BibTeX records: Sachin Shetty

download as .bib file

@article{DBLP:journals/access/PrajapatKKDSH24,
  author       = {Sunil Prajapat and
                  Pankaj Kumar and
                  Sandeep Kumar and
                  Ashok Kumar Das and
                  Sachin Shetty and
                  M. Shamim Hossain},
  title        = {Designing High-Performance Identity-Based Quantum Signature Protocol
                  With Strong Security},
  journal      = {{IEEE} Access},
  volume       = {12},
  pages        = {14647--14658},
  year         = {2024},
  url          = {https://doi.org/10.1109/ACCESS.2024.3355196},
  doi          = {10.1109/ACCESS.2024.3355196},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/PrajapatKKDSH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iot/BandaraLFSMRRZN24,
  author       = {Eranga Bandara and
                  Xueping Liang and
                  Peter Foytik and
                  Sachin Shetty and
                  Ravi Mukkamala and
                  Abdul Rahman and
                  Nalin Ranasinghe and
                  Kasun De Zoysa and
                  Wee Keong Ng},
  title        = {Lightweight, geo-scalable deterministic blockchain design for 5G networks
                  sliced applications with hierarchical {CFT/BFT} consensus groups,
                  {IPFS} and novel hardware design},
  journal      = {Internet Things},
  volume       = {25},
  pages        = {101077},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.iot.2024.101077},
  doi          = {10.1016/J.IOT.2024.101077},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iot/BandaraLFSMRRZN24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tits/TanRS24,
  author       = {Le Thanh Tan and
                  Martin Reisslein and
                  Sachin Shetty},
  title        = {Multi-Timescale Actor-Critic Learning for Computing Resource Management
                  With Semi-Markov Renewal Process Mobility},
  journal      = {{IEEE} Trans. Intell. Transp. Syst.},
  volume       = {25},
  number       = {1},
  pages        = {452--461},
  year         = {2024},
  url          = {https://doi.org/10.1109/TITS.2023.3303953},
  doi          = {10.1109/TITS.2023.3303953},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tits/TanRS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnse/MishraWSDRS24,
  author       = {Amit Kumar Mishra and
                  Mohammad Wazid and
                  Devesh Pratap Singh and
                  Ashok Kumar Das and
                  Sandip Roy and
                  Sachin Shetty},
  title        = {{ACKS-IA:} An Access Control and Key Agreement Scheme for Securing
                  Industry 4.0 Applications},
  journal      = {{IEEE} Trans. Netw. Sci. Eng.},
  volume       = {11},
  number       = {1},
  pages        = {254--269},
  year         = {2024},
  url          = {https://doi.org/10.1109/TNSE.2023.3296329},
  doi          = {10.1109/TNSE.2023.3296329},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tnse/MishraWSDRS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvt/RoyNMSDL24,
  author       = {Sandip Roy and
                  Sourav Nandi and
                  Raj Maheshwari and
                  Sachin Shetty and
                  Ashok Kumar Das and
                  Pascal Lorenz},
  title        = {Blockchain-Based Efficient Access Control With Handover Policy in
                  IoV-Enabled Intelligent Transportation System},
  journal      = {{IEEE} Trans. Veh. Technol.},
  volume       = {73},
  number       = {3},
  pages        = {3009--3024},
  year         = {2024},
  url          = {https://doi.org/10.1109/TVT.2023.3322637},
  doi          = {10.1109/TVT.2023.3322637},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tvt/RoyNMSDL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccnc/BandaraFSMRLNZ24,
  author       = {Eranga Bandara and
                  Peter Foytik and
                  Sachin Shetty and
                  Ravi Mukkamala and
                  Abdul Rahman and
                  Xueping Liang and
                  Wee Keong Ng and
                  Kasun De Zoysa},
  title        = {SliceGPT - OpenAI {GPT-3.5} LLM, Blockchain and Non-Fungible Token
                  Enabled Intelligent 5G/6G Network Slice Broker and Marketplace},
  booktitle    = {21st {IEEE} Consumer Communications {\&} Networking Conference,
                  {CCNC} 2024, Las Vegas, NV, USA, January 6-9, 2024},
  pages        = {439--445},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/CCNC51664.2024.10454701},
  doi          = {10.1109/CCNC51664.2024.10454701},
  timestamp    = {Tue, 26 Mar 2024 22:14:36 +0100},
  biburl       = {https://dblp.org/rec/conf/ccnc/BandaraFSMRLNZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccnc/SinghSCWAW24,
  author       = {Bikash Chandra Singh and
                  Sachin Shetty and
                  Praneet Chivate and
                  David Wright and
                  Alex Alenberg and
                  Peter Woodward},
  title        = {Performance Analysis of Indoor 5G {NR} Systems},
  booktitle    = {21st {IEEE} Consumer Communications {\&} Networking Conference,
                  {CCNC} 2024, Las Vegas, NV, USA, January 6-9, 2024},
  pages        = {632--633},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/CCNC51664.2024.10454767},
  doi          = {10.1109/CCNC51664.2024.10454767},
  timestamp    = {Tue, 26 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccnc/SinghSCWAW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccnc/FoytikBAS24,
  author       = {Peter Foytik and
                  Safdar Hussain Bouk and
                  Gustave Anderson and
                  Sachin Shetty},
  title        = {Self-Sovereign Identity Management in Ship-Based 5G-Devices Use Case},
  booktitle    = {21st {IEEE} Consumer Communications {\&} Networking Conference,
                  {CCNC} 2024, Las Vegas, NV, USA, January 6-9, 2024},
  pages        = {650--651},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/CCNC51664.2024.10454874},
  doi          = {10.1109/CCNC51664.2024.10454874},
  timestamp    = {Tue, 26 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccnc/FoytikBAS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccnc/GhoshNSK24,
  author       = {Uttam Ghosh and
                  Laurent Njilla and
                  Sachin Shetty and
                  Charles A. Kamhoua},
  title        = {A Decentralized Smart Grid Communication Framework Using SDN-Enabled
                  Blockchain},
  booktitle    = {21st {IEEE} Consumer Communications {\&} Networking Conference,
                  {CCNC} 2024, Las Vegas, NV, USA, January 6-9, 2024},
  pages        = {982--985},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/CCNC51664.2024.10454835},
  doi          = {10.1109/CCNC51664.2024.10454835},
  timestamp    = {Tue, 26 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccnc/GhoshNSK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccnc/BoukOS24,
  author       = {Safdar Hussain Bouk and
                  Babatunji Omoniwa and
                  Sachin Shetty},
  title        = {Predicting Downlink Retransmissions in 5G Networks Using Deep Learning},
  booktitle    = {21st {IEEE} Consumer Communications {\&} Networking Conference,
                  {CCNC} 2024, Las Vegas, NV, USA, January 6-9, 2024},
  pages        = {1056--1057},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/CCNC51664.2024.10454769},
  doi          = {10.1109/CCNC51664.2024.10454769},
  timestamp    = {Tue, 26 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccnc/BoukOS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2403-06388,
  author       = {Md. Shirajum Munir and
                  Sravanthi Proddatoori and
                  Manjushree Muralidhara and
                  Walid Saad and
                  Zhu Han and
                  Sachin Shetty},
  title        = {A Zero Trust Framework for Realization and Defense Against Generative
                  {AI} Attacks in Power Grid},
  journal      = {CoRR},
  volume       = {abs/2403.06388},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2403.06388},
  doi          = {10.48550/ARXIV.2403.06388},
  eprinttype    = {arXiv},
  eprint       = {2403.06388},
  timestamp    = {Thu, 04 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2403-06388.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/JavedAAAMDS23,
  author       = {Safdar Hussain Javed and
                  Maaz Bin Ahmad and
                  Muhammad Asif and
                  Waseem Akram and
                  Khalid Mahmood and
                  Ashok Kumar Das and
                  Sachin Shetty},
  title        = {{APT} Adversarial Defence Mechanism for Industrial IoT Enabled Cyber-Physical
                  System},
  journal      = {{IEEE} Access},
  volume       = {11},
  pages        = {74000--74020},
  year         = {2023},
  url          = {https://doi.org/10.1109/ACCESS.2023.3291599},
  doi          = {10.1109/ACCESS.2023.3291599},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/JavedAAAMDS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ThapliyalWSDSA23,
  author       = {Siddhant Thapliyal and
                  Mohammad Wazid and
                  Devesh Pratap Singh and
                  Ashok Kumar Das and
                  Sachin Shetty and
                  Abdullah Alqahtani},
  title        = {Design of Robust Blockchain-Envisioned Authenticated Key Management
                  Mechanism for Smart Healthcare Applications},
  journal      = {{IEEE} Access},
  volume       = {11},
  pages        = {93032--93047},
  year         = {2023},
  url          = {https://doi.org/10.1109/ACCESS.2023.3310264},
  doi          = {10.1109/ACCESS.2023.3310264},
  timestamp    = {Fri, 01 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/ThapliyalWSDSA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/KhahMGS23,
  author       = {Mohammad Ali Mansouri Khah and
                  Neda Moghim and
                  Nasrin Gholami and
                  Sachin Shetty},
  title        = {Energy-Efficient Multi-Rate Opportunistic Routing in Wireless Mesh
                  Networks},
  journal      = {{IEEE} Access},
  volume       = {11},
  pages        = {97466--97477},
  year         = {2023},
  url          = {https://doi.org/10.1109/ACCESS.2023.3313096},
  doi          = {10.1109/ACCESS.2023.3313096},
  timestamp    = {Sat, 14 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/KhahMGS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ThakurPKDS23,
  author       = {Garima Thakur and
                  Sunil Prajapat and
                  Pankaj Kumar and
                  Ashok Kumar Das and
                  Sachin Shetty},
  title        = {An Efficient Lightweight Provably Secure Authentication Protocol for
                  Patient Monitoring Using Wireless Medical Sensor Networks},
  journal      = {{IEEE} Access},
  volume       = {11},
  pages        = {114662--114679},
  year         = {2023},
  url          = {https://doi.org/10.1109/ACCESS.2023.3325130},
  doi          = {10.1109/ACCESS.2023.3325130},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/ThakurPKDS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LiangKSBS23,
  author       = {Xueping Liang and
                  Charalambos Konstantinou and
                  Sachin Shetty and
                  Eranga Bandara and
                  Ruimin Sun},
  title        = {Decentralizing Cyber Physical Systems for Resilience: An Innovative
                  Case Study from {A} Cybersecurity Perspective},
  journal      = {Comput. Secur.},
  volume       = {124},
  pages        = {102953},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2022.102953},
  doi          = {10.1016/J.COSE.2022.102953},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LiangKSBS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csr/GugueothSSR23,
  author       = {Vinay Gugueoth and
                  Sunitha Safavat and
                  Sachin Shetty and
                  Danda B. Rawat},
  title        = {A review of IoT security and privacy using decentralized blockchain
                  techniques},
  journal      = {Comput. Sci. Rev.},
  volume       = {50},
  pages        = {100585},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cosrev.2023.100585},
  doi          = {10.1016/J.COSREV.2023.100585},
  timestamp    = {Thu, 25 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csr/GugueothSSR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ict-express/GugueothSS23,
  author       = {Vinay Gugueoth and
                  Sunitha Safavat and
                  Sachin Shetty},
  title        = {Security of Internet of Things (IoT) using federated learning and
                  deep learning - Recent advancements, issues and prospects},
  journal      = {{ICT} Express},
  volume       = {9},
  number       = {5},
  pages        = {941--960},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.icte.2023.03.006},
  doi          = {10.1016/J.ICTE.2023.03.006},
  timestamp    = {Wed, 24 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ict-express/GugueothSS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/BandaraLSMFRZ23,
  author       = {Eranga Bandara and
                  Xueping Liang and
                  Sachin Shetty and
                  Ravi Mukkamala and
                  Peter Foytik and
                  Nalin Ranasinghe and
                  Kasun De Zoysa},
  title        = {Octopus: privacy preserving peer-to-peer transactions system with
                  InterPlanetary file system {(IPFS)}},
  journal      = {Int. J. Inf. Sec.},
  volume       = {22},
  number       = {3},
  pages        = {591--609},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10207-022-00650-2},
  doi          = {10.1007/S10207-022-00650-2},
  timestamp    = {Sun, 04 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/BandaraLSMFRZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/DasRBS23,
  author       = {Ashok Kumar Das and
                  Sandip Roy and
                  Eranga Bandara and
                  Sachin Shetty},
  title        = {Securing Age-of-Information (AoI)-Enabled 5G Smart Warehouse Using
                  Access Control Scheme},
  journal      = {{IEEE} Internet Things J.},
  volume       = {10},
  number       = {2},
  pages        = {1358--1375},
  year         = {2023},
  url          = {https://doi.org/10.1109/JIOT.2022.3205245},
  doi          = {10.1109/JIOT.2022.3205245},
  timestamp    = {Tue, 31 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/DasRBS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/MunirKASSPH23,
  author       = {Md. Shirajum Munir and
                  Ki Tae Kim and
                  Apurba Adhikary and
                  Walid Saad and
                  Sachin Shetty and
                  Seong{-}Bae Park and
                  Choong Seon Hong},
  title        = {Neuro-Symbolic Explainable Artificial Intelligence Twin for Zero-Touch
                  IoE in Wireless Network},
  journal      = {{IEEE} Internet Things J.},
  volume       = {10},
  number       = {24},
  pages        = {22451--22468},
  year         = {2023},
  url          = {https://doi.org/10.1109/JIOT.2023.3303713},
  doi          = {10.1109/JIOT.2023.3303713},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/MunirKASSPH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotm/BagchiBDSVK23,
  author       = {Prithwi Bagchi and
                  Basudeb Bera and
                  Ashok Kumar Das and
                  Sachin Shetty and
                  Pandi Vijayakumar and
                  Marimuthu Karuppiah},
  title        = {Post Quantum Lattice-Based Secure Framework using Aggregate Signature
                  for Ambient Intelligence Assisted Blockchain-Based IoT Applications},
  journal      = {{IEEE} Internet Things Mag.},
  volume       = {6},
  number       = {1},
  pages        = {52--58},
  year         = {2023},
  url          = {https://doi.org/10.1109/IOTM.001.2100215},
  doi          = {10.1109/IOTM.001.2100215},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotm/BagchiBDSVK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/BhattacharyaRCDS23,
  author       = {Munmun Bhattacharya and
                  Sandip Roy and
                  Samiran Chattopadhyay and
                  Ashok Kumar Das and
                  Sachin Shetty},
  title        = {A comprehensive survey on online social networks security and privacy
                  issues: Threats, machine learning-based solutions, and open challenges},
  journal      = {Secur. Priv.},
  volume       = {6},
  number       = {1},
  year         = {2023},
  url          = {https://doi.org/10.1002/spy2.275},
  doi          = {10.1002/SPY2.275},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/BhattacharyaRCDS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tce/WazidDS23,
  author       = {Mohammad Wazid and
                  Ashok Kumar Das and
                  Sachin Shetty},
  title        = {{BSFR-SH:} Blockchain-Enabled Security Framework Against Ransomware
                  Attacks for Smart Healthcare},
  journal      = {{IEEE} Trans. Consumer Electron.},
  volume       = {69},
  number       = {1},
  pages        = {18--28},
  year         = {2023},
  url          = {https://doi.org/10.1109/TCE.2022.3208795},
  doi          = {10.1109/TCE.2022.3208795},
  timestamp    = {Fri, 10 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tce/WazidDS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WazidDSRG23,
  author       = {Mohammad Wazid and
                  Ashok Kumar Das and
                  Sachin Shetty and
                  Joel J. P. C. Rodrigues and
                  Mohsen Guizani},
  title        = {{AISCM-FH:} AI-Enabled Secure Communication Mechanism in Fog Computing-Based
                  Healthcare},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {18},
  pages        = {319--334},
  year         = {2023},
  url          = {https://doi.org/10.1109/TIFS.2022.3220959},
  doi          = {10.1109/TIFS.2022.3220959},
  timestamp    = {Sun, 15 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/WazidDSRG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnse/WazidTSDS23,
  author       = {Mohammad Wazid and
                  Siddhant Thapliyal and
                  Devesh Pratap Singh and
                  Ashok Kumar Das and
                  Sachin Shetty},
  title        = {Design and Testbed Experiments of User Authentication and Key Establishment
                  Mechanism for Smart Healthcare Cyber Physical Systems},
  journal      = {{IEEE} Trans. Netw. Sci. Eng.},
  volume       = {10},
  number       = {5},
  pages        = {2697--2709},
  year         = {2023},
  url          = {https://doi.org/10.1109/TNSE.2022.3163201},
  doi          = {10.1109/TNSE.2022.3163201},
  timestamp    = {Sat, 14 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tnse/WazidTSDS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvt/PalaniswamyARDS23,
  author       = {Basker Palaniswamy and
                  Keyvan Ansari and
                  Alavalapati Goutham Reddy and
                  Ashok Kumar Das and
                  Sachin Shetty},
  title        = {Robust Certificateless Authentication Protocol for the {SAE} {J1939}
                  Commercial Vehicles Bus},
  journal      = {{IEEE} Trans. Veh. Technol.},
  volume       = {72},
  number       = {4},
  pages        = {4493--4509},
  year         = {2023},
  url          = {https://doi.org/10.1109/TVT.2022.3227281},
  doi          = {10.1109/TVT.2022.3227281},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tvt/PalaniswamyARDS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/annsim/SahabanduBFSMRL23,
  author       = {Nadini Sahabandu and
                  Eranga Bandara and
                  Peter Foytik and
                  Sachin Shetty and
                  Ravi Mukkamala and
                  Abdul Rahman and
                  Xueping Liang},
  editor       = {Mar{\'{\i}}a Julia Blas and
                  Gonzalo Alvarez},
  title        = {GreenThread - Blockchain, Non-Fungible Token(NFT), Model Cards, Self-Sovereign
                  Identity and {IPFS} Enabled Sustainable Circular Fashion Platform},
  booktitle    = {Annual Modeling and Simulation Conference, {ANNSIM} 2023, Hamilton,
                  ON, Canada, May 23-26, 2023},
  pages        = {357--243},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://ieeexplore.ieee.org/document/10155217},
  timestamp    = {Tue, 11 Jul 2023 11:40:10 +0200},
  biburl       = {https://dblp.org/rec/conf/annsim/SahabanduBFSMRL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/MpembeleRGS23,
  author       = {Armando B. Mpembele and
                  Tamara Rogers and
                  Uttam Ghosh and
                  Sachin Shetty},
  title        = {Communication-Efficient and Privacy-Preserving Edge-Cloud Framework
                  For Smart Healthcare},
  booktitle    = {{IEEE} Globecom Workshops 2023, Kuala Lumpur, Malaysia, December 4-8,
                  2023},
  pages        = {377--382},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/GCWkshps58843.2023.10464501},
  doi          = {10.1109/GCWKSHPS58843.2023.10464501},
  timestamp    = {Tue, 26 Mar 2024 22:14:40 +0100},
  biburl       = {https://dblp.org/rec/conf/globecom/MpembeleRGS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/MittalMWSDS23,
  author       = {Saksham Mittal and
                  Amit Kumar Mishra and
                  Mohammad Wazid and
                  Devesh Pratap Singh and
                  Ashok Kumar Das and
                  Sachin Shetty},
  title        = {Multiclass Classification Approaches for Intrusion Detection in IoT-Driven
                  Aerial Computing Environment},
