Obserwuj
Ritu Chadha
Ritu Chadha
Senior Research Director, Peraton Labs
Zweryfikowany adres z peratonlabs.com
Tytuł
Cytowane przez
Cytowane przez
Rok
Policy-based mobile ad hoc network management
R Chadha, H Cheng, YH Cheng, J Chiang, A Ghetie, G Levin, H Tanna
Proceedings. Fifth IEEE International Workshop on Policies for Distributed …, 2004
972004
System and method for correlating historical attacks with diverse indicators to generate indicator profiles for detecting and predicting future network attacks
A Vashist, R Chadha, A Ghosh, A Poylisher, Y Sawaya, A Yamada, ...
US Patent 9,386,030, 2016
862016
Cyber deception: Virtual networks to defend insider reconnaissance
S Achleitner, T La Porta, P McDaniel, S Sugrim, SV Krishnamurthy, ...
Proceedings of the 8th ACM CCS international workshop on managing insider …, 2016
702016
Limitations of the Lipschitz constant as a defense against adversarial examples
T Huster, CYJ Chiang, R Chadha
Joint European Conference on Machine Learning and Knowledge Discovery in …, 2018
582018
Policy-driven mobile ad hoc network management
R Chadha, L Kant
John Wiley & Sons, 2007
542007
Deceiving network reconnaissance using SDN-based virtual topologies
S Achleitner, TF La Porta, P McDaniel, S Sugrim, SV Krishnamurthy, ...
IEEE Transactions on Network and Service Management 14 (4), 1098-1112, 2017
502017
Cybervan: A cyber security virtual assured network testbed
R Chadha, T Bowen, CYJ Chiang, YM Gottlieb, A Poylisher, A Sapello, ...
MILCOM 2016-2016 IEEE Military Communications Conference, 1125-1130, 2016
442016
Policy-based mobile ad hoc network management for DRAMA
R Chadha, YH Cheng, J Chiang, G Levin, SW Li, A Poylisher
IEEE MILCOM 2004. Military Communications Conference, 2004. 3, 1317-1323, 2004
432004
Policy-based networking
R Chadha, G Lapiotis, S Wright
IEEE Network Magazine 16, 8-9, 2002
412002
Cognitive radio rides on the cloud
F Ge, H Lin, A Khajeh, CJ Chiang, ME Ahmed, WB Charles, W Feng, ...
2010-MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE, 1448-1453, 2010
392010
ACyDS: An adaptive cyber deception system
CYJ Chiang, YM Gottlieb, SJ Sugrim, R Chadha, C Serban, A Poylisher, ...
MILCOM 2016-2016 IEEE Military Communications Conference, 800-805, 2016
372016
Special issue on policy based networking
S Wright, R Chadha, G Lapiotis
IEEE Network 16 (2), 8-56, 2002
372002
Cognitive network load prediction method and apparatus
A Vashist, A Poylisher, SC Mau, A Ghosh, R Chadha
US Patent App. 13/004,324, 2012
362012
An integrated testbed for virtual ad hoc networks
PK Biswas, C Serban, A Poylisher, J Lee, SC Mau, R Chadha, ...
2009 5th International Conference on Testbeds and Research Infrastructures …, 2009
342009
Sophisticated access control via SMT and logical frameworks
K Arkoudas, R Chadha, J Chiang
ACM Transactions on Information and System Security (TISSEC) 16 (4), 1-31, 2014
302014
Gnu radio-based digital communications: Computational analysis of a gmsk transceiver
F Ge, CJ Chiang, YM Gottlieb, R Chadha
2011 IEEE Global Telecommunications Conference-GLOBECOM 2011, 1-6, 2011
302011
Performance analysis of drama: a distributed policy-based system for manet management
CYJ Chiang, S Demers, P Gopalakrishnan, L Kant, A Poylisher, ...
MILCOM 2006-2006 IEEE Military Communications conference, 1-8, 2006
302006
Correctness of unification without occur check in Prolog
R Chadha, DA Plaisted
The Journal of Logic Programming 18 (2), 99-122, 1994
301994
Real Time Monitoring, Onset Detection And Control Of Congestive Phase-Transitions in Communication Networks
SC Mau, A Poylisher, A Vashist, R Chadha, CYJ Chiang
US Patent App. 12/957,459, 2011
282011
PECAN: Policy-enabled configuration across networks
R Chadha, YH Cheng, T Cheng, S Gadgil, A Hafid, K Kim, G Levin, ...
Proceedings POLICY 2003. IEEE 4th International Workshop on Policies for …, 2003
242003
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20