Obserwuj
Ankit Shah
Tytuł
Cytowane przez
Cytowane przez
Rok
Vulcon: A system for vulnerability prioritization, mitigation, and management
KA Farris, A Shah, G Cybenko, R Ganesan, S Jajodia
ACM Transactions on Privacy and Security (TOPS) 21 (4), 1-28, 2018
932018
Dynamic scheduling of cybersecurity analysts for minimizing risk using reinforcement learning
R Ganesan, S Jajodia, A Shah, H Cam
ACM Transactions on Intelligent Systems and Technology (TIST) 8 (1), 1-21, 2016
682016
A reinforcement learning approach for rebalancing electric vehicle sharing systems
A Bogyrbayeva, S Jang, A Shah, YJ Jang, C Kwon
IEEE Transactions on Intelligent Transportation Systems 23 (7), 8704-8714, 2021
392021
Towards optimal foreign object debris detection in an airport environment
M Noroozi, A Shah
Expert Systems with Applications 213, 118829, 2023
372023
Detecting Stealthy Botnets in a Resource-Constrained Environment Using Reinforcement Learning
S Venkatesan, M Albanese, A Shah, R Ganesan, S Jajodia
Proceedings of the 4th ACM Workshop on Moving Target Defense, 75-85, 2017
342017
A methodology to measure and monitor level of operational effectiveness of a CSOC
A Shah, R Ganesan, S Jajodia, H Cam
International Journal of Information Security 17 (2), 121-134, 2018
312018
Understanding tradeoffs between throughput, quality, and cost of alert analysis in a csoc
A Shah, R Ganesan, S Jajodia, H Cam
IEEE Transactions on Information Forensics and Security 14 (5), 1155-1170, 2018
302018
Vulnerability selection for remediation: An empirical analysis
A Shah, KA Farris, R Ganesan, S Jajodia
The Journal of Defense Modeling and Simulation 19 (1), 13-22, 2022
202022
Deep VULMAN: A deep reinforcement learning-enabled cyber vulnerability management framework
S Hore, A Shah, ND Bastian
Expert Systems with Applications 221, 119734, 2023
192023
A methodology for ensuring fair allocation of CSOC effort for alert investigation
A Shah, R Ganesan, S Jajodia
International Journal of Information Security 18, 199-218, 2019
192019
Dynamic optimization of the level of operational effectiveness of a CSOC under adverse conditions
A Shah, R Ganesan, S Jajodia, H Cam
ACM Transactions on Intelligent Systems and Technology (TIST) 9 (5), 1-20, 2018
162018
A two-step approach to optimal selection of alerts for investigation in a CSOC
A Shah, R Ganesan, S Jajodia, H Cam
IEEE Transactions on Information Forensics and Security 14 (7), 1857-1870, 2018
142018
An AI-assisted systematic literature review of the impact of vehicle automation on energy consumption
M Noroozi, HR Moghaddam, A Shah, H Charkhgard, S Sarkar, TK Das, ...
IEEE Transactions on Intelligent Vehicles 8 (6), 3572-3592, 2023
132023
Optimal assignment of sensors to analysts in a cybersecurity operations center
A Shah, R Ganesan, S Jajodia, H Cam
IEEE Systems Journal 13 (1), 1060-1071, 2018
132018
Deep packgen: A deep reinforcement learning framework for adversarial network packet generation
S Hore, J Ghadermazi, D Paudel, A Shah, T Das, N Bastian
ACM Transactions on Privacy and Security, 2025
122025
A novel team formation framework based on performance in a cybersecurity operations center
A Shah, R Ganesan, S Jajodia, H Cam, S Hutchinson
IEEE Transactions on Services Computing 16 (4), 2359-2371, 2023
122023
Towards optimal triage and mitigation of context-sensitive cyber vulnerabilities
S Hore, F Moomtaheen, A Shah, X Ou
IEEE Transactions on Dependable and Secure Computing 20 (2), 1270-1285, 2022
122022
Towards real-time network intrusion detection with image-based sequential packets representation
J Ghadermazi, A Shah, ND Bastian
IEEE Transactions on Big Data, 2024
102024
A strategy for effective alert analysis at a cyber security operations center
R Ganesan, A Shah
From Database to Cyber Security: Essays Dedicated to Sushil Jajodia on the …, 2018
102018
A sequential deep learning framework for a robust and resilient network intrusion detection system
S Hore, J Ghadermazi, A Shah, ND Bastian
Computers & Security, 103928, 2024
92024
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20