  booktitle    = {{IEEE} Global Communications Conference, {GLOBECOM} 2023, Kuala Lumpur,
                  Malaysia, December 4-8, 2023},
  pages        = {2160--2165},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/GLOBECOM54140.2023.10436894},
  doi          = {10.1109/GLOBECOM54140.2023.10436894},
  timestamp    = {Sun, 10 Mar 2024 10:39:12 +0100},
  biburl       = {https://dblp.org/rec/conf/globecom/MittalMWSDS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/BouomLFSGK23,
  author       = {Aymar Le P{\`{e}}re Tchimwa Bouom and
                  Jean{-}Pierre Lienou and
                  Frederica Free{-}Nelson and
                  Sachin Shetty and
                  Wilson Ejuh Geh and
                  Charles A. Kamhoua},
  title        = {Cyber Resilience Measurement Through Logical Attack Graph Analysis},
  booktitle    = {{IEEE} International Conference on Communications, {ICC} 2023, Rome,
                  Italy, May 28 - June 1, 2023},
  pages        = {6034--6039},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICC45041.2023.10279750},
  doi          = {10.1109/ICC45041.2023.10279750},
  timestamp    = {Thu, 02 Nov 2023 17:09:41 +0100},
  biburl       = {https://dblp.org/rec/conf/icc/BouomLFSGK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccnc/BanerjeeGS23,
  author       = {Soumya Banerjee and
                  Sarada Prasad Gochhayat and
                  Sachin Shetty},
  title        = {Performance Analysis of Fixed Broadband Wireless Access in mmWave
                  Band in 5G},
  booktitle    = {International Conference on Computing, Networking and Communications,
                  {ICNC} 2023, Honolulu, HI, USA, February 20-22, 2023},
  pages        = {124--129},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICNC57223.2023.10074306},
  doi          = {10.1109/ICNC57223.2023.10074306},
  timestamp    = {Wed, 29 Mar 2023 17:46:17 +0200},
  biburl       = {https://dblp.org/rec/conf/iccnc/BanerjeeGS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccnc/HaqueSKG23,
  author       = {Md Ariful Haque and
                  Sachin Shetty and
                  Charles A. Kamhoua and
                  Kimberly Gold},
  title        = {Adversarial Technique Validation {\&} Defense Selection Using
                  Attack Graph {\&} ATT{\&}CK Matrix},
  booktitle    = {International Conference on Computing, Networking and Communications,
                  {ICNC} 2023, Honolulu, HI, USA, February 20-22, 2023},
  pages        = {181--187},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICNC57223.2023.10074241},
  doi          = {10.1109/ICNC57223.2023.10074241},
  timestamp    = {Wed, 29 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccnc/HaqueSKG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iri/ThakurRBHCS23,
  author       = {Dipanwita Thakur and
                  Sandip Roy and
                  Suparna Biswas and
                  Edmond S. L. Ho and
                  Samiran Chattopadhyay and
                  Sachin Shetty},
  title        = {A Novel Smartphone-Based Human Activity Recognition Approach using
                  Convolutional Autoencoder Long Short-Term Memory Network},
  booktitle    = {24th {IEEE} International Conference on Information Reuse and Integration
                  for Data Science, {IRI} 2023, Bellevue, WA, USA, August 4-6, 2023},
  pages        = {146--153},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/IRI58017.2023.00032},
  doi          = {10.1109/IRI58017.2023.00032},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iri/ThakurRBHCS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isncc/BandaraSFRMLS23,
  author       = {Eranga Bandara and
                  Sachin Shetty and
                  Peter Foytik and
                  Abdul Rahman and
                  Ravi Mukkamala and
                  Xueping Liang and
                  Nadini Sahabandu},
  title        = {Blockchain, NFT, Federated Learning and Model Cards enabled {UAV}
                  Surveillance System for 5G/6G Network Sliced Environment},
  booktitle    = {International Symposium on Networks, Computers and Communications,
                  {ISNCC} 2023, Doha, Qatar, October 23-26, 2023},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ISNCC58260.2023.10323641},
  doi          = {10.1109/ISNCC58260.2023.10323641},
  timestamp    = {Thu, 07 Dec 2023 20:38:52 +0100},
  biburl       = {https://dblp.org/rec/conf/isncc/BandaraSFRMLS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isncc/HasanS23,
  author       = {Mahmudul Hasan and
                  Sachin Shetty},
  title        = {Sentiment Analysis With Lipschitz Recurrent Neural Networks},
  booktitle    = {International Symposium on Networks, Computers and Communications,
                  {ISNCC} 2023, Doha, Qatar, October 23-26, 2023},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ISNCC58260.2023.10323619},
  doi          = {10.1109/ISNCC58260.2023.10323619},
  timestamp    = {Thu, 14 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isncc/HasanS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isncc/NipaLS23,
  author       = {Nishat Ara Nipa and
                  Yan Lu and
                  Sachin Shetty},
  title        = {U-Net Based Disaster Damage Detection Through Semantic Segmentation},
  booktitle    = {International Symposium on Networks, Computers and Communications,
                  {ISNCC} 2023, Doha, Qatar, October 23-26, 2023},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ISNCC58260.2023.10323958},
  doi          = {10.1109/ISNCC58260.2023.10323958},
  timestamp    = {Thu, 07 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isncc/NipaLS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isncc/SadehvandMGS23,
  author       = {Mehrdad Sadehvand and
                  Neda Moghim and
                  Behrouz Shahgholi Ghahfarokhi and
                  Sachin Shetty},
  title        = {Transmission Power Control for Interference Reduction in Cellular
                  {D2D} Networks},
  booktitle    = {International Symposium on Networks, Computers and Communications,
                  {ISNCC} 2023, Doha, Qatar, October 23-26, 2023},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ISNCC58260.2023.10323715},
  doi          = {10.1109/ISNCC58260.2023.10323715},
  timestamp    = {Thu, 07 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isncc/SadehvandMGS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobihoc/RoutraySSPCS23,
  author       = {Sidheswar Routray and
                  Amrit Suman and
                  Preetam Suman and
                  Sasmita Padhy and
                  Pushpita Chatterjee and
                  Sachin Shetty},
  editor       = {Jie Wu and
                  Suresh Subramaniam and
                  Bo Ji and
                  Carla{-}Fabiana Chiasserini},
  title        = {Vehicular Safety Revolution: {A} Cutting-Edge Communication Paradigm
                  for Accident Prevention},
  booktitle    = {Proceedings of the Twenty-fourth International Symposium on Theory,
                  Algorithmic Foundations, and Protocol Design for Mobile Networks and
                  Mobile Computing, MobiHoc 2023, Washington, DC, USA, October 23-26,
                  2023},
  pages        = {406--411},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3565287.3623389},
  doi          = {10.1145/3565287.3623389},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mobihoc/RoutraySSPCS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wowmom/GhoshDCS23,
  author       = {Uttam Ghosh and
                  Debashis Das and
                  Pushpita Chatterjee and
                  Sachin Shetty},
  title        = {Quantum-Enabled Blockchain for Data Processing and Management in Smart
                  Cities},
  booktitle    = {24th {IEEE} International Symposium on a World of Wireless, Mobile
                  and Multimedia Networks, WoWMoM 2023, Boston, MA, USA, June 12-15,
                  2023},
  pages        = {425--430},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/WoWMoM57956.2023.00075},
  doi          = {10.1109/WOWMOM57956.2023.00075},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wowmom/GhoshDCS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wsc/MunirSR23,
  author       = {Md. Shirajum Munir and
                  Sachin Shetty and
                  Danda B. Rawat},
  title        = {Trustworthy Artificial Intelligence Framework for Proactive Detection
                  and Risk Explanation of Cyber Attacks in Smart Grid},
  booktitle    = {Winter Simulation Conference, {WSC} 2023, San Antonio, TX, USA, December
                  10-13, 2023},
  pages        = {636--647},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/WSC60868.2023.10408676},
  doi          = {10.1109/WSC60868.2023.10408676},
  timestamp    = {Sat, 24 Feb 2024 20:42:44 +0100},
  biburl       = {https://dblp.org/rec/conf/wsc/MunirSR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2306-07993,
  author       = {Md. Shirajum Munir and
                  Sachin Shetty and
                  Danda B. Rawat},
  title        = {Trustworthy Artificial Intelligence Framework for Proactive Detection
                  and Risk Explanation of Cyber Attacks in Smart Grid},
  journal      = {CoRR},
  volume       = {abs/2306.07993},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2306.07993},
  doi          = {10.48550/ARXIV.2306.07993},
  eprinttype    = {arXiv},
  eprint       = {2306.07993},
  timestamp    = {Sun, 18 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2306-07993.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2311-17097,
  author       = {Ying Wang and
                  Shashank Jere and
                  Soumya Banerjee and
                  Lingjia Liu and
                  Sachin Shetty and
                  Shehadi Dayekh},
  title        = {Anonymous Jamming Detection in 5G with Bayesian Network Model Based
                  Inference Analysis},
  journal      = {CoRR},
  volume       = {abs/2311.17097},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2311.17097},
  doi          = {10.48550/ARXIV.2311.17097},
  eprinttype    = {arXiv},
  eprint       = {2311.17097},
  timestamp    = {Tue, 05 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2311-17097.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2312-00051,
  author       = {Soumya Banerjee and
                  Sandip Roy and
                  Sayyed Farid Ahamed and
                  Devin Quinn and
                  Marc Vucovich and
                  Dhruv Nandakumar and
                  Kevin Choi and
                  Abdul Rahman and
                  Edward Bowen and
                  Sachin Shetty},
  title        = {{MIA-BAD:} An Approach for Enhancing Membership Inference Attack and
                  its Mitigation with Federated Learning},
  journal      = {CoRR},
  volume       = {abs/2312.00051},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2312.00051},
  doi          = {10.48550/ARXIV.2312.00051},
  eprinttype    = {arXiv},
  eprint       = {2312.00051},
  timestamp    = {Fri, 08 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2312-00051.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2312-09467,
  author       = {Soumya Banerjee and
                  Sarada Prasad Gochhayat and
                  Sachin Shetty},
  title        = {Performance Analysis of Fixed Broadband Wireless Access in mmWave
                  Band in 5G},
  journal      = {CoRR},
  volume       = {abs/2312.09467},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2312.09467},
  doi          = {10.48550/ARXIV.2312.09467},
  eprinttype    = {arXiv},
  eprint       = {2312.09467},
  timestamp    = {Tue, 09 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2312-09467.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/WazidSDSKR22,
  author       = {Mohammad Wazid and
                  Jaskaran Singh and
                  Ashok Kumar Das and
                  Sachin Shetty and
                  Muhammad Khurram Khan and
                  Joel J. P. C. Rodrigues},
  title        = {ASCP-IoMT: AI-Enabled Lightweight Secure Communication Protocol for
                  Internet of Medical Things},
  journal      = {{IEEE} Access},
  volume       = {10},
  pages        = {57990--58004},
  year         = {2022},
  url          = {https://doi.org/10.1109/ACCESS.2022.3179418},
  doi          = {10.1109/ACCESS.2022.3179418},
  timestamp    = {Mon, 13 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/WazidSDSKR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adhoc/TanS22,
  author       = {Le Thanh Tan and
                  Sachin Shetty},
  title        = {Artificial intelligence-aided privacy preserving trustworthy computation
                  and communication in 5G-based IoT networks},
  journal      = {Ad Hoc Networks},
  volume       = {126},
  pages        = {102752},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.adhoc.2021.102752},
  doi          = {10.1016/J.ADHOC.2021.102752},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/adhoc/TanS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/ShettyWGD22,
  author       = {Sachin S. Shetty and
                  Jhing{-}Fa Wang and
                  Uttam Ghosh and
                  Schahram Dustdar},
  title        = {Guest Editorial Special Issue on Secure Data Analytics for Emerging
                  Internet of Things},
  journal      = {{IEEE} Internet Things J.},
  volume       = {9},
  number       = {4},
  pages        = {2463--2467},
  year         = {2022},
  url          = {https://doi.org/10.1109/JIOT.2021.3126438},
  doi          = {10.1109/JIOT.2021.3126438},
  timestamp    = {Wed, 23 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/ShettyWGD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/WazidDS22,
  author       = {Mohammad Wazid and
                  Ashok Kumar Das and
                  Sachin Shetty},
  title        = {TACAS-IoT: Trust Aggregation Certificate-Based Authentication Scheme
                  for Edge-Enabled IoT Systems},
  journal      = {{IEEE} Internet Things J.},
  volume       = {9},
  number       = {22},
  pages        = {22643--22656},
  year         = {2022},
  url          = {https://doi.org/10.1109/JIOT.2022.3181610},
  doi          = {10.1109/JIOT.2022.3181610},
  timestamp    = {Sun, 13 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/WazidDS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jbft/BandaraSMLFRZ22,
  author       = {Eranga Bandara and
                  Sachin Shetty and
                  Ravi Mukkamala and
                  Xueping Liang and
                  Peter Foytik and
                  Nalin Ranasinghe and
                  Kasun De Zoysa},
  title        = {Casper: a blockchain-based system for efficient and secure customer
                  credential verification},
  journal      = {J. Bank. Financial Technol.},
  volume       = {6},
  number       = {1},
  pages        = {43--62},
  year         = {2022},
  url          = {https://doi.org/10.1007/s42786-021-00036-3},
  doi          = {10.1007/S42786-021-00036-3},
  timestamp    = {Fri, 01 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jbft/BandaraSMLFRZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jgim/HeZWLS22,
  author       = {Wu He and
                  Zuopeng Justin Zhang and
                  Huanmei Wu and
                  Wenzhuo Li and
                  Sachin Shetty},
  title        = {A Unified Health Information System Framework for Connecting Data,
                  People, Devices, and Systems},
  journal      = {J. Glob. Inf. Manag.},
  volume       = {30},
  number       = {11},
  pages        = {1--19},
  year         = {2022},
  url          = {https://doi.org/10.4018/jgim.305239},
  doi          = {10.4018/JGIM.305239},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jgim/HeZWLS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amcis/0001HSHT22,
  author       = {Justin Zhang and
                  Wu He and
                  Sachin Shetty and
                  Yuming He and
                  Xin Tian},
  editor       = {Gordan Davis and
                  Sue Brown and
                  Mani R. Subramani and
                  Gove N. Allen and
                  K. D. Joshi and
                  Kevin P. Scheibe},
  title        = {A Proposed Framework for the Governance of Blockchain Technology},
  booktitle    = {28th Americas Conference on Information Systems, {AMCIS} 2022, Minneapolis,
                  MN, USA, August 10-14, 2022},
  publisher    = {Association for Information Systems},
  year         = {2022},
  url          = {https://aisel.aisnet.org/amcis2022/sig\_egov/sig\_egov/1},
  timestamp    = {Tue, 14 Feb 2023 11:57:54 +0100},
  biburl       = {https://dblp.org/rec/conf/amcis/0001HSHT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/annsim/BandaraSMRL22,
  author       = {Eranga Bandara and
                  Sachin Shetty and
                  Ravi Mukkamala and
                  Abdul Rahaman and
                  Xueping Liang},
  editor       = {Cristina Ruiz Martin and
                  Niloufar Emami and
                  Mar{\'{\i}}a Julia Blas and
                  Roya Rezaee},
  title        = {{LUUNU} - Blockchain, MISP, Model Cards and Federated Learning Enabled
                  Cyber Threat Intelligence Sharing Platform},
  booktitle    = {Annual Modeling and Simulation Conference, {ANNSIM} 2022, San Diego,
                  CA, USA, July 18-20, 2022},
  pages        = {235--245},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.23919/ANNSIM55834.2022.9859355},
  doi          = {10.23919/ANNSIM55834.2022.9859355},
  timestamp    = {Fri, 02 Sep 2022 18:51:53 +0200},
  biburl       = {https://dblp.org/rec/conf/annsim/BandaraSMRL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccnc/AminFSDG22,
  author       = {Md Ali Reza Al Amin and
                  Peter Foytik and
                  Sachin Shetty and
                  Jessica Dorismond and
                  Marco A. Gamarra},
  title        = {Deception for Characterizing Adversarial Strategies in Complex Networked
                  Systems},
  booktitle    = {19th {IEEE} Annual Consumer Communications {\&} Networking Conference,
                  {CCNC} 2022, Las Vegas, NV, USA, January 8-11, 2022},
  pages        = {429--432},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CCNC49033.2022.9700549},
  doi          = {10.1109/CCNC49033.2022.9700549},
  timestamp    = {Mon, 28 Aug 2023 21:17:27 +0200},
  biburl       = {https://dblp.org/rec/conf/ccnc/AminFSDG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccnc/BandaraSRM0L22,
  author       = {Eranga Bandara and
                  Sachin Shetty and
                  Abdul Rahman and
                  Ravi Mukkamala and
                  Juan Zhao and
                  Xueping Liang},
  title        = {Bassa-ML - {A} Blockchain and Model Card Integrated Federated Learning
                  Provenance Platform},
  booktitle    = {19th {IEEE} Annual Consumer Communications {\&} Networking Conference,
                  {CCNC} 2022, Las Vegas, NV, USA, January 8-11, 2022},
  pages        = {753--759},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CCNC49033.2022.9700513},
  doi          = {10.1109/CCNC49033.2022.9700513},
  timestamp    = {Mon, 14 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccnc/BandaraSRM0L22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hpsr/WangJBLSD22,
  author       = {Ying Wang and
                  Shashank Jere and
                  Soumya Banerjee and
                  Lingjia Liu and
                  Sachin Shetty and
                  Shehadi Dayekh},
  title        = {Anonymous Jamming Detection in 5G with Bayesian Network Model Based
                  Inference Analysis},
  booktitle    = {23rd {IEEE} International Conference on High Performance Switching
                  and Routing, {HPSR} 2022, Taicang, Jiangsu, China, June 6-8, 2022},
  pages        = {151--156},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/HPSR54439.2022.9831286},
  doi          = {10.1109/HPSR54439.2022.9831286},
  timestamp    = {Mon, 01 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hpsr/WangJBLSD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccn/HasanSIA22,
  author       = {Kamrul Hasan and
                  Sachin Shetty and
                  Tariqul Islam and
                  Imtiaz Ahmed},
  title        = {Predictive Cyber Defense Remediation against Advanced Persistent Threat
                  in Cyber-Physical Systems},
  booktitle    = {31st International Conference on Computer Communications and Networks,
                  {ICCCN} 2022, Honolulu, HI, USA, July 25-28, 2022},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ICCCN54977.2022.9868886},
  doi          = {10.1109/ICCCN54977.2022.9868886},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icccn/HasanSIA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ijcnn/ZalamedaKGWSI22,
  author       = {Joseph Zalameda and
                  Brady Kruse and
                  Alexander Glandon and
                  Megan A. Witherow and
                  Sachin Shetty and
                  Khan M. Iftekharuddin},
  title        = {Generalized Adversarial and Hierarchical Co-occurrence Network based
                  Synthetic Skeleton Generation and Human Identity Recognition},
  booktitle    = {International Joint Conference on Neural Networks, {IJCNN} 2022, Padua,
                  Italy, July 18-23, 2022},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/IJCNN55064.2022.9892887},
  doi          = {10.1109/IJCNN55064.2022.9892887},
  timestamp    = {Mon, 10 Oct 2022 17:40:09 +0200},
  biburl       = {https://dblp.org/rec/conf/ijcnn/ZalamedaKGWSI22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/milcom/HaqueSKG22,
