Sridhar Venkatesan

According to our database1, Sridhar Venkatesan authored at least 32 papers between 2012 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Data-Driven Constraint Mining for Realizable Adversarial Samples.
Proceedings of the IEEE Military Communications Conference, 2023

An Improved Nested Training Approach to Mitigate Clean-label Attacks against Malware Classifiers.
Proceedings of the IEEE Military Communications Conference, 2023

2022
R-Sentry: Deception based ransomware detection using file access patterns.
Comput. Electr. Eng., 2022

Data Sanitization Approach to Mitigate Clean-Label Attacks Against Malware Detection Systems.
Proceedings of the IEEE Military Communications Conference, 2022

2021
Poisoning Attacks and Data Sanitization Mitigations for Machine Learning Models in Network Intrusion Detection Systems.
Proceedings of the 2021 IEEE Military Communications Conference, 2021

Combinatorial Boosting of Ensembles of Diversified Classifiers for Defense Against Evasion Attacks.
Proceedings of the 2021 IEEE Military Communications Conference, 2021

Combinatorial Boosting of Classifiers for Moving Target Defense Against Adversarial Evasion Attacks.
Proceedings of the MTD@CCS 2021: Proceedings of the 8th ACM Workshop on Moving Target Defense, 2021

2020
Learning and Planning in the Feature Deception Problem.
Proceedings of the Decision and Game Theory for Security - 11th International Conference, 2020

Harnessing the Power of Deception in Attack Graph-Based Security Games.
Proceedings of the Decision and Game Theory for Security - 11th International Conference, 2020

A Quantitative Framework to Model Reconnaissance by Stealthy Attackers and Support Deception-Based Defenses.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020

A Framework for Studying Autonomic Computing Models in Cyber Deception.
Proceedings of the Adaptive Autonomous Secure Cyber Systems., 2020

2019
Adaptive Cyber Defenses for Botnet Detection and Mitigation.
Proceedings of the Adversarial and Uncertain Reasoning for Adaptive Cyber Defense, 2019

Moving Target Defense Quantification.
Proceedings of the Adversarial and Uncertain Reasoning for Adaptive Cyber Defense, 2019

Learning and Planning in Feature Deception Games.
CoRR, 2019

VulnerVAN: A Vulnerable Network Generation Tool.
Proceedings of the 2019 IEEE Military Communications Conference, 2019

Identifying Stealthy Attackers in a Game Theoretic Framework Using Deception.
Proceedings of the Decision and Game Theory for Security - 10th International Conference, 2019

2018
DeBot: A novel network-based mechanism to detect exfiltration by architectural stealthy botnets.
Secur. Priv., 2018

Defending from Stealthy Botnets Using Moving Target Defenses.
IEEE Secur. Priv., 2018

On Detecting Manifestation of Adversary Characteristics.
Proceedings of the 2018 IEEE Military Communications Conference, 2018

On Defensive Cyber Deception: A Case Study Using SDN.
Proceedings of the 2018 IEEE Military Communications Conference, 2018

Measuring the Effectiveness of Network Deception.
Proceedings of the 2018 IEEE International Conference on Intelligence and Security Informatics, 2018

2017
A Framework for Moving Target Defense Quantification.
Proceedings of the ICT Systems Security and Privacy Protection, 2017

Detecting Stealthy Botnets in a Resource-Constrained Environment using Reinforcement Learning.
Proceedings of the 2017 Workshop on Moving Target Defense, 2017

2016
A moving target defense approach to mitigate DDoS attacks against proxy-based architectures.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

A quantitative risk assessment framework for adaptive Intrusion Detection in the cloud.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

Moving Target Defense against DDoS Attacks: An Empirical Game-Theoretic Analysis.
Proceedings of the 2016 ACM Workshop on Moving Target Defense, 2016

A Moving Target Defense Approach to Disrupting Stealthy Botnets.
Proceedings of the 2016 ACM Workshop on Moving Target Defense, 2016

2015
Disrupting stealthy botnets through strategic placement of detectors.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

2014
A hardware accelerator for data classification within the sensing infrastructure.
Proceedings of the 15th IEEE International Conference on Information Reuse and Integration, 2014

Advancing WSN physical security adopting TPM-based architectures.
Proceedings of the 15th IEEE International Conference on Information Reuse and Integration, 2014

2012
A Code-Based 1-out-of-N Oblivious Transfer Based on McEliece Assumptions.
Proceedings of the Information Security Practice and Experience, 2012

An Efficient IND-CCA2 Secure Variant of the Niederreiter Encryption Scheme in the Standard Model.
Proceedings of the Information Security and Privacy - 17th Australasian Conference, 2012


  Loading...