Publications
Displaying publications 281 through 300 out of 1094.
Publications
2016
- K. Khanna, B. K. Panigrahi, and A. Joshi, "Data Integrity Attack in Smart Grid: Optimized Attack to Gain Monetary Economic Profit", Article, IET Transactions on Generation, Transmission and Distribution, September 2016, 1676 downloads.
- S. Mittal, P. K. Das, V. Mulwad, A. Joshi, and T. Finin, "CyberTwitter: Using Twitter to generate alerts for Cybersecurity Threats and Vulnerabilities", InProceedings, IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), August 2016, 4448 downloads.
- P. Nimbalkar, V. Mulwad, N. Puranik, A. Joshi, and T. Finin, "Semantic Interpretation of Structured Log Files", InProceedings, 17th IEEE International Conference on Information Reuse and Integration, July 2016, 1435 downloads.
- B. Thuraisingham, M. Kantarcioglu, K. Hamlen, L. Khan, T. Finin, A. Joshi, T. Oates, and E. Bertino, "A Data Driven Approach for the Science of Cyber Security: Challenges and Directions", InProceedings, IEEE Conference on Information Reuse and Integration,, July 2016, 1732 downloads.
- A. Gupta, S. Mittal, K. P. Joshi, C. Pearce, and A. Joshi, "Streamlining Management of Multiple Cloud Services", InProceedings, IEEE International Conference on Cloud Computing, June 2016, 1800 downloads.
- V. Narkhede, K. P. Joshi, T. Finin, S. Choi, A. Aviv, and D. S. Roche, "Managing Cloud Storage Obliviously", InProceedings, International Conference on Cloud Computing, June 2016, 1889 downloads.
- J. Lo, Y. Gui, and Y. Peng, "Training Deep Neural Networks with Gradual Deconvexification", InProceedings, International Joint Conference on Neural Networks (IJCNN 2016),, June 2016, 516 downloads.
- K. P. Joshi, Y. Yesha, and T. Finin, "An Ontology for a HIPAA compliant cloud service", InProceedings, 4th International IBM Cloud Academy Conference ICACON 2016, June 2016, 2321 downloads.
- P. K. Das, S. N. Narayanan, N. K. Sharma, A. Joshi, K. P. Joshi, and T. Finin, "Context-Sensitive Policy Based Security in Internet of Things", InProceedings, 2016 IEEE International Conference on Smart Computing (SMARTCOMP), May 2016, 1994 downloads.
- S. N. Narayanan, S. Mittal, and A. Joshi, "OBD SecureAlert: An Anomaly Detection System for Vehicles", InProceedings, IEEE Workshop on Smart Service Systems (SmartSys 2016), May 2016, 1905 downloads.
- Y. Sun and Y. Peng, "Inconsistent Knowledge Integration with Bayesian Network", 29th International FLAIRS Conference, May 2016, 492 downloads.
- D. S. Roche, A. Aviv, and S. Choi, "A Practical Oblivious Map Data Structure with Secure Deletion and History Independence.", InProceedings, IEEE Symposium on Security and Privacy, May 2016, 1533 downloads.
- R. Holder, "Rapid Plan Adaptation Through Offline Analysis of Potential Plan Disruptors", PhdThesis, May 2016, 479 downloads.
- Y. Gui, "Convexification and Deconvexification for Training Artificial Neural Networks", PhdThesis, May 2016, 444 downloads.
- S. Mittal, K. P. Joshi, C. Pearce, and A. Joshi, "Automatic Extraction of Metrics from SLAs for Cloud Service Management", InProceedings, 2016 IEEE International Conference on Cloud Engineering (IC2E 2016), April 2016, 1814 downloads.
- K. Khanna and A. Joshi, "Feasibility and mitigation of false data injection attacks in smart grid", InProceedings, IEEE 6th International Conference on Power Systems (ICPS), 2016 , March 2016, 1087 downloads.
- A. L. Kashyap, L. Han, R. Yus, J. Sleeman, T. W. Satyapanich, S. R. Gandhi, and T. Finin, "Robust Semantic Text Similarity Using LSA, Machine Learning and Linguistic Resources", Article, Language Resources and Evaluation, March 2016, 2622 downloads.
- K. Chopra, R. Bose, and A. Joshi, "Duopoly Models for Power Trading in Secure Cooperative Relay Networks", InProceedings, IEEE National Conference on Communications (NCC 2016), February 2016, 1212 downloads.
- M. L. Mathews, A. Joshi, and T. Finin, "Detecting Botnets Using a Collaborative Situational-aware IDPS", InProceedings, Second International Conference on Information Systems Security and Privacy, February 2016, 1882 downloads.
- Z. Syed, A. Padia, M. L. Mathews, T. Finin, and A. Joshi, "UCO: A Unified Cybersecurity Ontology", InProceedings, Proceedings of the AAAI Workshop on Artificial Intelligence for Cyber Security, February 2016, 4250 downloads.