Sathya Chandran Sundaramurthy

According to our database1, Sathya Chandran Sundaramurthy authored at least 14 papers between 2011 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
Deploying Android Security Updates: an Extensive Study Involving Manufacturers, Carriers, and End Users.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

2017
An Anthropological Study of Security Operations Centers to Improve Operational Efficiency.
PhD thesis, 2017

Humans Are Dynamic - Our Tools Should Be Too.
IEEE Internet Comput., 2017

MTD CBITS: Moving Target Defense for Cloud-Based IT Systems.
Proceedings of the Computer Security - ESORICS 2017, 2017

2016
Turning Contradictions into Innovations or: How We Learned to Stop Whining and Improve Security Operations.
Proceedings of the Twelfth Symposium on Usable Privacy and Security, 2016

2015
A Human Capital Model for Mitigating Security Analyst Burnout.
Proceedings of the Eleventh Symposium On Usable Privacy and Security, 2015

2014
An Anthropological Approach to Studying CSIRTs.
IEEE Secur. Priv., 2014

A Tale of Three Security Operation Centers.
Proceedings of the 2014 ACM Workshop on Security Information Workers, 2014

2013
Designing forensic analysis techniques through anthropology.
Proceedings of the New Security Paradigms Workshop, 2013

Aiding Intrusion Analysis Using Machine Learning.
Proceedings of the 12th International Conference on Machine Learning and Applications, 2013

2012
Classification of UDP Traffic for DDoS Detection.
Proceedings of the 5th USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2012

Investigative response modeling and predictive data collection.
Proceedings of the 2012 eCrime Researchers Summit, 2012

Examining intrusion prevention system events from worldwide networks.
Proceedings of the 2012 ACM Workshop on Building analysis datasets and gathering experience returns for security, 2012

2011
Prioritizing intrusion analysis using Dempster-Shafer theory.
Proceedings of the 4th ACM Workshop on Security and Artificial Intelligence, 2011


  Loading...