Sajjan G. Shiva

Orcid: 0000-0002-3996-7484

According to our database1, Sajjan G. Shiva authored at least 72 papers between 1976 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
State of the art: Security Testing of Machine Learning Development Systems.
Proceedings of the 14th IEEE Annual Computing and Communication Workshop and Conference, 2024

Trusting Classifiers with Interpretable Machine Learning Based Feature Selection Backpropagation.
Proceedings of the 14th IEEE Annual Computing and Communication Workshop and Conference, 2024

2023
Explainability of Artificial Intelligence Systems: A Survey.
Proceedings of the International Symposium on Networks, Computers and Communications, 2023

Requirements Elicitation and Stakeholder Communications for Explainable Machine Learning Systems: State of the Art.
Proceedings of the International Conference on Information Technology, 2023

Handling Node Discovery Problem in Fog Computing using Categorical51 Algorithm With Explainability.
Proceedings of the 2023 IEEE World AI IoT Congress (AIIoT), 2023

2022
Network Intrusion Detection and Comparative Analysis Using Ensemble Machine Learning and Feature Selection.
IEEE Trans. Netw. Serv. Manag., December, 2022

Scalable Hindsight Experience Replay based Q-learning Framework with Explainability for Big Data Applications in Fog Computing.
Proceedings of the 12th IEEE Annual Computing and Communication Workshop and Conference, 2022

MVE-based Reinforcement Learning Framework with Explainability for improving Quality of Experience of Application Placement in Fog Computing.
Proceedings of the 2022 IEEE World AI IoT Congress (AIIoT), 2022

Energy Efficient Double Critic Deep Deterministic Policy Gradient Framework for Fog Computing.
Proceedings of the 2022 IEEE World AI IoT Congress (AIIoT), 2022

Man-in-the-Middle attack Explainer for Fog computing using Soft Actor Critic Q-Learning Approach.
Proceedings of the 2022 IEEE World AI IoT Congress (AIIoT), 2022

2021
Machine Learning application lifecycle augmented with explanation and security.
Proceedings of the 12th IEEE Annual Ubiquitous Computing, 2021

2020
Ensemble Classifiers for Network Intrusion Detection Using a Novel Network Attack Dataset.
Future Internet, 2020

Detecting stealthy false data injection attacks in the smart grid using ensemble-based machine learning.
Comput. Secur., 2020

Taxonomy and Survey of Interpretable Machine Learning Method.
Proceedings of the 2020 IEEE Symposium Series on Computational Intelligence, 2020

Network Intrusion Detection using Natural Language Processing and Ensemble Machine Learning.
Proceedings of the 2020 IEEE Symposium Series on Computational Intelligence, 2020

Ads-Guard: Detecting Scammers in Online Classified Ads.
Proceedings of the 2020 IEEE Symposium Series on Computational Intelligence, 2020

Social-Guard: Detecting Scammers in Online Dating.
Proceedings of the 2020 IEEE International Conference on Electro Information Technology, 2020

Empirical Evaluation of the Ensemble Framework for Feature Selection in DDoS Attack.
Proceedings of the 7th IEEE International Conference on Cyber Security and Cloud Computing, 2020

2019
IoMT-SAF: Internet of Medical Things Security Assessment Framework.
Internet Things, 2019

Ontology-Based Security Recommendation for the Internet of Medical Things.
IEEE Access, 2019

DDoS Intrusion Detection Through Machine Learning Ensemble.
Proceedings of the 19th IEEE International Conference on Software Quality, 2019

Security Benchmarks for Wearable Medical Things: Stakeholders-Centric Approach.
Proceedings of the Fourth International Congress on Information and Communication Technology, 2019

Comparative Analysis of ML Classifiers for Network Intrusion Detection.
Proceedings of the Fourth International Congress on Information and Communication Technology, 2019

2018
On a Generic Security Game Model.
CoRR, 2018

Crowdsourcing Multi-Objective Recommendation System.
Proceedings of the Companion of the The Web Conference 2018 on The Web Conference 2018, 2018

CoRuM: Collaborative Runtime Monitor Framework for Application Security.
Proceedings of the 2018 IEEE/ACM International Conference on Utility and Cloud Computing Companion, 2018

Quantifying security and privacy in Internet of Things solutions.
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018

2017
Security and Privacy in the Internet of Medical Things: Taxonomy and Risk Assessment.
Proceedings of the 42nd IEEE Conference on Local Computer Networks Workshops, 2017

Secure live virtual machine migration through runtime monitors.
Proceedings of the Tenth International Conference on Contemporary Computing, 2017

2016
CSSR: Cloud Services Security Recommender.
Proceedings of the IEEE World Congress on Services, 2016

Evaluating Security and Privacy in Cloud Services.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

2015
Mitigating congestion based DoS attacks with an enhanced AQM technique.
Comput. Commun., 2015

Towards an Effective Crowdsourcing Recommendation System: A Survey of the State-of-the-Art.
Proceedings of the 2015 IEEE Symposium on Service-Oriented System Engineering, 2015

A Network Security Game Model.
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015

Building Trust in Cloud: Service Certification Challenges and Approaches.
Proceedings of the Ninth International Conference on Complex, 2015

