Research Output 1993 2019

Filter
Conference contribution
2019

Adaptive MTD Security using Markov Game Modeling

Chowdhary, A., Sengupta, S., Alshamrani, A., Huang, D. & Sabur, A., Apr 8 2019, 2019 International Conference on Computing, Networking and Communications, ICNC 2019. Institute of Electrical and Electronics Engineers Inc., p. 577-581 5 p. 8685647. (2019 International Conference on Computing, Networking and Communications, ICNC 2019).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Intrusion detection
Monitoring
Costs

Attribute Based Encryption for Information Sharing on Tactical Mobile Networks

Luo, J., Dong, Q., Huang, D. & Kang, M., Jan 2 2019, 2018 IEEE Military Communications Conference, MILCOM 2018. Institute of Electrical and Electronics Engineers Inc., p. 960-965 6 p. 8599802. (Proceedings - IEEE Military Communications Conference MILCOM; vol. 2019-October).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptography
Wireless networks
Access control

Combining Dynamic and Static Attack Information for Attack Tracing and Event Correlation

Alshamrani, A., Chowdhary, A., Mjihil, O., Myneni, S. & Huang, D., Feb 20 2019, 2018 IEEE Global Communications Conference, GLOBECOM 2018 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 8647326. (2018 IEEE Global Communications Conference, GLOBECOM 2018 - Proceedings).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

tracing
Tracing
attack
Attack
Intrusion detection

Improving student learning performance in a virtual hands-on lab system in cybersecurity education

Zeng, Z., Deng, Y., Hsiao, I., Huang, D. & Chung, C. J., Mar 4 2019, Frontiers in Education: Fostering Innovation Through Diversity, FIE 2018 - Conference Proceedings. Institute of Electrical and Electronics Engineers Inc., 8658855. (Proceedings - Frontiers in Education Conference, FIE; vol. 2018-October).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

learning performance
Education
Students
learning
education

Personalized Learning in a Virtual Hands-on Lab Platform for Computer Science Education

Deng, Y., Lu, D., Chung, C. J., Huang, D. & Zeng, Z., Mar 4 2019, Frontiers in Education: Fostering Innovation Through Diversity, FIE 2018 - Conference Proceedings. Institute of Electrical and Electronics Engineers Inc., 8659291. (Proceedings - Frontiers in Education Conference, FIE; vol. 2018-October).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

computer science
Computer science
Education
Students
learning

SDN based Network Function Parallelism in Cloud

Chowdhary, A. & Huang, D., Apr 8 2019, 2019 International Conference on Computing, Networking and Communications, ICNC 2019. Institute of Electrical and Electronics Engineers Inc., p. 486-490 5 p. 8685508. (2019 International Conference on Computing, Networking and Communications, ICNC 2019).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Software defined networking
Switches
Network function virtualization

SUPC: SDN enabled Universal Policy Checking in Cloud Network

Chowdhary, A., Alshamrani, A. & Huang, D., Apr 8 2019, 2019 International Conference on Computing, Networking and Communications, ICNC 2019. Institute of Electrical and Electronics Engineers Inc., p. 572-576 5 p. 8685550. (2019 International Conference on Computing, Networking and Communications, ICNC 2019).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Chemical analysis
Software defined networking
Availability
Monitoring
Compliance

The danger of missing instructions: A systematic analysis of security requirements for MCPS

Lamp, J., Rubio-Medrano, C. E., Zhao, Z. & Ahn, G-J., Feb 21 2019, Proceedings - 2018 IEEE/ACM International Conference on Connected Health: Applications, Systems and Engineering Technologies, CHASE 2018. Institute of Electrical and Electronics Engineers Inc., p. 94-99 6 p. (Proceedings - 2018 IEEE/ACM International Conference on Connected Health: Applications, Systems and Engineering Technologies, CHASE 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Computer Security
instruction
Delivery of Health Care
Quality of Health Care
Documentation

Understanding and detecting private interactions in underground forums

Sun, Z., Rubio-Medrano, C. E., Zhao, Z., Bao, T., Doupe, A. & Ahn, G-J., Mar 13 2019, CODASPY 2019 - Proceedings of the 9th ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery, Inc, p. 303-314 12 p. (CODASPY 2019 - Proceedings of the 9th ACM Conference on Data and Application Security and Privacy).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
Learning systems
Detectors

