BibTeX records: Sudip Mittal

download as .bib file

@article{DBLP:journals/access/NeupaneMFSMCPR24,
  author       = {Subash Neupane and
                  Shaswata Mitra and
                  Ivan A. Fernandez and
                  Swayamjit Saha and
                  Sudip Mittal and
                  Jingdao Chen and
                  Nisha Pillai and
                  Shahram Rahimi},
  title        = {Security Considerations in AI-Robotics: {A} Survey of Current Methods,
                  Challenges, and Opportunities},
  journal      = {{IEEE} Access},
  volume       = {12},
  pages        = {22072--22097},
  year         = {2024},
  url          = {https://doi.org/10.1109/ACCESS.2024.3363657},
  doi          = {10.1109/ACCESS.2024.3363657},
  timestamp    = {Sun, 24 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/NeupaneMFSMCPR24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2401-05680,
  author       = {Shaswata Mitra and
                  Trisha Chakraborty and
                  Subash Neupane and
                  Aritran Piplai and
                  Sudip Mittal},
  title        = {Use of Graph Neural Networks in Aiding Defensive Cyber Operations},
  journal      = {CoRR},
  volume       = {abs/2401.05680},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2401.05680},
  doi          = {10.48550/ARXIV.2401.05680},
  eprinttype    = {arXiv},
  eprint       = {2401.05680},
  timestamp    = {Thu, 25 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2401-05680.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2401-07871,
  author       = {Logan Cummins and
                  Alexander Sommers and
                  Somayeh Bakhtiari Ramezani and
                  Sudip Mittal and
                  Joseph Jabour and
                  Maria Seale and
                  Shahram Rahimi},
  title        = {Explainable Predictive Maintenance: {A} Survey of Current Methods,
                  Challenges and Opportunities},
  journal      = {CoRR},
  volume       = {abs/2401.07871},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2401.07871},
  doi          = {10.48550/ARXIV.2401.07871},
  eprinttype    = {arXiv},
  eprint       = {2401.07871},
  timestamp    = {Tue, 26 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2401-07871.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2401-10036,
  author       = {Shaswata Mitra and
                  Subash Neupane and
                  Trisha Chakraborty and
                  Sudip Mittal and
                  Aritran Piplai and
                  Manas Gaur and
                  Shahram Rahimi},
  title        = {{LOCALINTEL:} Generating Organizational Threat Intelligence from Global
                  and Local Cyber Knowledge},
  journal      = {CoRR},
  volume       = {abs/2401.10036},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2401.10036},
  doi          = {10.48550/ARXIV.2401.10036},
  eprinttype    = {arXiv},
  eprint       = {2401.10036},
  timestamp    = {Tue, 26 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2401-10036.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2401-10207,
  author       = {Jesse Ables and
                  Nathaniel Childers and
                  William Anderson and
                  Sudip Mittal and
                  Shahram Rahimi and
                  Ioana Banicescu and
                  Maria Seale},
  title        = {Eclectic Rule Extraction for Explainability of Deep Neural Network
                  based Intrusion Detection Systems},
  journal      = {CoRR},
  volume       = {abs/2401.10207},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2401.10207},
  doi          = {10.48550/ARXIV.2401.10207},
  eprinttype    = {arXiv},
  eprint       = {2401.10207},
  timestamp    = {Wed, 27 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2401-10207.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2402-00890,
  author       = {Martin Duclos and
                  Ivan A. Fernandez and
                  Kaneesha Moore and
                  Sudip Mittal and
                  Edward Zieglar},
  title        = {Utilizing Large Language Models to Translate {RFC} Protocol Specifications
                  to {CPSA} Definitions},
  journal      = {CoRR},
  volume       = {abs/2402.00890},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2402.00890},
  doi          = {10.48550/ARXIV.2402.00890},
  eprinttype    = {arXiv},
  eprint       = {2402.00890},
  timestamp    = {Fri, 09 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2402-00890.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2402-12608,
  author       = {Hassan S. Al Khatib and
                  Subash Neupane and
                  Harish Kumar Manchukonda and
                  Noorbakhsh Amiri Golilarz and
                  Sudip Mittal and
                  Amin Amirlatifi and
                  Shahram Rahimi},
  title        = {Patient-Centric Knowledge Graphs: {A} Survey of Current Methods, Challenges,
                  and Applications},
  journal      = {CoRR},
  volume       = {abs/2402.12608},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2402.12608},
  doi          = {10.48550/ARXIV.2402.12608},
  eprinttype    = {arXiv},
  eprint       = {2402.12608},
  timestamp    = {Thu, 21 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2402-12608.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2403-05551,
  author       = {Di Kevin Gao and
                  Andrew Haverly and
                  Sudip Mittal and
                  Jingdao Chen},
  title        = {A Bibliometric View of {AI} Ethics Development},
  journal      = {CoRR},
  volume       = {abs/2403.05551},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2403.05551},
  doi          = {10.48550/ARXIV.2403.05551},
  eprinttype    = {arXiv},
  eprint       = {2403.05551},
  timestamp    = {Thu, 04 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2403-05551.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2403-08607,
  author       = {Subash Neupane and
                  Shaswata Mitra and
                  Sudip Mittal and
                  Noorbakhsh Amiri Golilarz and
                  Shahram Rahimi and
                  Amin Amirlatifi},
  title        = {MedInsight: {A} Multi-Source Context Augmentation Framework for Generating
                  Patient-Centric Medical Responses using Large Language Models},
  journal      = {CoRR},
  volume       = {abs/2403.08607},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2403.08607},
  doi          = {10.48550/ARXIV.2403.08607},
  eprinttype    = {arXiv},
  eprint       = {2403.08607},
  timestamp    = {Fri, 05 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2403-08607.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2403-14681,
  author       = {Di Kevin Gao and
                  Andrew Haverly and
                  Sudip Mittal and
                  Jiming Wu and
                  Jingdao Chen},
  title        = {{AI} Ethics: {A} Bibliometric Analysis, Critical Issues, and Key Gaps},
  journal      = {CoRR},
  volume       = {abs/2403.14681},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2403.14681},
  doi          = {10.48550/ARXIV.2403.14681},
  eprinttype    = {arXiv},
  eprint       = {2403.14681},
  timestamp    = {Tue, 09 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2403-14681.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/internet/PiplaiKMGMJ23,
  author       = {Aritran Piplai and
                  Anantaa Kotal and
                  Seyedreza Mohseni and
                  Manas Gaur and
                  Sudip Mittal and
                  Anupam Joshi},
  title        = {Knowledge-Enhanced Neurosymbolic Artificial Intelligence for Cybersecurity
                  and Privacy},
  journal      = {{IEEE} Internet Comput.},
  volume       = {27},
  number       = {5},
  pages        = {43--48},
  year         = {2023},
  url          = {https://doi.org/10.1109/MIC.2023.3299435},
  doi          = {10.1109/MIC.2023.3299435},
  timestamp    = {Sat, 14 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/internet/PiplaiKMGMJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsc/SaneJM23,
  author       = {Ketki Sane and
                  Karuna Pande Joshi and
                  Sudip Mittal},
  title        = {Semantically Rich Framework to Automate Cyber Insurance Services},
  journal      = {{IEEE} Trans. Serv. Comput.},
  volume       = {16},
  number       = {1},
  pages        = {588--599},
  year         = {2023},
  url          = {https://doi.org/10.1109/TSC.2021.3113272},
  doi          = {10.1109/TSC.2021.3113272},
  timestamp    = {Sat, 25 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tsc/SaneJM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/flairs/CumminsKRRSM23,
  author       = {Logan Cummins and
                  Brad Killen and
                  Somayeh Bakhtiari Ramezani and
                  Shahram Rahimi and
                  Maria Seale and
                  Sudip Mittal},
  editor       = {Michael Franklin and
                  Soon Ae Chun},
  title        = {A Comparative Study of Continual, Lifelong, and Online Supervised
                  Learning Libraries},