2014
A game inspired defense mechanism against distributed denial of service attacks.
Secur. Commun. Networks, 2014

Use of Attack Graphs in Security Systems.
J. Comput. Networks Commun., 2014

A survey of cloud computing taxonomies: Rationale and overview.
Proceedings of the 9th International Conference for Internet Technology and Secured Transactions, 2014

2013
ADAPT: A Game Inspired Attack-Defense and Performance Metric Taxonomy.
Proceedings of the Security and Privacy Protection in Information Processing Systems, 2013

Runtime Monitors to Detect and Prevent Union Query Based SQL Injection Attacks.
Proceedings of the Tenth International Conference on Information Technology: New Generations, 2013

Security in the cloud based systems: Structure and breaches.
Proceedings of the 8th International Conference for Internet Technology and Secured Transactions, 2013

Mitigating congestion-based denial of service attacks with active queue management.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

Towards a Stakeholder-Oriented Taxonomical Approach for Secure Cloud Computing.
Proceedings of the 2013 IEEE Sixth International Conference on Cloud Computing, Santa Clara, CA, USA, June 28, 2013

2012
Evaluating security and privacy in cloud computing services: A Stakeholder's perspective.
Proceedings of the 7th International Conference for Internet Technology and Secured Transactions, 2012

Securing cloud infrastructure against co-resident DoS attacks using game theoretic defense mechanisms.
Proceedings of the 2012 International Conference on Advances in Computing, 2012

Runtime monitors for tautology based SQL injection attacks.
Proceedings of the 2012 International Conference on Cyber Security, 2012

2011
Game theory-based defense mechanisms against DDoS attacks on TCP/TCP-friendly flows.
Proceedings of the 2011 IEEE Symposium on Computational Intelligence in Cyber Security, 2011

2010
On modeling and simulation of game theory-based defense mechanisms against DoS and DDoS attacks.
Proceedings of the 2010 Spring Simulation Multiconference, 2010

Knowledge Engineering to Visualize Complexity for Legacy Modernization Planning.
Proceedings of the 22nd International Conference on Software Engineering & Knowledge Engineering (SEKE'2010), Redwood City, San Francisco Bay, CA, USA, July 1, 2010

An Approach to Overcoming Knowledge Sharing Challenges in a Corporate IT Environment.
Proceedings of the 5th IEEE International Conference on Global Software Engineering, 2010

A Survey of Game Theory as Applied to Network Security.
Proceedings of the 43rd Hawaii International International Conference on Systems Science (HICSS-43 2010), 2010

Game theory for cyber security.
Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, 2010

2009
Knowledge Management in Global Software Development.
Int. J. Distributed Sens. Networks, 2009

Clustering of Defect Reports Using Graph Partitioning Algorithms.
Proceedings of the 21st International Conference on Software Engineering & Knowledge Engineering (SEKE'2009), 2009

A Novel Approach to Knowledge Sharing in Software Systems Engineering.
Proceedings of the 4th IEEE International Conference on Global Software Engineering, 2009

2008
Using Semantic Wikis to Support Software Reuse.
J. Softw., 2008

Automatic Clustering of Defect Reports.
Proceedings of the Twentieth International Conference on Software Engineering & Knowledge Engineering (SEKE'2008), 2008

2007
Software Reuse: Research and Practice.
Proceedings of the Fourth International Conference on Information Technology: New Generations (ITNG 2007), 2007

2005
Will earlier projects plus a disciplined process enforce SE principles throughout the CS curriculum?
Proceedings of the 27th International Conference on Software Engineering (ICSE 2005), 2005

Comparing Agent Software Development Methodologies using the CMMI Engineering Process Model.
Proceedings of the A Conference on a Human Scale. 11th Americas Conference on Information Systems, 2005

Comparing Agent Software Development Methodologies Using the Waterfall Model.
Proceedings of the A Conference on a Human Scale. 11th Americas Conference on Information Systems, 2005

2004
CMMI Framework in Small Business Environment - A Case Study.
Proceedings of the International Conference on Software Engineering Research and Practice, 2004

Software Practices in Academia.
Proceedings of the International Conference on Software Engineering Research and Practice, 2004

1996
Design of a Knowledge-Based Simulation Environment.
Simul., 1996

Interpartition Communication with Shared Active Packages.
Proceedings of the annual meeting of the Ada programming world, 1996

1994
A VHDL Based Expert System for Hardware Synthesis.
VLSI Design, 1994

1990
A file integrity checking system to detect and recover from program modification attacks in multi-user computer systems.
Comput. Secur., 1990

1989
An aposteriori computer security system to identify computer viruses.
Proceedings of the Computer Trends in the 1990s, 1989

1982
Modular description/simulation/synthesis using DDL.
Proceedings of the 19th Design Automation Conference, 1982

1981
On the Description of Multiprocessor Architectures.
Proceedings of the IEEE Real-Time Systems Symposium, 1981

1980
Combinational logic synthesis from an HDL description.
Proceedings of the 17th Design Automation Conference, 1980

1976
Flip-Flops for Multiple-Valued Logic.
IEEE Trans. Computers, 1976


  Loading...