  author       = {Md Ariful Haque and
                  Sachin Shetty and
                  Charles A. Kamhoua and
                  Kimberly Gold},
  title        = {Attack Graph Embedded Machine Learning Platform For Cyber Situational
                  Awareness},
  booktitle    = {{IEEE} Military Communications Conference, {MILCOM} 2022, Rockville,
                  MD, USA, November 28 - December 2, 2022},
  pages        = {464--469},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/MILCOM55135.2022.10017837},
  doi          = {10.1109/MILCOM55135.2022.10017837},
  timestamp    = {Wed, 08 Feb 2023 17:46:14 +0100},
  biburl       = {https://dblp.org/rec/conf/milcom/HaqueSKG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/milcom/BandaraSMRFLN22,
  author       = {Eranga Bandara and
                  Sachin Shetty and
                  Ravi Mukkamala and
                  Abdul Rahman and
                  Peter Foytik and
                  Xueping Liang and
                  Wee Keong Ng},
  title        = {Kaputa - Blockchain, Non-Fungible Token and Model Card Integrated
                  5G/6G Network Slice Broker and Marketplace},
  booktitle    = {{IEEE} Military Communications Conference, {MILCOM} 2022, Rockville,
                  MD, USA, November 28 - December 2, 2022},
  pages        = {559--564},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/MILCOM55135.2022.10017900},
  doi          = {10.1109/MILCOM55135.2022.10017900},
  timestamp    = {Wed, 08 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/milcom/BandaraSMRFLN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secon/BandaraLSMRN22,
  author       = {Eranga Bandara and
                  Xueping Liang and
                  Sachin Shetty and
                  Ravi Mukkamala and
                  Abdul Rahman and
                  Wee Keong Ng},
  title        = {Skunk - {A} Blockchain and Zero Trust Security Enabled Federated Learning
                  Platform for 5G/6G Network Slicing},
  booktitle    = {19th Annual {IEEE} International Conference on Sensing, Communication,
                  and Networking, {SECON} 2022, Stockholm, Sweden, September 20-23,
                  2022},
  pages        = {109--117},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/SECON55815.2022.9918536},
  doi          = {10.1109/SECON55815.2022.9918536},
  timestamp    = {Fri, 04 Nov 2022 13:53:28 +0100},
  biburl       = {https://dblp.org/rec/conf/secon/BandaraLSMRN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/AminSFO22,
  author       = {Md Ali Reza Al Amin and
                  Sachin Shetty and
                  Valerio Formicola and
                  Martin Otto},
  editor       = {Fengjun Li and
                  Kaitai Liang and
                  Zhiqiang Lin and
                  Sokratis K. Katsikas},
  title        = {Assessing the Quality of Differentially Private Synthetic Data for
                  Intrusion Detection},
  booktitle    = {Security and Privacy in Communication Networks - 18th {EAI} International
                  Conference, SecureComm 2022, Virtual Event, October 2022, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {462},
  pages        = {473--490},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-25538-0\_25},
  doi          = {10.1007/978-3-031-25538-0\_25},
  timestamp    = {Tue, 11 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/AminSFO22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnc/BandaraSRML22,
  author       = {Eranga Bandara and
                  Sachin Shetty and
                  Abdul Rahman and
                  Ravi Mukkamala and
                  Xueping Liang},
  title        = {Moose: {A} Scalable Blockchain Architecture for 5G Enabled IoT with
                  Sharding and Network Slicing},
  booktitle    = {{IEEE} Wireless Communications and Networking Conference, {WCNC} 2022,
                  Austin, TX, USA, April 10-13, 2022},
  pages        = {1194--1199},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/WCNC51071.2022.9771885},
  doi          = {10.1109/WCNC51071.2022.9771885},
  timestamp    = {Tue, 24 May 2022 15:39:22 +0200},
  biburl       = {https://dblp.org/rec/conf/wcnc/BandaraSRML22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wsc/AminSK22,
  author       = {Md Ali Reza Al Amin and
                  Sachin Shetty and
                  Charles A. Kamhoua},
  title        = {Cyber Deception Metrics For Interconnected Complex Systems},
  booktitle    = {Winter Simulation Conference, {WSC} 2022, Singapore, December 11-14,
                  2022},
  pages        = {473--483},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/WSC57314.2022.10015347},
  doi          = {10.1109/WSC57314.2022.10015347},
  timestamp    = {Wed, 08 Feb 2023 22:09:21 +0100},
  biburl       = {https://dblp.org/rec/conf/wsc/AminSK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wsc/LuS22,
  author       = {Yan Lu and
                  Sachin Shetty},
  title        = {Towards {AI} Robustness Multi-Agent Adversarial Planning in Game Play},
  booktitle    = {Winter Simulation Conference, {WSC} 2022, Singapore, December 11-14,
                  2022},
  pages        = {2653--2662},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/WSC57314.2022.10015292},
  doi          = {10.1109/WSC57314.2022.10015292},
  timestamp    = {Wed, 08 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wsc/LuS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2210-06649,
  author       = {Md. Shirajum Munir and
                  Ki Tae Kim and
                  Apurba Adhikary and
                  Walid Saad and
                  Sachin Shetty and
                  Seong{-}Bae Park and
                  Choong Seon Hong},
  title        = {Neuro-symbolic Explainable Artificial Intelligence Twin for Zero-touch
                  IoE in Wireless Network},
  journal      = {CoRR},
  volume       = {abs/2210.06649},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2210.06649},
  doi          = {10.48550/ARXIV.2210.06649},
  eprinttype    = {arXiv},
  eprint       = {2210.06649},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2210-06649.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/WazidDSGR21,
  author       = {Mohammad Wazid and
                  Ashok Kumar Das and
                  Sachin Shetty and
                  Prosanta Gope and
                  Joel J. P. C. Rodrigues},
  title        = {Security in 5G-Enabled Internet of Things Communication: Issues, Challenges,
                  and Future Research Roadmap},
  journal      = {{IEEE} Access},
  volume       = {9},
  pages        = {4466--4489},
  year         = {2021},
  url          = {https://doi.org/10.1109/ACCESS.2020.3047895},
  doi          = {10.1109/ACCESS.2020.3047895},
  timestamp    = {Tue, 26 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/WazidDSGR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/AminSNTK21,
  author       = {Md Ali Reza Al Amin and
                  Sachin Shetty and
                  Laurent Njilla and
                  Deepak K. Tosh and
                  Charles A. Kamhoua},
  title        = {Hidden Markov Model and Cyber Deception for the Prevention of Adversarial
                  Lateral Movement},
  journal      = {{IEEE} Access},
  volume       = {9},
  pages        = {49662--49682},
  year         = {2021},
  url          = {https://doi.org/10.1109/ACCESS.2021.3069105},
  doi          = {10.1109/ACCESS.2021.3069105},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/AminSNTK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecurity/KavakPVDGS21,
  author       = {Hamdi Kavak and
                  Jose J. Padilla and
                  Daniele Vernon{-}Bido and
                  Saikou Y. Diallo and
                  Ross Gore and
                  Sachin Shetty},
  title        = {Simulation for cybersecurity: state of the art and future directions},
  journal      = {J. Cybersecur.},
  volume       = {7},
  number       = {1},
  year         = {2021},
  url          = {https://doi.org/10.1093/cybsec/tyab005},
  doi          = {10.1093/CYBSEC/TYAB005},
  timestamp    = {Wed, 07 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cybersecurity/KavakPVDGS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fbloc/BandaraSTL21,
  author       = {Eranga Bandara and
                  Sachin Shetty and
                  Deepak K. Tosh and
                  Xueping Liang},
  title        = {Vind: {A} Blockchain-Enabled Supply Chain Provenance Framework for
                  Energy Delivery Systems},
  journal      = {Frontiers Blockchain},
  volume       = {4},
  pages        = {607320},
  year         = {2021},
  url          = {https://doi.org/10.3389/fbloc.2021.607320},
  doi          = {10.3389/FBLOC.2021.607320},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fbloc/BandaraSTL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/BandaraTFSRZ21,
  author       = {Eranga Bandara and
                  Deepak K. Tosh and
                  Peter Foytik and
                  Sachin Shetty and
                  Nalin Ranasinghe and
                  Kasun De Zoysa},
  title        = {Tikiri - Towards a lightweight blockchain for IoT},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {119},
  pages        = {154--165},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.future.2021.02.006},
  doi          = {10.1016/J.FUTURE.2021.02.006},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fgcs/BandaraTFSRZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/LiangSTFZ21,
  author       = {Xueping Liang and
                  Sachin Shetty and
                  Deepak K. Tosh and
                  Peter Foytik and
                  Lingchen Zhang},
  title        = {Leveraging Intel {SGX} to enable trusted and privacy preserving membership
                  service in distributed ledgers},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {16},
  number       = {1/2},
  pages        = {63--83},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJICS.2021.117395},
  doi          = {10.1504/IJICS.2021.117395},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijics/LiangSTFZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipm/BandaraLFSHBRZ21,
  author       = {Eranga Bandara and
                  Xueping Liang and
                  Peter Foytik and
                  Sachin Shetty and
                  Crissie Hall and
                  Daniel Bowden and
                  Nalin Ranasinghe and
                  Kasun De Zoysa},
  title        = {A blockchain empowered and privacy preserving digital contact tracing
                  platform},
  journal      = {Inf. Process. Manag.},
  volume       = {58},
  number       = {4},
  pages        = {102572},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.ipm.2021.102572},
  doi          = {10.1016/J.IPM.2021.102572},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipm/BandaraLFSHBRZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsa/BandaraLFSRZ21,
  author       = {Eranga Bandara and
                  Xueping Liang and
                  Peter Foytik and
                  Sachin Shetty and
                  Nalin Ranasinghe and
                  Kasun De Zoysa},
  title        = {Rahasak - Scalable blockchain architecture for enterprise applications},
  journal      = {J. Syst. Archit.},
  volume       = {116},
  pages        = {102061},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.sysarc.2021.102061},
  doi          = {10.1016/J.SYSARC.2021.102061},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsa/BandaraLFSRZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/ImoizeATS21,
  author       = {Agbotiname Lucky Imoize and
                  Oluwadara Adedeji and
                  Nistha Tandiya and
                  Sachin Shetty},
  title        = {6G Enabled Smart Infrastructure for Sustainable Society: Opportunities,
                  Challenges, and Research Roadmap},
  journal      = {Sensors},
  volume       = {21},
  number       = {5},
  pages        = {1709},
  year         = {2021},
  url          = {https://doi.org/10.3390/s21051709},
  doi          = {10.3390/S21051709},
  timestamp    = {Thu, 29 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/ImoizeATS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/HasanSUHI21,
  author       = {Kamrul Hasan and
                  Sachin Shetty and
                  Sharif Ullah and
                  Amin Hassanzadeh and
                  Tariqul Islam},
  title        = {Criticality based Optimal Cyber Defense Remediation in Energy Delivery
                  Systems},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {8},
  number       = {28},
  pages        = {e5},
  year         = {2021},
  url          = {https://doi.org/10.4108/eai.10-9-2021.170949},
  doi          = {10.4108/EAI.10-9-2021.170949},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sesa/HasanSUHI21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/annsim/DavenportS21,
  author       = {Amanda Davenport and
                  Sachin Shetty},
  editor       = {Cristina Ruiz Martin and
                  Mar{\'{\i}}a Julia Blas and
                  Alonso Inostrosa{-}Psijas},
  title        = {Comparative Analysis of Elliptic Curve and Lattice Based Cryptography},
  booktitle    = {Annual Modeling and Simulation Conference, {ANNSIM} 2021, Virtual
                  Event / Fairfax, VA, USA, July 19-22, 2021},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.23919/ANNSIM52504.2021.9552144},
  doi          = {10.23919/ANNSIM52504.2021.9552144},
  timestamp    = {Wed, 13 Oct 2021 15:47:26 +0200},
  biburl       = {https://dblp.org/rec/conf/annsim/DavenportS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/blockchain2/BandaraTSK21,
  author       = {Eranga Bandara and
                  Deepak K. Tosh and
                  Sachin Shetty and
                  Bheshaj Krishnappa},
  editor       = {Yang Xiang and
                  Ziyuan Wang and
                  Honggang Wang and
                  Valtteri Niemi},
  title        = {CySCPro - Cyber Supply Chain Provenance Framework for Risk Management
                  of Energy Delivery Systems},
  booktitle    = {2021 {IEEE} International Conference on Blockchain, Blockchain 2021,
                  Melbourne, Australia, December 6-8, 2021},
  pages        = {65--72},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/Blockchain53845.2021.00020},
  doi          = {10.1109/BLOCKCHAIN53845.2021.00020},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/blockchain2/BandaraTSK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/euc/YuchiYDLGS21,
  author       = {Xuebiao Yuchi and
                  Zhiwei Yan and
                  Kejun Dong and
                  Hongtao Li and
                  Guanggang Geng and
                  Sachin Shetty},
  editor       = {Shaohua Wan and
                  Xiaochun Cheng and
                  Celimuge Wu},
  title        = {Dealing with the Domain Name Abuse: Issues and Approaches},
  booktitle    = {19th {IEEE} International Conference on Embedded and Ubiquitous Computing,
                  {EUC} 2021, Shenyang, China, October 20-22, 2021},
  pages        = {166--173},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/EUC53437.2021.00032},
  doi          = {10.1109/EUC53437.2021.00032},
  timestamp    = {Tue, 20 Feb 2024 19:40:20 +0100},
  biburl       = {https://dblp.org/rec/conf/euc/YuchiYDLGS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/AhamedASLF21,
  author       = {Sayyed Farid Ahamed and
                  Priyanka Aggarwal and
                  Sachin Shetty and
                  Erin Lanus and
                  Laura J. Freeman},
  title        = {{ATTL:} An Automated Targeted Transfer Learning with Deep Neural Networks},
  booktitle    = {{IEEE} Global Communications Conference, {GLOBECOM} 2021, Madrid,
                  Spain, December 7-11, 2021},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/GLOBECOM46510.2021.9685826},
  doi          = {10.1109/GLOBECOM46510.2021.9685826},
  timestamp    = {Mon, 07 Feb 2022 09:24:07 +0100},
  biburl       = {https://dblp.org/rec/conf/globecom/AhamedASLF21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccn/BandaraLFSZ21,
  author       = {Eranga Bandara and
                  Xueping Liang and
                  Peter Foytik and
                  Sachin Shetty and
                  Kasun De Zoysa},
  title        = {A Blockchain and Self-Sovereign Identity Empowered Digital Identity
                  Platform},
  booktitle    = {30th International Conference on Computer Communications and Networks,
                  {ICCCN} 2021, Athens, Greece, July 19-22, 2021},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ICCCN52240.2021.9522184},
  doi          = {10.1109/ICCCN52240.2021.9522184},
  timestamp    = {Wed, 22 Sep 2021 16:08:30 +0200},
  biburl       = {https://dblp.org/rec/conf/icccn/BandaraLFSZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iri/LuS21,
  author       = {Yan Lu and
                  Sachin Shetty},
  title        = {Multi-Class Malware Classification Using Deep Residual Network with
                  Non-SoftMax Classifier},
  booktitle    = {22nd {IEEE} International Conference on Information Reuse and Integration
                  for Data Science, {IRI} 2021, Las Vegas, NV, USA, August 10-12, 2021},
  pages        = {201--207},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/IRI51335.2021.00033},
  doi          = {10.1109/IRI51335.2021.00033},
  timestamp    = {Tue, 23 Nov 2021 09:27:31 +0100},
  biburl       = {https://dblp.org/rec/conf/iri/LuS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/milcom/BandaraSRM21,
  author       = {Eranga Bandara and
                  Sachin Shetty and
                  Abdul Rahman and
                  Ravi Mukkamala},
  title        = {Let'sTrace - Blockchain, Federated Learning and TUF/In-ToTo Enabled
                  Cyber Supply Chain Provenance Platform},
  booktitle    = {2021 {IEEE} Military Communications Conference, {MILCOM} 2021, San
                  Diego, CA, USA, November 29 - Dec. 2, 2021},
  pages        = {470--476},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/MILCOM52596.2021.9653024},
  doi          = {10.1109/MILCOM52596.2021.9653024},
  timestamp    = {Wed, 12 Jan 2022 09:10:31 +0100},
  biburl       = {https://dblp.org/rec/conf/milcom/BandaraSRM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sai/BandaraLFSRZN21,
  author       = {Eranga Bandara and
                  Xueping Liang and
                  Peter Foytik and
                  Sachin Shetty and
                  Nalin Ranasinghe and
                  Kasun De Zoysa and
                  Wee Keong Ng},
  editor       = {Kohei Arai},
  title        = {Promize - Blockchain and Self Sovereign Identity Empowered Mobile
                  {ATM} Platform},
  booktitle    = {Intelligent Computing - Proceedings of the 2021 Computing Conference,
                  Volume 2, {SAI} 2021, Virtual Event, 15-16 July, 2021},
  series       = {Lecture Notes in Networks and Systems},
  volume       = {284},
  pages        = {891--911},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-80126-7\_63},
  doi          = {10.1007/978-3-030-80126-7\_63},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sai/BandaraLFSRZN21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/smartcomp/BandaraLFS21,
  author       = {Eranga Bandara and
                  Xueping Liang and
                  Peter Foytik and
                  Sachin Shetty},
  title        = {Blockchain and Self-Sovereign Identity Empowered Cyber Threat Information
                  Sharing Platform},
  booktitle    = {{IEEE} International Conference on Smart Computing, {SMARTCOMP} 2021,
                  Irvine, CA, USA, August 23-27, 2021},
  pages        = {258--263},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/SMARTCOMP52413.2021.00057},
  doi          = {10.1109/SMARTCOMP52413.2021.00057},
  timestamp    = {Tue, 12 Oct 2021 18:03:31 +0200},
  biburl       = {https://dblp.org/rec/conf/smartcomp/BandaraLFS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/smartgridcomm/RiveraTS21,
  author       = {Abel O. Gomez Rivera and
                  Deepak K. Tosh and
                  Sachin Shetty},
  title        = {Achieving Runtime State Verification Assurance in Critical Cyber-Physical
                  Infrastructures},
  booktitle    = {{IEEE} International Conference on Communications, Control, and Computing
                  Technologies for Smart Grids, SmartGridComm 2021, Aachen, Germany,
                  October 25-28, 2021},
  pages        = {245--251},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/SmartGridComm51999.2021.9632340},
  doi          = {10.1109/SMARTGRIDCOMM51999.2021.9632340},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/smartgridcomm/RiveraTS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tpsisa/KamhouaBFAS21,
  author       = {Georges A. Kamhoua and
                  Eranga Bandara and
                  Peter Foytik and
                  Priyanka Aggarwal and
                  Sachin Shetty},
  title        = {Resilient and Verifiable Federated Learning against Byzantine Colluding
                  Attacks},
  booktitle    = {3rd {IEEE} International Conference on Trust, Privacy and Security
                  in Intelligent Systems and Applications, {TPS-ISA} 2021, Atlanta,
                  GA, USA, December 13-15, 2021},
  pages        = {31--40},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/TPSISA52974.2021.00004},
  doi          = {10.1109/TPSISA52974.2021.00004},
  timestamp    = {Thu, 21 Apr 2022 16:21:01 +0200},
  biburl       = {https://dblp.org/rec/conf/tpsisa/KamhouaBFAS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tpsisa/AggarwalASF21,