  booktitle    = {Proceedings of the Thirty-Sixth International Florida Artificial Intelligence
                  Research Society Conference, {FLAIRS} 2023, Clearwater Beach, FL,
                  USA, May 14-17, 2023},
  publisher    = {{AAAI} Press},
  year         = {2023},
  url          = {https://doi.org/10.32473/flairs.36.133171},
  doi          = {10.32473/FLAIRS.36.133171},
  timestamp    = {Wed, 27 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/flairs/CumminsKRRSM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kdd/GaurTSM23,
  author       = {Manas Gaur and
                  Efthymia Tsamoura and
                  Sarath Sreedharan and
                  Sudip Mittal},
  editor       = {Ambuj K. Singh and
                  Yizhou Sun and
                  Leman Akoglu and
                  Dimitrios Gunopulos and
                  Xifeng Yan and
                  Ravi Kumar and
                  Fatma Ozcan and
                  Jieping Ye},
  title        = {KiL 2023 : 3rd International Workshop on Knowledge-infused Learning},
  booktitle    = {Proceedings of the 29th {ACM} {SIGKDD} Conference on Knowledge Discovery
                  and Data Mining, {KDD} 2023, Long Beach, CA, USA, August 6-10, 2023},
  pages        = {5857--5858},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3580305.3599199},
  doi          = {10.1145/3580305.3599199},
  timestamp    = {Mon, 25 Sep 2023 08:29:22 +0200},
  biburl       = {https://dblp.org/rec/conf/kdd/GaurTSM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/ChakrabortyMM23,
  author       = {Trisha Chakraborty and
                  Shaswata Mitra and
                  Sudip Mittal},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {CAPoW: Context-Aware AI-Assisted Proof of Work Based DDoS Defense},
  booktitle    = {Proceedings of the 20th International Conference on Security and Cryptography,
                  {SECRYPT} 2023, Rome, Italy, July 10-12, 2023},
  pages        = {62--72},
  publisher    = {{SCITEPRESS}},
  year         = {2023},
  url          = {https://doi.org/10.5220/0012069000003555},
  doi          = {10.5220/0012069000003555},
  timestamp    = {Mon, 31 Jul 2023 15:34:21 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/ChakrabortyMM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2301-11767,
  author       = {Trisha Chakraborty and
                  Shaswata Mitra and
                  Sudip Mittal},
  title        = {CAPoW: Context-Aware AI-Assisted Proof of Work based DDoS Defense},
  journal      = {CoRR},
  volume       = {abs/2301.11767},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2301.11767},
  doi          = {10.48550/ARXIV.2301.11767},
  eprinttype    = {arXiv},
  eprint       = {2301.11767},
  timestamp    = {Tue, 31 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2301-11767.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2302-00152,
  author       = {Subash Neupane and
                  Ivan A. Fernandez and
                  Wilson Patterson and
                  Sudip Mittal and
                  Milan Parmar and
                  Shahram Rahimi},
  title        = {TwinExplainer: Explaining Predictions of an Automotive Digital Twin},
  journal      = {CoRR},
  volume       = {abs/2302.00152},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2302.00152},
  doi          = {10.48550/ARXIV.2302.00152},
  eprinttype    = {arXiv},
  eprint       = {2302.00152},
  timestamp    = {Thu, 09 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2302-00152.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2302-07953,
  author       = {Sudip Mittal and
                  Jingdao Chen},
  title        = {{AI} Security Threats against Pervasive Robotic Systems: {A} Course
                  for Next Generation Cybersecurity Workforce},
  journal      = {CoRR},
  volume       = {abs/2302.07953},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2302.07953},
  doi          = {10.48550/ARXIV.2302.07953},
  eprinttype    = {arXiv},
  eprint       = {2302.07953},
  timestamp    = {Mon, 20 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2302-07953.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2303-17387,
  author       = {Jesse Ables and
                  Thomas Kirby and
                  Sudip Mittal and
                  Ioana Banicescu and
                  Shahram Rahimi and
                  William Anderson and
                  Maria Seale},
  title        = {Explainable Intrusion Detection Systems Using Competitive Learning
                  Techniques},
  journal      = {CoRR},
  volume       = {abs/2303.17387},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2303.17387},
  doi          = {10.48550/ARXIV.2303.17387},
  eprinttype    = {arXiv},
  eprint       = {2303.17387},
  timestamp    = {Wed, 27 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2303-17387.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2305-08993,
  author       = {Shaswata Mitra and
                  Stephen A. Torri and
                  Sudip Mittal},
  title        = {Survey of Malware Analysis through Control Flow Graph using Machine
                  Learning},
  journal      = {CoRR},
  volume       = {abs/2305.08993},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2305.08993},
  doi          = {10.48550/ARXIV.2305.08993},
  eprinttype    = {arXiv},
  eprint       = {2305.08993},
  timestamp    = {Wed, 24 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2305-08993.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2305-13967,
  author       = {Damodar Panigrahi and
                  William Anderson and
                  Joshua Whitman and
                  Sudip Mittal and
                  Benjamin A. Blakely},
  title        = {{REGARD:} Rules of EngaGement for Automated cybeR Defense to aid in
                  Intrusion Response},
  journal      = {CoRR},
  volume       = {abs/2305.13967},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2305.13967},
  doi          = {10.48550/ARXIV.2305.13967},
  eprinttype    = {arXiv},
  eprint       = {2305.13967},
  timestamp    = {Wed, 06 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2305-13967.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2306-01862,
  author       = {Morgan Reece and
                  Theodore Edward Lander Jr. and
                  Matthew Stoffolano and
                  Andy Sampson and
                  Josiah Dykstra and
                  Sudip Mittal and
                  Nidhi Rastogi},
  title        = {Systemic Risk and Vulnerability Analysis of Multi-cloud Environments},
  journal      = {CoRR},
  volume       = {abs/2306.01862},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2306.01862},
  doi          = {10.48550/ARXIV.2306.01862},
  eprinttype    = {arXiv},
  eprint       = {2306.01862},
  timestamp    = {Mon, 12 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2306-01862.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2306-13033,
  author       = {Subash Neupane and
                  Ivan A. Fernandez and
                  Sudip Mittal and
                  Shahram Rahimi},
  title        = {Impacts and Risk of Generative {AI} Technology on Cyber Defense},
  journal      = {CoRR},
  volume       = {abs/2306.13033},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2306.13033},
  doi          = {10.48550/ARXIV.2306.13033},
  eprinttype    = {arXiv},
  eprint       = {2306.13033},
  timestamp    = {Tue, 27 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2306-13033.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2308-02031,
  author       = {Aritran Piplai and
                  Anantaa Kotal and
                  Seyedreza Mohseni and
                  Manas Gaur and
                  Sudip Mittal and
                  Anupam Joshi},
  title        = {Knowledge-enhanced Neuro-Symbolic {AI} for Cybersecurity and Privacy},
  journal      = {CoRR},
  volume       = {abs/2308.02031},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2308.02031},
  doi          = {10.48550/ARXIV.2308.02031},
  eprinttype    = {arXiv},
  eprint       = {2308.02031},
  timestamp    = {Mon, 21 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2308-02031.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2309-08814,
  author       = {Charles Moore and
                  Shaswata Mitra and
                  Nisha Pillai and
                  Marc Moore and
                  Sudip Mittal and
                  Cindy L. Bethel and
                  Jingdao Chen},
  title        = {URA*: Uncertainty-aware Path Planning using Image-based Aerial-to-Ground
                  Traversability Estimation for Off-road Environments},
  journal      = {CoRR},
  volume       = {abs/2309.08814},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2309.08814},
  doi          = {10.48550/ARXIV.2309.08814},
  eprinttype    = {arXiv},
  eprint       = {2309.08814},
  timestamp    = {Fri, 22 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2309-08814.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2310-08565,
  author       = {Subash Neupane and
                  Shaswata Mitra and
                  Ivan A. Fernandez and
                  Swayamjit Saha and
                  Sudip Mittal and
                  Jingdao Chen and
