Obserwuj
Shridatt Sugrim
Tytuł
Cytowane przez
Cytowane przez
Rok
User-generated free-form gestures for authentication: Security and memorability
M Sherman, G Clark, Y Yang, S Sugrim, A Modig, J Lindqvist, A Oulasvirta, ...
Proceedings of the 12th annual international conference on Mobile systems …, 2014
1252014
Elastic pathing: Your speed is enough to track you
X Gao, B Firner, S Sugrim, V Kaiser-Pendergrast, Y Yang, J Lindqvist
Proceedings of the 2014 ACM International Joint Conference on Pervasive and …, 2014
862014
Cyber deception: Virtual networks to defend insider reconnaissance
S Achleitner, T La Porta, P McDaniel, S Sugrim, SV Krishnamurthy, ...
Proceedings of the 8th ACM CCS international workshop on managing insider …, 2016
732016
Deceiving network reconnaissance using SDN-based virtual topologies
S Achleitner, TF La Porta, P McDaniel, S Sugrim, SV Krishnamurthy, ...
IEEE Transactions on Network and Service Management 14 (4), 1098-1112, 2017
522017
Cybervan: A cyber security virtual assured network testbed
R Chadha, T Bowen, CYJ Chiang, YM Gottlieb, A Poylisher, A Sapello, ...
MILCOM 2016-2016 IEEE Military Communications Conference, 1125-1130, 2016
432016
ACyDS: An adaptive cyber deception system
CYJ Chiang, YM Gottlieb, SJ Sugrim, R Chadha, C Serban, A Poylisher, ...
MILCOM 2016-2016 IEEE Military Communications Conference, 800-805, 2016
392016
Simulations in cyber-security: a review of cognitive modeling of network attackers, defenders, and users
VD Veksler, N Buchler, BE Hoffman, DN Cassenti, C Sample, S Sugrim
Frontiers in psychology 9, 691, 2018
332018
Robust performance metrics for authentication systems
S Sugrim, C Liu, M McLean, J Lindqvist
Network and Distributed Systems Security (NDSS) Symposium 2019, 2019
202019
On detecting manifestation of adversary characteristics
S Venkatesan, S Sugrim, R Izmailov, CYJ Chiang, R Chadha, B Doshi, ...
MILCOM 2018-2018 IEEE military communications conference (MILCOM), 431-437, 2018
112018
On defensive cyber deception: A case study using SDN
CYJ Chiang, S Venkatesan, S Sugrim, JA Youzwak, R Chadha, EI Colbert, ...
MILCOM 2018-2018 IEEE Military Communications Conference (MILCOM), 110-115, 2018
92018
Measuring the effectiveness of network deception
S Sugrim, S Venkatesan, JA Youzwak, CYJ Chiang, R Chadha, ...
2018 IEEE International Conference on Intelligence and Security Informatics …, 2018
82018
Enablers of adversarial attacks in machine learning
R Izmailov, S Sugrim, R Chadha, P McDaniel, A Swami
MILCOM 2018-2018 IEEE Military Communications Conference (MILCOM), 425-430, 2018
82018
Recruit until it fails: Exploring performance limits for identification systems
S Sugrim, C Liu, J Lindqvist
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous …, 2019
52019
AutoGAN: Robust classifier against adversarial attacks
B Lindqvist, S Sugrim, R Izmailov
arXiv preprint arXiv:1812.03405, 2018
52018
Elastic pathing: Your speed is enough to track you
B Firner, S Sugrim, Y Yang, J Lindqvist
arXiv preprint arXiv:1401.0052, 2013
42013
Noise power and SNR estimation based on the preamble in tri-sectored OFDM systems
HS Park, S Sugrim, P Spasojevic, YO Park
2011 IEEE 73rd Vehicular Technology Conference (VTC Spring), 1-5, 2011
32011
Combinatorial boosting of classifiers for moving target defense against adversarial evasion attacks
R Izmailov, P Lin, S Venkatesan, S Sugrim
Proceedings of the 8th ACM Workshop on Moving Target Defense, 13-21, 2021
22021
VulnerVAN: A Vulnerable Network Generation Tool
S Venkatesan, JA Youzwak, S Sugrim, CYJ Chiang, A Poylisher, ...
MILCOM 2019-2019 IEEE Military Communications Conference (MILCOM), 1-6, 2019
22019
Transforming Speed Sequences into Road Rays on the Map with Elastic Pathing
X Gao, B Firner, S Sugrim, V Kaiser-Pendergrast, Y Yang, J Lindqvist
arXiv preprint arXiv:1710.06932, 2017
22017
A Framework for Studying Autonomic Computing Models in Cyber Deception
S Venkatesan, S Sugrim, JA Youzwak, CYJ Chiang, R Chadha
Adaptive Autonomous Secure Cyber Systems, 89-107, 2020
12020
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20