Using social media to understand cyber attack behavior

Sliva, A., Shu, K. & Liu, H., Jan 1 2019, Advances in Human Factors, Business Management and Society - Proceedings of the AHFE 2018 International Conference on Human Factors, Business Management and Society, 2018. Springer Verlag, p. 636-645 10 p. (Advances in Intelligent Systems and Computing; vol. 783).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Sensors
Experiments
2018
2 Citations (Scopus)

#metoo through the lens of social media

Manikonda, L., Beigi, G., Kambhampati, S. & Liu, H., Jan 1 2018, Social, Cultural, and Behavioral Modeling - 11th International Conference, SBP-BRiMS 2018, Proceedings. Bisgin, H., Thomson, R., Hyder, A. & Dancy, C. (eds.). Springer Verlag, p. 104-110 7 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10899 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Social Media
Lens
Lenses
Comparative Analysis
Sharing

Achieving fine-grained access control with discretionary user revocation over cloud data

Dong, Q., Huang, D., Luo, J. & Kang, M., Aug 10 2018, 2018 IEEE Conference on Communications and Network Security, CNS 2018. Institute of Electrical and Electronics Engineers Inc., 8433128

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Access control
Cryptography
Servers
Control systems
Momentum
3 Citations (Scopus)

A data driven in-air-handwriting biometric authentication system

Lu, D., Xu, K. & Huang, D., Jan 29 2018, IEEE International Joint Conference on Biometrics, IJCB 2017. Institute of Electrical and Electronics Engineers Inc., Vol. 2018-January. p. 531-537 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

handwriting
biometrics
Biometrics
Authentication
human-computer interface

AIM-SDN: Aacking information mismanagement in SDN-datastores

Dixit, V. H., Doupe, A., Shoshitaishvili, Y., Zhao, Z. & Ahn, G-J., Oct 15 2018, CCS 2018 - Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 664-676 13 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Network management
Critical infrastructures
Controllers
Cloud computing
Information management

CacheLight: Defeating the cachekit attack

Gutierrez, M., Zhao, Z., Doupe, A., Shoshitaishvili, Y. & Ahn, G-J., Oct 15 2018, ASHES 2018 - Proceedings of the 2018 Workshop on Attacks and Solutions in Hardware Security, co-located with CCS 2018. Association for Computing Machinery, p. 65-74 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data storage equipment
Inspection
Hardware
Malware
Hardware security

Challenges, opportunities and a framework for web environment forensics

Mabey, M., Doupe, A., Zhao, Z. & Ahn, G-J., Jan 1 2018, Advances in Digital Forensics XIV - 14th IFIP WG 11.9 International Conference, 2018. Peterson, G. & Shenoi, S. (eds.). Springer New York LLC, p. 11-33 23 p. (IFIP Advances in Information and Communication Technology; vol. 532).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

World Wide Web
Digital forensics
1 Citation (Scopus)

Challenges and preparedness of SDN-based firewalls

Dixit, V. H., Kyung, S., Zhao, Z., Doupe, A., Shoshitaishvili, Y. & Ahn, G-J., Mar 14 2018, SDN-NFVSec 2018 - Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks and Network Function Virtualization, Co-located with CODASPY 2018. Association for Computing Machinery, Inc, Vol. 2018-January. p. 33-38 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cost effectiveness
Scalability
Controllers
Industry
8 Citations (Scopus)

CrossFire: Cross media joint friend and item recommendations

Shu, K., Wang, S., Tang, J., Wang, Y. & Liu, H., Feb 2 2018, WSDM 2018 - Proceedings of the 11th ACM International Conference on Web Search and Data Mining. Association for Computing Machinery, Inc, Vol. 2018-Febuary. p. 522-530 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Defining and detecting environment discrimination in android apps

Hong, Y., Hu, Y., Lai, C. M., Felix Wu, S., Neamtiu, I., McDaniel, P., Yu, P., Cam, H. & Ahn, G-J., Jan 1 2018, Security and Privacy in Communication Networks - 13th International Conference, SecureComm 2017, Proceedings. Springer Verlag, p. 510-529 20 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 238).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Application programs
Android (operating system)
Malware
Application programming interfaces (API)
Dynamic analysis