                  Nisha Pillai and
                  Shahram Rahimi},
  title        = {Security Considerations in AI-Robotics: {A} Survey of Current Methods,
                  Challenges, and Opportunities},
  journal      = {CoRR},
  volume       = {abs/2310.08565},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2310.08565},
  doi          = {10.48550/ARXIV.2310.08565},
  eprinttype    = {arXiv},
  eprint       = {2310.08565},
  timestamp    = {Tue, 26 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2310-08565.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2311-01247,
  author       = {Morgan Reece and
                  Theodore Edward Lander Jr. and
                  Sudip Mittal and
                  Nidhi Rastogi and
                  Josiah Dykstra and
                  Andy Sampson},
  title        = {Emergent (In)Security of Multi-Cloud Environments},
  journal      = {CoRR},
  volume       = {abs/2311.01247},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2311.01247},
  doi          = {10.48550/ARXIV.2311.01247},
  eprinttype    = {arXiv},
  eprint       = {2311.01247},
  timestamp    = {Tue, 07 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2311-01247.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/NeupaneAAMRBS22,
  author       = {Subash Neupane and
                  Jesse Ables and
                  William Anderson and
                  Sudip Mittal and
                  Shahram Rahimi and
                  Ioana Banicescu and
                  Maria Seale},
  title        = {Explainable Intrusion Detection Systems {(X-IDS):} {A} Survey of Current
                  Methods, Challenges, and Opportunities},
  journal      = {{IEEE} Access},
  volume       = {10},
  pages        = {112392--112415},
  year         = {2022},
  url          = {https://doi.org/10.1109/ACCESS.2022.3216617},
  doi          = {10.1109/ACCESS.2022.3216617},
  timestamp    = {Sun, 24 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/NeupaneAAMRBS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/simpa/ChakrabortyMMY22,
  author       = {Trisha Chakraborty and
                  Shaswata Mitra and
                  Sudip Mittal and
                  Maxwell Young},
  title        = {AI{\_}Adaptive{\_}POW: An {AI} assisted Proof Of Work {(POW)} framework
                  for DDoS defense},
  journal      = {Softw. Impacts},
  volume       = {13},
  pages        = {100335},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.simpa.2022.100335},
  doi          = {10.1016/J.SIMPA.2022.100335},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/simpa/ChakrabortyMMY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/softx/CardelliniCILMP22,
  author       = {Valeria Cardellini and
                  Emiliano Casalicchio and
                  Stefano Iannucci and
                  Matteo Lucantonio and
                  Sudip Mittal and
                  Damodar Panigrahi and
                  Andrea Silvi},
  title        = {irs-partition: An Intrusion Response System utilizing Deep Q-Networks
                  and system partitions},
  journal      = {SoftwareX},
  volume       = {19},
  pages        = {101120},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.softx.2022.101120},
  doi          = {10.1016/J.SOFTX.2022.101120},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/softx/CardelliniCILMP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/NguyenMM22,
  author       = {Chuyen Nguyen and
                  Caleb Morgan and
                  Sudip Mittal},
  editor       = {Heng Yin and
                  Angelos Stavrou and
                  Cas Cremers and
                  Elaine Shi},
  title        = {Poster {CTI4AI:} Threat Intelligence Generation and Sharing after
                  Red Teaming {AI} Models},
  booktitle    = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2022, Los Angeles, CA, USA, November
                  7-11, 2022},
  pages        = {3431--3433},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3548606.3563525},
  doi          = {10.1145/3548606.3563525},
  timestamp    = {Sat, 17 Dec 2022 01:15:29 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/NguyenMM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/BertinoSTRLGM22,
  author       = {Elisa Bertino and
                  Ravi S. Sandhu and
                  Bhavani Thuraisingham and
                  Indrakshi Ray and
                  Wenjia Li and
                  Maanak Gupta and
                  Sudip Mittal},
  editor       = {Anupam Joshi and
                  Maribel Fern{\'{a}}ndez and
                  Rakesh M. Verma},
  title        = {Security and Privacy for Emerging IoT and {CPS} Domains},
  booktitle    = {{CODASPY} '22: Twelveth {ACM} Conference on Data and Application Security
                  and Privacy, Baltimore, MD, USA, April 24 - 27, 2022},
  pages        = {336--337},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3508398.3519314},
  doi          = {10.1145/3508398.3519314},
  timestamp    = {Wed, 29 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/BertinoSTRLGM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/KantarciogluCSM22,
  author       = {Murat Kantarcioglu and
                  Barbara Carminati and
                  Sagar Samtani and
                  Sudip Mittal and
                  Maanak Gupta},
  editor       = {Anupam Joshi and
                  Maribel Fern{\'{a}}ndez and
                  Rakesh M. Verma},
  title        = {Enforcement of Laws and Privacy Preferences in Modern Computing Systems},
  booktitle    = {{CODASPY} '22: Twelveth {ACM} Conference on Data and Application Security
                  and Privacy, Baltimore, MD, USA, April 24 - 27, 2022},
  pages        = {338--339},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3508398.3519315},
  doi          = {10.1145/3508398.3519315},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/KantarciogluCSM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/coinco/NeupaneFPMR22,
  author       = {Subash Neupane and
                  Ivan A. Fernandez and
                  Wilson Patterson and
                  Sudip Mittal and
                  Shahram Rahimi},
  title        = {A Temporal Anomaly Detection System for Vehicles utilizing Functional
                  Working Groups and Sensor Channels},
  booktitle    = {8th {IEEE} International Conference on Collaboration and Internet
                  Computing, {CIC} 2022, Atlanta, GA, USA, December 14-16, 2022},
  pages        = {99--108},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CIC56439.2022.00024},
  doi          = {10.1109/CIC56439.2022.00024},
  timestamp    = {Sun, 24 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/coinco/NeupaneFPMR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/ChakrabortyMMY22,
  author       = {Trisha Chakraborty and
                  Shaswata Mitra and
                  Sudip Mittal and
                  Maxwell Young},
  title        = {A Policy Driven AI-Assisted PoW Framework},
  booktitle    = {52nd Annual {IEEE/IFIP} International Conference on Dependable Systems
                  and Networks, {DSN} 2022, Supplemental Volume, Baltimore, MD, USA,
                  June 27-30, 2022},
  pages        = {37--38},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/DSN-S54099.2022.00023},
  doi          = {10.1109/DSN-S54099.2022.00023},
  timestamp    = {Wed, 03 Aug 2022 09:05:42 +0200},
  biburl       = {https://dblp.org/rec/conf/dsn/ChakrabortyMMY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssci/AblesKAMRBS22,
  author       = {Jesse Ables and
                  Thomas Kirby and
                  William Anderson and
                  Sudip Mittal and
                  Shahram Rahimi and
                  Ioana Banicescu and
                  Maria Seale},
  editor       = {Hisao Ishibuchi and
                  Chee{-}Keong Kwoh and
                  Ah{-}Hwee Tan and
                  Dipti Srinivasan and
                  Chunyan Miao and
                  Anupam Trivedi and
                  Keeley A. Crockett},
  title        = {Creating an Explainable Intrusion Detection System Using Self Organizing
                  Maps},
  booktitle    = {{IEEE} Symposium Series on Computational Intelligence, {SSCI} 2022,
                  Singapore, December 4-7, 2022},
  pages        = {404--412},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/SSCI51031.2022.10022255},
  doi          = {10.1109/SSCI51031.2022.10022255},
  timestamp    = {Sun, 24 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssci/AblesKAMRBS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2202-08182,
  author       = {Valeria Cardellini and
                  Emiliano Casalicchio and
                  Stefano Iannucci and
                  Matteo Lucantonio and
                  Sudip Mittal and
                  Damodar Panigrahi and
                  Andrea Silvi},
  title        = {An Intrusion Response System utilizing Deep Q-Networks and System
                  Partitions},
  journal      = {CoRR},
  volume       = {abs/2202.08182},
  year         = {2022},
  url          = {https://arxiv.org/abs/2202.08182},
  eprinttype    = {arXiv},
