIRTs.
IEEE Secur. Priv., 2014

Smart Meter Privacy: A Theoretical Framework.
IEEE Trans. Smart Grid, 2013

Utility-Privacy Tradeoffs in Databases: An Information-Theoretic Approach.
IEEE Trans. Inf. Forensics Secur., 2013

Aggregating vulnerability metrics in enterprise networks using attack graphs.
J. Comput. Secur., 2013

Classification of UDP Traffic for DDoS Detection.
Proceedings of the 5th USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2012

Investigative response modeling and predictive data collection.
Proceedings of the 2012 eCrime Researchers Summit, 2012

A Theory of Privacy and Utility in Databases
CoRR, 2011

Smart meter privacy: A utility-privacy framework.
Proceedings of the IEEE Second International Conference on Smart Grid Communications, 2011

Prioritizing intrusion analysis using Dempster-Shafer theory.
Proceedings of the 4th ACM Workshop on Security and Artificial Intelligence, 2011

Uncertainty and Risk Management in Cyber Situational Awareness.
Proceedings of the Cyber Situational Awareness - Issues and Research, 2010

Utility and privacy of data sources: Can Shannon help conceal and reveal information?
Proceedings of the Information Theory and Applications Workshop, 2010

A theory of utility and privacy of data sources.
Proceedings of the IEEE International Symposium on Information Theory, 2010

An information-theoretic approach to privacy.
Proceedings of the 48th Annual Allerton Conference on Communication, 2010

An Empirical Approach to Modeling Uncertainty in Intrusion Analysis.
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009

Federated Security Management for Dynamic Coalitions.
Proceedings of the 3rd DARPA Information Survivability Conference and Exposition (DISCEX-III 2003), 2003

Network and service security.
IEEE Netw., 2002

Spy: A Method to Secure Clients for Network Services.
Proceedings of the 22nd International Conference on Distributed Computing Systems, 2002