Your selections:
A Detailed Investigation and Analysis of using Machine Learning Techniques for Intrusion Detection
- Mishra, Preeti, Varadharajan, Vijay, Tupakula, Uday, Pilli, Emmanuel S.
A Novel Deep Learning-Based Approach for Malware Detection
- Shaukat, Kamran, Luo, Suhuai, Varadharajan, Vijay
A novel malware for subversion of self-protection in anti-virus
- Min, Byungho, Varadharajan, Vijay
- Shaukat, Kamran, Luo, Suhuai, Varadharajan, Vijay
A novel secure observer-based controller and attack detection scheme for Networked Control Systems
- Sadeghikhorami, Ladan, Varadharajan, Vijay, Safavi, Ali Akbar
A policy-based security architecture for software defined networks
- Varadharajan, Vijay, Karmakar, Kallol, Tupakula, Uday, Hitchens, Michael
A pre-computable signature scheme with efficient verification for RFID
- Guo, Fuchun, Mu, Yi, Susilo, Willy, Varadharajan, Vijay
- Sultan, Nazatul H., Varadharajan, Vijay, Zhou, Lan, Barbhuiya, Ferdous A.
A secure access and accountability framework for provisioning services in Named Data Networks
- Sultan, Nazatul H., Varadharajan, Vijay, Kumar, Chandan, Camtepe, Seyit, Nepal, Surya
A secure role-based cloud storage system for encrypted patient-centric health records
- Zhou, Lan, Varadharajan, Vijay, Gopinath, K.
A simple and novel technique for counteracting exploit kits
- Min, Byungho, Varadharajan, Vijay
A stochastic time-domain model for burst data aggregation in IEEE 802.15.4 wireless sensor networks
- Haghighi, Mohammad Sayad, Xiang, Yang, Varadharajan, Vijay, Quinn, Barry
A survey on machine learning techniques for cyber security in the last decade
- Shaukat, Kamran, Luo, Suhuai, Varadharajan, Vijay, Hameed, Ibrahim A., Xu, Min
A trust-aware openflow switching framework for software defined networks (SDN)
- Karmakar, Kallol Krishna, Varadharajan, Vijay, Hitchens, Michael, Tupakula, Uday, Sariputra, Prajna
- Tupakula, Uday, Varadharajan, Vijay, Karmakar, Kallol
- Pal, Shantanu, Hitchens, Michael, Varadharajan, Vijay
Achieving secure role-based access control on encrypted data in cloud storage
- Zhou, Lan, Varadharajan, Vijay, Hitchens, Michael
Alleviating heterogeneity in SDN-IoT networks to maintain QoS and enhance security
- Sood, Keshav, Karmakar, Kallol Krishna, Yu, Shui, Varadharajan, Vijay, Pokhrel, Shiva Raj, Xiang, Yong
An accountable access control scheme for hierarchical content in named data networks with revocation
- Sultan, Nazatul Haque, Varadharajan, Vijay, Camtepe, Seyit, Nepal, Surya
Analysis of policy-based security management system in software-defined networks
- Sood, Keshav, Karmakar, Kallol Krishna, Varadharajan, Vijay, Tupakula, Uday, Yu, Shui
Are you sure you would like to clear your session, including search history and login status?