  eprint       = {2202.08182},
  timestamp    = {Tue, 01 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2202-08182.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2203-10698,
  author       = {Trisha Chakraborty and
                  Shaswata Mitra and
                  Sudip Mittal and
                  Maxwell Young},
  title        = {A Policy Driven AI-Assisted PoW Framework},
  journal      = {CoRR},
  volume       = {abs/2203.10698},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2203.10698},
  doi          = {10.48550/ARXIV.2203.10698},
  eprinttype    = {arXiv},
  eprint       = {2203.10698},
  timestamp    = {Tue, 29 Mar 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2203-10698.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2207-06236,
  author       = {Subash Neupane and
                  Jesse Ables and
                  William Anderson and
                  Sudip Mittal and
                  Shahram Rahimi and
                  Ioana Banicescu and
                  Maria Seale},
  title        = {Explainable Intrusion Detection Systems {(X-IDS):} {A} Survey of Current
                  Methods, Challenges, and Opportunities},
  journal      = {CoRR},
  volume       = {abs/2207.06236},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2207.06236},
  doi          = {10.48550/ARXIV.2207.06236},
  eprinttype    = {arXiv},
  eprint       = {2207.06236},
  timestamp    = {Wed, 27 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2207-06236.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2207-07465,
  author       = {Jesse Ables and
                  Thomas Kirby and
                  William Anderson and
                  Sudip Mittal and
                  Shahram Rahimi and
                  Ioana Banicescu and
                  Maria Seale},
  title        = {Creating an Explainable Intrusion Detection System Using Self Organizing
                  Maps},
  journal      = {CoRR},
  volume       = {abs/2207.07465},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2207.07465},
  doi          = {10.48550/ARXIV.2207.07465},
  eprinttype    = {arXiv},
  eprint       = {2207.07465},
  timestamp    = {Wed, 27 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2207-07465.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2208-07476,
  author       = {Chuyen Nguyen and
                  Caleb Morgan and
                  Sudip Mittal},
  title        = {{CTI4AI:} Threat Intelligence Generation and Sharing after Red Teaming
                  {AI} Models},
  journal      = {CoRR},
  volume       = {abs/2208.07476},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2208.07476},
  doi          = {10.48550/ARXIV.2208.07476},
  eprinttype    = {arXiv},
  eprint       = {2208.07476},
  timestamp    = {Mon, 22 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2208-07476.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2208-07801,
  author       = {William Anderson and
                  Kaneesha Moore and
                  Jesse Ables and
                  Sudip Mittal and
                  Shahram Rahimi and
                  Ioana Banicescu and
                  Maria Seale},
  title        = {Designing an Artificial Immune System inspired Intrusion Detection
                  System},
  journal      = {CoRR},
  volume       = {abs/2208.07801},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2208.07801},
  doi          = {10.48550/ARXIV.2208.07801},
  eprinttype    = {arXiv},
  eprint       = {2208.07801},
  timestamp    = {Wed, 27 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2208-07801.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2209-06828,
  author       = {Subash Neupane and
                  Ivan A. Fernandez and
                  Wilson Patterson and
                  Sudip Mittal and
                  Shahram Rahimi},
  title        = {A Temporal Anomaly Detection System for Vehicles utilizing Functional
                  Working Groups and Sensor Channels},
  journal      = {CoRR},
  volume       = {abs/2209.06828},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2209.06828},
  doi          = {10.48550/ARXIV.2209.06828},
  eprinttype    = {arXiv},
  eprint       = {2209.06828},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2209-06828.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2209-11647,
  author       = {Morgan Reece and
                  Sudip Mittal},
  title        = {Self-Sovereign Identity in a World of Authentication: Architecture
                  and Domain Usecases},
  journal      = {CoRR},
  volume       = {abs/2209.11647},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2209.11647},
  doi          = {10.48550/ARXIV.2209.11647},
  eprinttype    = {arXiv},
  eprint       = {2209.11647},
  timestamp    = {Wed, 28 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2209-11647.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2210-14018,
  author       = {Wilson Patterson and
                  Ivan A. Fernandez and
                  Subash Neupane and
                  Milan Parmar and
                  Sudip Mittal and
                  Shahram Rahimi},
  title        = {A White-Box Adversarial Attack Against a Digital Twin},
  journal      = {CoRR},
  volume       = {abs/2210.14018},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2210.14018},
  doi          = {10.48550/ARXIV.2210.14018},
  eprinttype    = {arXiv},
  eprint       = {2210.14018},
  timestamp    = {Mon, 31 Oct 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2210-14018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2211-17073,
  author       = {Keith Strandell and
                  Sudip Mittal},
  title        = {Risks to Zero Trust in a Federated Mission Partner Environment},
  journal      = {CoRR},
  volume       = {abs/2211.17073},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2211.17073},
  doi          = {10.48550/ARXIV.2211.17073},
  eprinttype    = {arXiv},
  eprint       = {2211.17073},
  timestamp    = {Fri, 02 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2211-17073.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Mittal21,
  author       = {Sudip Mittal},
  title        = {Secure {V2V} and {V2I} Technologies for the Next-Generation Intelligent
                  Transportation Systems},
  journal      = {Computer},
  volume       = {54},
  number       = {2},
  pages        = {4--6},
  year         = {2021},
  url          = {https://doi.org/10.1109/MC.2020.3042227},
  doi          = {10.1109/MC.2020.3042227},
  timestamp    = {Mon, 22 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/computer/Mittal21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bigdataconf/MitraPMJ21,
  author       = {Shaswata Mitra and
                  Aritran Piplai and
                  Sudip Mittal and
                  Anupam Joshi},
  editor       = {Yixin Chen and
                  Heiko Ludwig and
                  Yicheng Tu and
                  Usama M. Fayyad and
                  Xingquan Zhu and
                  Xiaohua Hu and
                  Suren Byna and
                  Xiong Liu and
                  Jianping Zhang and
                  Shirui Pan and
                  Vagelis Papalexakis and
                  Jianwu Wang and
                  Alfredo Cuzzocrea and
                  Carlos Ordonez},
  title        = {Combating Fake Cyber Threat Intelligence using Provenance in Cybersecurity
                  Knowledge Graphs},
  booktitle    = {2021 {IEEE} International Conference on Big Data (Big Data), Orlando,
                  FL, USA, December 15-18, 2021},
  pages        = {3316--3323},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/BigData52589.2021.9671867},
  doi          = {10.1109/BIGDATA52589.2021.9671867},
  timestamp    = {Fri, 13 Jan 2023 17:06:49 +0100},
  biburl       = {https://dblp.org/rec/conf/bigdataconf/MitraPMJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/ChukkapalliAAMG21,
  author       = {Sai Sree Laya Chukkapalli and
                  Shaik Barakhat Aziz and
                  Nouran Alotaibi and
                  Sudip Mittal and
                  Maanak Gupta and
                  Mahmoud Abdelsalam},
  editor       = {Maanak Gupta and
                  Mahmoud Abdelsalam and
                  Sudip Mittal},
  title        = {Ontology driven {AI} and Access Control Systems for Smart Fisheries},
  booktitle    = {SAT-CPS@CODASPY 2021, Proceedings of the 2021 {ACM} Workshop on Secure
                  and Trustworthy Cyber-Physical Systems, Virtual Event, USA, April
                  28, 2021},
  pages        = {59--68},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3445969.3450429},
  doi          = {10.1145/3445969.3450429},
  timestamp    = {Mon, 10 May 2021 15:39:18 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/ChukkapalliAAMG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/AbdelsalamGM21,
  author       = {Mahmoud Abdelsalam and
                  Maanak Gupta and
                  Sudip Mittal},
  editor       = {Maanak Gupta and
                  Mahmoud Abdelsalam and
                  Sudip Mittal},
  title        = {Artificial Intelligence Assisted Malware Analysis},
  booktitle    = {SAT-CPS@CODASPY 2021, Proceedings of the 2021 {ACM} Workshop on Secure
                  and Trustworthy Cyber-Physical Systems, Virtual Event, USA, April
                  28, 2021},
  pages        = {75--77},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3445969.3450433},
  doi          = {10.1145/3445969.3450433},
  timestamp    = {Mon, 10 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/AbdelsalamGM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/BertinoKASMG21,
  author       = {Elisa Bertino and
                  Murat Kantarcioglu and
                  Cuneyt Gurcan Akcora and
                  Sagar Samtani and
                  Sudip Mittal and
                  Maanak Gupta},
  editor       = {Anupam Joshi and
                  Barbara Carminati and
                  Rakesh M. Verma},
  title        = {{AI} for Security and Security for {AI}},
  booktitle    = {{CODASPY} '21: Eleventh {ACM} Conference on Data and Application Security
                  and Privacy, Virtual Event, USA, April 26-28, 2021},
  pages        = {333--334},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3422337.3450357},
  doi          = {10.1145/3422337.3450357},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/BertinoKASMG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/SirajSHKKGM21,
  author       = {Ambareen Siraj and
                  Nigamanth Sridhar and
                  John A. Drew Hamilton and
                  Latifur Khan and
                  Siddharth Kaza and
                  Maanak Gupta and
                  Sudip Mittal},
  editor       = {Anupam Joshi and
                  Barbara Carminati and
                  Rakesh M. Verma},
  title        = {Is there a Security Mindset and Can it be Taught?},
  booktitle    = {{CODASPY} '21: Eleventh {ACM} Conference on Data and Application Security
                  and Privacy, Virtual Event, USA, April 26-28, 2021},
  pages        = {335--336},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3422337.3450358},
  doi          = {10.1145/3422337.3450358},
  timestamp    = {Wed, 21 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/SirajSHKKGM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dis/MoroneyCMJAMJB21,
  author       = {Caitlin Moroney and
                  Evan Crothers and
                  Sudip Mittal and
                  Anupam Joshi and
                  T{\"{u}}lay Adali and
                  Christine Mallinson and
                  Nathalie Japkowicz and
                  Zois Boukouvalas},
  editor       = {Carlos Soares and
                  Lu{\'{\i}}s Torgo},
  title        = {The Case for Latent Variable Vs Deep Learning Methods in Misinformation
                  Detection: An Application to {COVID-19}},
  booktitle    = {Discovery Science - 24th International Conference, {DS} 2021, Halifax,
                  NS, Canada, October 11-13, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12986},
  pages        = {422--432},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-88942-5\_33},
  doi          = {10.1007/978-3-030-88942-5\_33},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dis/MoroneyCMJAMJB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ijcnn/RanadePMJF21,
  author       = {Priyanka Ranade and
                  Aritran Piplai and
                  Sudip Mittal and
                  Anupam Joshi and
                  Tim Finin},
  title        = {Generating Fake Cyber Threat Intelligence Using Transformer-Based
                  Models},
  booktitle    = {International Joint Conference on Neural Networks, {IJCNN} 2021, Shenzhen,
                  China, July 18-22, 2021},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/IJCNN52387.2021.9534192},
  doi          = {10.1109/IJCNN52387.2021.9534192},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ijcnn/RanadePMJF21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/ChukkapalliPMJ21,
  author       = {Sai Sree Laya Chukkapalli and
                  Nisha Pillai and
                  Sudip Mittal and
                  Anupam Joshi},
  title        = {Cyber-Physical System Security Surveillance using Knowledge Graph
                  based Digital Twins - {A} Smart Farming Usecase},
  booktitle    = {{IEEE} International Conference on Intelligence and Security Informatics,
                  {ISI} 2021, San Antonio, TX, USA, November 2-3, 2021},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ISI53945.2021.9624688},
  doi          = {10.1109/ISI53945.2021.9624688},
  timestamp    = {Tue, 07 Dec 2021 17:02:14 +0100},
  biburl       = {https://dblp.org/rec/conf/isi/ChukkapalliPMJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tpsisa/ChukkapalliRMJ21,
  author       = {Sai Sree Laya Chukkapalli and
                  Priyanka Ranade and
                  Sudip Mittal and
                  Anupam Joshi},
  title        = {A Privacy Preserving Anomaly Detection Framework for Cooperative Smart
                  Farming Ecosystem},
  booktitle    = {3rd {IEEE} International Conference on Trust, Privacy and Security
                  in Intelligent Systems and Applications, {TPS-ISA} 2021, Atlanta,
                  GA, USA, December 13-15, 2021},
  pages        = {340--347},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/TPSISA52974.2021.00037},
  doi          = {10.1109/TPSISA52974.2021.00037},
  timestamp    = {Thu, 21 Apr 2022 16:21:01 +0200},
  biburl       = {https://dblp.org/rec/conf/tpsisa/ChukkapalliRMJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/codaspy/2021sat-cps,
  editor       = {Maanak Gupta and
                  Mahmoud Abdelsalam and
                  Sudip Mittal},
  title        = {SAT-CPS@CODASPY 2021, Proceedings of the 2021 {ACM} Workshop on Secure
                  and Trustworthy Cyber-Physical Systems, Virtual Event, USA, April
                  28, 2021},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3445969},
  doi          = {10.1145/3445969},
  isbn         = {978-1-4503-8319-6},
  timestamp    = {Mon, 10 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/2021sat-cps.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2102-04351,
  author       = {Priyanka Ranade and
                  Aritran Piplai and
                  Sudip Mittal and
                  Anupam Joshi and
                  Tim Finin},
  title        = {Generating Fake Cyber Threat Intelligence Using Transformer-Based
                  Models},
  journal      = {CoRR},
  volume       = {abs/2102.04351},
  year         = {2021},
  url          = {https://arxiv.org/abs/2102.04351},
  eprinttype    = {arXiv},
  eprint       = {2102.04351},
  timestamp    = {Wed, 10 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2102-04351.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/GuptaAKM20,
  author       = {Maanak Gupta and
                  Mahmoud Abdelsalam and
                  Sajad Khorsandroo and
                  Sudip Mittal},
  title        = {Security and Privacy in Smart Farming: Challenges and Opportunities},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {34564--34584},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.2975142},
  doi          = {10.1109/ACCESS.2020.2975142},
  timestamp    = {Thu, 19 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/GuptaAKM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ChukkapalliMGAJ20,
  author       = {Sai Sree Laya Chukkapalli and
                  Sudip Mittal and
                  Maanak Gupta and
                  Mahmoud Abdelsalam and
                  Anupam Joshi and
                  Ravi S. Sandhu and
                  Karuna P. Joshi},
  title        = {Ontologies and Artificial Intelligence Systems for the Cooperative
                  Smart Farming Ecosystem},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {164045--164064},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.3022763},
  doi          = {10.1109/ACCESS.2020.3022763},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/ChukkapalliMGAJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/PiplaiMJFHZ20,
  author       = {Aritran Piplai and
                  Sudip Mittal and
                  Anupam Joshi and
                  Tim Finin and
                  James Holt and
                  Richard Zak},
  title        = {Creating Cybersecurity Knowledge Graphs From Malware After Action
                  Reports},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {211691--211703},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.3039234},
  doi          = {10.1109/ACCESS.2020.3039234},
  timestamp    = {Thu, 17 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/PiplaiMJFHZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bigdataconf/ChoudharyCMGAJ20,
  author       = {Nitu Kedarmal Choudhary and
                  Sai Sree Laya Chukkapalli and
                  Sudip Mittal and
                  Maanak Gupta and
                  Mahmoud Abdelsalam and
                  Anupam Joshi},
  editor       = {Xintao Wu and
                  Chris Jermaine and
                  Li Xiong and
                  Xiaohua Hu and
                  Olivera Kotevska and
                  Siyuan Lu and
                  Weija Xu and
                  Srinivas Aluru and
                  Chengxiang Zhai and
                  Eyhab Al{-}Masri and
                  Zhiyuan Chen and
                  Jeff Saltz},
  title        = {YieldPredict: {A} Crop Yield Prediction Framework for Smart Farms},
  booktitle    = {2020 {IEEE} International Conference on Big Data {(IEEE} BigData 2020),
                  Atlanta, GA, USA, December 10-13, 2020},
  pages        = {2340--2349},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/BigData50022.2020.9377832},
  doi          = {10.1109/BIGDATA50022.2020.9377832},
  timestamp    = {Fri, 19 Nov 2021 16:08:20 +0100},
  biburl       = {https://dblp.org/rec/conf/bigdataconf/ChoudharyCMGAJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bigdataconf/PiplaiRKMNJ20,
  author       = {Aritran Piplai and
                  Priyanka Ranade and
                  Anantaa Kotal and
                  Sudip Mittal and
                  Sandeep Nair Narayanan and
                  Anupam Joshi},
  editor       = {Xintao Wu and
                  Chris Jermaine and
                  Li Xiong and
                  Xiaohua Hu and
                  Olivera Kotevska and
                  Siyuan Lu and
                  Weija Xu and
                  Srinivas Aluru and
                  Chengxiang Zhai and
                  Eyhab Al{-}Masri and
                  Zhiyuan Chen and
                  Jeff Saltz},
  title        = {Using Knowledge Graphs and Reinforcement Learning for Malware Analysis},
  booktitle    = {2020 {IEEE} International Conference on Big Data {(IEEE} BigData 2020),
                  Atlanta, GA, USA, December 10-13, 2020},
  pages        = {2626--2633},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/BigData50022.2020.9378491},
  doi          = {10.1109/BIGDATA50022.2020.9378491},
  timestamp    = {Thu, 08 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/bigdataconf/PiplaiRKMNJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bigdatasec/ChukkapalliPMGJ20,
  author       = {Sai Sree Laya Chukkapalli and
                  Aritran Piplai and
                  Sudip Mittal and
                  Maanak Gupta and
                  Anupam Joshi},
  title        = {A Smart-Farming Ontology for Attribute Based Access Control},
  booktitle    = {6th {IEEE} International Conference on Big Data Security on Cloud,
                  {IEEE} International Conference on High Performance and Smart Computing,
                  and {IEEE} International Conference on Intelligent Data and Security,
                  BigDataSecurity/HPSC/IDS 2020, Baltimore, MD, USA, May 25-27, 2020},
  pages        = {29--34},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/BigDataSecurity-HPSC-IDS49724.2020.00017},
  doi          = {10.1109/BIGDATASECURITY-HPSC-IDS49724.2020.00017},
  timestamp    = {Wed, 14 Jul 2021 09:36:30 +0200},
  biburl       = {https://dblp.org/rec/conf/bigdatasec/ChukkapalliPMGJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cloud2/McDoleAGM20,
  author       = {Andrew McDole and
                  Mahmoud Abdelsalam and
                  Maanak Gupta and
                  Sudip Mittal},
  editor       = {Qi Zhang and
                  Yingwei Wang and
                  Liang{-}Jie Zhang},
  title        = {Analyzing {CNN} Based Behavioural Malware Detection Techniques on
                  Cloud IaaS},
  booktitle    = {Cloud Computing - {CLOUD} 2020 - 13th International Conference, Held
                  as Part of the Services Conference Federation, {SCF} 2020, Honolulu,
                  HI, USA, September 18-20, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12403},
  pages        = {64--79},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-59635-4\_5},
  doi          = {10.1007/978-3-030-59635-4\_5},
  timestamp    = {Tue, 22 Sep 2020 17:23:44 +0200},
  biburl       = {https://dblp.org/rec/conf/cloud2/McDoleAGM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/coinco/SontowskiGCAMJS20,
  author       = {Sina Sontowski and
                  Maanak Gupta and
                  Sai Sree Laya Chukkapalli and
                  Mahmoud Abdelsalam and
                  Sudip Mittal and
                  Anupam Joshi and
                  Ravi S. Sandhu},
  title        = {Cyber Attacks on Smart Farming Infrastructure},
  booktitle    = {6th {IEEE} International Conference on Collaboration and Internet
                  Computing, {CIC} 2020, Atlanta, GA, USA, December 1-3, 2020},
  pages        = {135--143},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CIC50333.2020.00025},
  doi          = {10.1109/CIC50333.2020.00025},
  timestamp    = {Fri, 27 May 2022 15:04:14 +0200},
  biburl       = {https://dblp.org/rec/conf/coinco/SontowskiGCAMJS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/PiplaiMAGJF20,
  author       = {Aritran Piplai and
                  Sudip Mittal and
                  Mahmoud Abdelsalam and
                  Maanak Gupta and
                  Anupam Joshi and
                  Tim Finin},
  title        = {Knowledge Enrichment by Fusing Representations for Malware Threat
                  Intelligence and Behavior},
  booktitle    = {{IEEE} International Conference on Intelligence and Security Informatics,
                  {ISI} 2020, Arlington, VA, USA, November 9-10, 2020},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/ISI49825.2020.9280512},
  doi          = {10.1109/ISI49825.2020.9280512},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/PiplaiMAGJF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/SillsRM20,
  author       = {Matthew Sills and
                  Priyanka Ranade and
                  Sudip Mittal},
  title        = {Cybersecurity Threat Intelligence Augmentation and Embedding Improvement
                  - {A} Healthcare Usecase},
  booktitle    = {{IEEE} International Conference on Intelligence and Security Informatics,
                  {ISI} 2020, Arlington, VA, USA, November 9-10, 2020},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/ISI49825.2020.9280482},
  doi          = {10.1109/ISI49825.2020.9280482},
  timestamp    = {Mon, 14 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isi/SillsRM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2002-06383,
  author       = {Andrew McDole and
                  Mahmoud Abdelsalam and
                  Maanak Gupta and
                  Sudip Mittal},
  title        = {Analyzing {CNN} Based Behavioural Malware Detection Techniques on
                  Cloud IaaS},
  journal      = {CoRR},
  volume       = {abs/2002.06383},
  year         = {2020},
  url          = {https://arxiv.org/abs/2002.06383},
  eprinttype    = {arXiv},
  eprint       = {2002.06383},
  timestamp    = {Mon, 02 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2002-06383.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2004-09246,
  author       = {Maanak Gupta and
                  Mahmoud Abdelsalam and
                  Sudip Mittal},
  title        = {Enabling and Enforcing Social Distancing Measures using Smart City
                  and {ITS} Infrastructures: {A} {COVID-19} Use Case},
  journal      = {CoRR},
  volume       = {abs/2004.09246},
  year         = {2020},
  url          = {https://arxiv.org/abs/2004.09246},
  eprinttype    = {arXiv},
  eprint       = {2004.09246},
  timestamp    = {Wed, 22 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2004-09246.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2006-01284,
  author       = {Zois Boukouvalas and
                  Christine Mallinson and
                  Evan Crothers and
                  Nathalie Japkowicz and
                  Aritran Piplai and
                  Sudip Mittal and
                  Anupam Joshi and
                  T{\"{u}}lay Adali},
  title        = {Independent Component Analysis for Trustworthy Cyberspace during High
                  Impact Events: An Application to Covid-19},
  journal      = {CoRR},
  volume       = {abs/2006.01284},
  year         = {2020},
  url          = {https://arxiv.org/abs/2006.01284},
  eprinttype    = {arXiv},
  eprint       = {2006.01284},
  timestamp    = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2006-01284.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2009-11101,
  author       = {Maanak Gupta and
                  Sudip Mittal and
                  Mahmoud Abdelsalam},
  title        = {{AI} assisted Malware Analysis: {A} Course for Next Generation Cybersecurity
                  Workforce},
  journal      = {CoRR},
  volume       = {abs/2009.11101},
  year         = {2020},
  url          = {https://arxiv.org/abs/2009.11101},
  eprinttype    = {arXiv},
  eprint       = {2009.11101},
  timestamp    = {Wed, 30 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2009-11101.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asunam/PinglePMJHZ19,
  author       = {Aditya Pingle and
                  Aritran Piplai and
                  Sudip Mittal and
                  Anupam Joshi and
                  James Holt and
                  Richard Zak},
  editor       = {Francesca Spezzano and
                  Wei Chen and
                  Xiaokui Xiao},
  title        = {RelExt: relation extraction using deep learning approaches for cybersecurity
                  knowledge graph improvement},
  booktitle    = {{ASONAM} '19: International Conference on Advances in Social Networks
                  Analysis and Mining, Vancouver, British Columbia, Canada, 27-30 August,
                  2019},
  pages        = {879--886},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3341161.3343519},
  doi          = {10.1145/3341161.3343519},
  timestamp    = {Sat, 09 Apr 2022 12:39:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asunam/PinglePMJHZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bigdatasec/RamapatruniNMJJ19,
  author       = {Sowmya Ramapatruni and
                  Sandeep Nair Narayanan and
                  Sudip Mittal and
                  Anupam Joshi and
                  Karuna P. Joshi},
  title        = {Anomaly Detection Models for Smart Home Security},
  booktitle    = {5th {IEEE} International Conference on Big Data Security on Cloud,
                  {IEEE} International Conference on High Performance and Smart Computing,
                  and {IEEE} International Conference on Intelligent Data and Security,
                  BigDataSecurity/HPSC/IDS 2019, Washington, DC, USA, May 27-29, 2019},
  pages        = {19--24},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/BigDataSecurity-HPSC-IDS.2019.00015},
  doi          = {10.1109/BIGDATASECURITY-HPSC-IDS.2019.00015},
  timestamp    = {Wed, 14 Jul 2021 09:36:14 +0200},
  biburl       = {https://dblp.org/rec/conf/bigdatasec/RamapatruniNMJJ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icws/JoshiJM19,
  author       = {Ketki Joshi and
                  Karuna Pande Joshi and
                  Sudip Mittal},
  editor       = {Elisa Bertino and
                  Carl K. Chang and
                  Peter Chen and
                  Ernesto Damiani and
                  Michael Goul and
                  Katsunori Oyama},
  title        = {A Semantic Approach for Automating Knowledge in Policies of Cyber
                  Insurance Services},
  booktitle    = {2019 {IEEE} International Conference on Web Services, {ICWS} 2019,
                  Milan, Italy, July 8-13, 2019},
  pages        = {33--40},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICWS.2019.00018},
  doi          = {10.1109/ICWS.2019.00018},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/icws/JoshiJM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mlsp/KhuranaMPJ19,
  author       = {Nitika Khurana and
                  Sudip Mittal and
                  Aritran Piplai and
                  Anupam Joshi},
  title        = {Preventing Poisoning Attacks On {AI} Based Threat Intelligence Systems},
  booktitle    = {29th {IEEE} International Workshop on Machine Learning for Signal
                  Processing, {MLSP} 2019, Pittsburgh, PA, USA, October 13-16, 2019},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/MLSP.2019.8918803},
  doi          = {10.1109/MLSP.2019.8918803},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mlsp/KhuranaMPJ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1905-02497,
  author       = {Aditya Pingle and
                  Aritran Piplai and
                  Sudip Mittal and
                  Anupam Joshi and
                  James Holt and
                  Richard Zak},
  title        = {RelExt: Relation Extraction using Deep Learning approaches for Cybersecurity
                  Knowledge Graph Improvement},
  journal      = {CoRR},
  volume       = {abs/1905.02497},
  year         = {2019},
  url          = {http://arxiv.org/abs/1905.02497},
  eprinttype    = {arXiv},
  eprint       = {1905.02497},
  timestamp    = {Sat, 23 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1905-02497.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1905-02895,
  author       = {Sudip Mittal and
                  Anupam Joshi and
                  Tim Finin},
  title        = {Cyber-All-Intel: An {AI} for Security related Threat Intelligence},
  journal      = {CoRR},
  volume       = {abs/1905.02895},
  year         = {2019},
  url          = {http://arxiv.org/abs/1905.02895},
  eprinttype    = {arXiv},
  eprint       = {1905.02895},
  timestamp    = {Mon, 27 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1905-02895.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/coinco/RathodNMJ18,
  author       = {Vishal Rathod and
                  Sandeep Nair Narayanan and
                  Sudip Mittal and
                  Anupam Joshi},
  title        = {Semantically Rich, Context Aware Access Control for Openstack},
  booktitle    = {4th {IEEE} International Conference on Collaboration and Internet
                  Computing, {CIC} 2018, Philadelphia, PA, USA, October 18-20, 2018},
  pages        = {460--465},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/CIC.2018.00069},
  doi          = {10.1109/CIC.2018.00069},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/coinco/RathodNMJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/NeilNJ18,
  author       = {Lorenzo Neil and
                  Sudip Mittal and
                  Anupam Joshi},
  title        = {Mining Threat Intelligence about Open-Source Projects and Libraries
                  from Code Repository Issues and Bug Reports},
  booktitle    = {2018 {IEEE} International Conference on Intelligence and Security
                  Informatics, {ISI} 2018, Miami, FL, USA, November 9-11, 2018},
  pages        = {7--12},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/ISI.2018.8587375},
  doi          = {10.1109/ISI.2018.8587375},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/NeilNJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/RanadeMJJ18,
  author       = {Priyanka Ranade and
                  Sudip Mittal and
                  Anupam Joshi and
                  Karuna Pande Joshi},
  title        = {Using Deep Neural Networks to Translate Multi-lingual Threat Intelligence},
  booktitle    = {2018 {IEEE} International Conference on Intelligence and Security
                  Informatics, {ISI} 2018, Miami, FL, USA, November 9-11, 2018},
  pages        = {238--243},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/ISI.2018.8587374},
  doi          = {10.1109/ISI.2018.8587374},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/RanadeMJJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1807-07418,
  author       = {Nitika Khurana and
                  Sudip Mittal and
                  Anupam Joshi},
  title        = {Preventing Poisoning Attacks on {AI} based Threat Intelligence Systems},
  journal      = {CoRR},
  volume       = {abs/1807.07418},
  year         = {2018},
  url          = {http://arxiv.org/abs/1807.07418},
  eprinttype    = {arXiv},
  eprint       = {1807.07418},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1807-07418.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1807-07517,
  author       = {Priyanka Ranade and
                  Sudip Mittal and
                  Anupam Joshi and
                  Karuna P. Joshi},
  title        = {Using Deep Neural Networks to Translate Multi-lingual Threat Intelligence},
  journal      = {CoRR},
  volume       = {abs/1807.07517},
  year         = {2018},
  url          = {http://arxiv.org/abs/1807.07517},
  eprinttype    = {arXiv},
  eprint       = {1807.07517},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1807-07517.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1808-04673,
  author       = {Lorenzo Neil and
                  Sudip Mittal and
                  Anupam Joshi},
  title        = {Mining Threat Intelligence about Open-Source Projects and Libraries
                  from Code Repository Issues and Bug Reports},
  journal      = {CoRR},
  volume       = {abs/1808.04673},
  year         = {2018},
  url          = {http://arxiv.org/abs/1808.04673},
  eprinttype    = {arXiv},
  eprint       = {1808.04673},
  timestamp    = {Sun, 02 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1808-04673.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEcloud/Mittal0JPJ17,
  author       = {Sudip Mittal and
                  Aditi Gupta and
                  Karuna P. Joshi and
                  Claudia Pearce and
                  Anupam Joshi},
  editor       = {Geoffrey C. Fox},
  title        = {A Question and Answering System for Management of Cloud Service Level
                  Agreements},
  booktitle    = {2017 {IEEE} 10th International Conference on Cloud Computing (CLOUD),
                  Honolulu, HI, USA, June 25-30, 2017},
  pages        = {684--687},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/CLOUD.2017.92},
  doi          = {10.1109/CLOUD.2017.92},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEcloud/Mittal0JPJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/edge/JoshiMJF17,
  author       = {Maithilee P. Joshi and
                  Sudip Mittal and
                  Karuna P. Joshi and
                  Tim Finin},
  title        = {Semantically Rich, Oblivious Access Control Using {ABAC} for Secure
                  Cloud Storage},
  booktitle    = {{IEEE} International Conference on Edge Computing, {EDGE} 2017, Honolulu,
                  HI, USA, June 25-30, 2017},
  pages        = {142--149},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/IEEE.EDGE.2017.27},
  doi          = {10.1109/IEEE.EDGE.2017.27},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/edge/JoshiMJF17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1708-03310,
  author       = {Sudip Mittal and
                  Anupam Joshi and
                  Tim Finin},
  title        = {Thinking, Fast and Slow: Combining Vector Spaces and Knowledge Graphs},
  journal      = {CoRR},
  volume       = {abs/1708.03310},
  year         = {2017},
  url          = {http://arxiv.org/abs/1708.03310},
  eprinttype    = {arXiv},
  eprint       = {1708.03310},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1708-03310.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEcloud/0003MJPJ16,
  author       = {Aditi Gupta and
                  Sudip Mittal and
                  Karuna P. Joshi and
                  Claudia Pearce and
                  Anupam Joshi},
  title        = {Streamlining Management of Multiple Cloud Services},
  booktitle    = {9th {IEEE} International Conference on Cloud Computing, {CLOUD} 2016,
                  San Francisco, CA, USA, June 27 - July 2, 2016},
  pages        = {481--488},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/CLOUD.2016.0070},
  doi          = {10.1109/CLOUD.2016.0070},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEcloud/0003MJPJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aaaifs/Joshi0MPJF16,
  author       = {Karuna P. Joshi and
                  Aditi Gupta and
                  Sudip Mittal and
                  Claudia Pearce and
                  Anupam Joshi and
                  Tim Finin},
  title        = {{ALDA:} Cognitive Assistant for Legal Document Analytics},
  booktitle    = {2016 {AAAI} Fall Symposia, Arlington, Virginia, USA, November 17-19,
                  2016},
  publisher    = {{AAAI} Press},
  year         = {2016},
  url          = {http://aaai.org/ocs/index.php/FSS/FSS16/paper/view/14119},
  timestamp    = {Wed, 14 Nov 2018 14:49:10 +0100},
  biburl       = {https://dblp.org/rec/conf/aaaifs/Joshi0MPJF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asunam/MittalDMJF16,
  author       = {Sudip Mittal and
                  Prajit Kumar Das and
                  Varish Mulwad and
                  Anupam Joshi and
                  Tim Finin},
  editor       = {Ravi Kumar and
                  James Caverlee and
                  Hanghang Tong},
  title        = {CyberTwitter: Using Twitter to generate alerts for cybersecurity threats
                  and vulnerabilities},
  booktitle    = {2016 {IEEE/ACM} International Conference on Advances in Social Networks
                  Analysis and Mining, {ASONAM} 2016, San Francisco, CA, USA, August
                  18-21, 2016},
  pages        = {860--867},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/ASONAM.2016.7752338},
  doi          = {10.1109/ASONAM.2016.7752338},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asunam/MittalDMJF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bigdataconf/Joshi0MPJF16,
  author       = {Karuna P. Joshi and
                  Aditi Gupta and
                  Sudip Mittal and
                  Claudia Pearce and
                  Anupam Joshi and
                  Tim Finin},
  editor       = {James Joshi and
                  George Karypis and
                  Ling Liu and
                  Xiaohua Hu and
                  Ronay Ak and
                  Yinglong Xia and
                  Weijia Xu and
                  Aki{-}Hiro Sato and
                  Sudarsan Rachuri and
                  Lyle H. Ungar and
                  Philip S. Yu and
                  Rama Govindaraju and
                  Toyotaro Suzumura},
  title        = {Semantic approach to automating management of big data privacy policies},
  booktitle    = {2016 {IEEE} International Conference on Big Data {(IEEE} BigData 2016),
                  Washington DC, USA, December 5-8, 2016},
  pages        = {482--491},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/BigData.2016.7840639},
  doi          = {10.1109/BIGDATA.2016.7840639},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/bigdataconf/Joshi0MPJF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ic2e/MittalJPJ16,
  author       = {Sudip Mittal and
                  Karuna P. Joshi and
                  Claudia Pearce and
                  Anupam Joshi},
  title        = {Automatic Extraction of Metrics from SLAs for Cloud Service Management},
  booktitle    = {2016 {IEEE} International Conference on Cloud Engineering, {IC2E}
                  2016, Berlin, Germany, April 4-8, 2016},
  pages        = {139--142},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/IC2E.2016.14},
  doi          = {10.1109/IC2E.2016.14},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ic2e/MittalJPJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sarnoff/NarayananMJ16,
  author       = {Sandeep Nair Narayanan and
                  Sudip Mittal and
                  Anupam Joshi},
  title        = {Using semantic technologies to mine vehicular context for security},
  booktitle    = {37th {IEEE} Sarnoff Symposium 2016, Newark, NJ, USA, September 19-21,
                  2016},
  pages        = {124--129},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/SARNOF.2016.7846740},
  doi          = {10.1109/SARNOF.2016.7846740},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sarnoff/NarayananMJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/smartcomp/NarayananMJ16,
  author       = {Sandeep Nair Narayanan and
                  Sudip Mittal and
                  Anupam Joshi},
  title        = {OBD{\_}SecureAlert: An Anomaly Detection System for Vehicles},
  booktitle    = {2016 {IEEE} International Conference on Smart Computing, {SMARTCOMP}
                  2016, St Louis, MO, USA, May 18-20, 2016},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/SMARTCOMP.2016.7501710},
  doi          = {10.1109/SMARTCOMP.2016.7501710},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/smartcomp/NarayananMJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bigdataconf/MittalJPJ15,
  author       = {Sudip Mittal and
                  Karuna P. Joshi and
                  Claudia Pearce and
                  Anupam Joshi},
  title        = {Parallelizing natural language techniques for knowledge extraction
                  from cloud service level agreements},
  booktitle    = {2015 {IEEE} International Conference on Big Data {(IEEE} BigData 2015),
                  Santa Clara, CA, USA, October 29 - November 1, 2015},
  pages        = {2831--2833},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/BigData.2015.7364092},
  doi          = {10.1109/BIGDATA.2015.7364092},
  timestamp    = {Fri, 19 Nov 2021 16:08:20 +0100},
  biburl       = {https://dblp.org/rec/conf/bigdataconf/MittalJPJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/NarayananMJ15,
  author       = {Sandeep Nair Narayanan and
                  Sudip Mittal and
                  Anupam Joshi},
  title        = {Using Data Analytics to Detect Anomalous States in Vehicles},
  journal      = {CoRR},
  volume       = {abs/1512.08048},
  year         = {2015},
  url          = {http://arxiv.org/abs/1512.08048},
  eprinttype    = {arXiv},
  eprint       = {1512.08048},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/NarayananMJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cods/MittalGDK14,
  author       = {Sudip Mittal and
                  Neha Gupta and
                  Prateek Dewan and
                  Ponnurangam Kumaraguru},
  editor       = {Balaraman Ravindran and
                  Kamalakar Karlapalem},
  title        = {Pinned it! {A} Large Scale Study of the Pinterest Network},
  booktitle    = {Proceedings of the 1st {IKDD} Conference on Data Sciences, Delhi,
                  India, March 21 - 23, 2014},
  pages        = {1--10},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2567688.2567692},
  doi          = {10.1145/2567688.2567692},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cods/MittalGDK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/MittalK14,
  author       = {Sudip Mittal and
                  Ponnurangam Kumaraguru},
  title        = {Broker Bots: Analyzing automated activity during High Impact Events
                  on Twitter},
  journal      = {CoRR},
  volume       = {abs/1406.4286},
  year         = {2014},
  url          = {http://arxiv.org/abs/1406.4286},
  eprinttype    = {arXiv},
  eprint       = {1406.4286},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/MittalK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/MittalGDK13,
  author       = {Sudip Mittal and
                  Neha Gupta and
                  Prateek Dewan and
                  Ponnurangam Kumaraguru},
  title        = {The Pin-Bang Theory: Discovering The Pinterest World},
  journal      = {CoRR},
  volume       = {abs/1307.4952},
  year         = {2013},
  url          = {http://arxiv.org/abs/1307.4952},
  eprinttype    = {arXiv},
  eprint       = {1307.4952},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/MittalGDK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics