Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Sudip Mittal
@article{DBLP:journals/access/NeupaneMFSMCPR24, author = {Subash Neupane and Shaswata Mitra and Ivan A. Fernandez and Swayamjit Saha and Sudip Mittal and Jingdao Chen and Nisha Pillai and Shahram Rahimi}, title = {Security Considerations in AI-Robotics: {A} Survey of Current Methods, Challenges, and Opportunities}, journal = {{IEEE} Access}, volume = {12}, pages = {22072--22097}, year = {2024}, url = {https://doi.org/10.1109/ACCESS.2024.3363657}, doi = {10.1109/ACCESS.2024.3363657}, timestamp = {Sun, 24 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/NeupaneMFSMCPR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2401-05680, author = {Shaswata Mitra and Trisha Chakraborty and Subash Neupane and Aritran Piplai and Sudip Mittal}, title = {Use of Graph Neural Networks in Aiding Defensive Cyber Operations}, journal = {CoRR}, volume = {abs/2401.05680}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2401.05680}, doi = {10.48550/ARXIV.2401.05680}, eprinttype = {arXiv}, eprint = {2401.05680}, timestamp = {Thu, 25 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2401-05680.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2401-07871, author = {Logan Cummins and Alexander Sommers and Somayeh Bakhtiari Ramezani and Sudip Mittal and Joseph Jabour and Maria Seale and Shahram Rahimi}, title = {Explainable Predictive Maintenance: {A} Survey of Current Methods, Challenges and Opportunities}, journal = {CoRR}, volume = {abs/2401.07871}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2401.07871}, doi = {10.48550/ARXIV.2401.07871}, eprinttype = {arXiv}, eprint = {2401.07871}, timestamp = {Tue, 26 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2401-07871.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2401-10036, author = {Shaswata Mitra and Subash Neupane and Trisha Chakraborty and Sudip Mittal and Aritran Piplai and Manas Gaur and Shahram Rahimi}, title = {{LOCALINTEL:} Generating Organizational Threat Intelligence from Global and Local Cyber Knowledge}, journal = {CoRR}, volume = {abs/2401.10036}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2401.10036}, doi = {10.48550/ARXIV.2401.10036}, eprinttype = {arXiv}, eprint = {2401.10036}, timestamp = {Tue, 26 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2401-10036.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2401-10207, author = {Jesse Ables and Nathaniel Childers and William Anderson and Sudip Mittal and Shahram Rahimi and Ioana Banicescu and Maria Seale}, title = {Eclectic Rule Extraction for Explainability of Deep Neural Network based Intrusion Detection Systems}, journal = {CoRR}, volume = {abs/2401.10207}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2401.10207}, doi = {10.48550/ARXIV.2401.10207}, eprinttype = {arXiv}, eprint = {2401.10207}, timestamp = {Wed, 27 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2401-10207.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2402-00890, author = {Martin Duclos and Ivan A. Fernandez and Kaneesha Moore and Sudip Mittal and Edward Zieglar}, title = {Utilizing Large Language Models to Translate {RFC} Protocol Specifications to {CPSA} Definitions}, journal = {CoRR}, volume = {abs/2402.00890}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2402.00890}, doi = {10.48550/ARXIV.2402.00890}, eprinttype = {arXiv}, eprint = {2402.00890}, timestamp = {Fri, 09 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2402-00890.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2402-12608, author = {Hassan S. Al Khatib and Subash Neupane and Harish Kumar Manchukonda and Noorbakhsh Amiri Golilarz and Sudip Mittal and Amin Amirlatifi and Shahram Rahimi}, title = {Patient-Centric Knowledge Graphs: {A} Survey of Current Methods, Challenges, and Applications}, journal = {CoRR}, volume = {abs/2402.12608}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2402.12608}, doi = {10.48550/ARXIV.2402.12608}, eprinttype = {arXiv}, eprint = {2402.12608}, timestamp = {Thu, 21 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2402-12608.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2403-05551, author = {Di Kevin Gao and Andrew Haverly and Sudip Mittal and Jingdao Chen}, title = {A Bibliometric View of {AI} Ethics Development}, journal = {CoRR}, volume = {abs/2403.05551}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2403.05551}, doi = {10.48550/ARXIV.2403.05551}, eprinttype = {arXiv}, eprint = {2403.05551}, timestamp = {Thu, 04 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2403-05551.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2403-08607, author = {Subash Neupane and Shaswata Mitra and Sudip Mittal and Noorbakhsh Amiri Golilarz and Shahram Rahimi and Amin Amirlatifi}, title = {MedInsight: {A} Multi-Source Context Augmentation Framework for Generating Patient-Centric Medical Responses using Large Language Models}, journal = {CoRR}, volume = {abs/2403.08607}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2403.08607}, doi = {10.48550/ARXIV.2403.08607}, eprinttype = {arXiv}, eprint = {2403.08607}, timestamp = {Fri, 05 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2403-08607.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2403-14681, author = {Di Kevin Gao and Andrew Haverly and Sudip Mittal and Jiming Wu and Jingdao Chen}, title = {{AI} Ethics: {A} Bibliometric Analysis, Critical Issues, and Key Gaps}, journal = {CoRR}, volume = {abs/2403.14681}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2403.14681}, doi = {10.48550/ARXIV.2403.14681}, eprinttype = {arXiv}, eprint = {2403.14681}, timestamp = {Tue, 09 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2403-14681.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/internet/PiplaiKMGMJ23, author = {Aritran Piplai and Anantaa Kotal and Seyedreza Mohseni and Manas Gaur and Sudip Mittal and Anupam Joshi}, title = {Knowledge-Enhanced Neurosymbolic Artificial Intelligence for Cybersecurity and Privacy}, journal = {{IEEE} Internet Comput.}, volume = {27}, number = {5}, pages = {43--48}, year = {2023}, url = {https://doi.org/10.1109/MIC.2023.3299435}, doi = {10.1109/MIC.2023.3299435}, timestamp = {Sat, 14 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/internet/PiplaiKMGMJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsc/SaneJM23, author = {Ketki Sane and Karuna Pande Joshi and Sudip Mittal}, title = {Semantically Rich Framework to Automate Cyber Insurance Services}, journal = {{IEEE} Trans. Serv. Comput.}, volume = {16}, number = {1}, pages = {588--599}, year = {2023}, url = {https://doi.org/10.1109/TSC.2021.3113272}, doi = {10.1109/TSC.2021.3113272}, timestamp = {Sat, 25 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tsc/SaneJM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/flairs/CumminsKRRSM23, author = {Logan Cummins and Brad Killen and Somayeh Bakhtiari Ramezani and Shahram Rahimi and Maria Seale and Sudip Mittal}, editor = {Michael Franklin and Soon Ae Chun}, title = {A Comparative Study of Continual, Lifelong, and Online Supervised Learning Libraries}, booktitle = {Proceedings of the Thirty-Sixth International Florida Artificial Intelligence Research Society Conference, {FLAIRS} 2023, Clearwater Beach, FL, USA, May 14-17, 2023}, publisher = {{AAAI} Press}, year = {2023}, url = {https://doi.org/10.32473/flairs.36.133171}, doi = {10.32473/FLAIRS.36.133171}, timestamp = {Wed, 27 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/flairs/CumminsKRRSM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kdd/GaurTSM23, author = {Manas Gaur and Efthymia Tsamoura and Sarath Sreedharan and Sudip Mittal}, editor = {Ambuj K. Singh and Yizhou Sun and Leman Akoglu and Dimitrios Gunopulos and Xifeng Yan and Ravi Kumar and Fatma Ozcan and Jieping Ye}, title = {KiL 2023 : 3rd International Workshop on Knowledge-infused Learning}, booktitle = {Proceedings of the 29th {ACM} {SIGKDD} Conference on Knowledge Discovery and Data Mining, {KDD} 2023, Long Beach, CA, USA, August 6-10, 2023}, pages = {5857--5858}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3580305.3599199}, doi = {10.1145/3580305.3599199}, timestamp = {Mon, 25 Sep 2023 08:29:22 +0200}, biburl = {https://dblp.org/rec/conf/kdd/GaurTSM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/ChakrabortyMM23, author = {Trisha Chakraborty and Shaswata Mitra and Sudip Mittal}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {CAPoW: Context-Aware AI-Assisted Proof of Work Based DDoS Defense}, booktitle = {Proceedings of the 20th International Conference on Security and Cryptography, {SECRYPT} 2023, Rome, Italy, July 10-12, 2023}, pages = {62--72}, publisher = {{SCITEPRESS}}, year = {2023}, url = {https://doi.org/10.5220/0012069000003555}, doi = {10.5220/0012069000003555}, timestamp = {Mon, 31 Jul 2023 15:34:21 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/ChakrabortyMM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2301-11767, author = {Trisha Chakraborty and Shaswata Mitra and Sudip Mittal}, title = {CAPoW: Context-Aware AI-Assisted Proof of Work based DDoS Defense}, journal = {CoRR}, volume = {abs/2301.11767}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2301.11767}, doi = {10.48550/ARXIV.2301.11767}, eprinttype = {arXiv}, eprint = {2301.11767}, timestamp = {Tue, 31 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2301-11767.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2302-00152, author = {Subash Neupane and Ivan A. Fernandez and Wilson Patterson and Sudip Mittal and Milan Parmar and Shahram Rahimi}, title = {TwinExplainer: Explaining Predictions of an Automotive Digital Twin}, journal = {CoRR}, volume = {abs/2302.00152}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2302.00152}, doi = {10.48550/ARXIV.2302.00152}, eprinttype = {arXiv}, eprint = {2302.00152}, timestamp = {Thu, 09 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2302-00152.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2302-07953, author = {Sudip Mittal and Jingdao Chen}, title = {{AI} Security Threats against Pervasive Robotic Systems: {A} Course for Next Generation Cybersecurity Workforce}, journal = {CoRR}, volume = {abs/2302.07953}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2302.07953}, doi = {10.48550/ARXIV.2302.07953}, eprinttype = {arXiv}, eprint = {2302.07953}, timestamp = {Mon, 20 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2302-07953.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2303-17387, author = {Jesse Ables and Thomas Kirby and Sudip Mittal and Ioana Banicescu and Shahram Rahimi and William Anderson and Maria Seale}, title = {Explainable Intrusion Detection Systems Using Competitive Learning Techniques}, journal = {CoRR}, volume = {abs/2303.17387}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2303.17387}, doi = {10.48550/ARXIV.2303.17387}, eprinttype = {arXiv}, eprint = {2303.17387}, timestamp = {Wed, 27 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2303-17387.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2305-08993, author = {Shaswata Mitra and Stephen A. Torri and Sudip Mittal}, title = {Survey of Malware Analysis through Control Flow Graph using Machine Learning}, journal = {CoRR}, volume = {abs/2305.08993}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2305.08993}, doi = {10.48550/ARXIV.2305.08993}, eprinttype = {arXiv}, eprint = {2305.08993}, timestamp = {Wed, 24 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2305-08993.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2305-13967, author = {Damodar Panigrahi and William Anderson and Joshua Whitman and Sudip Mittal and Benjamin A. Blakely}, title = {{REGARD:} Rules of EngaGement for Automated cybeR Defense to aid in Intrusion Response}, journal = {CoRR}, volume = {abs/2305.13967}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2305.13967}, doi = {10.48550/ARXIV.2305.13967}, eprinttype = {arXiv}, eprint = {2305.13967}, timestamp = {Wed, 06 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2305-13967.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2306-01862, author = {Morgan Reece and Theodore Edward Lander Jr. and Matthew Stoffolano and Andy Sampson and Josiah Dykstra and Sudip Mittal and Nidhi Rastogi}, title = {Systemic Risk and Vulnerability Analysis of Multi-cloud Environments}, journal = {CoRR}, volume = {abs/2306.01862}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2306.01862}, doi = {10.48550/ARXIV.2306.01862}, eprinttype = {arXiv}, eprint = {2306.01862}, timestamp = {Mon, 12 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2306-01862.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2306-13033, author = {Subash Neupane and Ivan A. Fernandez and Sudip Mittal and Shahram Rahimi}, title = {Impacts and Risk of Generative {AI} Technology on Cyber Defense}, journal = {CoRR}, volume = {abs/2306.13033}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2306.13033}, doi = {10.48550/ARXIV.2306.13033}, eprinttype = {arXiv}, eprint = {2306.13033}, timestamp = {Tue, 27 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2306-13033.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2308-02031, author = {Aritran Piplai and Anantaa Kotal and Seyedreza Mohseni and Manas Gaur and Sudip Mittal and Anupam Joshi}, title = {Knowledge-enhanced Neuro-Symbolic {AI} for Cybersecurity and Privacy}, journal = {CoRR}, volume = {abs/2308.02031}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2308.02031}, doi = {10.48550/ARXIV.2308.02031}, eprinttype = {arXiv}, eprint = {2308.02031}, timestamp = {Mon, 21 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2308-02031.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2309-08814, author = {Charles Moore and Shaswata Mitra and Nisha Pillai and Marc Moore and Sudip Mittal and Cindy L. Bethel and Jingdao Chen}, title = {URA*: Uncertainty-aware Path Planning using Image-based Aerial-to-Ground Traversability Estimation for Off-road Environments}, journal = {CoRR}, volume = {abs/2309.08814}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2309.08814}, doi = {10.48550/ARXIV.2309.08814}, eprinttype = {arXiv}, eprint = {2309.08814}, timestamp = {Fri, 22 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2309-08814.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2310-08565, author = {Subash Neupane and Shaswata Mitra and Ivan A. Fernandez and Swayamjit Saha and Sudip Mittal and Jingdao Chen and Nisha Pillai and Shahram Rahimi}, title = {Security Considerations in AI-Robotics: {A} Survey of Current Methods, Challenges, and Opportunities}, journal = {CoRR}, volume = {abs/2310.08565}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2310.08565}, doi = {10.48550/ARXIV.2310.08565}, eprinttype = {arXiv}, eprint = {2310.08565}, timestamp = {Tue, 26 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2310-08565.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2311-01247, author = {Morgan Reece and Theodore Edward Lander Jr. and Sudip Mittal and Nidhi Rastogi and Josiah Dykstra and Andy Sampson}, title = {Emergent (In)Security of Multi-Cloud Environments}, journal = {CoRR}, volume = {abs/2311.01247}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2311.01247}, doi = {10.48550/ARXIV.2311.01247}, eprinttype = {arXiv}, eprint = {2311.01247}, timestamp = {Tue, 07 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2311-01247.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/NeupaneAAMRBS22, author = {Subash Neupane and Jesse Ables and William Anderson and Sudip Mittal and Shahram Rahimi and Ioana Banicescu and Maria Seale}, title = {Explainable Intrusion Detection Systems {(X-IDS):} {A} Survey of Current Methods, Challenges, and Opportunities}, journal = {{IEEE} Access}, volume = {10}, pages = {112392--112415}, year = {2022}, url = {https://doi.org/10.1109/ACCESS.2022.3216617}, doi = {10.1109/ACCESS.2022.3216617}, timestamp = {Sun, 24 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/NeupaneAAMRBS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/simpa/ChakrabortyMMY22, author = {Trisha Chakraborty and Shaswata Mitra and Sudip Mittal and Maxwell Young}, title = {AI{\_}Adaptive{\_}POW: An {AI} assisted Proof Of Work {(POW)} framework for DDoS defense}, journal = {Softw. Impacts}, volume = {13}, pages = {100335}, year = {2022}, url = {https://doi.org/10.1016/j.simpa.2022.100335}, doi = {10.1016/J.SIMPA.2022.100335}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/simpa/ChakrabortyMMY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/softx/CardelliniCILMP22, author = {Valeria Cardellini and Emiliano Casalicchio and Stefano Iannucci and Matteo Lucantonio and Sudip Mittal and Damodar Panigrahi and Andrea Silvi}, title = {irs-partition: An Intrusion Response System utilizing Deep Q-Networks and system partitions}, journal = {SoftwareX}, volume = {19}, pages = {101120}, year = {2022}, url = {https://doi.org/10.1016/j.softx.2022.101120}, doi = {10.1016/J.SOFTX.2022.101120}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/softx/CardelliniCILMP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/NguyenMM22, author = {Chuyen Nguyen and Caleb Morgan and Sudip Mittal}, editor = {Heng Yin and Angelos Stavrou and Cas Cremers and Elaine Shi}, title = {Poster {CTI4AI:} Threat Intelligence Generation and Sharing after Red Teaming {AI} Models}, booktitle = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2022, Los Angeles, CA, USA, November 7-11, 2022}, pages = {3431--3433}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3548606.3563525}, doi = {10.1145/3548606.3563525}, timestamp = {Sat, 17 Dec 2022 01:15:29 +0100}, biburl = {https://dblp.org/rec/conf/ccs/NguyenMM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/BertinoSTRLGM22, author = {Elisa Bertino and Ravi S. Sandhu and Bhavani Thuraisingham and Indrakshi Ray and Wenjia Li and Maanak Gupta and Sudip Mittal}, editor = {Anupam Joshi and Maribel Fern{\'{a}}ndez and Rakesh M. Verma}, title = {Security and Privacy for Emerging IoT and {CPS} Domains}, booktitle = {{CODASPY} '22: Twelveth {ACM} Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24 - 27, 2022}, pages = {336--337}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3508398.3519314}, doi = {10.1145/3508398.3519314}, timestamp = {Wed, 29 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/BertinoSTRLGM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/KantarciogluCSM22, author = {Murat Kantarcioglu and Barbara Carminati and Sagar Samtani and Sudip Mittal and Maanak Gupta}, editor = {Anupam Joshi and Maribel Fern{\'{a}}ndez and Rakesh M. Verma}, title = {Enforcement of Laws and Privacy Preferences in Modern Computing Systems}, booktitle = {{CODASPY} '22: Twelveth {ACM} Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24 - 27, 2022}, pages = {338--339}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3508398.3519315}, doi = {10.1145/3508398.3519315}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/KantarciogluCSM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/coinco/NeupaneFPMR22, author = {Subash Neupane and Ivan A. Fernandez and Wilson Patterson and Sudip Mittal and Shahram Rahimi}, title = {A Temporal Anomaly Detection System for Vehicles utilizing Functional Working Groups and Sensor Channels}, booktitle = {8th {IEEE} International Conference on Collaboration and Internet Computing, {CIC} 2022, Atlanta, GA, USA, December 14-16, 2022}, pages = {99--108}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CIC56439.2022.00024}, doi = {10.1109/CIC56439.2022.00024}, timestamp = {Sun, 24 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/coinco/NeupaneFPMR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/ChakrabortyMMY22, author = {Trisha Chakraborty and Shaswata Mitra and Sudip Mittal and Maxwell Young}, title = {A Policy Driven AI-Assisted PoW Framework}, booktitle = {52nd Annual {IEEE/IFIP} International Conference on Dependable Systems and Networks, {DSN} 2022, Supplemental Volume, Baltimore, MD, USA, June 27-30, 2022}, pages = {37--38}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/DSN-S54099.2022.00023}, doi = {10.1109/DSN-S54099.2022.00023}, timestamp = {Wed, 03 Aug 2022 09:05:42 +0200}, biburl = {https://dblp.org/rec/conf/dsn/ChakrabortyMMY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ssci/AblesKAMRBS22, author = {Jesse Ables and Thomas Kirby and William Anderson and Sudip Mittal and Shahram Rahimi and Ioana Banicescu and Maria Seale}, editor = {Hisao Ishibuchi and Chee{-}Keong Kwoh and Ah{-}Hwee Tan and Dipti Srinivasan and Chunyan Miao and Anupam Trivedi and Keeley A. Crockett}, title = {Creating an Explainable Intrusion Detection System Using Self Organizing Maps}, booktitle = {{IEEE} Symposium Series on Computational Intelligence, {SSCI} 2022, Singapore, December 4-7, 2022}, pages = {404--412}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/SSCI51031.2022.10022255}, doi = {10.1109/SSCI51031.2022.10022255}, timestamp = {Sun, 24 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ssci/AblesKAMRBS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2202-08182, author = {Valeria Cardellini and Emiliano Casalicchio and Stefano Iannucci and Matteo Lucantonio and Sudip Mittal and Damodar Panigrahi and Andrea Silvi}, title = {An Intrusion Response System utilizing Deep Q-Networks and System Partitions}, journal = {CoRR}, volume = {abs/2202.08182}, year = {2022}, url = {https://arxiv.org/abs/2202.08182}, eprinttype = {arXiv}, eprint = {2202.08182}, timestamp = {Tue, 01 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2202-08182.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2203-10698, author = {Trisha Chakraborty and Shaswata Mitra and Sudip Mittal and Maxwell Young}, title = {A Policy Driven AI-Assisted PoW Framework}, journal = {CoRR}, volume = {abs/2203.10698}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2203.10698}, doi = {10.48550/ARXIV.2203.10698}, eprinttype = {arXiv}, eprint = {2203.10698}, timestamp = {Tue, 29 Mar 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2203-10698.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2207-06236, author = {Subash Neupane and Jesse Ables and William Anderson and Sudip Mittal and Shahram Rahimi and Ioana Banicescu and Maria Seale}, title = {Explainable Intrusion Detection Systems {(X-IDS):} {A} Survey of Current Methods, Challenges, and Opportunities}, journal = {CoRR}, volume = {abs/2207.06236}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2207.06236}, doi = {10.48550/ARXIV.2207.06236}, eprinttype = {arXiv}, eprint = {2207.06236}, timestamp = {Wed, 27 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2207-06236.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2207-07465, author = {Jesse Ables and Thomas Kirby and William Anderson and Sudip Mittal and Shahram Rahimi and Ioana Banicescu and Maria Seale}, title = {Creating an Explainable Intrusion Detection System Using Self Organizing Maps}, journal = {CoRR}, volume = {abs/2207.07465}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2207.07465}, doi = {10.48550/ARXIV.2207.07465}, eprinttype = {arXiv}, eprint = {2207.07465}, timestamp = {Wed, 27 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2207-07465.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2208-07476, author = {Chuyen Nguyen and Caleb Morgan and Sudip Mittal}, title = {{CTI4AI:} Threat Intelligence Generation and Sharing after Red Teaming {AI} Models}, journal = {CoRR}, volume = {abs/2208.07476}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2208.07476}, doi = {10.48550/ARXIV.2208.07476}, eprinttype = {arXiv}, eprint = {2208.07476}, timestamp = {Mon, 22 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2208-07476.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2208-07801, author = {William Anderson and Kaneesha Moore and Jesse Ables and Sudip Mittal and Shahram Rahimi and Ioana Banicescu and Maria Seale}, title = {Designing an Artificial Immune System inspired Intrusion Detection System}, journal = {CoRR}, volume = {abs/2208.07801}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2208.07801}, doi = {10.48550/ARXIV.2208.07801}, eprinttype = {arXiv}, eprint = {2208.07801}, timestamp = {Wed, 27 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2208-07801.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2209-06828, author = {Subash Neupane and Ivan A. Fernandez and Wilson Patterson and Sudip Mittal and Shahram Rahimi}, title = {A Temporal Anomaly Detection System for Vehicles utilizing Functional Working Groups and Sensor Channels}, journal = {CoRR}, volume = {abs/2209.06828}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2209.06828}, doi = {10.48550/ARXIV.2209.06828}, eprinttype = {arXiv}, eprint = {2209.06828}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2209-06828.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2209-11647, author = {Morgan Reece and Sudip Mittal}, title = {Self-Sovereign Identity in a World of Authentication: Architecture and Domain Usecases}, journal = {CoRR}, volume = {abs/2209.11647}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2209.11647}, doi = {10.48550/ARXIV.2209.11647}, eprinttype = {arXiv}, eprint = {2209.11647}, timestamp = {Wed, 28 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2209-11647.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2210-14018, author = {Wilson Patterson and Ivan A. Fernandez and Subash Neupane and Milan Parmar and Sudip Mittal and Shahram Rahimi}, title = {A White-Box Adversarial Attack Against a Digital Twin}, journal = {CoRR}, volume = {abs/2210.14018}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2210.14018}, doi = {10.48550/ARXIV.2210.14018}, eprinttype = {arXiv}, eprint = {2210.14018}, timestamp = {Mon, 31 Oct 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2210-14018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2211-17073, author = {Keith Strandell and Sudip Mittal}, title = {Risks to Zero Trust in a Federated Mission Partner Environment}, journal = {CoRR}, volume = {abs/2211.17073}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2211.17073}, doi = {10.48550/ARXIV.2211.17073}, eprinttype = {arXiv}, eprint = {2211.17073}, timestamp = {Fri, 02 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2211-17073.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Mittal21, author = {Sudip Mittal}, title = {Secure {V2V} and {V2I} Technologies for the Next-Generation Intelligent Transportation Systems}, journal = {Computer}, volume = {54}, number = {2}, pages = {4--6}, year = {2021}, url = {https://doi.org/10.1109/MC.2020.3042227}, doi = {10.1109/MC.2020.3042227}, timestamp = {Mon, 22 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/computer/Mittal21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigdataconf/MitraPMJ21, author = {Shaswata Mitra and Aritran Piplai and Sudip Mittal and Anupam Joshi}, editor = {Yixin Chen and Heiko Ludwig and Yicheng Tu and Usama M. Fayyad and Xingquan Zhu and Xiaohua Hu and Suren Byna and Xiong Liu and Jianping Zhang and Shirui Pan and Vagelis Papalexakis and Jianwu Wang and Alfredo Cuzzocrea and Carlos Ordonez}, title = {Combating Fake Cyber Threat Intelligence using Provenance in Cybersecurity Knowledge Graphs}, booktitle = {2021 {IEEE} International Conference on Big Data (Big Data), Orlando, FL, USA, December 15-18, 2021}, pages = {3316--3323}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/BigData52589.2021.9671867}, doi = {10.1109/BIGDATA52589.2021.9671867}, timestamp = {Fri, 13 Jan 2023 17:06:49 +0100}, biburl = {https://dblp.org/rec/conf/bigdataconf/MitraPMJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/ChukkapalliAAMG21, author = {Sai Sree Laya Chukkapalli and Shaik Barakhat Aziz and Nouran Alotaibi and Sudip Mittal and Maanak Gupta and Mahmoud Abdelsalam}, editor = {Maanak Gupta and Mahmoud Abdelsalam and Sudip Mittal}, title = {Ontology driven {AI} and Access Control Systems for Smart Fisheries}, booktitle = {SAT-CPS@CODASPY 2021, Proceedings of the 2021 {ACM} Workshop on Secure and Trustworthy Cyber-Physical Systems, Virtual Event, USA, April 28, 2021}, pages = {59--68}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3445969.3450429}, doi = {10.1145/3445969.3450429}, timestamp = {Mon, 10 May 2021 15:39:18 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/ChukkapalliAAMG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/AbdelsalamGM21, author = {Mahmoud Abdelsalam and Maanak Gupta and Sudip Mittal}, editor = {Maanak Gupta and Mahmoud Abdelsalam and Sudip Mittal}, title = {Artificial Intelligence Assisted Malware Analysis}, booktitle = {SAT-CPS@CODASPY 2021, Proceedings of the 2021 {ACM} Workshop on Secure and Trustworthy Cyber-Physical Systems, Virtual Event, USA, April 28, 2021}, pages = {75--77}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3445969.3450433}, doi = {10.1145/3445969.3450433}, timestamp = {Mon, 10 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/AbdelsalamGM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/BertinoKASMG21, author = {Elisa Bertino and Murat Kantarcioglu and Cuneyt Gurcan Akcora and Sagar Samtani and Sudip Mittal and Maanak Gupta}, editor = {Anupam Joshi and Barbara Carminati and Rakesh M. Verma}, title = {{AI} for Security and Security for {AI}}, booktitle = {{CODASPY} '21: Eleventh {ACM} Conference on Data and Application Security and Privacy, Virtual Event, USA, April 26-28, 2021}, pages = {333--334}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3422337.3450357}, doi = {10.1145/3422337.3450357}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/BertinoKASMG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/SirajSHKKGM21, author = {Ambareen Siraj and Nigamanth Sridhar and John A. Drew Hamilton and Latifur Khan and Siddharth Kaza and Maanak Gupta and Sudip Mittal}, editor = {Anupam Joshi and Barbara Carminati and Rakesh M. Verma}, title = {Is there a Security Mindset and Can it be Taught?}, booktitle = {{CODASPY} '21: Eleventh {ACM} Conference on Data and Application Security and Privacy, Virtual Event, USA, April 26-28, 2021}, pages = {335--336}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3422337.3450358}, doi = {10.1145/3422337.3450358}, timestamp = {Wed, 21 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/SirajSHKKGM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dis/MoroneyCMJAMJB21, author = {Caitlin Moroney and Evan Crothers and Sudip Mittal and Anupam Joshi and T{\"{u}}lay Adali and Christine Mallinson and Nathalie Japkowicz and Zois Boukouvalas}, editor = {Carlos Soares and Lu{\'{\i}}s Torgo}, title = {The Case for Latent Variable Vs Deep Learning Methods in Misinformation Detection: An Application to {COVID-19}}, booktitle = {Discovery Science - 24th International Conference, {DS} 2021, Halifax, NS, Canada, October 11-13, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12986}, pages = {422--432}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-88942-5\_33}, doi = {10.1007/978-3-030-88942-5\_33}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dis/MoroneyCMJAMJB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ijcnn/RanadePMJF21, author = {Priyanka Ranade and Aritran Piplai and Sudip Mittal and Anupam Joshi and Tim Finin}, title = {Generating Fake Cyber Threat Intelligence Using Transformer-Based Models}, booktitle = {International Joint Conference on Neural Networks, {IJCNN} 2021, Shenzhen, China, July 18-22, 2021}, pages = {1--9}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/IJCNN52387.2021.9534192}, doi = {10.1109/IJCNN52387.2021.9534192}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ijcnn/RanadePMJF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/ChukkapalliPMJ21, author = {Sai Sree Laya Chukkapalli and Nisha Pillai and Sudip Mittal and Anupam Joshi}, title = {Cyber-Physical System Security Surveillance using Knowledge Graph based Digital Twins - {A} Smart Farming Usecase}, booktitle = {{IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2021, San Antonio, TX, USA, November 2-3, 2021}, pages = {1--6}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ISI53945.2021.9624688}, doi = {10.1109/ISI53945.2021.9624688}, timestamp = {Tue, 07 Dec 2021 17:02:14 +0100}, biburl = {https://dblp.org/rec/conf/isi/ChukkapalliPMJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tpsisa/ChukkapalliRMJ21, author = {Sai Sree Laya Chukkapalli and Priyanka Ranade and Sudip Mittal and Anupam Joshi}, title = {A Privacy Preserving Anomaly Detection Framework for Cooperative Smart Farming Ecosystem}, booktitle = {3rd {IEEE} International Conference on Trust, Privacy and Security in Intelligent Systems and Applications, {TPS-ISA} 2021, Atlanta, GA, USA, December 13-15, 2021}, pages = {340--347}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/TPSISA52974.2021.00037}, doi = {10.1109/TPSISA52974.2021.00037}, timestamp = {Thu, 21 Apr 2022 16:21:01 +0200}, biburl = {https://dblp.org/rec/conf/tpsisa/ChukkapalliRMJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/codaspy/2021sat-cps, editor = {Maanak Gupta and Mahmoud Abdelsalam and Sudip Mittal}, title = {SAT-CPS@CODASPY 2021, Proceedings of the 2021 {ACM} Workshop on Secure and Trustworthy Cyber-Physical Systems, Virtual Event, USA, April 28, 2021}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3445969}, doi = {10.1145/3445969}, isbn = {978-1-4503-8319-6}, timestamp = {Mon, 10 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/2021sat-cps.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2102-04351, author = {Priyanka Ranade and Aritran Piplai and Sudip Mittal and Anupam Joshi and Tim Finin}, title = {Generating Fake Cyber Threat Intelligence Using Transformer-Based Models}, journal = {CoRR}, volume = {abs/2102.04351}, year = {2021}, url = {https://arxiv.org/abs/2102.04351}, eprinttype = {arXiv}, eprint = {2102.04351}, timestamp = {Wed, 10 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2102-04351.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/GuptaAKM20, author = {Maanak Gupta and Mahmoud Abdelsalam and Sajad Khorsandroo and Sudip Mittal}, title = {Security and Privacy in Smart Farming: Challenges and Opportunities}, journal = {{IEEE} Access}, volume = {8}, pages = {34564--34584}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.2975142}, doi = {10.1109/ACCESS.2020.2975142}, timestamp = {Thu, 19 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/GuptaAKM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ChukkapalliMGAJ20, author = {Sai Sree Laya Chukkapalli and Sudip Mittal and Maanak Gupta and Mahmoud Abdelsalam and Anupam Joshi and Ravi S. Sandhu and Karuna P. Joshi}, title = {Ontologies and Artificial Intelligence Systems for the Cooperative Smart Farming Ecosystem}, journal = {{IEEE} Access}, volume = {8}, pages = {164045--164064}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.3022763}, doi = {10.1109/ACCESS.2020.3022763}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/ChukkapalliMGAJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/PiplaiMJFHZ20, author = {Aritran Piplai and Sudip Mittal and Anupam Joshi and Tim Finin and James Holt and Richard Zak}, title = {Creating Cybersecurity Knowledge Graphs From Malware After Action Reports}, journal = {{IEEE} Access}, volume = {8}, pages = {211691--211703}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.3039234}, doi = {10.1109/ACCESS.2020.3039234}, timestamp = {Thu, 17 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/PiplaiMJFHZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigdataconf/ChoudharyCMGAJ20, author = {Nitu Kedarmal Choudhary and Sai Sree Laya Chukkapalli and Sudip Mittal and Maanak Gupta and Mahmoud Abdelsalam and Anupam Joshi}, editor = {Xintao Wu and Chris Jermaine and Li Xiong and Xiaohua Hu and Olivera Kotevska and Siyuan Lu and Weija Xu and Srinivas Aluru and Chengxiang Zhai and Eyhab Al{-}Masri and Zhiyuan Chen and Jeff Saltz}, title = {YieldPredict: {A} Crop Yield Prediction Framework for Smart Farms}, booktitle = {2020 {IEEE} International Conference on Big Data {(IEEE} BigData 2020), Atlanta, GA, USA, December 10-13, 2020}, pages = {2340--2349}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/BigData50022.2020.9377832}, doi = {10.1109/BIGDATA50022.2020.9377832}, timestamp = {Fri, 19 Nov 2021 16:08:20 +0100}, biburl = {https://dblp.org/rec/conf/bigdataconf/ChoudharyCMGAJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigdataconf/PiplaiRKMNJ20, author = {Aritran Piplai and Priyanka Ranade and Anantaa Kotal and Sudip Mittal and Sandeep Nair Narayanan and Anupam Joshi}, editor = {Xintao Wu and Chris Jermaine and Li Xiong and Xiaohua Hu and Olivera Kotevska and Siyuan Lu and Weija Xu and Srinivas Aluru and Chengxiang Zhai and Eyhab Al{-}Masri and Zhiyuan Chen and Jeff Saltz}, title = {Using Knowledge Graphs and Reinforcement Learning for Malware Analysis}, booktitle = {2020 {IEEE} International Conference on Big Data {(IEEE} BigData 2020), Atlanta, GA, USA, December 10-13, 2020}, pages = {2626--2633}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/BigData50022.2020.9378491}, doi = {10.1109/BIGDATA50022.2020.9378491}, timestamp = {Thu, 08 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/bigdataconf/PiplaiRKMNJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigdatasec/ChukkapalliPMGJ20, author = {Sai Sree Laya Chukkapalli and Aritran Piplai and Sudip Mittal and Maanak Gupta and Anupam Joshi}, title = {A Smart-Farming Ontology for Attribute Based Access Control}, booktitle = {6th {IEEE} International Conference on Big Data Security on Cloud, {IEEE} International Conference on High Performance and Smart Computing, and {IEEE} International Conference on Intelligent Data and Security, BigDataSecurity/HPSC/IDS 2020, Baltimore, MD, USA, May 25-27, 2020}, pages = {29--34}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/BigDataSecurity-HPSC-IDS49724.2020.00017}, doi = {10.1109/BIGDATASECURITY-HPSC-IDS49724.2020.00017}, timestamp = {Wed, 14 Jul 2021 09:36:30 +0200}, biburl = {https://dblp.org/rec/conf/bigdatasec/ChukkapalliPMGJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cloud2/McDoleAGM20, author = {Andrew McDole and Mahmoud Abdelsalam and Maanak Gupta and Sudip Mittal}, editor = {Qi Zhang and Yingwei Wang and Liang{-}Jie Zhang}, title = {Analyzing {CNN} Based Behavioural Malware Detection Techniques on Cloud IaaS}, booktitle = {Cloud Computing - {CLOUD} 2020 - 13th International Conference, Held as Part of the Services Conference Federation, {SCF} 2020, Honolulu, HI, USA, September 18-20, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12403}, pages = {64--79}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-59635-4\_5}, doi = {10.1007/978-3-030-59635-4\_5}, timestamp = {Tue, 22 Sep 2020 17:23:44 +0200}, biburl = {https://dblp.org/rec/conf/cloud2/McDoleAGM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/coinco/SontowskiGCAMJS20, author = {Sina Sontowski and Maanak Gupta and Sai Sree Laya Chukkapalli and Mahmoud Abdelsalam and Sudip Mittal and Anupam Joshi and Ravi S. Sandhu}, title = {Cyber Attacks on Smart Farming Infrastructure}, booktitle = {6th {IEEE} International Conference on Collaboration and Internet Computing, {CIC} 2020, Atlanta, GA, USA, December 1-3, 2020}, pages = {135--143}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CIC50333.2020.00025}, doi = {10.1109/CIC50333.2020.00025}, timestamp = {Fri, 27 May 2022 15:04:14 +0200}, biburl = {https://dblp.org/rec/conf/coinco/SontowskiGCAMJS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/PiplaiMAGJF20, author = {Aritran Piplai and Sudip Mittal and Mahmoud Abdelsalam and Maanak Gupta and Anupam Joshi and Tim Finin}, title = {Knowledge Enrichment by Fusing Representations for Malware Threat Intelligence and Behavior}, booktitle = {{IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2020, Arlington, VA, USA, November 9-10, 2020}, pages = {1--6}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/ISI49825.2020.9280512}, doi = {10.1109/ISI49825.2020.9280512}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/PiplaiMAGJF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/SillsRM20, author = {Matthew Sills and Priyanka Ranade and Sudip Mittal}, title = {Cybersecurity Threat Intelligence Augmentation and Embedding Improvement - {A} Healthcare Usecase}, booktitle = {{IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2020, Arlington, VA, USA, November 9-10, 2020}, pages = {1--6}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/ISI49825.2020.9280482}, doi = {10.1109/ISI49825.2020.9280482}, timestamp = {Mon, 14 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isi/SillsRM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2002-06383, author = {Andrew McDole and Mahmoud Abdelsalam and Maanak Gupta and Sudip Mittal}, title = {Analyzing {CNN} Based Behavioural Malware Detection Techniques on Cloud IaaS}, journal = {CoRR}, volume = {abs/2002.06383}, year = {2020}, url = {https://arxiv.org/abs/2002.06383}, eprinttype = {arXiv}, eprint = {2002.06383}, timestamp = {Mon, 02 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2002-06383.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2004-09246, author = {Maanak Gupta and Mahmoud Abdelsalam and Sudip Mittal}, title = {Enabling and Enforcing Social Distancing Measures using Smart City and {ITS} Infrastructures: {A} {COVID-19} Use Case}, journal = {CoRR}, volume = {abs/2004.09246}, year = {2020}, url = {https://arxiv.org/abs/2004.09246}, eprinttype = {arXiv}, eprint = {2004.09246}, timestamp = {Wed, 22 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2004-09246.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2006-01284, author = {Zois Boukouvalas and Christine Mallinson and Evan Crothers and Nathalie Japkowicz and Aritran Piplai and Sudip Mittal and Anupam Joshi and T{\"{u}}lay Adali}, title = {Independent Component Analysis for Trustworthy Cyberspace during High Impact Events: An Application to Covid-19}, journal = {CoRR}, volume = {abs/2006.01284}, year = {2020}, url = {https://arxiv.org/abs/2006.01284}, eprinttype = {arXiv}, eprint = {2006.01284}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2006-01284.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2009-11101, author = {Maanak Gupta and Sudip Mittal and Mahmoud Abdelsalam}, title = {{AI} assisted Malware Analysis: {A} Course for Next Generation Cybersecurity Workforce}, journal = {CoRR}, volume = {abs/2009.11101}, year = {2020}, url = {https://arxiv.org/abs/2009.11101}, eprinttype = {arXiv}, eprint = {2009.11101}, timestamp = {Wed, 30 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2009-11101.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asunam/PinglePMJHZ19, author = {Aditya Pingle and Aritran Piplai and Sudip Mittal and Anupam Joshi and James Holt and Richard Zak}, editor = {Francesca Spezzano and Wei Chen and Xiaokui Xiao}, title = {RelExt: relation extraction using deep learning approaches for cybersecurity knowledge graph improvement}, booktitle = {{ASONAM} '19: International Conference on Advances in Social Networks Analysis and Mining, Vancouver, British Columbia, Canada, 27-30 August, 2019}, pages = {879--886}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3341161.3343519}, doi = {10.1145/3341161.3343519}, timestamp = {Sat, 09 Apr 2022 12:39:00 +0200}, biburl = {https://dblp.org/rec/conf/asunam/PinglePMJHZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigdatasec/RamapatruniNMJJ19, author = {Sowmya Ramapatruni and Sandeep Nair Narayanan and Sudip Mittal and Anupam Joshi and Karuna P. Joshi}, title = {Anomaly Detection Models for Smart Home Security}, booktitle = {5th {IEEE} International Conference on Big Data Security on Cloud, {IEEE} International Conference on High Performance and Smart Computing, and {IEEE} International Conference on Intelligent Data and Security, BigDataSecurity/HPSC/IDS 2019, Washington, DC, USA, May 27-29, 2019}, pages = {19--24}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/BigDataSecurity-HPSC-IDS.2019.00015}, doi = {10.1109/BIGDATASECURITY-HPSC-IDS.2019.00015}, timestamp = {Wed, 14 Jul 2021 09:36:14 +0200}, biburl = {https://dblp.org/rec/conf/bigdatasec/RamapatruniNMJJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icws/JoshiJM19, author = {Ketki Joshi and Karuna Pande Joshi and Sudip Mittal}, editor = {Elisa Bertino and Carl K. Chang and Peter Chen and Ernesto Damiani and Michael Goul and Katsunori Oyama}, title = {A Semantic Approach for Automating Knowledge in Policies of Cyber Insurance Services}, booktitle = {2019 {IEEE} International Conference on Web Services, {ICWS} 2019, Milan, Italy, July 8-13, 2019}, pages = {33--40}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ICWS.2019.00018}, doi = {10.1109/ICWS.2019.00018}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/icws/JoshiJM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mlsp/KhuranaMPJ19, author = {Nitika Khurana and Sudip Mittal and Aritran Piplai and Anupam Joshi}, title = {Preventing Poisoning Attacks On {AI} Based Threat Intelligence Systems}, booktitle = {29th {IEEE} International Workshop on Machine Learning for Signal Processing, {MLSP} 2019, Pittsburgh, PA, USA, October 13-16, 2019}, pages = {1--6}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/MLSP.2019.8918803}, doi = {10.1109/MLSP.2019.8918803}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mlsp/KhuranaMPJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1905-02497, author = {Aditya Pingle and Aritran Piplai and Sudip Mittal and Anupam Joshi and James Holt and Richard Zak}, title = {RelExt: Relation Extraction using Deep Learning approaches for Cybersecurity Knowledge Graph Improvement}, journal = {CoRR}, volume = {abs/1905.02497}, year = {2019}, url = {http://arxiv.org/abs/1905.02497}, eprinttype = {arXiv}, eprint = {1905.02497}, timestamp = {Sat, 23 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1905-02497.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1905-02895, author = {Sudip Mittal and Anupam Joshi and Tim Finin}, title = {Cyber-All-Intel: An {AI} for Security related Threat Intelligence}, journal = {CoRR}, volume = {abs/1905.02895}, year = {2019}, url = {http://arxiv.org/abs/1905.02895}, eprinttype = {arXiv}, eprint = {1905.02895}, timestamp = {Mon, 27 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1905-02895.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/coinco/RathodNMJ18, author = {Vishal Rathod and Sandeep Nair Narayanan and Sudip Mittal and Anupam Joshi}, title = {Semantically Rich, Context Aware Access Control for Openstack}, booktitle = {4th {IEEE} International Conference on Collaboration and Internet Computing, {CIC} 2018, Philadelphia, PA, USA, October 18-20, 2018}, pages = {460--465}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/CIC.2018.00069}, doi = {10.1109/CIC.2018.00069}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/coinco/RathodNMJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/NeilNJ18, author = {Lorenzo Neil and Sudip Mittal and Anupam Joshi}, title = {Mining Threat Intelligence about Open-Source Projects and Libraries from Code Repository Issues and Bug Reports}, booktitle = {2018 {IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2018, Miami, FL, USA, November 9-11, 2018}, pages = {7--12}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ISI.2018.8587375}, doi = {10.1109/ISI.2018.8587375}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/NeilNJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/RanadeMJJ18, author = {Priyanka Ranade and Sudip Mittal and Anupam Joshi and Karuna Pande Joshi}, title = {Using Deep Neural Networks to Translate Multi-lingual Threat Intelligence}, booktitle = {2018 {IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2018, Miami, FL, USA, November 9-11, 2018}, pages = {238--243}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ISI.2018.8587374}, doi = {10.1109/ISI.2018.8587374}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/RanadeMJJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1807-07418, author = {Nitika Khurana and Sudip Mittal and Anupam Joshi}, title = {Preventing Poisoning Attacks on {AI} based Threat Intelligence Systems}, journal = {CoRR}, volume = {abs/1807.07418}, year = {2018}, url = {http://arxiv.org/abs/1807.07418}, eprinttype = {arXiv}, eprint = {1807.07418}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1807-07418.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1807-07517, author = {Priyanka Ranade and Sudip Mittal and Anupam Joshi and Karuna P. Joshi}, title = {Using Deep Neural Networks to Translate Multi-lingual Threat Intelligence}, journal = {CoRR}, volume = {abs/1807.07517}, year = {2018}, url = {http://arxiv.org/abs/1807.07517}, eprinttype = {arXiv}, eprint = {1807.07517}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1807-07517.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1808-04673, author = {Lorenzo Neil and Sudip Mittal and Anupam Joshi}, title = {Mining Threat Intelligence about Open-Source Projects and Libraries from Code Repository Issues and Bug Reports}, journal = {CoRR}, volume = {abs/1808.04673}, year = {2018}, url = {http://arxiv.org/abs/1808.04673}, eprinttype = {arXiv}, eprint = {1808.04673}, timestamp = {Sun, 02 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1808-04673.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEcloud/Mittal0JPJ17, author = {Sudip Mittal and Aditi Gupta and Karuna P. Joshi and Claudia Pearce and Anupam Joshi}, editor = {Geoffrey C. Fox}, title = {A Question and Answering System for Management of Cloud Service Level Agreements}, booktitle = {2017 {IEEE} 10th International Conference on Cloud Computing (CLOUD), Honolulu, HI, USA, June 25-30, 2017}, pages = {684--687}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/CLOUD.2017.92}, doi = {10.1109/CLOUD.2017.92}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEcloud/Mittal0JPJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/edge/JoshiMJF17, author = {Maithilee P. Joshi and Sudip Mittal and Karuna P. Joshi and Tim Finin}, title = {Semantically Rich, Oblivious Access Control Using {ABAC} for Secure Cloud Storage}, booktitle = {{IEEE} International Conference on Edge Computing, {EDGE} 2017, Honolulu, HI, USA, June 25-30, 2017}, pages = {142--149}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/IEEE.EDGE.2017.27}, doi = {10.1109/IEEE.EDGE.2017.27}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/edge/JoshiMJF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1708-03310, author = {Sudip Mittal and Anupam Joshi and Tim Finin}, title = {Thinking, Fast and Slow: Combining Vector Spaces and Knowledge Graphs}, journal = {CoRR}, volume = {abs/1708.03310}, year = {2017}, url = {http://arxiv.org/abs/1708.03310}, eprinttype = {arXiv}, eprint = {1708.03310}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1708-03310.