Systems and methods for detecting attacks in big data systems SK ADITHAM, N Ranganathan WO Patent App. PCT/US2017/033,769, 2017 | 54 | 2017 |
A system architecture for the detection of insider attacks in big data systems S Aditham, N Ranganathan IEEE Transactions on Dependable and Secure Computing 15 (6), 974-987, 2017 | 43 | 2017 |
Applications of Sequence to Sequence Models for Technical Support Automation G Aalipour, P Kumar, S Aditham, T Nguyen, A Sood 2018 IEEE International Conference on Big Data (Big Data), 4861 - 4869, 2018 | 21 | 2018 |
A novel framework for mitigating insider attacks in big data systems S Aditham, N Ranganathan 2015 IEEE International Conference on Big Data (Big Data), 1876-1885, 2015 | 21 | 2015 |
Detecting threats in big data platforms based on call trace and memory access patterns SK Aditham, N Ranganathan US Patent 10,678,907, 2020 | 18 | 2020 |
LSTM-based memory profiling for predicting data attacks in distributed big data systems S Aditham, N Ranganathan, S Katkoori 2017 IEEE International Parallel and Distributed Processing Symposium …, 2017 | 16 | 2017 |
A Novel Control-flow based Intrusion Detection Technique for Big Data Systems S Aditham, N Ranganathan The 3rd International Conference on Advances in Big Data Analytics (ABDA), 45-51, 2016 | 7 | 2016 |
Memory access pattern based insider threat detection in big data systems S Aditham, N Ranganathan, S Katkoori 2016 IEEE International Conference on Big Data (Big Data), 3625 - 3628, 2016 | 6 | 2016 |
Call trace and memory access pattern based runtime insider threat detection for big data platforms S Aditham, N Ranganathan, S Katkoori arXiv preprint arXiv:1611.07392, 2016 | 3 | 2016 |
Detecting threats in big data platforms based on call trace and memory access patterns SK Aditham, N Ranganathan US Patent 11,269,990, 2022 | 2 | 2022 |
Mitigation of Insider Attacks for Data Security in Distributed Computing Environments S Aditham University of South Florida, 2017 | | 2017 |
An energy-aware scheduling heuristic for distributed systems using non-cooperative games S Aditham, N Ranganathan 2015 Sixth International Green and Sustainable Computing Conference (IGSC), 1-6, 2015 | | 2015 |
2018 Index IEEE Transactions on Dependable and Secure Computing Vol. 15 A Abbas, S Aditham, G Ahn, NZ Aitzhan, M Al-Qurishi, A Alamri, ... | | |