  author       = {Priyanka Aggarwal and
                  Sayyed Farid Ahamed and
                  Sachin Shetty and
                  Laura J. Freeman},
  title        = {Selective Targeted Transfer Learning for Malware Classification},
  booktitle    = {3rd {IEEE} International Conference on Trust, Privacy and Security
                  in Intelligent Systems and Applications, {TPS-ISA} 2021, Atlanta,
                  GA, USA, December 13-15, 2021},
  pages        = {114--120},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/TPSISA52974.2021.00013},
  doi          = {10.1109/TPSISA52974.2021.00013},
  timestamp    = {Thu, 21 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tpsisa/AggarwalASF21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/WazidDSJ20,
  author       = {Mohammad Wazid and
                  Ashok Kumar Das and
                  Sachin Shetty and
                  Minho Jo},
  title        = {A Tutorial and Future Research for Building a Blockchain-Based Secure
                  Communication Scheme for Internet of Intelligent Things},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {88700--88716},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.2992467},
  doi          = {10.1109/ACCESS.2020.2992467},
  timestamp    = {Tue, 16 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/WazidDSJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/GochhayatSMFKN20,
  author       = {Sarada Prasad Gochhayat and
                  Sachin Shetty and
                  Ravi Mukkamala and
                  Peter Foytik and
                  Georges A. Kamhoua and
                  Laurent Njilla},
  title        = {Measuring Decentrality in Blockchain Based Systems},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {178372--178390},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.3026577},
  doi          = {10.1109/ACCESS.2020.3026577},
  timestamp    = {Tue, 20 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/GochhayatSMFKN20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comsur/SaadSNKSNM20,
  author       = {Muhammad Saad and
                  Jeffrey Spaulding and
                  Laurent Njilla and
                  Charles A. Kamhoua and
                  Sachin Shetty and
                  DaeHun Nyang and
                  David Mohaisen},
  title        = {Exploring the Attack Surface of Blockchain: {A} Comprehensive Survey},
  journal      = {{IEEE} Commun. Surv. Tutorials},
  volume       = {22},
  number       = {3},
  pages        = {1977--2008},
  year         = {2020},
  url          = {https://doi.org/10.1109/COMST.2020.2975999},
  doi          = {10.1109/COMST.2020.2975999},
  timestamp    = {Tue, 20 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comsur/SaadSNKSNM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/HaqueSKG20,
  author       = {Md Ariful Haque and
                  Sachin Shetty and
                  Charles A. Kamhoua and
                  Kimberly Gold},
  title        = {Integrating Mission-Centric Impact Assessment to Operational Resiliency
                  in Cyber-Physical Systems},
  booktitle    = {{IEEE} Global Communications Conference, {GLOBECOM} 2020, Virtual
                  Event, Taiwan, December 7-11, 2020},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/GLOBECOM42002.2020.9322321},
  doi          = {10.1109/GLOBECOM42002.2020.9322321},
  timestamp    = {Mon, 01 Feb 2021 08:43:43 +0100},
  biburl       = {https://dblp.org/rec/conf/globecom/HaqueSKG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icbc/BandaraLSNFRZLL20,
  author       = {Eranga Bandara and
                  Xueping Liang and
                  Sachin Shetty and
                  Wee Keong Ng and
                  Peter Foytik and
                  Nalin Ranasinghe and
                  Kasun De Zoysa and
                  B{\aa}rd Lang{\"{o}}y and
                  David Larsson},
  editor       = {Zhixiong Chen and
                  Laizhong Cui and
                  Balaji Palanisamy and
                  Liang{-}Jie Zhang},
  title        = {Lekana - Blockchain Based Archive Storage for Large-Scale Cloud Systems},
  booktitle    = {Blockchain - {ICBC} 2020 - Third International Conference, Held as
                  Part of the Services Conference Federation, {SCF} 2020, Honolulu,
                  HI, USA, September 18-20, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12404},
  pages        = {169--184},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-59638-5\_12},
  doi          = {10.1007/978-3-030-59638-5\_12},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icbc/BandaraLSNFRZLL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/WazidDSR20,
  author       = {Mohammad Wazid and
                  Ashok Kumar Das and
                  Sachin Shetty and
                  Joel J. P. C. Rodrigues},
  title        = {On the Design of Secure Communication Framework for Blockchain-Based
                  Internet of Intelligent Battlefield Things Environment},
  booktitle    = {39th {IEEE} Conference on Computer Communications, {INFOCOM} Workshops
                  2020, Toronto, ON, Canada, July 6-9, 2020},
  pages        = {888--893},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/INFOCOMWKSHPS50562.2020.9163066},
  doi          = {10.1109/INFOCOMWKSHPS50562.2020.9163066},
  timestamp    = {Tue, 18 Aug 2020 11:30:21 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/WazidDSR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isc2/BandaraLFSRZ20,
  author       = {Eranga Bandara and
                  Xueping Liang and
                  Peter Foytik and
                  Sachin Shetty and
                  Nalin Ranasinghe and
                  Kasun De Zoysa},
  title        = {Bassa-Scalable Blockchain Architecture for Smart Cities},
  booktitle    = {{IEEE} International Smart Cities Conference, {ISC2} 2020, Piscataway,
                  NJ, USA, September 28 - October 1, 2020},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/ISC251055.2020.9239072},
  doi          = {10.1109/ISC251055.2020.9239072},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isc2/BandaraLFSRZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobihealth/BandaraLFSHBRZN20,
  author       = {Eranga Bandara and
                  Xueping Liang and
                  Peter Foytik and
                  Sachin Shetty and
                  Crissie Hall and
                  Daniel Bowden and
                  Nalin Ranasinghe and
                  Kasun De Zoysa and
                  Wee Keong Ng},
  editor       = {Juan Ye and
                  Michael J. O'Grady and
                  Gabriele Civitarese and
                  Kristina Y. Yordanova},
  title        = {Connect - Blockchain and Self-Sovereign Identity Empowered Contact
                  Tracing Platform},
  booktitle    = {Wireless Mobile Communication and Healthcare - 9th {EAI} International
                  Conference, MobiHealth 2020, Virtual Event, November 19, 2020, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {362},
  pages        = {208--223},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-70569-5\_13},
  doi          = {10.1007/978-3-030-70569-5\_13},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mobihealth/BandaraLFSHBRZN20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/HaqueSKG20,
  author       = {Md Ariful Haque and
                  Sachin Shetty and
                  Charles A. Kamhoua and
                  Kimberly Gold},
  editor       = {Noseong Park and
                  Kun Sun and
                  Sara Foresti and
                  Kevin R. B. Butler and
                  Nitesh Saxena},
  title        = {Modeling Mission Impact of Cyber Attacks on Energy Delivery Systems},
  booktitle    = {Security and Privacy in Communication Networks - 16th {EAI} International
                  Conference, SecureComm 2020, Washington, DC, USA, October 21-23, 2020,
                  Proceedings, Part {II}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {336},
  pages        = {41--61},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-63095-9\_3},
  doi          = {10.1007/978-3-030-63095-9\_3},
  timestamp    = {Tue, 15 Dec 2020 15:30:59 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/HaqueSKG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/springsim/FoytikSGHTN20,
  author       = {Peter Foytik and
                  Sachin Shetty and
                  Sarada Prasad Gochhayat and
                  Eranga Herath and
                  Deepak K. Tosh and
                  Laurent Njilla},
  editor       = {Fernando J. Barros and
                  Xiaolin Hu and
                  Hamdi Kavak and
                  Alberto A. Del Barrio},
  title        = {A Blockchain Simulator for Evaluating Consensus Algorithms in Diverse
                  Networking Environments},
  booktitle    = {Spring Simulation Conference, SpringSim 2020, Fairfax, VA, USA, May
                  18-21, 2020},
  pages        = {1--12},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.22360/SpringSim.2020.CSE.003},
  doi          = {10.22360/SPRINGSIM.2020.CSE.003},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/springsim/FoytikSGHTN20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/springsim/LiangSFT20,
  author       = {Xueping Liang and
                  Sachin Shetty and
                  Peter Foytik and
                  Deepak K. Tosh},
  editor       = {Fernando J. Barros and
                  Xiaolin Hu and
                  Hamdi Kavak and
                  Alberto A. Del Barrio},
  title        = {Enforcing Security and Privacy in Distributed Ledgers by Intel {SGX}},
  booktitle    = {Spring Simulation Conference, SpringSim 2020, Fairfax, VA, USA, May
                  18-21, 2020},
  pages        = {1--12},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.22360/SpringSim.2020.CSE.002},
  doi          = {10.22360/SPRINGSIM.2020.CSE.002},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/springsim/LiangSFT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sscc/BandaraLFSRZN20,
  author       = {Eranga Bandara and
                  Xueping Liang and
                  Peter Foytik and
                  Sachin Shetty and
                  Nalin Ranasinghe and
                  Kasun De Zoysa and
                  Wee Keong Ng},
  editor       = {Sabu M. Thampi and
                  Guojun Wang and
                  Danda B. Rawat and
                  Ryan K. L. Ko and
                  Chun{-}I Fan},
  title        = {SaaS - Microservices-Based Scalable Smart Contract Architecture},
  booktitle    = {Security in Computing and Communications - 8th International Symposium,
                  {SSCC} 2020, Chennai, India, October 14-17, 2020, Revised Selected
                  Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1364},
  pages        = {228--243},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-981-16-0422-5\_16},
  doi          = {10.1007/978-981-16-0422-5\_16},
  timestamp    = {Thu, 11 Feb 2021 15:38:25 +0100},
  biburl       = {https://dblp.org/rec/conf/sscc/BandaraLFSRZN20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2007-11536,
  author       = {Uttam Ghosh and
                  Pushpita Chatterjee and
                  Sachin Shetty and
                  Raja Datta},
  title        = {An SDN-IoT-based Framework for Future Smart Cities: Addressing Perspective},
  journal      = {CoRR},
  volume       = {abs/2007.11536},
  year         = {2020},
  url          = {https://arxiv.org/abs/2007.11536},
  eprinttype    = {arXiv},
  eprint       = {2007.11536},
  timestamp    = {Wed, 29 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2007-11536.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/WazidDRSP19,
  author       = {Mohammad Wazid and
                  Ashok Kumar Das and
                  Joel J. P. C. Rodrigues and
                  Sachin Shetty and
                  Youngho Park},
  title        = {IoMT Malware Detection Approaches: Analysis and Research Challenges},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {182459--182476},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2960412},
  doi          = {10.1109/ACCESS.2019.2960412},
  timestamp    = {Wed, 15 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/WazidDRSP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cem/ToshSLKN19,
  author       = {Deepak K. Tosh and
                  Sachin Shetty and
                  Xueping Liang and
                  Charles A. Kamhoua and
                  Laurent L. Njilla},
  title        = {Data Provenance in the Cloud: {A} Blockchain-Based Approach},
  journal      = {{IEEE} Consumer Electron. Mag.},
  volume       = {8},
  number       = {4},
  pages        = {38--44},
  year         = {2019},
  url          = {https://doi.org/10.1109/MCE.2019.2892222},
  doi          = {10.1109/MCE.2019.2892222},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cem/ToshSLKN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/MazikuSN19,
  author       = {Hellen Maziku and
                  Sachin Shetty and
                  David M. Nicol},
  title        = {Security risk assessment for SDN-enabled smart grids},
  journal      = {Comput. Commun.},
  volume       = {133},
  pages        = {1--11},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.comcom.2018.10.007},
  doi          = {10.1016/J.COMCOM.2018.10.007},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comcom/MazikuSN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/ZhaoSPKK19,
  author       = {Juan Zhao and
                  Sachin Shetty and
                  Jan Wei Pan and
                  Charles A. Kamhoua and
                  Kevin A. Kwiat},
  title        = {Transfer learning for detecting unknown network attacks},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2019},
  pages        = {1},
  year         = {2019},
  url          = {https://doi.org/10.1186/s13635-019-0084-4},
  doi          = {10.1186/S13635-019-0084-4},
  timestamp    = {Tue, 08 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/ZhaoSPKK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/WazidBDSRP19,
  author       = {Mohammad Wazid and
                  Palak Bagga and
                  Ashok Kumar Das and
                  Sachin Shetty and
                  Joel J. P. C. Rodrigues and
                  Youngho Park},
  title        = {AKM-IoV: Authenticated Key Management Protocol in Fog Computing-Based
                  Internet of Vehicles Deployment},
  journal      = {{IEEE} Internet Things J.},
  volume       = {6},
  number       = {5},
  pages        = {8804--8817},
  year         = {2019},
  url          = {https://doi.org/10.1109/JIOT.2019.2923611},
  doi          = {10.1109/JIOT.2019.2923611},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/WazidBDSRP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/WazidDSRP19,
  author       = {Mohammad Wazid and
                  Ashok Kumar Das and
                  Sachin Shetty and
                  Joel J. P. C. Rodrigues and
                  Youngho Park},
  title        = {LDAKM-EIoT: Lightweight Device Authentication and Key Management Mechanism
                  for Edge-Based IoT Deployment},
  journal      = {Sensors},
  volume       = {19},
  number       = {24},
  pages        = {5539},
  year         = {2019},
  url          = {https://doi.org/10.3390/s19245539},
  doi          = {10.3390/S19245539},
  timestamp    = {Sat, 30 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/WazidDSRP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/AminSNTK19,
  author       = {Md Ali Reza Al Amin and
                  Sachin Shetty and
                  Laurent Njilla and
                  Deepak K. Tosh and
                  Charles Kamouha},
  title        = {Attacker Capability based Dynamic Deception Model for Large-Scale
                  Networks},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {6},
  number       = {21},
  pages        = {e2},
  year         = {2019},
  url          = {https://doi.org/10.4108/eai.13-7-2018.162808},
  doi          = {10.4108/EAI.13-7-2018.162808},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sesa/AminSNTK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bigdatasec/HaqueSK19,
  author       = {Md Ariful Haque and
                  Sachin Shetty and
                  Bheshaj Krishnappa},
  title        = {{ICS-CRAT:} {A} Cyber Resilience Assessment Tool for Industrial Control
                  Systems},
  booktitle    = {5th {IEEE} International Conference on Big Data Security on Cloud,
                  {IEEE} International Conference on High Performance and Smart Computing,
                  and {IEEE} International Conference on Intelligent Data and Security,
                  BigDataSecurity/HPSC/IDS 2019, Washington, DC, USA, May 27-29, 2019},
  pages        = {273--281},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/BigDataSecurity-HPSC-IDS.2019.00058},
  doi          = {10.1109/BIGDATASECURITY-HPSC-IDS.2019.00058},
  timestamp    = {Wed, 14 Jul 2021 09:36:14 +0200},
  biburl       = {https://dblp.org/rec/conf/bigdatasec/HaqueSK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/blockchain2/GochhayatBSF19,
  author       = {Sarada Prasad Gochhayat and
                  Eranga Bandara and
                  Sachin Shetty and
                  Peter Foytik},
  title        = {Yugala: Blockchain Based Encrypted Cloud Storage for IoT Data},
  booktitle    = {{IEEE} International Conference on Blockchain, Blockchain 2019, Atlanta,
                  GA, USA, July 14-17, 2019},
  pages        = {483--489},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/Blockchain.2019.00073},
  doi          = {10.1109/BLOCKCHAIN.2019.00073},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/blockchain2/GochhayatBSF19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/blockchain2/DavenportS19,
  author       = {Amanda Davenport and
                  Sachin Shetty},
  title        = {Air Gapped Wallet Schemes and Private Key Leakage in Permissioned
                  Blockchain Platforms},
  booktitle    = {{IEEE} International Conference on Blockchain, Blockchain 2019, Atlanta,
                  GA, USA, July 14-17, 2019},
  pages        = {541--545},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/Blockchain.2019.00004},
  doi          = {10.1109/BLOCKCHAIN.2019.00004},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/blockchain2/DavenportS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/coinco/HasanSU19,
  author       = {Kamrul Hasan and
                  Sachin Shetty and
                  Sharif Ullah},
  title        = {Artificial Intelligence Empowered Cyber Threat Detection and Protection
                  for Power Utilities},
  booktitle    = {5th {IEEE} International Conference on Collaboration and Internet
                  Computing, {CIC} 2019, Los Angeles, CA, USA, December 12-14, 2019},
  pages        = {354--359},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CIC48465.2019.00049},
  doi          = {10.1109/CIC48465.2019.00049},
  timestamp    = {Fri, 27 May 2022 15:04:14 +0200},
  biburl       = {https://dblp.org/rec/conf/coinco/HasanSU19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eenergy/LiangS19,
  author       = {Xueping Liang and
                  Sachin Shetty},
  title        = {A State-aware Proof of Stake Consensus Protocol for Power System Resilience},
  booktitle    = {Proceedings of the Tenth {ACM} International Conference on Future
                  Energy Systems, e-Energy 2019, Phoenix, AZ, USA, June 25-28, 2019},
  pages        = {431--432},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3307772.3330177},
  doi          = {10.1145/3307772.3330177},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eenergy/LiangS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/GamarraSNNG19,
  author       = {Marco A. Gamarra and
                  Sachin Shetty and
                  David M. Nicol and
                  Laurent Njilla and
                  Oscar R. Gonz{\'{a}}lez},
  title        = {Modeling Stepping Stone Attacks with Constraints in Cyber Infrastructure},
  booktitle    = {2019 {IEEE} Global Communications Conference, {GLOBECOM} 2019, Waikoloa,
                  HI, USA, December 9-13, 2019},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/GLOBECOM38437.2019.9014266},
  doi          = {10.1109/GLOBECOM38437.2019.9014266},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/GamarraSNNG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/HasanSUHH19,
  author       = {Kamrul Hasan and
                  Sachin Shetty and
                  Sharif Ullah and
                  Amin Hassanzadeh and
                  Ethan Hadar},
  title        = {Towards Optimal Cyber Defense Remediation in Energy Delivery Systems},
  booktitle    = {2019 {IEEE} Global Communications Conference, {GLOBECOM} 2019, Waikoloa,
                  HI, USA, December 9-13, 2019},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/GLOBECOM38437.2019.9013517},
  doi          = {10.1109/GLOBECOM38437.2019.9013517},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/HasanSUHH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/GamarraSGNPK19,
  author       = {Marco A. Gamarra and
                  Sachin Shetty and
                  Oscar R. Gonz{\'{a}}lez and
                  Laurent Njilla and
                  Marcus Pendleton and
                  Charles A. Kamhoua},
  title        = {Dual Redundant Cyber-Attack Tolerant Control Systems Strategy for
                  Cyber-Physical Systems},
  booktitle    = {2019 {IEEE} International Conference on Communications, {ICC} 2019,
                  Shanghai, China, May 20-24, 2019},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICC.2019.8761260},
  doi          = {10.1109/ICC.2019.8761260},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/GamarraSGNPK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isc2/DavenportS19,
  author       = {Amanda Davenport and
                  Sachin Shetty},
  title        = {Modeling Threat of Leaking Private Keys from Air-Gapped Blockchain
                  Wallets},
  booktitle    = {2019 {IEEE} International Smart Cities Conference, {ISC2} 2019, Casablanca,
                  Morocco, October 14-17, 2019},
  pages        = {9--13},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ISC246665.2019.9071725},
  doi          = {10.1109/ISC246665.2019.9071725},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isc2/DavenportS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/milcom/HasanSHU19,
  author       = {Kamrul Hasan and
                  Sachin Shetty and
                  Amin Hassanzadeh and
                  Sharif Ullah},
  title        = {Towards Optimal Cyber Defense Remediation in Cyber Physical Systems
                  by Balancing Operational Resilience and Strategic Risk},
  booktitle    = {2019 {IEEE} Military Communications Conference, {MILCOM} 2019, Norfolk,
                  VA, USA, November 12-14, 2019},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/MILCOM47813.2019.9021076},
  doi          = {10.1109/MILCOM47813.2019.9021076},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/milcom/HasanSHU19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/UllahSNHH19,
  author       = {Sharif Ullah and
                  Sachin Shetty and
                  Anup Nayak and
                  Amin Hassanzadeh and
                  Kamrul Hasan},
  editor       = {Songqing Chen and
                  Kim{-}Kwang Raymond Choo and
                  Xinwen Fu and
                  Wenjing Lou and
                  Aziz Mohaisen},
  title        = {Cyber Threat Analysis Based on Characterizing Adversarial Behavior
                  for Energy Delivery System},
  booktitle    = {Security and Privacy in Communication Networks - 15th {EAI} International
                  Conference, SecureComm 2019, Orlando, FL, USA, October 23-25, 2019,
                  Proceedings, Part {II}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {305},
  pages        = {146--160},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-37231-6\_8},
  doi          = {10.1007/978-3-030-37231-6\_8},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/UllahSNHH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/AminSNTK19,
  author       = {Md Ali Reza Al Amin and
                  Sachin Shetty and
                  Laurent Njilla and
                  Deepak K. Tosh and
                  Charles A. Kamhoua},
  editor       = {Songqing Chen and
                  Kim{-}Kwang Raymond Choo and
                  Xinwen Fu and
                  Wenjing Lou and
                  Aziz Mohaisen},
  title        = {Online Cyber Deception System Using Partially Observable Monte-Carlo
                  Planning Framework},
  booktitle    = {Security and Privacy in Communication Networks - 15th {EAI} International
                  Conference, SecureComm 2019, Orlando, FL, USA, October 23-25, 2019,
                  Proceedings, Part {II}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {305},
  pages        = {205--223},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-37231-6\_11},
  doi          = {10.1007/978-3-030-37231-6\_11},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/AminSNTK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/springsim/AlmutairiHS19,
  author       = {Laila M. Almutairi and
                  Liang Hong and
                  Sachin Shetty},
  editor       = {Alberto A. Del Barrio and
                  Christopher J. Lynch and
                  Fernando J. Barros and
                  Xiaolin Hu and
                  Andrea D'Ambrogio},
  title        = {Security Analysis of Multiple {SDN} Controllers Based on Stochastic
                  Petri Nets},
  booktitle    = {2019 Spring Simulation Conference, SpringSim 2019, Tucson, AZ, USA,
                  April 29 - May 2, 2019},
  pages        = {1--12},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.23919/SpringSim.2019.8732908},
  doi          = {10.23919/SPRINGSIM.2019.8732908},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/springsim/AlmutairiHS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wsc/ShettyRCMBZ19,
  author       = {Sachin Shetty and
                  Indrajit Ray and
                  Nurcin Celik and
                  Michael Mesham and
                  Nathaniel Bastian and
                  Quanyan Zhu},
  title        = {Simulation for Cyber Risk Management - Where are we, and Where do
                  we Want to Go?},
  booktitle    = {2019 Winter Simulation Conference, {WSC} 2019, National Harbor, MD,
                  USA, December 8-11, 2019},
  pages        = {726--737},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/WSC40007.2019.9004688},
  doi          = {10.1109/WSC40007.2019.9004688},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wsc/ShettyRCMBZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1904-03487,
  author       = {Muhammad Saad and
                  Jeffrey Spaulding and
                  Laurent Njilla and
                  Charles A. Kamhoua and
                  Sachin Shetty and
                  DaeHun Nyang and
                  Aziz Mohaisen},
  title        = {Exploring the Attack Surface of Blockchain: {A} Systematic Overview},
  journal      = {CoRR},
  volume       = {abs/1904.03487},
  year         = {2019},
  url          = {http://arxiv.org/abs/1904.03487},
  eprinttype    = {arXiv},
  eprint       = {1904.03487},
  timestamp    = {Tue, 20 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1904-03487.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisp/LiangSTZLL18,
  author       = {Xueping Liang and
                  Sachin Shetty and
                  Deepak K. Tosh and
                  Juan Zhao and
                  Danyi Li and
                  Jihong Liu},
  title        = {A Reliable Data Provenance and Privacy Preservation Architecture for
                  Business-Driven Cyber-Physical Systems Using Blockchain},
  journal      = {Int. J. Inf. Secur. Priv.},
  volume       = {12},
  number       = {4},
  pages        = {68--81},
  year         = {2018},
  url          = {https://doi.org/10.4018/IJISP.2018100105},
  doi          = {10.4018/IJISP.2018100105},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisp/LiangSTZLL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/phat/LiangSTBNK18,
  author       = {Xueping Liang and
                  Sachin Shetty and
                  Deepak K. Tosh and
                  Daniel Bowden and
                  Laurent Njilla and
                  Charles A. Kamhoua},
  title        = {Towards Blockchain Empowered Trusted and Accountable Data Sharing
                  and Collaboration in Mobile Healthcare Applications},
  journal      = {{EAI} Endorsed Trans. Pervasive Health Technol.},
  volume       = {4},
  number       = {15},
  pages        = {e3},
  year         = {2018},
  url          = {https://doi.org/10.4108/eai.24-7-2018.159338},
  doi          = {10.4108/EAI.24-7-2018.159338},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/phat/LiangSTBNK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEcloud/ToshSFKN18,
  author       = {Deepak K. Tosh and
                  Sachin Shetty and
                  Peter Foytik and
                  Charles A. Kamhoua and
                  Laurent Njilla},
  title        = {CloudPoS: {A} Proof-of-Stake Consensus Design for Blockchain Integrated
                  Cloud},
  booktitle    = {11th {IEEE} International Conference on Cloud Computing, {CLOUD} 2018,
                  San Francisco, CA, USA, July 2-7, 2018},
  pages        = {302--309},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/CLOUD.2018.00045},
  doi          = {10.1109/CLOUD.2018.00045},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEcloud/ToshSFKN18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccta/HasanSHSC18,
  author       = {Kamrul Hasan and
                  Sachin Shetty and
                  Amin Hassanzadeh and
                  Malek Ben Salem and
                  Jay Chen},
  title        = {Self-Healing Cyber Resilient Framework for Software Defined Networking-Enabled
                  Energy Delivery System},
  booktitle    = {{IEEE} Conference on Control Technology and Applications, {CCTA} 2018,
                  Copenhagen, Denmark, August 21-24, 2018},
  pages        = {1692--1697},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CCTA.2018.8511421},
  doi          = {10.1109/CCTA.2018.8511421},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccta/HasanSHSC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/HasanSHSC18,
  author       = {Kamrul Hasan and
                  Sachin Shetty and
                  Amin Hassanzadeh and
                  Malek Ben Salem and
                  Jay Chen},
  title        = {Modeling Cost of Countermeasures in Software Defined Networking-enabled
                  Energy Delivery Systems},
  booktitle    = {2018 {IEEE} Conference on Communications and Network Security, {CNS}
                  2018, Beijing, China, May 30 - June 1, 2018},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CNS.2018.8433172},
  doi          = {10.1109/CNS.2018.8433172},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/HasanSHSC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/GamarraSNGKN18,
  author       = {Marco A. Gamarra and
                  Sachin Shetty and
                  David M. Nicol and
                  Oscar Gonazlez and
                  Charles A. Kamhoua and
                  Laurent Njilla},
  title        = {Analysis of Stepping Stone Attacks in Dynamic Vulnerability Graphs},
  booktitle    = {2018 {IEEE} International Conference on Communications, {ICC} 2018,
                  Kansas City, MO, USA, May 20-24, 2018},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/ICC.2018.8422723},
  doi          = {10.1109/ICC.2018.8422723},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/GamarraSNGKN18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccnc/MazikuSJKNK18,
  author       = {Hellen Maziku and
                  Sachin Shetty and
                  Dong Jin and
                  Charles A. Kamhoua and
                  Laurent Njilla and
                  Kevin A. Kwiat},
  title        = {Diversity Modeling to Evaluate Security of Multiple {SDN} Controllers},
  booktitle    = {2018 International Conference on Computing, Networking and Communications,
                  {ICNC} 2018, Maui, HI, USA, March 5-8, 2018},
  pages        = {344--348},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/ICCNC.2018.8390296},
  doi          = {10.1109/ICCNC.2018.8390296},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccnc/MazikuSJKNK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isc2/DavenportSL18,
  author       = {Amanda Davenport and
                  Sachin Shetty and
                  Xueping Liang},
  title        = {Attack Surface Analysis of Permissioned Blockchain Platforms for Smart
                  Cities},
  booktitle    = {{IEEE} International Smart Cities Conference, {ISC2} 2018, Kansas
                  City, MO, USA, September 16-19, 2018},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/ISC2.2018.8656983},
  doi          = {10.1109/ISC2.2018.8656983},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isc2/DavenportSL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isc2/LiangST18,
  author       = {Xueping Liang and
                  Sachin Shetty and
                  Deepak K. Tosh},
  title        = {Exploring the Attack Surfaces in Blockchain Enabled Smart Cities},
  booktitle    = {{IEEE} International Smart Cities Conference, {ISC2} 2018, Kansas
                  City, MO, USA, September 16-19, 2018},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/ISC2.2018.8656852},
  doi          = {10.1109/ISC2.2018.8656852},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isc2/LiangST18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isc2/QiuLSB18,
  author       = {Jinglin Qiu and
                  Xueping Liang and
                  Sachin Shetty and
                  Daniel Bowden},
  title        = {Towards Secure and Smart Healthcare in Smart Cities Using Blockchain},
  booktitle    = {{IEEE} International Smart Cities Conference, {ISC2} 2018, Kansas
                  City, MO, USA, September 16-19, 2018},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/ISC2.2018.8656914},
  doi          = {10.1109/ISC2.2018.8656914},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isc2/QiuLSB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/HaqueTSK18,
  author       = {Md Ariful Haque and
                  Gael Kamdem De Teyou and
                  Sachin Shetty and
                  Bheshaj Krishnappa},
  title        = {Cyber Resilience Framework for Industrial Control Systems: Concepts,
                  Metrics, and Insights},
  booktitle    = {2018 {IEEE} International Conference on Intelligence and Security
                  Informatics, {ISI} 2018, Miami, FL, USA, November 9-11, 2018},
  pages        = {25--30},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/ISI.2018.8587398},
  doi          = {10.1109/ISI.2018.8587398},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/HaqueTSK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/milcom/MuallemSHP18,
  author       = {Asmah Muallem and
                  Sachin Shetty and
                  Liang Hong and
                  Jan Wei Pan},
  title        = {{TDDEHT:} Threat Detection Using Distributed Ensembles of Hoeffding
                  Trees on Streaming Cyber Datasets},
  booktitle    = {2018 {IEEE} Military Communications Conference, {MILCOM} 2018, Los
                  Angeles, CA, USA, October 29-31, 2018},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/MILCOM.2018.8599734},
  doi          = {10.1109/MILCOM.2018.8599734},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/milcom/MuallemSHP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/milcom/ToshSFNK18,
  author       = {Deepak K. Tosh and
                  Sachin Shetty and
                  Peter Foytik and
                  Laurent Njilla and
                  Charles A. Kamhoua},
  title        = {Blockchain-Empowered Secure Internet -of- Battlefield Things (IoBT)
                  Architecture},
  booktitle    = {2018 {IEEE} Military Communications Conference, {MILCOM} 2018, Los
                  Angeles, CA, USA, October 29-31, 2018},
  pages        = {593--598},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/MILCOM.2018.8599758},
  doi          = {10.1109/MILCOM.2018.8599758},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/milcom/ToshSFNK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/LiangSTJL18,
  author       = {Xueping Liang and
                  Sachin Shetty and
                  Deepak K. Tosh and
                  Yafei Ji and
                  Danyi Li},
  editor       = {Raheem Beyah and
                  Bing Chang and
                  Yingjiu Li and
                  Sencun Zhu},
  title        = {Towards a Reliable and Accountable Cyber Supply Chain in Energy Delivery
                  System Using Blockchain},
  booktitle    = {Security and Privacy in Communication Networks - 14th International
                  Conference, SecureComm 2018, Singapore, August 8-10, 2018, Proceedings,
                  Part {II}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {255},
  pages        = {43--62},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-01704-0\_3},
  doi          = {10.1007/978-3-030-01704-0\_3},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/LiangSTJL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/springsim/TolkBDRMSTVY18,
  author       = {Andreas Tolk and
                  Fernando J. Barros and
                  Andrea D'Ambrogio and
                  Akshay Rajhans and
                  Pieter J. Mosterman and
                  Sachin S. Shetty and
                  Mamadou K. Traor{\'{e}} and
                  Hans Vangheluwe and
                  Levent Yilmaz},
  editor       = {Saurabh Mittal and
                  Jos{\'{e}} Luis Risco{-}Mart{\'{\i}}n and
                  Marco L{\"{u}}tzenberger},
  title        = {Hybrid simulation for cyber physical systems: a panel on where are
                  we going regarding complexity, intelligence, and adaptability of {CPS}
                  using simulation},
  booktitle    = {Proceedings of the Symposium on Modeling and Simulation of Complexity
                  in Intelligent, Adaptive and Autonomous Systems, SpringSim {(MSCIAAS)}
                  2018, Baltimore, MD, USA, April 15-18, 2018},
  pages        = {3:1--3:19},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {http://dl.acm.org/citation.cfm?id=3213230},
  timestamp    = {Tue, 22 May 2018 08:32:41 +0200},
  biburl       = {https://dblp.org/rec/conf/springsim/TolkBDRMSTVY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/springsim/HaqueSK18,
  author       = {Md Ariful Haque and
                  Sachin Shetty and
                  Gael Kamdem},
  editor       = {Erika Frydenlund and
                  Shafagh Jafer and
                  Hamdi Kavak},
  title        = {Improving bulk power system resilience by ranking critical nodes in
                  the vulnerability graph},
  booktitle    = {Proceedings of the Annual Simulation Symposium, SpringSim {(ANSS)}
                  2018, Baltimore, MD, USA, April 15-18, 2018},
  pages        = {8:1--8:12},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {http://dl.acm.org/citation.cfm?id=3213040},
  timestamp    = {Tue, 22 May 2018 08:07:22 +0200},
  biburl       = {https://dblp.org/rec/conf/springsim/HaqueSK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/springsim/HasanSST18,
  author       = {Kamrul Hasan and
                  Sachin Shetty and
                  John Sokolowski and
                  Deepak K. Tosh},
  editor       = {Abdolreza Abhari and
                  Hala ElAarag},
  title        = {Security game for cyber physical systems},
  booktitle    = {Proceedings of the Communications and Networking Symposium, SpringSim
                  {(CNS)} 2018, Baltimore, MD, USA, April 15-18, 2018},
  pages        = {12:1--12:12},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {http://dl.acm.org/citation.cfm?id=3213212},
  timestamp    = {Tue, 22 May 2018 08:28:20 +0200},
  biburl       = {https://dblp.org/rec/conf/springsim/HasanSST18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ElsaidRTSS17,
  author       = {Lubna Elsaid and
                  Leonardo Jim{\'{e}}nez Rodr{\'{\i}}guez and
                  Nghi H. Tran and
                  Sachin Shetty and
                  Shivakumar Sastry},
  title        = {Secrecy Rates and Optimal Power Allocation for Full-Duplex Decode-and-Forward
                  Relay Wire-Tap Channels},
  journal      = {{IEEE} Access},
  volume       = {5},
  pages        = {10469--10477},
  year         = {2017},
  url          = {https://doi.org/10.1109/ACCESS.2017.2712766},
  doi          = {10.1109/ACCESS.2017.2712766},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/ElsaidRTSS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnc/HongCSLC17,
  author       = {Liang Hong and
                  Wei Chen and
                  Sachin Shetty and
                  Dan Chia{-}Tien Lo and
                  Reginald Cooper},
  title        = {Strong Security Approach with Compromised Nodes Detection in Cognitive
                  Radio Sensor Networks},
  journal      = {Int. J. Netw. Comput.},
  volume       = {7},
  number       = {1},
  pages        = {50--68},
  year         = {2017},
  url          = {http://www.ijnc.org/index.php/ijnc/article/view/142},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnc/HongCSLC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvt/DangRTSS17,
  author       = {Cuong Dang and
                  Leonardo Jim{\'{e}}nez Rodr{\'{\i}}guez and
                  Nghi H. Tran and
                  Sachin Shetty and
                  Shivakumar Sastry},
  title        = {On Secrecy Rate and Optimal Power Allocation of the Full-Duplex Amplify-and-Forward
                  Relay Wire-Tap Channel},
  journal      = {{IEEE} Trans. Veh. Technol.},
  volume       = {66},
  number       = {5},
  pages        = {3887--3899},
  year         = {2017},
  url          = {https://doi.org/10.1109/TVT.2016.2600658},
  doi          = {10.1109/TVT.2016.2600658},
  timestamp    = {Fri, 21 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tvt/DangRTSS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEcloud/LiangSZKK17,
  author       = {Xueping Liang and
                  Sachin Shetty and
                  Lingchen Zhang and
                  Charles A. Kamhoua and
                  Kevin A. Kwiat},
  editor       = {Geoffrey C. Fox},
  title        = {Man in the Cloud {(MITC)} Defender: SGX-Based User Credential Protection
                  for Synchronization Applications in Cloud Computing Platform},
  booktitle    = {2017 {IEEE} 10th International Conference on Cloud Computing (CLOUD),
                  Honolulu, HI, USA, June 25-30, 2017},
  pages        = {302--309},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/CLOUD.2017.46},
  doi          = {10.1109/CLOUD.2017.46},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEcloud/LiangSZKK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEcloud/GhoshCTSXK17,
  author       = {Uttam Ghosh and
                  Pushpita Chatterjee and
                  Deepak K. Tosh and
                  Sachin Shetty and
                  Kaiqi Xiong and
                  Charles A. Kamhoua},
  editor       = {Geoffrey C. Fox},
  title        = {An {SDN} Based Framework for Guaranteeing Security and Performance
                  in Information-Centric Cloud Networks},
  booktitle    = {2017 {IEEE} 10th International Conference on Cloud Computing (CLOUD),
                  Honolulu, HI, USA, June 25-30, 2017},
  pages        = {749--752},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/CLOUD.2017.106},
  doi          = {10.1109/CLOUD.2017.106},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEcloud/GhoshCTSXK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccgrid/ToshSLKKN17,
  author       = {Deepak K. Tosh and
                  Sachin Shetty and
                  Xueping Liang and
                  Charles A. Kamhoua and
                  Kevin A. Kwiat and
                  Laurent Njilla},
  title        = {Security Implications of Blockchain Cloud with Analysis of Block Withholding
                  Attack},
  booktitle    = {Proceedings of the 17th {IEEE/ACM} International Symposium on Cluster,
                  Cloud and Grid Computing, {CCGRID} 2017, Madrid, Spain, May 14-17,
                  2017},
  pages        = {458--467},
  publisher    = {{IEEE} Computer Society / {ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1109/CCGRID.2017.111},
  doi          = {10.1109/CCGRID.2017.111},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccgrid/ToshSLKKN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccgrid/LiangSTKKN17,
  author       = {Xueping Liang and
                  Sachin Shetty and
                  Deepak K. Tosh and
                  Charles A. Kamhoua and
                  Kevin A. Kwiat and
                  Laurent Njilla},
  title        = {ProvChain: {A} Blockchain-based Data Provenance Architecture in Cloud
                  Environment with Enhanced Privacy and Availability},
  booktitle    = {Proceedings of the 17th {IEEE/ACM} International Symposium on Cluster,
                  Cloud and Grid Computing, {CCGRID} 2017, Madrid, Spain, May 14-17,
                  2017},
  pages        = {468--477},
  publisher    = {{IEEE} Computer Society / {ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1109/CCGRID.2017.8},
  doi          = {10.1109/CCGRID.2017.8},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccgrid/LiangSTKKN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccnc/HasanSO17,
  author       = {Kamrul Hasan and
                  Sachin Shetty and
                  Taiwo Oyedare},
  title        = {Cross layer attacks on {GSM} mobile networks using software defined
                  radios},
  booktitle    = {14th {IEEE} Annual Consumer Communications {\&} Networking Conference,
                  {CCNC} 2017, Las Vegas, NV, USA, January 8-11, 2017},
  pages        = {357--360},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/CCNC.2017.7983134},
  doi          = {10.1109/CCNC.2017.7983134},
  timestamp    = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl       = {https://dblp.org/rec/conf/ccnc/HasanSO17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/edge/Al-SalahHS17,
  author       = {Tulha Al{-}Salah and
                  Liang Hong and
                  Sachin Shetty},
  title        = {Attack Surface Expansion Using Decoys to Protect Virtualized Infrastructure},
  booktitle    = {{IEEE} International Conference on Edge Computing, {EDGE} 2017, Honolulu,
                  HI, USA, June 25-30, 2017},
  pages        = {216--219},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/IEEE.EDGE.2017.38},
  doi          = {10.1109/IEEE.EDGE.2017.38},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/edge/Al-SalahHS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamenets/ToshSSKK17,
  author       = {Deepak K. Tosh and
                  Sachin Shetty and
                  Shamik Sengupta and
                  Jay P. Kesan and
                  Charles A. Kamhoua},
  editor       = {Lingjie Duan and
                  Anibal Sanjab and
                  Husheng Li and
                  Xu Chen and
                  Donatello Materassi and
                  Rachid El Azouzi},
  title        = {Risk Management Using Cyber-Threat Information Sharing and Cyber-Insurance},
  booktitle    = {Game Theory for Networks - 7th International {EAI} Conference, GameNets
                  2017 Knoxville, TN, USA, May 9, 2017, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {212},
  pages        = {154--164},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-67540-4\_14},
  doi          = {10.1007/978-3-319-67540-4\_14},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamenets/ToshSSKK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/ToshVSSKNK17,
  author       = {Deepak K. Tosh and
                  Iman Vakilinia and
                  Sachin Shetty and
                  Shamik Sengupta and
                  Charles A. Kamhoua and
                  Laurent Njilla and
                  Kevin A. Kwiat},
  editor       = {Stefan Rass and
                  Bo An and
                  Christopher Kiekintveld and
                  Fei Fang and
                  Stefan Schauer},
  title        = {Three Layer Game Theoretic Decision Framework for Cyber-Investment
                  and Cyber-Insurance},
  booktitle    = {Decision and Game Theory for Security - 8th International Conference,
                  GameSec 2017, Vienna, Austria, October 23-25, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10575},
  pages        = {519--532},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68711-7\_28},
  doi          = {10.1007/978-3-319-68711-7\_28},
  timestamp    = {Wed, 07 Feb 2024 17:23:12 +0100},
  biburl       = {https://dblp.org/rec/conf/gamesec/ToshVSSKNK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccnc/MazikuS17,
  author       = {Hellen Maziku and
                  Sachin Shetty},
  title        = {Software Defined Networking enabled resilience for {IEC} 61850-based
                  substation communication systems},
  booktitle    = {2017 International Conference on Computing, Networking and Communications,
                  {ICNC} 2017, Silicon Valley, CA, USA, January 26-29, 2017},
  pages        = {690--694},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/ICCNC.2017.7876213},
  doi          = {10.1109/ICCNC.2017.7876213},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccnc/MazikuS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcsw/GhoshCS17,
  author       = {Uttam Ghosh and
                  Pushpita Chatterjee and
                  Sachin Shetty},
  editor       = {Aibek Musaev and
                  Jo{\~{a}}o Eduardo Ferreira and
                  Teruo Higashino},
  title        = {A Security Framework for SDN-Enabled Smart Power Grids},
  booktitle    = {37th {IEEE} International Conference on Distributed Computing Systems
                  Workshops, {ICDCS} Workshops 2017, Atlanta, GA, USA, June 5-8, 2017},
  pages        = {113--118},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/ICDCSW.2017.20},
  doi          = {10.1109/ICDCSW.2017.20},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcsw/GhoshCS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcsw/KamdemKLSN17,
  author       = {Gael Kamdem and
                  Charles A. Kamhoua and
                  Yue Lu and
                  Sachin Shetty and
                  Laurent Njilla},
  editor       = {Aibek Musaev and
                  Jo{\~{a}}o Eduardo Ferreira and
                  Teruo Higashino},
  title        = {A Markov Game Theoritic Approach for Power Grid Security},
  booktitle    = {37th {IEEE} International Conference on Distributed Computing Systems
                  Workshops, {ICDCS} Workshops 2017, Atlanta, GA, USA, June 5-8, 2017},
  pages        = {139--144},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/ICDCSW.2017.63},
  doi          = {10.1109/ICDCSW.2017.63},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcsw/KamdemKLSN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/LiangSTFZ17,
  author       = {Xueping Liang and
                  Sachin Shetty and
                  Deepak K. Tosh and
                  Peter Foytik and
                  Lingchen Zhang},
  editor       = {Sihan Qing and
                  Chris Mitchell and
                  Liqun Chen and
                  Dongmei Liu},
  title        = {Towards a Trusted and Privacy Preserving Membership Service in Distributed
                  Ledger Using Intel Software Guard Extensions},
  booktitle    = {Information and Communications Security - 19th International Conference,
                  {ICICS} 2017, Beijing, China, December 6-8, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10631},
  pages        = {304--310},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-89500-0\_27},
  doi          = {10.1007/978-3-319-89500-0\_27},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/LiangSTFZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/LiangSZBLL17,
  author       = {Xueping Liang and
                  Sachin Shetty and
                  Juan Zhao and
                  Daniel Bowden and
                  Danyi Li and
                  Jihong Liu},
  editor       = {Sihan Qing and
                  Chris Mitchell and
                  Liqun Chen and
                  Dongmei Liu},
  title        = {Towards Decentralized Accountability and Self-sovereignty in Healthcare
                  Systems},
  booktitle    = {Information and Communications Security - 19th International Conference,
                  {ICICS} 2017, Beijing, China, December 6-8, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10631},
  pages        = {387--398},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-89500-0\_34},
  doi          = {10.1007/978-3-319-89500-0\_34},
  timestamp    = {Tue, 08 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/LiangSZBLL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/milcom/ZhaoSP17,
  author       = {Juan Zhao and
                  Sachin Shetty and
                  Jan Wei Pan},
  title        = {Feature-based transfer learning for network security},
  booktitle    = {2017 {IEEE} Military Communications Conference, {MILCOM} 2017, Baltimore,
                  MD, USA, October 23-25, 2017},
  pages        = {17--22},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/MILCOM.2017.8170749},
  doi          = {10.1109/MILCOM.2017.8170749},
  timestamp    = {Tue, 08 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/milcom/ZhaoSP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/milcom/LiangZSL17,
  author       = {Xueping Liang and
                  Juan Zhao and
                  Sachin Shetty and
                  Danyi Li},
  title        = {Towards data assurance and resilience in IoT using blockchain},
  booktitle    = {2017 {IEEE} Military Communications Conference, {MILCOM} 2017, Baltimore,
                  MD, USA, October 23-25, 2017},
  pages        = {261--266},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/MILCOM.2017.8170858},
  doi          = {10.1109/MILCOM.2017.8170858},
  timestamp    = {Tue, 08 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/milcom/LiangZSL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/milcom/AlmutairiS17,
  author       = {Laila M. Almutairi and
                  Sachin Shetty},
  title        = {Generalized stochastic Petri Net model based security risk assessment
                  of software defined networks},
  booktitle    = {2017 {IEEE} Military Communications Conference, {MILCOM} 2017, Baltimore,
                  MD, USA, October 23-25, 2017},
  pages        = {545--550},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/MILCOM.2017.8170813},
  doi          = {10.1109/MILCOM.2017.8170813},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/milcom/AlmutairiS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pimrc/LiangZSLL17,
  author       = {Xueping Liang and
                  Juan Zhao and
                  Sachin Shetty and
                  Jihong Liu and
                  Danyi Li},
  title        = {Integrating blockchain for data sharing and collaboration in mobile
                  healthcare applications},
  booktitle    = {28th {IEEE} Annual International Symposium on Personal, Indoor, and
                  Mobile Radio Communications, {PIMRC} 2017, Montreal, QC, Canada, October
                  8-13, 2017},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/PIMRC.2017.8292361},
  doi          = {10.1109/PIMRC.2017.8292361},
  timestamp    = {Tue, 08 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pimrc/LiangZSLL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uemcom/ToshSLKN17,
  author       = {Deepak K. Tosh and
                  Sachin Shetty and
                  Xueping Liang and
                  Charles A. Kamhoua and
                  Laurent Njilla},
  title        = {Consensus protocols for blockchain-based data provenance: Challenges
                  and opportunities},
  booktitle    = {8th {IEEE} Annual Ubiquitous Computing, Electronics and Mobile Communication
                  Conference, {UEMCON} 2017, New York City, NY, USA, October 19-21,
                  2017},
  pages        = {469--474},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/UEMCON.2017.8249088},
  doi          = {10.1109/UEMCON.2017.8249088},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uemcom/ToshSLKN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/wn/ShettyYS16,
  author       = {Sachin Shetty and
                  Xuebiao Yuchi and
                  Min Song},
  title        = {Moving Target Defense for Distributed Systems},
  series       = {Wireless Networks},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-31032-9},
  doi          = {10.1007/978-3-319-31032-9},
  isbn         = {978-3-319-31031-2},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/wn/ShettyYS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijghpc/RawatS16,
  author       = {Danda B. Rawat and
                  Sachin Shetty},
  title        = {Game Theoretic Cloud-Assisted Opportunistic Spectrum Access in Cognitive
                  Radio Networks},
  journal      = {Int. J. Grid High Perform. Comput.},
  volume       = {8},
  number       = {2},
  pages        = {94--110},
  year         = {2016},
  url          = {https://doi.org/10.4018/IJGHPC.2016040106},
  doi          = {10.4018/IJGHPC.2016040106},
  timestamp    = {Thu, 16 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijghpc/RawatS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcnc/SharahOS16,
  author       = {Ashraf Al Sharah and
                  Taiwo Oyedare and
                  Sachin Shetty},
  title        = {Detecting and Mitigating Smart Insider Jamming Attacks in MANETs Using
                  Reputation-Based Coalition Game},
  journal      = {J. Comput. Networks Commun.},
  volume       = {2016},
  pages        = {4289176:1--4289176:13},
  year         = {2016},
  url          = {https://doi.org/10.1155/2016/4289176},
  doi          = {10.1155/2016/4289176},
  timestamp    = {Wed, 02 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcnc/SharahOS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sj/RawatSX16,
  author       = {Danda B. Rawat and
                  Sachin Shetty and
                  Chunsheng Xin},
  title        = {Stackelberg-Game-Based Dynamic Spectrum Access in Heterogeneous Wireless
                  Systems},
  journal      = {{IEEE} Syst. J.},
  volume       = {10},
  number       = {4},
  pages        = {1494--1504},
  year         = {2016},
  url          = {https://doi.org/10.1109/JSYST.2014.2347048},
  doi          = {10.1109/JSYST.2014.2347048},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sj/RawatSX16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ant/McNeilSGB16,
  author       = {Paul McNeil and
                  Sachin Shetty and
                  Divya Guntu and
                  Gauree Barve},
  editor       = {Elhadi M. Shakshuki},
  title        = {{SCREDENT:} Scalable Real-time Anomalies Detection and Notification
                  of Targeted Malware in Mobile Devices},
  booktitle    = {The 7th International Conference on Ambient Systems, Networks and
                  Technologies {(ANT} 2016) / The 6th International Conference on Sustainable
                  Energy Information Technology {(SEIT-2016)} / Affiliated Workshops,
                  May 23-26, 2016, Madrid, Spain},
  series       = {Procedia Computer Science},
  volume       = {83},
  pages        = {1219--1225},
  publisher    = {Elsevier},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.procs.2016.04.254},
  doi          = {10.1016/J.PROCS.2016.04.254},
  timestamp    = {Thu, 08 Jul 2021 16:04:01 +0200},
  biburl       = {https://dblp.org/rec/conf/ant/McNeilSGB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccnc/AlamBHS16,
  author       = {Md Monzurul Alam and
                  Sudeep Bhattarai and
                  Liang Hong and
                  Sachin Shetty},
  title        = {Robust cooperative beamforming against steering vector uncertainty
                  in cognitive radio networks},
  booktitle    = {13th {IEEE} Annual Consumer Communications {\&} Networking Conference,
                  {CCNC} 2016, Las Vegas, NV, USA, January 9-12, 2016},
  pages        = {656--661},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CCNC.2016.7444858},
  doi          = {10.1109/CCNC.2016.7444858},
  timestamp    = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl       = {https://dblp.org/rec/conf/ccnc/AlamBHS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ficloud/AlghamdiS16,
  author       = {Abdullah Alghamdi and
                  Sachin Shetty},
  editor       = {Muhammad Younas and
                  Irfan Awan and
                  Winston Seah},
  title        = {Survey Toward a Smart Campus Using the Internet of Things},
  booktitle    = {4th {IEEE} International Conference on Future Internet of Things and
                  Cloud, FiCloud 2016, Vienna, Austria, August 22-24, 2016},
  pages        = {235--239},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/FiCloud.2016.41},
  doi          = {10.1109/FICLOUD.2016.41},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ficloud/AlghamdiS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ipccc/AldarrajiHS16,
  author       = {Ali Aldarraji and
                  Liang Hong and
                  Sachin Shetty},
  title        = {Polarized beamforming for enhanced countermeasure of wireless jamming
                  attacks},
  booktitle    = {35th {IEEE} International Performance Computing and Communications
                  Conference, {IPCCC} 2016, Las Vegas, NV, USA, December 9-11, 2016},
  pages        = {1--2},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/PCCC.2016.7820612},
  doi          = {10.1109/PCCC.2016.7820612},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ipccc/AldarrajiHS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ipps/0003HSLC16,
  author       = {Wei Chen and
                  Liang Hong and
                  Sachin Shetty and
                  Dan Chia{-}Tien Lo and
                  Reginald Cooper},
  title        = {Cross-Layered Security Approach with Compromised Nodes Detection in
                  Cooperative Sensor Networks},
  booktitle    = {2016 {IEEE} International Parallel and Distributed Processing Symposium
                  Workshops, {IPDPS} Workshops 2016, Chicago, IL, USA, May 23-27, 2016},
  pages        = {499--508},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/IPDPSW.2016.88},
  doi          = {10.1109/IPDPSW.2016.88},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ipps/0003HSLC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/services/YuchiS16,
  author       = {Xuebiao Yuchi and
                  Sachin Shetty},
  editor       = {Rami Bahsoon and
                  Liang{-}Jie Zhang},
  title        = {Hierarchical Random Graph Based Network Diversity Modeling for the
                  Cloud},
  booktitle    = {{IEEE} World Congress on Services, {SERVICES} 2016, San Francisco,
                  CA, USA, June 27 - July 2, 2016},
  pages        = {35--38},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/SERVICES.2016.11},
  doi          = {10.1109/SERVICES.2016.11},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/services/YuchiS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/services/YuchiS16a,
  author       = {Xuebiao Yuchi and
                  Sachin Shetty},
  editor       = {Rami Bahsoon and
                  Liang{-}Jie Zhang},
  title        = {Towards Network-Topology Aware Virtual Machine Placement in Cloud
                  Datacenters},
  booktitle    = {{IEEE} World Congress on Services, {SERVICES} 2016, San Francisco,
                  CA, USA, June 27 - July 2, 2016},
  pages        = {95--96},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/SERVICES.2016.19},
  doi          = {10.1109/SERVICES.2016.19},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/services/YuchiS16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wwic/OyedareSS16,
  author       = {Taiwo Oyedare and
                  Ashraf Al Sharah and
                  Sachin Shetty},
  editor       = {Lefteris Mamatas and
                  Ibrahim Matta and
                  Panagiotis Papadimitriou and
                  Yevgeni Koucheryavy},
  title        = {A Reputation-Based Coalition Game to Prevent Smart Insider Jamming
                  Attacks in MANETs},
  booktitle    = {Wired/Wireless Internet Communications - 14th {IFIP} {WG} 6.2 International
                  Conference, {WWIC} 2016, Thessaloniki, Greece, May 25-27, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9674},
  pages        = {241--253},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-33936-8\_19},
  doi          = {10.1007/978-3-319-33936-8\_19},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wwic/OyedareSS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/sbece/RawatSS15,
  author       = {Danda B. Rawat and
                  Min Song and
                  Sachin Shetty},
  title        = {Dynamic Spectrum Access for Wireless Networks},
  series       = {Springer Briefs in Electrical and Computer Engineering},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-15299-8},
  doi          = {10.1007/978-3-319-15299-8},
  isbn         = {978-3-319-15298-1},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/sbece/RawatSS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cm/RodriguezTDLES15,
  author       = {Leonardo Jim{\'{e}}nez Rodr{\'{\i}}guez and
                  Nghi H. Tran and
                  Trung Quang Duong and
                  Tho Le{-}Ngoc and
                  Maged Elkashlan and
                  Sachin Shetty},
  title        = {Physical layer security in wireless cooperative relay networks: state
                  of the art and beyond},
  journal      = {{IEEE} Commun. Mag.},
  volume       = {53},
  number       = {12},
  pages        = {32--39},
  year         = {2015},
  url          = {https://doi.org/10.1109/MCOM.2015.7355563},
  doi          = {10.1109/MCOM.2015.7355563},
  timestamp    = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cm/RodriguezTDLES15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-com/LeHTDS15,
  author       = {Anh D. Le and
                  Sanjeewa P. Herath and
                  Nghi H. Tran and
                  Trung Quang Duong and
                  Sachin Shetty},
  title        = {Achievable rates and outage probability of cognitive radio with dynamic
                  frequency hopping under imperfect spectrum sensing},
  journal      = {{IET} Commun.},
  volume       = {9},
  number       = {17},
  pages        = {2160--2167},
  year         = {2015},
  url          = {https://doi.org/10.1049/iet-com.2015.0094},
  doi          = {10.1049/IET-COM.2015.0094},
  timestamp    = {Tue, 08 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-com/LeHTDS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmheur/BiswalSR15,
  author       = {Biswajit Biswal and
                  Sachin Shetty and
                  Tamara Rogers},
  title        = {Enhanced learning classifier to locate data in cloud data centres},
  journal      = {Int. J. Metaheuristics},
  volume       = {4},
  number       = {2},
  pages        = {141--158},
  year         = {2015},
  url          = {https://doi.org/10.1504/IJMHEUR.2015.074248},
  doi          = {10.1504/IJMHEUR.2015.074248},
  timestamp    = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijmheur/BiswalSR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aina/SharmaRBS15,
  author       = {Nimish Sharma and
                  Danda B. Rawat and
                  Bhed Bahadur Bista and
                  Sachin Shetty},
  editor       = {Leonard Barolli and
                  Makoto Takizawa and
                  Fatos Xhafa and
                  Tomoya Enokido and
                  Jong Hyuk Park},
  title        = {A Testbed Using {USRP(TM)} and LabView(R) for Dynamic Spectrum Access
                  in Cognitive Radio Networks},
  booktitle    = {29th {IEEE} International Conference on Advanced Information Networking
                  and Applications, {AINA} 2015, Gwangju, South Korea, March 24-27,
                  2015},
  pages        = {735--740},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/AINA.2015.261},
  doi          = {10.1109/AINA.2015.261},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aina/SharmaRBS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LiS15,
  author       = {Depeng Li and
                  Sachin Shetty},
  editor       = {Indrajit Ray and
                  Ninghui Li and
                  Christopher Kruegel},
  title        = {{POSTER:} Toward Energy-Wasting Misbehavior Detection Platform with
                  Privacy Preservation in Building Energy Use},
  booktitle    = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Denver, CO, USA, October 12-16, 2015},
  pages        = {1647--1649},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2810103.2810128},
  doi          = {10.1145/2810103.2810128},
  timestamp    = {Mon, 21 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/LiS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/milcom/GoldSR15,
  author       = {Kimberly Gold and
                  Sachin Shetty and
                  Tamara Rogers},
  editor       = {Qinqing Zhang and
                  Jerry Brand and
                  Thomas G. MacDonald and
                  Bharat T. Doshi and
                  Bonnie L. Gorsic},
  title        = {A testbed for modeling and detecting attacks on {NFC} enabled mobile
                  devices},
  booktitle    = {34th {IEEE} Military Communications Conference, {MILCOM} 2015, Tampa,
                  FL, USA, October 26-28, 2015},
  pages        = {635--640},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/MILCOM.2015.7357515},
  doi          = {10.1109/MILCOM.2015.7357515},
  timestamp    = {Thu, 07 Nov 2019 09:04:27 +0100},
  biburl       = {https://dblp.org/rec/conf/milcom/GoldSR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/milcom/YuchiS15,
  author       = {Xuebiao Yuchi and
                  Sachin Shetty},
  editor       = {Qinqing Zhang and
                  Jerry Brand and
                  Thomas G. MacDonald and
                  Bharat T. Doshi and
                  Bonnie L. Gorsic},
  title        = {Enabling security-aware virtual machine placement in IaaS clouds},
  booktitle    = {34th {IEEE} Military Communications Conference, {MILCOM} 2015, Tampa,
                  FL, USA, October 26-28, 2015},
  pages        = {1554--1559},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/MILCOM.2015.7357666},
  doi          = {10.1109/MILCOM.2015.7357666},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/milcom/YuchiS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vtc/LeTSS15,
  author       = {Anh D. Le and
                  Nghi H. Tran and
                  Sachin Shetty and
                  Shivakumar Sastry},
  title        = {Achievable Rate and Outage Probability of Cognitive Radio with Finite-Alphabet
                  Inputs under Imperfect Spectrum Sensing},
  booktitle    = {{IEEE} 81st Vehicular Technology Conference, {VTC} Spring 2015, Glasgow,
                  United Kingdom, 11-14 May, 2015},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/VTCSpring.2015.7145664},
  doi          = {10.1109/VTCSPRING.2015.7145664},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/vtc/LeTSS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnc/DangRTSS15,
  author       = {Cuong Dang and
                  Leonardo Jim{\'{e}}nez Rodr{\'{\i}}guez and
                  Nghi H. Tran and
                  Sachin Shetty and
                  Shivakumar Sastry},
  title        = {Secrecy capacity of the full-duplex {AF} relay wire-tap channel under
                  residual self-interference},
  booktitle    = {2015 {IEEE} Wireless Communications and Networking Conference, {WCNC}
                  2015, New Orleans, LA, USA, March 9-12, 2015},
  pages        = {99--104},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/WCNC.2015.7127452},
  doi          = {10.1109/WCNC.2015.7127452},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/wcnc/DangRTSS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnc/RawatLSBS15,
  author       = {Danda B. Rawat and
                  Swetha Reddy Lenkala and
                  Nimish Sharma and
                  Bhed Bahadur Bista and
                  Sachin Shetty},
  title        = {Cloud-assisted GPS-driven dynamic spectrum access in cognitive radio
                  vehicular networks for transportation cyber physical systems},
  booktitle    = {2015 {IEEE} Wireless Communications and Networking Conference, {WCNC}
                  2015, New Orleans, LA, USA, March 9-12, 2015},
  pages        = {1942--1947},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/WCNC.2015.7127765},
  doi          = {10.1109/WCNC.2015.7127765},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wcnc/RawatLSBS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijbpim/ShettyBM14,
  author       = {Sachin Shetty and
                  Biswajit Biswal and
                  Hellen Maziku},
  title        = {Auditing and analysis of network traffic in cloud environment},
  journal      = {Int. J. Bus. Process. Integr. Manag.},
  volume       = {7},
  number       = {2},
  pages        = {153--165},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJBPIM.2014.063519},
  doi          = {10.1504/IJBPIM.2014.063519},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijbpim/ShettyBM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcc/RawatSR14,
  author       = {Danda B. Rawat and
                  Sachin Shetty and
                  Khurram Raza},
  title        = {Geolocation-aware resource management in cloud computing-based cognitive
                  radio networks},
  journal      = {Int. J. Cloud Comput.},
  volume       = {3},
  number       = {3},
  pages        = {267--287},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJCC.2014.064765},
  doi          = {10.1504/IJCC.2014.064765},
  timestamp    = {Sun, 06 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcc/RawatSR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cloudnet/MazikuS14,
  author       = {Hellen Maziku and
                  Sachin Shetty},
  title        = {Towards a network aware {VM} migration: Evaluating the cost of {VM}
                  migration in cloud data centers},
  booktitle    = {3rd {IEEE} International Conference on Cloud Networking, CloudNet
                  2014, Luxembourg, Luxembourg, October 8-10, 2014},
  pages        = {114--119},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CloudNet.2014.6968978},
  doi          = {10.1109/CLOUDNET.2014.6968978},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cloudnet/MazikuS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cloudnet/BiswalSR14,
  author       = {Biswajit Biswal and
                  Sachin Shetty and
                  Tamara Rogers},
  title        = {Enhanced learning classifier to locate data in cloud datacenters},
  booktitle    = {3rd {IEEE} International Conference on Cloud Networking, CloudNet
                  2014, Luxembourg, Luxembourg, October 8-10, 2014},
  pages        = {375--380},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CloudNet.2014.6969024},
  doi          = {10.1109/CLOUDNET.2014.6969024},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cloudnet/BiswalSR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/ZhangS0J14,
  author       = {Lingchen Zhang and
                  Sachin Shetty and
                  Peng Liu and
                  Jiwu Jing},
  editor       = {Miroslaw Kutylowski and
                  Jaideep Vaidya},
  title        = {RootkitDet: Practical End-to-End Defense against Kernel Rootkits in
                  a Cloud Environment},
  booktitle    = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research
                  in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8713},
  pages        = {475--493},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11212-1\_27},
  doi          = {10.1007/978-3-319-11212-1\_27},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/ZhangS0J14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gree/MazikuS14,
  author       = {Hellen Maziku and
                  Sachin Shetty},
  title        = {Network Aware {VM} Migration in Cloud Data Centers},
  booktitle    = {2014 Third {GENI} Research and Educational Experiment Workshop, Atlanta,
                  GA, USA, March 19-20, 2014},
  pages        = {25--28},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/GREE.2014.18},
  doi          = {10.1109/GREE.2014.18},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gree/MazikuS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ic2e/RawatSR14,
  author       = {Danda B. Rawat and
                  Sachin Shetty and
                  Khurram Raza},
  title        = {Game Theoretic Dynamic Spectrum Access in Cloud-Based Cognitive Radio
                  Networks},
  booktitle    = {2014 {IEEE} International Conference on Cloud Engineering, Boston,
                  MA, USA, March 11-14, 2014},
  pages        = {586--591},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/IC2E.2014.16},
  doi          = {10.1109/IC2E.2014.16},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ic2e/RawatSR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/AlamBHS14,
  author       = {Md Monzurul Alam and
                  Sudeep Bhattarai and
                  Liang Hong and
                  Sachin Shetty},
  title        = {Robust transmit beamforming against steering vector uncertainty in
                  cognitive radio networks},
  booktitle    = {2014 Proceedings {IEEE} {INFOCOM} Workshops, Toronto, ON, Canada,
                  April 27 - May 2, 2014},
  pages        = {700--705},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/INFCOMW.2014.6849316},
  doi          = {10.1109/INFCOMW.2014.6849316},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/AlamBHS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ipccc/RawatLSS14,
  author       = {Danda B. Rawat and
                  Swetha Reddy Lenkala and
                  Nimish Sharma and
                  Sachin Shetty},
  title        = {Cloud-assisted dynamic spectrum access for {VANET} in transportation
                  cyber-physical systems},
  booktitle    = {{IEEE} 33rd International Performance Computing and Communications
                  Conference, {IPCCC} 2014, Austin, TX, USA, December 5-7, 2014},
  pages        = {1--2},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/PCCC.2014.7017032},
  doi          = {10.1109/PCCC.2014.7017032},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ipccc/RawatLSS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ivs/RawatS14,
  author       = {Danda B. Rawat and
                  Sachin Shetty},
  title        = {Enhancing connectivity for spectrum-agile Vehicular Ad hoc NETworks
                  in fading channels},
  booktitle    = {2014 {IEEE} Intelligent Vehicles Symposium Proceedings, Dearborn,
                  MI, USA, June 8-11, 2014},
  pages        = {957--962},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/IVS.2014.6856517},
  doi          = {10.1109/IVS.2014.6856517},
  timestamp    = {Wed, 16 Oct 2019 14:14:57 +0200},
  biburl       = {https://dblp.org/rec/conf/ivs/RawatS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccgrid/LenkalaSX13,
  author       = {Swetha Reddy Lenkala and
                  Sachin Shetty and
                  Kaiqi Xiong},
  title        = {Security Risk Assessment of Cloud Carrier},
  booktitle    = {13th {IEEE/ACM} International Symposium on Cluster, Cloud, and Grid
                  Computing, CCGrid 2013, Delft, Netherlands, May 13-16, 2013},
  pages        = {442--449},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/CCGrid.2013.28},
  doi          = {10.1109/CCGRID.2013.28},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccgrid/LenkalaSX13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisis/RawatBSY13,
  author       = {Danda B. Rawat and
                  Bhed Bahadur Bista and
                  Sachin Shetty and
                  Gongjun Yan},
  editor       = {Leonard Barolli and
                  Fatos Xhafa and
                  Hsing{-}Chung Chen and
                  Antonio Fernandez G{\'{o}}mez{-}Skarmeta and
                  Farooq Hussain},
  title        = {Waiting Probability Analysis for Dynamic Spectrum Access in Cognitive
                  Radio Networks},
  booktitle    = {Seventh International Conference on Complex, Intelligent, and Software
                  Intensive Systems, {CISIS} 2013, Taichung, Taiwan, July 3-5, 2013},
  pages        = {15--20},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/CISIS.2013.13},
  doi          = {10.1109/CISIS.2013.13},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cisis/RawatBSY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globalsip/RawatS13,
  author       = {Danda B. Rawat and
                  Sachin Shetty},
  title        = {Game theoretic approach to dynamic spectrum access with multi-radio
                  and QoS requirements},
  booktitle    = {{IEEE} Global Conference on Signal and Information Processing, GlobalSIP
                  2013, Austin, TX, USA, December 3-5, 2013},
  pages        = {1150--1153},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/GlobalSIP.2013.6737110},
  doi          = {10.1109/GLOBALSIP.2013.6737110},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/globalsip/RawatS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icacci/MeenaS13,
  author       = {S. M. Meena and
                  Sachin S. Shetty},
  title        = {Trace transform based identifier for speech based image retrieval
                  on mobile phones},
  booktitle    = {International Conference on Advances in Computing, Communications
                  and Informatics, {ICACCI} 2013, Mysore, India, August 22-25, 2013},
  pages        = {967--972},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICACCI.2013.6637307},
  doi          = {10.1109/ICACCI.2013.6637307},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/icacci/MeenaS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccve/AlamBHS13,
  author       = {Md Monzurul Alam and
                  Sudeep Bhattarai and
                  Liang Hong and
                  Sachin Shetty},
  title        = {Robust beamforming for cognitive radio based vehicular communication},
  booktitle    = {International Conference on Connected Vehicles and Expo, {ICCVE} 2012,
                  Las Vegas, NV, USA, December 2-6, 2013},
  pages        = {838--839},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICCVE.2013.6799910},
  doi          = {10.1109/ICCVE.2013.6799910},
  timestamp    = {Mon, 09 Aug 2021 14:54:01 +0200},
  biburl       = {https://dblp.org/rec/conf/iccve/AlamBHS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/services/NixKS13,
  author       = {Robert Nix and
                  Murat Kantarcioglu and
                  Sachin Shetty},
  title        = {Toward a Real-Time Cloud Auditing Paradigm},
  booktitle    = {{IEEE} Ninth World Congress on Services, {SERVICES} 2013, Santa Clara,
                  CA, USA, June 28 - July 3, 2013},
  pages        = {255--259},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/SERVICES.2013.43},
  doi          = {10.1109/SERVICES.2013.43},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/services/NixKS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/services/Shetty13,
  author       = {Sachin Shetty},
  title        = {Auditing and Analysis of Network Traffic in Cloud Environment},
  booktitle    = {{IEEE} Ninth World Congress on Services, {SERVICES} 2013, Santa Clara,
                  CA, USA, June 28 - July 3, 2013},
  pages        = {260--267},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/SERVICES.2013.42},
  doi          = {10.1109/SERVICES.2013.42},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/services/Shetty13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpmc/BhattaraiHS13,
  author       = {Sudeep Bhattarai and
                  Liang Hong and
                  Sachin Shetty},
  title        = {Optimum transmit beamforming scheme for underlay cognitive radio networks},
  booktitle    = {The 16th International Symposium on Wireless Personal Multimedia Communications,
                  {WPMC} 2013, Atlantic City, NJ, USA, June 24-27, 2013},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://ieeexplore.ieee.org/document/6618606/},
  timestamp    = {Thu, 12 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wpmc/BhattaraiHS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcbdd/TangCS12,
  author       = {Ying Tang and
                  David Carbonetta and
                  Sachin Shetty},
  title        = {Development of an integrated network visualisation and graph analysis
                  tool for biological networks},
  journal      = {Int. J. Comput. Biol. Drug Des.},
  volume       = {5},
  number       = {2},
  pages        = {152--163},
  year         = {2012},
  url          = {https://doi.org/10.1504/IJCBDD.2012.048318},
  doi          = {10.1504/IJCBDD.2012.048318},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcbdd/TangCS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccgrid/MukkavilliS12,
  author       = {Sai Kiran Mukkavilli and
                  Sachin Shetty},
  title        = {Mining Concept Drifting Network Traffic in Cloud Computing Environments},
  booktitle    = {12th {IEEE/ACM} International Symposium on Cluster, Cloud and Grid
                  Computing, CCGrid 2012, Ottawa, Canada, May 13-16, 2012},
  pages        = {721--722},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/CCGrid.2012.142},
  doi          = {10.1109/CCGRID.2012.142},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccgrid/MukkavilliS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/ShettyLX12,
  author       = {Sachin Shetty and
                  Nicholas Luna and
                  Kaiqi Xiong},
  title        = {Assessing network path vulnerabilities for secure cloud computing},
  booktitle    = {Proceedings of {IEEE} International Conference on Communications,
                  {ICC} 2012, Ottawa, ON, Canada, June 10-15, 2012},
  pages        = {5548--5552},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/ICC.2012.6364720},
  doi          = {10.1109/ICC.2012.6364720},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/ShettyLX12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iconip/RavalRSS12,
  author       = {Kalpesh Raval and
                  Ravi Prakash Ramachandran and
                  Sachin S. Shetty and
                  Brett Y. Smolenski},
  editor       = {Tingwen Huang and
                  Zhigang Zeng and
                  Chuandong Li and
                  Chi{-}Sing Leung},
  title        = {Feature and Signal Enhancement for Robust Speaker Identification of
                  {G.729} Decoded Speech},
  booktitle    = {Neural Information Processing - 19th International Conference, {ICONIP}
                  2012, Doha, Qatar, November 12-15, 2012, Proceedings, Part {V}},
  series       = {Lecture Notes in Computer Science},
  volume       = {7667},
  pages        = {345--352},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34500-5\_41},
  doi          = {10.1007/978-3-642-34500-5\_41},
  timestamp    = {Wed, 03 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iconip/RavalRSS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icppw/RawatSR12,
  author       = {Danda B. Rawat and
                  Sachin Shetty and
                  Khurram Raza},
  title        = {Secure Radio Resource Management in Cloud Computing Based Cognitive
                  Radio Networks},
  booktitle    = {41st International Conference on Parallel Processing Workshops, {ICPPW}
                  2012, Pittsburgh, PA, USA, September 10-13, 2012},
  pages        = {288--295},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/ICPPW.2012.43},
  doi          = {10.1109/ICPPW.2012.43},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icppw/RawatSR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscas/RamachandranPDS12,
  author       = {Ravi Prakash Ramachandran and
                  Robi Polikar and
                  Kevin D. Dahm and
                  Sachin S. Shetty},
  title        = {Open-ended design and performance evaluation of a biometric speaker
                  identification system},
  booktitle    = {2012 {IEEE} International Symposium on Circuits and Systems, {ISCAS}
                  2012, Seoul, Korea (South), May 20-23, 2012},
  pages        = {2697--2700},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/ISCAS.2012.6271864},
  doi          = {10.1109/ISCAS.2012.6271864},
  timestamp    = {Wed, 03 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iscas/RamachandranPDS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/milcom/MazikuSHR12,
  author       = {Hellen Maziku and
                  Sachin Shetty and
                  Keesook Han and
                  Tamara Rogers},
  title        = {Enhancing the classification accuracy of {IP} geolocation},
  booktitle    = {31st {IEEE} Military Communications Conference, {MILCOM} 2012, Orlando,
                  FL, USA, October 29 - November 1, 2012},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/MILCOM.2012.6415842},
  doi          = {10.1109/MILCOM.2012.6415842},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/milcom/MazikuSHR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mwscas/ThayasivamSKR12,
  author       = {Umashanger Thayasivam and
                  Sachin S. Shetty and
                  Chinthaka Kuruwita and
                  Ravi Prakash Ramachandran},
  title        = {Detection of anomalies in network traffic using {L2E} for accurate
                  speaker recognition},
  booktitle    = {55th {IEEE} International Midwest Symposium on Circuits and Systems,
                  {MWSCAS} 2012, Boise, ID, USA, August 5-8, 2012},
  pages        = {884--887},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/MWSCAS.2012.6292162},
  doi          = {10.1109/MWSCAS.2012.6292162},
  timestamp    = {Mon, 09 Aug 2021 14:54:01 +0200},
  biburl       = {https://dblp.org/rec/conf/mwscas/ThayasivamSKR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ppna/SongSJP11,
  author       = {Min Song and
                  Sachin Shetty and
                  Wenbin Jiang and
                  Eun Kyo Park},
  title        = {Special issue on information dissemination and new services in {P2P}
                  systems},
  journal      = {Peer-to-Peer Netw. Appl.},
  volume       = {4},
  number       = {1},
  pages        = {1--2},
  year         = {2011},
  url          = {https://doi.org/10.1007/s12083-010-0095-x},
  doi          = {10.1007/S12083-010-0095-X},
  timestamp    = {Mon, 04 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ppna/SongSJP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cogsima/KhoshnawZSM11,
  author       = {Abdulqadir Khoshnaw and
                  Saleh Zein{-}Sabatto and
                  Sachin Shetty and
                  Mohan Malkani},
  editor       = {Gabriel Jakobson and
                  Mica R. Endsley and
                  Mitch Kokar},
  title        = {Development of information fusion model for layered sensing systems
                  using computing with words},
  booktitle    = {{IEEE} International Inter-Disciplinary Conference on Cognitive Methods
                  in Situation Awareness and Decision Support, CogSIMA 2011, Miami,
                  FL, USA, February 21-24, 2011},
  pages        = {183--188},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/COGSIMA.2011.5753442},
  doi          = {10.1109/COGSIMA.2011.5753442},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cogsima/KhoshnawZSM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eusipco/ShettyAR11,
  author       = {Sachin Shetty and
                  Kodzo Agbedanu and
                  Ravi Prakash Ramachandran},
  title        = {Opportunistic spectrum access in multi-user multi-channel cognitive
                  radio networks},
  booktitle    = {Proceedings of the 19th European Signal Processing Conference, {EUSIPCO}
                  2011, Barcelona, Spain, August 29 - Sept. 2, 2011},
  pages        = {1229--1233},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/7074060/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eusipco/ShettyAR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icnsc/TangS11,
  author       = {Gina Tang and
                  Sachin Shetty},
  title        = {Adaptive virtual reality game system for personalized problem-based
                  learning},
  booktitle    = {Proceedings of the {IEEE} International Conference on Networking,
                  Sensing and Control, {ICNSC} 2011, Delft, The Netherlands, 11-13 April
                  2011},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ICNSC.2011.5874957},
  doi          = {10.1109/ICNSC.2011.5874957},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/icnsc/TangS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ShivarajSS10,
  author       = {Gayathri Shivaraj and
                  Min Song and
                  Sachin Shetty},
  title        = {Using Hidden Markov Model to detect rogue access points},
  journal      = {Secur. Commun. Networks},
  volume       = {3},
  number       = {5},
  pages        = {394--407},
  year         = {2010},
  url          = {https://doi.org/10.1002/sec.190},
  doi          = {10.1002/SEC.190},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ShivarajSS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/apccas/MudrowskyRS10,
  author       = {Robert W. Mudrowsky and
                  Ravi Prakash Ramachandran and
                  Sachin S. Shetty},
  title        = {The affine transform and feature fusion for robust speaker identification
                  in the presence of speech coding distortion},
  booktitle    = {{IEEE} Asia Pacific Conference on Circuits and Systems, {APCCAS} 2010,
                  Kuala Lumpur, Malaysia, December 6-9, 2010},
  pages        = {1063--1066},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/APCCAS.2010.5774905},
  doi          = {10.1109/APCCAS.2010.5774905},
  timestamp    = {Wed, 03 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/apccas/MudrowskyRS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesem/TangSC10,
  author       = {Ying Tang and
                  Sachin Shetty and
                  Xiufang Chen},
  title        = {Empowering students with engineering literacy and problem-solving
                  through interactive virtual reality games},
  booktitle    = {2010 International {IEEE} Consumer Electronics Society's Games Innovations
                  Conference, {ICE-GIC} 2010, Hong Kong, December 21-23, 2010},
  pages        = {64--69},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/ICEGIC.2010.5716890},
  doi          = {10.1109/ICEGIC.2010.5716890},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesem/TangSC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/XinSMSS10,
  author       = {Chunsheng Xin and
                  Min Song and
                  Liangping Ma and
                  Sachin Shetty and
                  Chien{-}Chung Shen},
  title        = {Control-Free Dynamic Spectrum Access for Cognitive Radio Networks},
  booktitle    = {Proceedings of {IEEE} International Conference on Communications,
                  {ICC} 2010, Cape Town, South Africa, 23-27 May 2010},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/ICC.2010.5502048},
  doi          = {10.1109/ICC.2010.5502048},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/XinSMSS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icnsc/ShettyTC10,
  author       = {Sachin Shetty and
                  Ying Tang and
                  William Collani},
  title        = {{TCP} Venoplus - {A} cross-layer approach to improve {TCP} performance
                  in wired-cum-wireless networks using signal strength},
  booktitle    = {Proceedings of the {IEEE} International Conference on Networking,
                  Sensing and Control, {ICNSC} 2010, Chicago, IL, USA, 10-12 April 2010},
  pages        = {693--697},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/ICNSC.2010.5461571},
  doi          = {10.1109/ICNSC.2010.5461571},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/icnsc/ShettyTC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscas/RamachandranS10,
  author       = {Ravi Prakash Ramachandran and
                  Sachin S. Shetty},
  title        = {Blind channel estimation based robust physical layer key generation
                  in {MIMO} networks},
  booktitle    = {International Symposium on Circuits and Systems {(ISCAS} 2010), May
                  30 - June 2, 2010, Paris, France},
  pages        = {2522--2525},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/ISCAS.2010.5537122},
  doi          = {10.1109/ISCAS.2010.5537122},
  timestamp    = {Wed, 03 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iscas/RamachandranS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcmse/ShettySYM09,
  author       = {Sachin Shetty and
                  Min Song and
                  HouJun Yang and
                  Lisa Matthews},
  title        = {Learning distributed bayesian network structure using majority-based
                  method},
  journal      = {J. Comput. Methods Sci. Eng.},
  volume       = {9},
  number       = {4-6},
  pages        = {53--68},
  year         = {2009},
  url          = {https://doi.org/10.3233/JCM-2009-0235},
  doi          = {10.3233/JCM-2009-0235},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcmse/ShettySYM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/ShettySXP09,
  author       = {Sachin Shetty and
                  Min Song and
                  Chunsheng Xin and
                  E. K. Park},
  title        = {A Learning-based Multiuser Opportunistic Spectrum Access Approach
                  in Unslotted Primary Networks},
  booktitle    = {{INFOCOM} 2009. 28th {IEEE} International Conference on Computer Communications,
                  Joint Conference of the {IEEE} Computer and Communications Societies,
                  19-25 April 2009, Rio de Janeiro, Brazil},
  pages        = {2966--2970},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/INFCOM.2009.5062268},
  doi          = {10.1109/INFCOM.2009.5062268},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/ShettySXP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mue/ShettySW09,
  author       = {Sachin Shetty and
                  Min Song and
                  Jun Wang},
  title        = {Distributed Adaptive Protocols for Information Dissemination in Large-Scale
                  Communication Systems},
  booktitle    = {2009 Third International Conference on Multimedia and Ubiquitous Engineering,
                  {MUE} 2009, Qingdao, China, June 4-6, 2009},
  pages        = {279--286},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/MUE.2009.56},
  doi          = {10.1109/MUE.2009.56},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mue/ShettySW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rtcsa/ZhouSSS09,
  author       = {Gang Zhou and
                  Sachin Shetty and
                  George Simmons and
                  Min Song},
  title        = {{PLL} Based Time Synchronization in Wireless Sensor Networks},
  booktitle    = {15th {IEEE} International Conference on Embedded and Real-Time Computing
                  Systems and Applications, {RTCSA} 2009, Beijing, China, 24-26 August
                  2009},
  pages        = {51--56},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/RTCSA.2009.12},
  doi          = {10.1109/RTCSA.2009.12},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/rtcsa/ZhouSSS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sede/Shetty08,
  author       = {Sachin Shetty},
  editor       = {Hisham Al{-}Mubaid and
                  Rym Zalila{-}Wenkstern},
  title        = {Min Song, Youjun Yang, Mary Mathews: Learning Bayesian Network over
                  Distributed Databases Using Majority-based Method},
  booktitle    = {17th International Conference on Software Engineering and Data Engineering
                  (SEDE-2008), June 30 - July 2, 2008, Omni Los Angeles Hotel at California
                  Plaza, Los Angeles, California, USA, Proceedings},
  pages        = {209--215},
  publisher    = {{ISCA}},
  year         = {2008},
  timestamp    = {Wed, 21 Jan 2009 10:04:27 +0100},
  biburl       = {https://dblp.org/rec/conf/sede/Shetty08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/monet/SongSG07,
  author       = {Min Song and
                  Sachin Shetty and
                  Deepthi Gopalpet},
  title        = {Coexistence of {IEEE} 802.11b and Bluetooth: An Integrated Performance
                  Analysis},
  journal      = {Mob. Networks Appl.},
  volume       = {12},
  number       = {5-6},
  pages        = {450--459},
  year         = {2007},
  url          = {https://doi.org/10.1007/s11036-008-0047-3},
  doi          = {10.1007/S11036-008-0047-3},
  timestamp    = {Thu, 24 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/monet/SongSG07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cata/ShettySAAB07,
  author       = {Sachin Shetty and
                  Min Song and
                  Robert Ash and
                  Ersin Ancel and
                  Kenneth Bone},
  editor       = {Bidyut Gupta},
  title        = {Wireless Sensor Payload Design for Sounding Rocket},
  booktitle    = {22nd International Conference on Computers and Their Applications,
                  CATA-2007, Honolulu, Hawaii, USA, March 28-30, 2007},
  pages        = {295--300},
  publisher    = {{ISCA}},
  year         = {2007},
  timestamp    = {Mon, 09 Aug 2021 16:27:19 +0200},
  biburl       = {https://dblp.org/rec/conf/cata/ShettySAAB07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/snpd/MathewsSSM07,
  author       = {Mary Mathews and
                  Min Song and
                  Sachin Shetty and
                  Rick McKenzie},
  editor       = {Wenying Feng and
                  Feng Gao},
  title        = {Detecting Compromised Nodes in Wireless Sensor Networks},
  booktitle    = {Proceedings of the 8th {ACIS} International Conference on Software
                  Engineering, Artificial Intelligence, Networking and Parallel/Distributed
                  Computing, {SNPD} 2007, July 30 - August 1, 2007, Qingdao, China},
  pages        = {273--278},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/SNPD.2007.538},
  doi          = {10.1109/SNPD.2007.538},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/snpd/MathewsSSM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccnmc/SongSL05,
  author       = {Min Song and
                  Sachin Shetty and
                  Wu Li},
  editor       = {Xicheng Lu and
                  Wei Zhao},
  title        = {Fair and Smooth Scheduling for Virtual Output Queuing Switches Achieving
                  100{\%} Throughput},
  booktitle    = {Networking and Mobile Computing, Third International Conference, {ICCNMC}
                  2005, Zhangjiajie, China, August 2-4, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3619},
  pages        = {405--413},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11534310\_44},
  doi          = {10.1007/11534310\_44},
  timestamp    = {Fri, 09 Apr 2021 18:41:16 +0200},
  biburl       = {https://dblp.org/rec/conf/iccnmc/SongSL05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itre/ShettyS05,
  author       = {Sachin Shetty and
                  Min Song},
  title        = {Structure learning of Bayesian networks using a semantic genetic algorithm-based
                  approach},
  booktitle    = {{ITRE} 2005 - 3rd International Conference on Information Technology:
                  Research and Education, June 27-30 2005, Hsinchu, Taiwan, Proceedings},
  pages        = {454--458},
  publisher    = {{IEEE}},
  year         = {2005},
  url          = {https://doi.org/10.1109/ITRE.2005.1503164},
  doi          = {10.1109/ITRE.2005.1503164},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/itre/ShettyS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ISCApdcs/SongSAY04,
  author       = {Min Song and
                  Sachin Shetty and
                  Mansoor Alam and
                  HouJun Yang},
  editor       = {David A. Bader and
                  Ashfaq A. Khokhar},
  title        = {A New Multicast Queuing Mechanism for High-Speed Packet Switches},
  booktitle    = {Proceedings of the {ISCA} 17th International Conference on Parallel
                  and Distributed Computing Systems, September 15-17, 2004, The Canterbury
                  Hotel, San Francisco, California, {USA}},
  pages        = {327--332},
  publisher    = {{ISCA}},
  year         = {2004},
  timestamp    = {Mon, 09 Aug 2021 16:35:42 +0200},
  biburl       = {https://dblp.org/rec/conf/ISCApdcs/SongSAY04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ISCApdcs/SongSLY03,
  author       = {Min Song and
                  Sachin Shetty and
                  Guillermo Loaisiga and
                  HouJun Yang},
  editor       = {Seong{-}Moo Yoo and
                  Hee Yong Youn},
  title        = {Efficient Queuing Scheme for Multicast Switches in Overlay Networks},
  booktitle    = {Proceedings of the {ISCA} 16th International Conference on Parallel
                  and Distributed Computing Systems, August 13-15, 2003, Atlantis Hotel,
                  Reno, Nevada, {USA}},
  pages        = {76--81},
  publisher    = {{ISCA}},
  year         = {2003},
  timestamp    = {Mon, 09 Aug 2021 16:35:48 +0200},
  biburl       = {https://dblp.org/rec/conf/ISCApdcs/SongSLY03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/caine/SongSZ03,
  author       = {Min Song and
                  Sachin Shetty and
                  Weiying Zhu},
  editor       = {Kendall E. Nygard},
  title        = {Evolutionary Programming in a Distributed Packet Scheduling Architecture},
  booktitle    = {Proceedings of the 16th International Conference on Computer Applications
                  in Industry and Engineering, November 11-13, 2003, Imperial Palace
                  Hotel, Las Vegas, Nevada, {USA}},
  pages        = {230--233},
  publisher    = {{ISCA}},
  year         = {2003},
  timestamp    = {Thu, 20 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/caine/SongSZ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ISCAicis/SongASJ02,
  author       = {Min Song and
                  Mansoor Alam and
                  Sachin Shetty and
                  Uday Jarajapu},
  editor       = {Adel Said Elmaghraby and
                  Robert Dees},
  title        = {Evolutionary Scheduling in a Multi-Service Routing Switch},
  booktitle    = {Proceedings of the 11th Conference on Intelligent Systems: Emerging
                  Technologies, July 18-20, 2002, Boston, Massachusetts, {USA}},
  pages        = {38--43},
  publisher    = {{ISCA}},
  year         = {2002},
  timestamp    = {Mon, 09 Aug 2021 16:17:38 +0200},
  biburl       = {https://dblp.org/rec/conf/ISCAicis/SongASJ02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icassp/ShettyMC01,
  author       = {Sachin Shetty and
                  John N. McDonald and
                  Douglas Cochran},
  title        = {A windowing condition for characterization of finite signals from
                  spectral phase or magnitude},
  booktitle    = {{IEEE} International Conference on Acoustics, Speech, and Signal Processing,
                  {ICASSP} 2001, 7-11 May, 2001, Salt Palace Convention Center, Salt
                  Lake City, Utah, USA, Proceedings},
  pages        = {3889--3892},
  publisher    = {{IEEE}},
  year         = {2001},
  url          = {https://doi.org/10.1109/ICASSP.2001.940693},
  doi          = {10.1109/ICASSP.2001.940693},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icassp/ShettyMC01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics