Sudip Mittal

According to our database1, Sudip Mittal authored at least 24 papers between 2013 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Cyber-All-Intel: An AI for Security related Threat Intelligence.
CoRR, 2019

RelExt: Relation Extraction using Deep Learning approaches for Cybersecurity Knowledge Graph Improvement.
CoRR, 2019

A Semantic Approach for Automating Knowledge in Policies of Cyber Insurance Services.
Proceedings of the 2019 IEEE International Conference on Web Services, 2019

2018
Mining Threat Intelligence about Open-Source Projects and Libraries from Code Repository Issues and Bug Reports.
CoRR, 2018

Using Deep Neural Networks to Translate Multi-lingual Threat Intelligence.
CoRR, 2018

Preventing Poisoning Attacks on AI based Threat Intelligence Systems.
CoRR, 2018

Using Deep Neural Networks to Translate Multi-lingual Threat Intelligence.
Proceedings of the 2018 IEEE International Conference on Intelligence and Security Informatics, 2018

Mining Threat Intelligence about Open-Source Projects and Libraries from Code Repository Issues and Bug Reports.
Proceedings of the 2018 IEEE International Conference on Intelligence and Security Informatics, 2018

Semantically Rich, Context Aware Access Control for Openstack.
Proceedings of the 4th IEEE International Conference on Collaboration and Internet Computing, 2018

2017
Thinking, Fast and Slow: Combining Vector Spaces and Knowledge Graphs.
CoRR, 2017

Semantically Rich, Oblivious Access Control Using ABAC for Secure Cloud Storage.
Proceedings of the IEEE International Conference on Edge Computing, 2017

A Question and Answering System for Management of Cloud Service Level Agreements.
Proceedings of the 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), 2017

2016
OBD_SecureAlert: An Anomaly Detection System for Vehicles.
Proceedings of the 2016 IEEE International Conference on Smart Computing, 2016

Using semantic technologies to mine vehicular context for security.
Proceedings of the 2016 37th IEEE Sarnoff Symposium, Newark, NJ, USA, 2016

Automatic Extraction of Metrics from SLAs for Cloud Service Management.
Proceedings of the 2016 IEEE International Conference on Cloud Engineering, 2016

Semantic approach to automating management of big data privacy policies.
Proceedings of the 2016 IEEE International Conference on Big Data, 2016

CyberTwitter: Using Twitter to generate alerts for cybersecurity threats and vulnerabilities.
Proceedings of the 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2016

ALDA: Cognitive Assistant for Legal Document Analytics.
Proceedings of the 2016 AAAI Fall Symposia, Arlington, Virginia, USA, November 17-19, 2016, 2016

Streamlining Management of Multiple Cloud Services.
Proceedings of the 9th IEEE International Conference on Cloud Computing, 2016

2015
Using Data Analytics to Detect Anomalous States in Vehicles.
CoRR, 2015

Parallelizing natural language techniques for knowledge extraction from cloud service level agreements.
Proceedings of the 2015 IEEE International Conference on Big Data, 2015

2014
Broker Bots: Analyzing automated activity during High Impact Events on Twitter.
CoRR, 2014

Pinned it! A Large Scale Study of the Pinterest Network.
Proceedings of the 1st IKDD Conference on Data Sciences, Delhi, India, March 21 - 23, 2014, 2014

2013
The Pin-Bang Theory: Discovering The Pinterest World.
CoRR, 2013


  Loading...