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEcloud/0003MJPJ16, author = {Aditi Gupta and Sudip Mittal and Karuna P. Joshi and Claudia Pearce and Anupam Joshi}, title = {Streamlining Management of Multiple Cloud Services}, booktitle = {9th {IEEE} International Conference on Cloud Computing, {CLOUD} 2016, San Francisco, CA, USA, June 27 - July 2, 2016}, pages = {481--488}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/CLOUD.2016.0070}, doi = {10.1109/CLOUD.2016.0070}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEcloud/0003MJPJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aaaifs/Joshi0MPJF16, author = {Karuna P. Joshi and Aditi Gupta and Sudip Mittal and Claudia Pearce and Anupam Joshi and Tim Finin}, title = {{ALDA:} Cognitive Assistant for Legal Document Analytics}, booktitle = {2016 {AAAI} Fall Symposia, Arlington, Virginia, USA, November 17-19, 2016}, publisher = {{AAAI} Press}, year = {2016}, url = {http://aaai.org/ocs/index.php/FSS/FSS16/paper/view/14119}, timestamp = {Wed, 14 Nov 2018 14:49:10 +0100}, biburl = {https://dblp.org/rec/conf/aaaifs/Joshi0MPJF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asunam/MittalDMJF16, author = {Sudip Mittal and Prajit Kumar Das and Varish Mulwad and Anupam Joshi and Tim Finin}, editor = {Ravi Kumar and James Caverlee and Hanghang Tong}, title = {CyberTwitter: Using Twitter to generate alerts for cybersecurity threats and vulnerabilities}, booktitle = {2016 {IEEE/ACM} International Conference on Advances in Social Networks Analysis and Mining, {ASONAM} 2016, San Francisco, CA, USA, August 18-21, 2016}, pages = {860--867}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/ASONAM.2016.7752338}, doi = {10.1109/ASONAM.2016.7752338}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asunam/MittalDMJF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigdataconf/Joshi0MPJF16, author = {Karuna P. Joshi and Aditi Gupta and Sudip Mittal and Claudia Pearce and Anupam Joshi and Tim Finin}, editor = {James Joshi and George Karypis and Ling Liu and Xiaohua Hu and Ronay Ak and Yinglong Xia and Weijia Xu and Aki{-}Hiro Sato and Sudarsan Rachuri and Lyle H. Ungar and Philip S. Yu and Rama Govindaraju and Toyotaro Suzumura}, title = {Semantic approach to automating management of big data privacy policies}, booktitle = {2016 {IEEE} International Conference on Big Data {(IEEE} BigData 2016), Washington DC, USA, December 5-8, 2016}, pages = {482--491}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/BigData.2016.7840639}, doi = {10.1109/BIGDATA.2016.7840639}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/bigdataconf/Joshi0MPJF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ic2e/MittalJPJ16, author = {Sudip Mittal and Karuna P. Joshi and Claudia Pearce and Anupam Joshi}, title = {Automatic Extraction of Metrics from SLAs for Cloud Service Management}, booktitle = {2016 {IEEE} International Conference on Cloud Engineering, {IC2E} 2016, Berlin, Germany, April 4-8, 2016}, pages = {139--142}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/IC2E.2016.14}, doi = {10.1109/IC2E.2016.14}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ic2e/MittalJPJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sarnoff/NarayananMJ16, author = {Sandeep Nair Narayanan and Sudip Mittal and Anupam Joshi}, title = {Using semantic technologies to mine vehicular context for security}, booktitle = {37th {IEEE} Sarnoff Symposium 2016, Newark, NJ, USA, September 19-21, 2016}, pages = {124--129}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/SARNOF.2016.7846740}, doi = {10.1109/SARNOF.2016.7846740}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sarnoff/NarayananMJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/smartcomp/NarayananMJ16, author = {Sandeep Nair Narayanan and Sudip Mittal and Anupam Joshi}, title = {OBD{\_}SecureAlert: An Anomaly Detection System for Vehicles}, booktitle = {2016 {IEEE} International Conference on Smart Computing, {SMARTCOMP} 2016, St Louis, MO, USA, May 18-20, 2016}, pages = {1--6}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/SMARTCOMP.2016.7501710}, doi = {10.1109/SMARTCOMP.2016.7501710}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/smartcomp/NarayananMJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigdataconf/MittalJPJ15, author = {Sudip Mittal and Karuna P. Joshi and Claudia Pearce and Anupam Joshi}, title = {Parallelizing natural language techniques for knowledge extraction from cloud service level agreements}, booktitle = {2015 {IEEE} International Conference on Big Data {(IEEE} BigData 2015), Santa Clara, CA, USA, October 29 - November 1, 2015}, pages = {2831--2833}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/BigData.2015.7364092}, doi = {10.1109/BIGDATA.2015.7364092}, timestamp = {Fri, 19 Nov 2021 16:08:20 +0100}, biburl = {https://dblp.org/rec/conf/bigdataconf/MittalJPJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/NarayananMJ15, author = {Sandeep Nair Narayanan and Sudip Mittal and Anupam Joshi}, title = {Using Data Analytics to Detect Anomalous States in Vehicles}, journal = {CoRR}, volume = {abs/1512.08048}, year = {2015}, url = {http://arxiv.org/abs/1512.08048}, eprinttype = {arXiv}, eprint = {1512.08048}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/NarayananMJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cods/MittalGDK14, author = {Sudip Mittal and Neha Gupta and Prateek Dewan and Ponnurangam Kumaraguru}, editor = {Balaraman Ravindran and Kamalakar Karlapalem}, title = {Pinned it! {A} Large Scale Study of the Pinterest Network}, booktitle = {Proceedings of the 1st {IKDD} Conference on Data Sciences, Delhi, India, March 21 - 23, 2014}, pages = {1--10}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2567688.2567692}, doi = {10.1145/2567688.2567692}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cods/MittalGDK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/MittalK14, author = {Sudip Mittal and Ponnurangam Kumaraguru}, title = {Broker Bots: Analyzing automated activity during High Impact Events on Twitter}, journal = {CoRR}, volume = {abs/1406.4286}, year = {2014}, url = {http://arxiv.org/abs/1406.4286}, eprinttype = {arXiv}, eprint = {1406.4286}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/MittalK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/MittalGDK13, author = {Sudip Mittal and Neha Gupta and Prateek Dewan and Ponnurangam Kumaraguru}, title = {The Pin-Bang Theory: Discovering The Pinterest World}, journal = {CoRR}, volume = {abs/1307.4952}, year = {2013}, url = {http://arxiv.org/abs/1307.4952}, eprinttype = {arXiv}, eprint = {1307.4952}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/MittalGDK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.