EDSGuard: Enforcing Network Security Requirements for Energy Delivery Systems

Coughlin, V., Rubio-Medrano, C., Zhao, Z. & Ahn, G-J., Dec 24 2018, 2018 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids, SmartGridComm 2018. Institute of Electrical and Electronics Engineers Inc., 8587430

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Geographical regions
Network security
Inspection
Network protocols
Monitoring

Fault Tolerant Controller Placement in Distributed SDN Environments

Alshamrani, A., Guha, S., Pisharody, S., Chowdhary, A. & Huang, D., Jul 27 2018, 2018 IEEE International Conference on Communications, ICC 2018 - Proceedings. Institute of Electrical and Electronics Engineers Inc., Vol. 2018-May. 8422593

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Controllers
Fault tolerance
Topology
Scalability
Internet
2 Citations (Scopus)

Initiator: Noise-contrastive estimation for marked temporal point process

Guo, R., Li, J. & Liu, H., Jan 1 2018, Proceedings of the 27th International Joint Conference on Artificial Intelligence, IJCAI 2018. Lang, J. (ed.). International Joint Conferences on Artificial Intelligence, Vol. 2018-July. p. 2191-2197 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Maximum likelihood estimation
Recurrent neural networks
Mathematical models
2 Citations (Scopus)

Inside a phisher's mind: Understanding the anti-phishing ecosystem through phishing kit analysis

Oest, A., Safei, Y., Doupe, A., Ahn, G-J., Wardman, B. & Warner, G., Jun 8 2018, Proceedings of the 2018 APWG Symposium on Electronic Crime Research, eCrime 2018. IEEE Computer Society, Vol. 2018-May. p. 1-12 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Ecosystems
Websites
Paint
Servers
Phishing
3 Citations (Scopus)

Learning partial-value variable relations for system modeling

Ye, N., Fok, T. Y., Wang, X., Collofello, J. & Dickson, N., Jun 13 2018, Proceedings - 2018 4th International Conference on Control, Automation and Robotics, ICCAR 2018. Institute of Electrical and Electronics Engineers Inc., p. 368-372 5 p. 8384702

Research output: Chapter in Book/Report/Conference proceedingConference contribution

System Modeling
Data mining
Learning systems
Energy utilization
Partial
1 Citation (Scopus)

Learning representations of ultrahigh-dimensional data for random distance-based outlier detection

Pang, G., Chen, L., Cao, L. & Liu, H., Jul 19 2018, KDD 2018 - Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. Association for Computing Machinery, p. 2041-2050 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Detectors

Leveraging implicit contribution amounts to facilitate microfinancing requests

Ranganath, S., Beigi, G. & Liu, H., Feb 2 2018, WSDM 2018 - Proceedings of the 11th ACM International Conference on Web Search and Data Mining. Association for Computing Machinery, Inc, Vol. 2018-Febuary. p. 477-485 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Economics
Data storage equipment
Costs

Maximum Distance Minimum Error (MDME): A non-parametric approach to feature selection for image-based high content screening data

Trevino, R. P., Lamkin, T. J., Smith, R., Kawamoto, S. A. & Liu, H., Mar 23 2018, 2017 Intelligent Systems Conference, IntelliSys 2017. Institute of Electrical and Electronics Engineers Inc., Vol. 2018-January. p. 670-677 8 p. 8324366

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Normal distribution
Minimum Distance
Feature Selection
Screening
Feature extraction
1 Citation (Scopus)

Measuring E-mail header injections on the world wide web

Chandramouli, S. P., Bajan, P. M., Kruegel, C., Vigna, G., Zhao, Z., Doupe, A. & Ahn, G-J., Apr 9 2018, Proceedings of the 33rd Annual ACM Symposium on Applied Computing, SAC 2018. Association for Computing Machinery, Vol. Part F137816. p. 1647-1656 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Electronic mail
World Wide Web
Websites
Ruby
1 Citation (Scopus)

Moving target defense for the placement of intrusion detection systems in the cloud

Sengupta, S., Chowdhary, A., Huang, D. & Kambhampati, S., Jan 1 2018, Decision and Game Theory for Security - 9th International Conference, GameSec 2018, Proceedings. Bushnell, L., Poovendran, R. & Basar, T. (eds.). Springer Verlag, p. 326-345 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11199 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Moving Target
Intrusion detection
Intrusion Detection
Placement
Vulnerability

MTD 2018: 5th ACM workshop on moving target defense (MTD)

Albanese, M. & Huang, D., Oct 15 2018, CCS 2018 - Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 2175-2176 2 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Security of data
Computer networks
Computer systems
Industry
Secure communication
2 Citations (Scopus)

MTD analysis and evaluation framework in software defined network (MASON)

Chowdhary, A., Huang, D., Alshamrani, A. & Liang, H., Mar 14 2018, SDN-NFVSec 2018 - Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks and Network Function Virtualization, Co-located with CODASPY 2018. Association for Computing Machinery, Inc, Vol. 2018-January. p. 43-48 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Controllers
Virtual machine
1 Citation (Scopus)

Multifactor user authentication with in-air-handwriting and hand geometry

Lu, D., Huang, D., Deng, Y. & Alshamrani, A., Jul 13 2018, Proceedings - 2018 International Conference on Biometrics, ICB 2018. Institute of Electrical and Electronics Engineers Inc., p. 255-262 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

handwriting
Handwriting
Authentication
Gestures
platforms

Multimodal fusion of brain networks with longitudinal couplings

Zhang, W., Shu, K., Wang, S., Liu, H. & Wang, Y., Jan 1 2018, Medical Image Computing and Computer Assisted Intervention – MICCAI 2018 - 21st International Conference, 2018, Proceedings. Frangi, A. F., Davatzikos, C., Fichtinger, G., Alberola-López, C. & Schnabel, J. A. (eds.). Springer Verlag, p. 3-11 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11072 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Neuroimaging
Brain
Fusion
Fusion reactions
Factorise
1 Citation (Scopus)

Optimized security as a service platforms via stochastic modeling and dynamic programming

Mjihil, O., Taramit, H., Haqiq, A. & Huang, D., Jan 1 2018, Innovations in Bio-Inspired Computing and Applications - Proceedings of the 8th International Conference on Innovations in Bio-Inspired Computing and Applications IBICA 2017. Springer Verlag, p. 277-287 11 p. (Advances in Intelligent Systems and Computing; vol. 735).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Dynamic programming
Scalability
Heuristic algorithms
Cloud computing

Prompt lightweight VPN session resumption for rapid client mobility and MTD enablement for VPN servers

Alshalan, A. & Huang, D., Jul 27 2018, 2018 IEEE International Conference on Communications, ICC 2018 - Proceedings. Institute of Electrical and Electronics Engineers Inc., Vol. 2018-May. 8422080

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Servers
Network protocols

Riskpol: A risk assessment framework for preventing attribute-forgery attacks to ABAC policies

Rubio-Medrano, C. E., Zhao, Z. & Ahn, G-J., Mar 14 2018, ABAC 2018 - Proceedings of the 3rd ACM Workshop on Attribute-Based Access Control, Co-located with CODASPY 2018. Association for Computing Machinery, Inc, Vol. 2018-January. p. 54-60 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Access control
Risk assessment

Secore: Continuous extrospection with high visibility on multi-core ARM platforms

Zhang, P., Ngabonziza, B., Cho, H., Zhao, Z., Doupe, A. & Ahn, G-J., Mar 13 2018, CODASPY 2018 - Proceedings of the 8th ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery, Inc, Vol. 2018-January. p. 161-163 3 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Visibility
Program processors
Monitoring
Internet of things
Coprocessor
4 Citations (Scopus)

Securing social media user data - An adversarial approach

Beigi, G., Shu, K., Zhang, Y. & Liu, H., Jul 3 2018, HT 2018 - Proceedings of the 29th ACM Conference on Hypertext and Social Media. Association for Computing Machinery, Inc, p. 165-173 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Citations (Scopus)

Similar but different: Exploiting users’ congruity for recommendation systems

Beigi, G. & Liu, H., Jan 1 2018, Social, Cultural, and Behavioral Modeling - 11th International Conference, SBP-BRiMS 2018, Proceedings. Bisgin, H., Thomson, R., Hyder, A. & Dancy, C. (eds.). Springer Verlag, p. 129-140 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10899 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Recommendation System
Recommender systems
Social Media
Building Blocks
Vary
3 Citations (Scopus)

Social cyber-security

Carley, K. M., Cervone, G., Agarwal, N. & Liu, H., Jan 1 2018, Social, Cultural, and Behavioral Modeling - 11th International Conference, SBP-BRiMS 2018, Proceedings. Bisgin, H., Thomson, R., Hyder, A. & Dancy, C. (eds.). Springer Verlag, p. 389-394 6 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10899 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Strategy

Software defined stochastic model for moving target defense

El Mir, I., Chowdhary, A., Huang, D., Pisharody, S., Kim, D. S. & Haqiq, A., 2018, Proceedings of the 3rd International Afro-European Conference for Industrial Advancement, AECIA 2016. Springer Verlag, Vol. 565. p. 188-197 10 p. (Advances in Intelligent Systems and Computing; vol. 565).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Stochastic models
Availability
Security systems
Servers
Computer simulation
5 Citations (Scopus)

Streaming link prediction on dynamic atributed networks

Li, J., Wu, L., Cheng, K. & Liu, H., Feb 2 2018, WSDM 2018 - Proceedings of the 11th ACM International Conference on Web Search and Data Mining. Association for Computing Machinery, Inc, Vol. 2018-Febuary. p. 369-377 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data storage equipment
Marketing
Availability
Experiments
18 Citations (Scopus)

Tracing fake-news footprints: Characterizing social media messages by how they propagate

Wu, L. & Liu, H., Feb 2 2018, WSDM 2018 - Proceedings of the 11th ACM International Conference on Web Search and Data Mining. Association for Computing Machinery, Inc, Vol. 2018-Febuary. p. 637-645 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Spreaders
5 Citations (Scopus)

Turning Clicks into purchases: Revenue optimization for product search in e-commerce

Wu, L., Hu, D., Hong, L. & Liu, H., Jun 27 2018, 41st International ACM SIGIR Conference on Research and Development in Information Retrieval, SIGIR 2018. Association for Computing Machinery, Inc, p. 365-374 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Electronic commerce
Search engines
Feedback
Information retrieval
Labels
1 Citation (Scopus)

Understanding cyber attack behaviors with sentiment information on social media

Shu, K., Sliva, A., Sampson, J. & Liu, H., Jan 1 2018, Social, Cultural, and Behavioral Modeling - 11th International Conference, SBP-BRiMS 2018, Proceedings. Bisgin, H., Thomson, R., Hyder, A. & Dancy, C. (eds.). Springer Verlag, p. 377-388 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10899 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Social Media
Attack
Logistics
Planning
Communication
5 Citations (Scopus)

Understanding User Profiles on Social Media for Fake News Detection

Shu, K., Wang, S. & Liu, H., Jun 26 2018, Proceedings - IEEE 1st Conference on Multimedia Information Processing and Retrieval, MIPR 2018. Institute of Electrical and Electronics Engineers Inc., p. 430-435 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Costs

VniDS: Towards elastic security with safe and efficient virtualization of network intrusion detection systems

Li, H., Hu, H., Gu, G., Ahn, G-J. & Zhang, F., Oct 15 2018, CCS 2018 - Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 17-34 18 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Intrusion detection
Virtualization
Elasticity
2017
14 Citations (Scopus)

Adaptive spammer detection with sparse group modeling

Wu, L., Hu, X., Morstatter, F. & Liu, H., 2017, Proceedings of the 11th International Conference on Web and Social Media, ICWSM 2017. AAAI Press, p. 319-326 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Spamming
Costs
8 Citations (Scopus)

A defense system for defeating DDoS attacks in SDN based networks

Alshamrani, A., Chowdhary, A., Pisharody, S., Lu, D. & Huang, D., Nov 21 2017, MobiWac 2017 - Proceedings of the 15th ACM International Symposium on Mobility Management and Wireless Access, Co-located with MSWiM 2017. Association for Computing Machinery, Inc, p. 83-92 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Computer networks
Computer systems
Network management
Network architecture
Learning systems
11 Citations (Scopus)

A game theoretic approach to strategy generation for moving target defense in web applications

Sengupta, S., Vadlamudi, S. G., Kambhampati, S., Doupe, A., Zhao, Z., Taguinod, M. & Ahn, G-J., Jan 1 2017, 16th International Conference on Autonomous Agents and Multiagent Systems, AAMAS 2017. International Foundation for Autonomous Agents and Multiagent Systems (IFAAMAS), Vol. 1. p. 178-186 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Costs
Uncertainty