Suryadipta Majumdar

Orcid: 0000-0002-6501-4214

According to our database1, Suryadipta Majumdar authored at least 36 papers between 2015 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
On Reducing Underutilization of Security Standards by Deriving Actionable Rules: An Application to IoT.
Proceedings of the Security Standardisation Research - 8th International Conference, 2023

Layered Security Analysis for Container Images: Expanding Lightweight Pre-Deployment Scanning.
Proceedings of the 20th Annual International Conference on Privacy, Security and Trust, 2023

Warping the Defence Timeline: Non-Disruptive Proactive Attack Mitigation for Kubernetes Clusters.
Proceedings of the IEEE International Conference on Communications, 2023

Evaluating the Security Posture of 5G Networks by Combining State Auditing and Event Monitoring.
Proceedings of the Computer Security - ESORICS 2023, 2023

A Tenant-based Two-stage Approach to Auditing the Integrity of Virtual Network Function Chains Hosted on Third-Party Clouds.
Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy, 2023

Towards Evaluation and Understanding of Large Language Models for Cyber Operation Automation.
Proceedings of the IEEE Conference on Communications and Network Security, 2023

2022
ProSAS: Proactive Security Auditing System for Clouds.
IEEE Trans. Dependable Secur. Comput., 2022

DPOAD: Differentially Private Outsourcing of Anomaly Detection through Iterative Sensitivity Learning.
CoRR, 2022

MLFM: Machine Learning Meets Formal Method for Faster Identification of Security Breaches in Network Functions Virtualization (NFV).
Proceedings of the Computer Security - ESORICS 2022, 2022

ProSPEC: Proactive Security Policy Enforcement for Containers.
Proceedings of the CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24, 2022

5GFIVer: Functional Integrity Verification for 5G Cloud-Native Network Functions.
Proceedings of the IEEE International Conference on Cloud Computing Technology and Science, 2022

2021
SegGuard: Segmentation-Based Anonymization of Network Data in Clouds for Privacy-Preserving Security Auditing.
IEEE Trans. Dependable Secur. Comput., 2021

VMGuard: State-Based Proactive Verification of Virtual Network Isolation With Application to NFV.
IEEE Trans. Dependable Secur. Comput., 2021

Feature Reduction through Data Preprocessing for Intrusion Detection in IoT Networks.
Proceedings of the 3rd IEEE International Conference on Trust, 2021

Towards an Attention-Based Accurate Intrusion Detection Approach.
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Systems, 2021

Security Auditing of Internet of Things Devices in a Smart Home.
Proceedings of the Advances in Digital Forensics XVII, 2021

Context-Aware IoT Device Functionality Extraction from Specifications for Ensuring Consumer Security.
Proceedings of the IEEE Conference on Communications and Network Security, 2021

Artificial Packet-Pair Dispersion (APPD): A Blackbox Approach to Verifying the Integrity of NFV Service Chains.
Proceedings of the IEEE Conference on Communications and Network Security, 2021

2020
A multi-level proactive security auditing framework for clouds through automated dependency building.
CCF Trans. Netw., 2020

Proactively Extracting IoT Device Capabilities: An Application to Smart Homes.
Proceedings of the Data and Applications Security and Privacy XXXIV, 2020

NFVGuard: Verifying the Security of Multilevel Network Functions Virtualization (NFV) Stack.
Proceedings of the 12th IEEE International Conference on Cloud Computing Technology and Science, 2020

2019
Cloud Security Auditing
Advances in Information Security 76, Springer, ISBN: 978-3-030-23127-9, 2019

ISOTOP: Auditing Virtual Networks Isolation Across Cloud Layers in OpenStack.
ACM Trans. Priv. Secur., 2019

Learning probabilistic dependencies among events for proactive security auditing in clouds.
J. Comput. Secur., 2019

Proactivizer: Transforming Existing Verification Tools into Efficient Solutions for Runtime Security Enforcement.
Proceedings of the Computer Security - ESORICS 2019, 2019

Multi-Level Proactive Security Auditing for Clouds.
Proceedings of the 2019 IEEE Conference on Dependable and Secure Computing, 2019

2018
User-Level Runtime Security Auditing for the Cloud.
IEEE Trans. Inf. Forensics Secur., 2018

Fast Control Channel Recovery for Resilient In-band OpenFlow Networks.
Proceedings of the 4th IEEE Conference on Network Softwarization and Workshops, 2018

Cloud Security Auditing: Major Approaches and Existing Challenges.
Proceedings of the Foundations and Practice of Security - 11th International Symposium, 2018

Stealthy Probing-Based Verification (SPV): An Active Approach to Defending Software Defined Networks Against Topology Poisoning Attacks.
Proceedings of the Computer Security, 2018

PERMON: An OpenStack Middleware for Runtime Security Policy Enforcement in Clouds.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

2017
TenantGuard: Scalable Runtime Verification of Cloud-Wide VM-Level Network Isolation.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

LeaPS: Learning-Based Proactive Security Auditing for Clouds.
Proceedings of the Computer Security - ESORICS 2017, 2017

2016
Proactive Verification of Security Compliance for Clouds Through Pre-computation: Application to OpenStack.
Proceedings of the Computer Security - ESORICS 2016, 2016

Auditing Security Compliance of the Virtualized Infrastructure in the Cloud: Application to OpenStack.
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016

2015
Security Compliance Auditing of Identity and Access Management in the Cloud: Application to OpenStack.
Proceedings of the 7th IEEE International Conference on Cloud Computing Technology and Science, 2015


  Loading...