Personal profile

External positions

Computing

Informatics and Decision Systems Engineering

School of (CIDSE)

Fingerprint Fingerprint is based on mining the text of the persons scientific documents to create an index of weighted terms, which defines the key subjects of each individual researcher.

  • 10 Similar Profiles
Access control Engineering & Materials Science
Application programs Engineering & Materials Science
Personal computing Engineering & Materials Science
Students Engineering & Materials Science
Ecosystems Engineering & Materials Science
Network security Engineering & Materials Science
Forging Engineering & Materials Science
Telephone Engineering & Materials Science

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output 2010 2017

  • 179 Citations
  • 7 h-Index
  • 24 Conference contribution
  • 1 Chapter
  • 1 Article

A game theoretic approach to strategy generation for moving target defense in web applications

Sengupta, S., Vadlamudi, S. G., Kambhampati, S., Doupé, A., Zhao, Z., Taguinod, M. & Ahn, G. J. Jan 1 2017 16th International Conference on Autonomous Agents and Multiagent Systems, AAMAS 2017. International Foundation for Autonomous Agents and Multiagent Systems (IFAAMAS), Vol. 1, p. 178-186 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Autonomous agents
Multi agent systems
Costs
Uncertainty
2 Citations

Deep android malware detection

McLaughlin, N., Del Rincon, J. M., Kang, B. J., Yerima, S., Miller, P., Sezer, S., Safaei, Y., Trickel, E., Zhao, Z., Doupe, A. & Ahn, G. J. Mar 22 2017 CODASPY 2017 - Proceedings of the 7th ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery, Inc, p. 301-308 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Static analysis
Pipelines
Malware
Neural networks
Graphics processing unit

HoneyProxy: Design and implementation of next-generation honeynet via SDN

Kyung, S., Han, W., Tiwari, N., Dixit, V. H., Srinivas, L., Zhao, Z., Doupe, A. & Ahn, G. J. Dec 19 2017 2017 IEEE Conference on Communications and Network Security, CNS 2017. Institute of Electrical and Electronics Engineers Inc., Vol. 2017-January, p. 1-9 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data acquisition
Controllers
Multicasting
Network architecture
Telecommunication traffic

Mutated policies: Towards proactive attribute-based defenses for access control

Rubio-Medrano, C. E., Lamp, J., Doupé, A., Zhao, Z. & Ahn, G. J. Oct 30 2017 MTD 2017 - Proceedings of the 2017 Workshop on Moving Target Defense, co-located with CCS 2017. Association for Computing Machinery, Inc, Vol. 2017-January, p. 39-49 11 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Personal computing
Network security
Access control
Industry

Panel: Trustworthy data science

Doupé, A. Mar 22 2017 CODASPY 2017 - Proceedings of the 7th ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery, Inc, p. 217 1 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Projects 2015 2024