Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Sachin Shetty
@article{DBLP:journals/access/PrajapatKKDSH24, author = {Sunil Prajapat and Pankaj Kumar and Sandeep Kumar and Ashok Kumar Das and Sachin Shetty and M. Shamim Hossain}, title = {Designing High-Performance Identity-Based Quantum Signature Protocol With Strong Security}, journal = {{IEEE} Access}, volume = {12}, pages = {14647--14658}, year = {2024}, url = {https://doi.org/10.1109/ACCESS.2024.3355196}, doi = {10.1109/ACCESS.2024.3355196}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/PrajapatKKDSH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iot/BandaraLFSMRRZN24, author = {Eranga Bandara and Xueping Liang and Peter Foytik and Sachin Shetty and Ravi Mukkamala and Abdul Rahman and Nalin Ranasinghe and Kasun De Zoysa and Wee Keong Ng}, title = {Lightweight, geo-scalable deterministic blockchain design for 5G networks sliced applications with hierarchical {CFT/BFT} consensus groups, {IPFS} and novel hardware design}, journal = {Internet Things}, volume = {25}, pages = {101077}, year = {2024}, url = {https://doi.org/10.1016/j.iot.2024.101077}, doi = {10.1016/J.IOT.2024.101077}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iot/BandaraLFSMRRZN24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tits/TanRS24, author = {Le Thanh Tan and Martin Reisslein and Sachin Shetty}, title = {Multi-Timescale Actor-Critic Learning for Computing Resource Management With Semi-Markov Renewal Process Mobility}, journal = {{IEEE} Trans. Intell. Transp. Syst.}, volume = {25}, number = {1}, pages = {452--461}, year = {2024}, url = {https://doi.org/10.1109/TITS.2023.3303953}, doi = {10.1109/TITS.2023.3303953}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tits/TanRS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnse/MishraWSDRS24, author = {Amit Kumar Mishra and Mohammad Wazid and Devesh Pratap Singh and Ashok Kumar Das and Sandip Roy and Sachin Shetty}, title = {{ACKS-IA:} An Access Control and Key Agreement Scheme for Securing Industry 4.0 Applications}, journal = {{IEEE} Trans. Netw. Sci. Eng.}, volume = {11}, number = {1}, pages = {254--269}, year = {2024}, url = {https://doi.org/10.1109/TNSE.2023.3296329}, doi = {10.1109/TNSE.2023.3296329}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tnse/MishraWSDRS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvt/RoyNMSDL24, author = {Sandip Roy and Sourav Nandi and Raj Maheshwari and Sachin Shetty and Ashok Kumar Das and Pascal Lorenz}, title = {Blockchain-Based Efficient Access Control With Handover Policy in IoV-Enabled Intelligent Transportation System}, journal = {{IEEE} Trans. Veh. Technol.}, volume = {73}, number = {3}, pages = {3009--3024}, year = {2024}, url = {https://doi.org/10.1109/TVT.2023.3322637}, doi = {10.1109/TVT.2023.3322637}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tvt/RoyNMSDL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccnc/BandaraFSMRLNZ24, author = {Eranga Bandara and Peter Foytik and Sachin Shetty and Ravi Mukkamala and Abdul Rahman and Xueping Liang and Wee Keong Ng and Kasun De Zoysa}, title = {SliceGPT - OpenAI {GPT-3.5} LLM, Blockchain and Non-Fungible Token Enabled Intelligent 5G/6G Network Slice Broker and Marketplace}, booktitle = {21st {IEEE} Consumer Communications {\&} Networking Conference, {CCNC} 2024, Las Vegas, NV, USA, January 6-9, 2024}, pages = {439--445}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/CCNC51664.2024.10454701}, doi = {10.1109/CCNC51664.2024.10454701}, timestamp = {Tue, 26 Mar 2024 22:14:36 +0100}, biburl = {https://dblp.org/rec/conf/ccnc/BandaraFSMRLNZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccnc/SinghSCWAW24, author = {Bikash Chandra Singh and Sachin Shetty and Praneet Chivate and David Wright and Alex Alenberg and Peter Woodward}, title = {Performance Analysis of Indoor 5G {NR} Systems}, booktitle = {21st {IEEE} Consumer Communications {\&} Networking Conference, {CCNC} 2024, Las Vegas, NV, USA, January 6-9, 2024}, pages = {632--633}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/CCNC51664.2024.10454767}, doi = {10.1109/CCNC51664.2024.10454767}, timestamp = {Tue, 26 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccnc/SinghSCWAW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccnc/FoytikBAS24, author = {Peter Foytik and Safdar Hussain Bouk and Gustave Anderson and Sachin Shetty}, title = {Self-Sovereign Identity Management in Ship-Based 5G-Devices Use Case}, booktitle = {21st {IEEE} Consumer Communications {\&} Networking Conference, {CCNC} 2024, Las Vegas, NV, USA, January 6-9, 2024}, pages = {650--651}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/CCNC51664.2024.10454874}, doi = {10.1109/CCNC51664.2024.10454874}, timestamp = {Tue, 26 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccnc/FoytikBAS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccnc/GhoshNSK24, author = {Uttam Ghosh and Laurent Njilla and Sachin Shetty and Charles A. Kamhoua}, title = {A Decentralized Smart Grid Communication Framework Using SDN-Enabled Blockchain}, booktitle = {21st {IEEE} Consumer Communications {\&} Networking Conference, {CCNC} 2024, Las Vegas, NV, USA, January 6-9, 2024}, pages = {982--985}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/CCNC51664.2024.10454835}, doi = {10.1109/CCNC51664.2024.10454835}, timestamp = {Tue, 26 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccnc/GhoshNSK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccnc/BoukOS24, author = {Safdar Hussain Bouk and Babatunji Omoniwa and Sachin Shetty}, title = {Predicting Downlink Retransmissions in 5G Networks Using Deep Learning}, booktitle = {21st {IEEE} Consumer Communications {\&} Networking Conference, {CCNC} 2024, Las Vegas, NV, USA, January 6-9, 2024}, pages = {1056--1057}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/CCNC51664.2024.10454769}, doi = {10.1109/CCNC51664.2024.10454769}, timestamp = {Tue, 26 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccnc/BoukOS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2403-06388, author = {Md. Shirajum Munir and Sravanthi Proddatoori and Manjushree Muralidhara and Walid Saad and Zhu Han and Sachin Shetty}, title = {A Zero Trust Framework for Realization and Defense Against Generative {AI} Attacks in Power Grid}, journal = {CoRR}, volume = {abs/2403.06388}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2403.06388}, doi = {10.48550/ARXIV.2403.06388}, eprinttype = {arXiv}, eprint = {2403.06388}, timestamp = {Thu, 04 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2403-06388.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/JavedAAAMDS23, author = {Safdar Hussain Javed and Maaz Bin Ahmad and Muhammad Asif and Waseem Akram and Khalid Mahmood and Ashok Kumar Das and Sachin Shetty}, title = {{APT} Adversarial Defence Mechanism for Industrial IoT Enabled Cyber-Physical System}, journal = {{IEEE} Access}, volume = {11}, pages = {74000--74020}, year = {2023}, url = {https://doi.org/10.1109/ACCESS.2023.3291599}, doi = {10.1109/ACCESS.2023.3291599}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/JavedAAAMDS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ThapliyalWSDSA23, author = {Siddhant Thapliyal and Mohammad Wazid and Devesh Pratap Singh and Ashok Kumar Das and Sachin Shetty and Abdullah Alqahtani}, title = {Design of Robust Blockchain-Envisioned Authenticated Key Management Mechanism for Smart Healthcare Applications}, journal = {{IEEE} Access}, volume = {11}, pages = {93032--93047}, year = {2023}, url = {https://doi.org/10.1109/ACCESS.2023.3310264}, doi = {10.1109/ACCESS.2023.3310264}, timestamp = {Fri, 01 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/ThapliyalWSDSA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/KhahMGS23, author = {Mohammad Ali Mansouri Khah and Neda Moghim and Nasrin Gholami and Sachin Shetty}, title = {Energy-Efficient Multi-Rate Opportunistic Routing in Wireless Mesh Networks}, journal = {{IEEE} Access}, volume = {11}, pages = {97466--97477}, year = {2023}, url = {https://doi.org/10.1109/ACCESS.2023.3313096}, doi = {10.1109/ACCESS.2023.3313096}, timestamp = {Sat, 14 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/KhahMGS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ThakurPKDS23, author = {Garima Thakur and Sunil Prajapat and Pankaj Kumar and Ashok Kumar Das and Sachin Shetty}, title = {An Efficient Lightweight Provably Secure Authentication Protocol for Patient Monitoring Using Wireless Medical Sensor Networks}, journal = {{IEEE} Access}, volume = {11}, pages = {114662--114679}, year = {2023}, url = {https://doi.org/10.1109/ACCESS.2023.3325130}, doi = {10.1109/ACCESS.2023.3325130}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/ThakurPKDS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LiangKSBS23, author = {Xueping Liang and Charalambos Konstantinou and Sachin Shetty and Eranga Bandara and Ruimin Sun}, title = {Decentralizing Cyber Physical Systems for Resilience: An Innovative Case Study from {A} Cybersecurity Perspective}, journal = {Comput. Secur.}, volume = {124}, pages = {102953}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2022.102953}, doi = {10.1016/J.COSE.2022.102953}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/LiangKSBS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csr/GugueothSSR23, author = {Vinay Gugueoth and Sunitha Safavat and Sachin Shetty and Danda B. Rawat}, title = {A review of IoT security and privacy using decentralized blockchain techniques}, journal = {Comput. Sci. Rev.}, volume = {50}, pages = {100585}, year = {2023}, url = {https://doi.org/10.1016/j.cosrev.2023.100585}, doi = {10.1016/J.COSREV.2023.100585}, timestamp = {Thu, 25 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csr/GugueothSSR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ict-express/GugueothSS23, author = {Vinay Gugueoth and Sunitha Safavat and Sachin Shetty}, title = {Security of Internet of Things (IoT) using federated learning and deep learning - Recent advancements, issues and prospects}, journal = {{ICT} Express}, volume = {9}, number = {5}, pages = {941--960}, year = {2023}, url = {https://doi.org/10.1016/j.icte.2023.03.006}, doi = {10.1016/J.ICTE.2023.03.006}, timestamp = {Wed, 24 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ict-express/GugueothSS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/BandaraLSMFRZ23, author = {Eranga Bandara and Xueping Liang and Sachin Shetty and Ravi Mukkamala and Peter Foytik and Nalin Ranasinghe and Kasun De Zoysa}, title = {Octopus: privacy preserving peer-to-peer transactions system with InterPlanetary file system {(IPFS)}}, journal = {Int. J. Inf. Sec.}, volume = {22}, number = {3}, pages = {591--609}, year = {2023}, url = {https://doi.org/10.1007/s10207-022-00650-2}, doi = {10.1007/S10207-022-00650-2}, timestamp = {Sun, 04 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/BandaraLSMFRZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/DasRBS23, author = {Ashok Kumar Das and Sandip Roy and Eranga Bandara and Sachin Shetty}, title = {Securing Age-of-Information (AoI)-Enabled 5G Smart Warehouse Using Access Control Scheme}, journal = {{IEEE} Internet Things J.}, volume = {10}, number = {2}, pages = {1358--1375}, year = {2023}, url = {https://doi.org/10.1109/JIOT.2022.3205245}, doi = {10.1109/JIOT.2022.3205245}, timestamp = {Tue, 31 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotj/DasRBS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/MunirKASSPH23, author = {Md. Shirajum Munir and Ki Tae Kim and Apurba Adhikary and Walid Saad and Sachin Shetty and Seong{-}Bae Park and Choong Seon Hong}, title = {Neuro-Symbolic Explainable Artificial Intelligence Twin for Zero-Touch IoE in Wireless Network}, journal = {{IEEE} Internet Things J.}, volume = {10}, number = {24}, pages = {22451--22468}, year = {2023}, url = {https://doi.org/10.1109/JIOT.2023.3303713}, doi = {10.1109/JIOT.2023.3303713}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotj/MunirKASSPH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotm/BagchiBDSVK23, author = {Prithwi Bagchi and Basudeb Bera and Ashok Kumar Das and Sachin Shetty and Pandi Vijayakumar and Marimuthu Karuppiah}, title = {Post Quantum Lattice-Based Secure Framework using Aggregate Signature for Ambient Intelligence Assisted Blockchain-Based IoT Applications}, journal = {{IEEE} Internet Things Mag.}, volume = {6}, number = {1}, pages = {52--58}, year = {2023}, url = {https://doi.org/10.1109/IOTM.001.2100215}, doi = {10.1109/IOTM.001.2100215}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotm/BagchiBDSVK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/BhattacharyaRCDS23, author = {Munmun Bhattacharya and Sandip Roy and Samiran Chattopadhyay and Ashok Kumar Das and Sachin Shetty}, title = {A comprehensive survey on online social networks security and privacy issues: Threats, machine learning-based solutions, and open challenges}, journal = {Secur. Priv.}, volume = {6}, number = {1}, year = {2023}, url = {https://doi.org/10.1002/spy2.275}, doi = {10.1002/SPY2.275}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/BhattacharyaRCDS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tce/WazidDS23, author = {Mohammad Wazid and Ashok Kumar Das and Sachin Shetty}, title = {{BSFR-SH:} Blockchain-Enabled Security Framework Against Ransomware Attacks for Smart Healthcare}, journal = {{IEEE} Trans. Consumer Electron.}, volume = {69}, number = {1}, pages = {18--28}, year = {2023}, url = {https://doi.org/10.1109/TCE.2022.3208795}, doi = {10.1109/TCE.2022.3208795}, timestamp = {Fri, 10 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tce/WazidDS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WazidDSRG23, author = {Mohammad Wazid and Ashok Kumar Das and Sachin Shetty and Joel J. P. C. Rodrigues and Mohsen Guizani}, title = {{AISCM-FH:} AI-Enabled Secure Communication Mechanism in Fog Computing-Based Healthcare}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {18}, pages = {319--334}, year = {2023}, url = {https://doi.org/10.1109/TIFS.2022.3220959}, doi = {10.1109/TIFS.2022.3220959}, timestamp = {Sun, 15 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/WazidDSRG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnse/WazidTSDS23, author = {Mohammad Wazid and Siddhant Thapliyal and Devesh Pratap Singh and Ashok Kumar Das and Sachin Shetty}, title = {Design and Testbed Experiments of User Authentication and Key Establishment Mechanism for Smart Healthcare Cyber Physical Systems}, journal = {{IEEE} Trans. Netw. Sci. Eng.}, volume = {10}, number = {5}, pages = {2697--2709}, year = {2023}, url = {https://doi.org/10.1109/TNSE.2022.3163201}, doi = {10.1109/TNSE.2022.3163201}, timestamp = {Sat, 14 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tnse/WazidTSDS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvt/PalaniswamyARDS23, author = {Basker Palaniswamy and Keyvan Ansari and Alavalapati Goutham Reddy and Ashok Kumar Das and Sachin Shetty}, title = {Robust Certificateless Authentication Protocol for the {SAE} {J1939} Commercial Vehicles Bus}, journal = {{IEEE} Trans. Veh. Technol.}, volume = {72}, number = {4}, pages = {4493--4509}, year = {2023}, url = {https://doi.org/10.1109/TVT.2022.3227281}, doi = {10.1109/TVT.2022.3227281}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tvt/PalaniswamyARDS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/annsim/SahabanduBFSMRL23, author = {Nadini Sahabandu and Eranga Bandara and Peter Foytik and Sachin Shetty and Ravi Mukkamala and Abdul Rahman and Xueping Liang}, editor = {Mar{\'{\i}}a Julia Blas and Gonzalo Alvarez}, title = {GreenThread - Blockchain, Non-Fungible Token(NFT), Model Cards, Self-Sovereign Identity and {IPFS} Enabled Sustainable Circular Fashion Platform}, booktitle = {Annual Modeling and Simulation Conference, {ANNSIM} 2023, Hamilton, ON, Canada, May 23-26, 2023}, pages = {357--243}, publisher = {{IEEE}}, year = {2023}, url = {https://ieeexplore.ieee.org/document/10155217}, timestamp = {Tue, 11 Jul 2023 11:40:10 +0200}, biburl = {https://dblp.org/rec/conf/annsim/SahabanduBFSMRL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/MpembeleRGS23, author = {Armando B. Mpembele and Tamara Rogers and Uttam Ghosh and Sachin Shetty}, title = {Communication-Efficient and Privacy-Preserving Edge-Cloud Framework For Smart Healthcare}, booktitle = {{IEEE} Globecom Workshops 2023, Kuala Lumpur, Malaysia, December 4-8, 2023}, pages = {377--382}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/GCWkshps58843.2023.10464501}, doi = {10.1109/GCWKSHPS58843.2023.10464501}, timestamp = {Tue, 26 Mar 2024 22:14:40 +0100}, biburl = {https://dblp.org/rec/conf/globecom/MpembeleRGS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/MittalMWSDS23, author = {Saksham Mittal and Amit Kumar Mishra and Mohammad Wazid and Devesh Pratap Singh and Ashok Kumar Das and Sachin Shetty}, title = {Multiclass Classification Approaches for Intrusion Detection in IoT-Driven Aerial Computing Environment}, booktitle = {{IEEE} Global Communications Conference, {GLOBECOM} 2023, Kuala Lumpur, Malaysia, December 4-8, 2023}, pages = {2160--2165}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/GLOBECOM54140.2023.10436894}, doi = {10.1109/GLOBECOM54140.2023.10436894}, timestamp = {Sun, 10 Mar 2024 10:39:12 +0100}, biburl = {https://dblp.org/rec/conf/globecom/MittalMWSDS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/BouomLFSGK23, author = {Aymar Le P{\`{e}}re Tchimwa Bouom and Jean{-}Pierre Lienou and Frederica Free{-}Nelson and Sachin Shetty and Wilson Ejuh Geh and Charles A. Kamhoua}, title = {Cyber Resilience Measurement Through Logical Attack Graph Analysis}, booktitle = {{IEEE} International Conference on Communications, {ICC} 2023, Rome, Italy, May 28 - June 1, 2023}, pages = {6034--6039}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICC45041.2023.10279750}, doi = {10.1109/ICC45041.2023.10279750}, timestamp = {Thu, 02 Nov 2023 17:09:41 +0100}, biburl = {https://dblp.org/rec/conf/icc/BouomLFSGK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccnc/BanerjeeGS23, author = {Soumya Banerjee and Sarada Prasad Gochhayat and Sachin Shetty}, title = {Performance Analysis of Fixed Broadband Wireless Access in mmWave Band in 5G}, booktitle = {International Conference on Computing, Networking and Communications, {ICNC} 2023, Honolulu, HI, USA, February 20-22, 2023}, pages = {124--129}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICNC57223.2023.10074306}, doi = {10.1109/ICNC57223.2023.10074306}, timestamp = {Wed, 29 Mar 2023 17:46:17 +0200}, biburl = {https://dblp.org/rec/conf/iccnc/BanerjeeGS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccnc/HaqueSKG23, author = {Md Ariful Haque and Sachin Shetty and Charles A. Kamhoua and Kimberly Gold}, title = {Adversarial Technique Validation {\&} Defense Selection Using Attack Graph {\&} ATT{\&}CK Matrix}, booktitle = {International Conference on Computing, Networking and Communications, {ICNC} 2023, Honolulu, HI, USA, February 20-22, 2023}, pages = {181--187}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICNC57223.2023.10074241}, doi = {10.1109/ICNC57223.2023.10074241}, timestamp = {Wed, 29 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccnc/HaqueSKG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iri/ThakurRBHCS23, author = {Dipanwita Thakur and Sandip Roy and Suparna Biswas and Edmond S. L. Ho and Samiran Chattopadhyay and Sachin Shetty}, title = {A Novel Smartphone-Based Human Activity Recognition Approach using Convolutional Autoencoder Long Short-Term Memory Network}, booktitle = {24th {IEEE} International Conference on Information Reuse and Integration for Data Science, {IRI} 2023, Bellevue, WA, USA, August 4-6, 2023}, pages = {146--153}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/IRI58017.2023.00032}, doi = {10.1109/IRI58017.2023.00032}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iri/ThakurRBHCS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isncc/BandaraSFRMLS23, author = {Eranga Bandara and Sachin Shetty and Peter Foytik and Abdul Rahman and Ravi Mukkamala and Xueping Liang and Nadini Sahabandu}, title = {Blockchain, NFT, Federated Learning and Model Cards enabled {UAV} Surveillance System for 5G/6G Network Sliced Environment}, booktitle = {International Symposium on Networks, Computers and Communications, {ISNCC} 2023, Doha, Qatar, October 23-26, 2023}, pages = {1--8}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ISNCC58260.2023.10323641}, doi = {10.1109/ISNCC58260.2023.10323641}, timestamp = {Thu, 07 Dec 2023 20:38:52 +0100}, biburl = {https://dblp.org/rec/conf/isncc/BandaraSFRMLS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isncc/HasanS23, author = {Mahmudul Hasan and Sachin Shetty}, title = {Sentiment Analysis With Lipschitz Recurrent Neural Networks}, booktitle = {International Symposium on Networks, Computers and Communications, {ISNCC} 2023, Doha, Qatar, October 23-26, 2023}, pages = {1--4}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ISNCC58260.2023.10323619}, doi = {10.1109/ISNCC58260.2023.10323619}, timestamp = {Thu, 14 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isncc/HasanS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isncc/NipaLS23, author = {Nishat Ara Nipa and Yan Lu and Sachin Shetty}, title = {U-Net Based Disaster Damage Detection Through Semantic Segmentation}, booktitle = {International Symposium on Networks, Computers and Communications, {ISNCC} 2023, Doha, Qatar, October 23-26, 2023}, pages = {1--5}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ISNCC58260.2023.10323958}, doi = {10.1109/ISNCC58260.2023.10323958}, timestamp = {Thu, 07 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isncc/NipaLS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isncc/SadehvandMGS23, author = {Mehrdad Sadehvand and Neda Moghim and Behrouz Shahgholi Ghahfarokhi and Sachin Shetty}, title = {Transmission Power Control for Interference Reduction in Cellular {D2D} Networks}, booktitle = {International Symposium on Networks, Computers and Communications, {ISNCC} 2023, Doha, Qatar, October 23-26, 2023}, pages = {1--6}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ISNCC58260.2023.10323715}, doi = {10.1109/ISNCC58260.2023.10323715}, timestamp = {Thu, 07 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isncc/SadehvandMGS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobihoc/RoutraySSPCS23, author = {Sidheswar Routray and Amrit Suman and Preetam Suman and Sasmita Padhy and Pushpita Chatterjee and Sachin Shetty}, editor = {Jie Wu and Suresh Subramaniam and Bo Ji and Carla{-}Fabiana Chiasserini}, title = {Vehicular Safety Revolution: {A} Cutting-Edge Communication Paradigm for Accident Prevention}, booktitle = {Proceedings of the Twenty-fourth International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing, MobiHoc 2023, Washington, DC, USA, October 23-26, 2023}, pages = {406--411}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3565287.3623389}, doi = {10.1145/3565287.3623389}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mobihoc/RoutraySSPCS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wowmom/GhoshDCS23, author = {Uttam Ghosh and Debashis Das and Pushpita Chatterjee and Sachin Shetty}, title = {Quantum-Enabled Blockchain for Data Processing and Management in Smart Cities}, booktitle = {24th {IEEE} International Symposium on a World of Wireless, Mobile and Multimedia Networks, WoWMoM 2023, Boston, MA, USA, June 12-15, 2023}, pages = {425--430}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/WoWMoM57956.2023.00075}, doi = {10.1109/WOWMOM57956.2023.00075}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wowmom/GhoshDCS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wsc/MunirSR23, author = {Md. Shirajum Munir and Sachin Shetty and Danda B. Rawat}, title = {Trustworthy Artificial Intelligence Framework for Proactive Detection and Risk Explanation of Cyber Attacks in Smart Grid}, booktitle = {Winter Simulation Conference, {WSC} 2023, San Antonio, TX, USA, December 10-13, 2023}, pages = {636--647}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/WSC60868.2023.10408676}, doi = {10.1109/WSC60868.2023.10408676}, timestamp = {Sat, 24 Feb 2024 20:42:44 +0100}, biburl = {https://dblp.org/rec/conf/wsc/MunirSR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2306-07993, author = {Md. Shirajum Munir and Sachin Shetty and Danda B. Rawat}, title = {Trustworthy Artificial Intelligence Framework for Proactive Detection and Risk Explanation of Cyber Attacks in Smart Grid}, journal = {CoRR}, volume = {abs/2306.07993}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2306.07993}, doi = {10.48550/ARXIV.2306.07993}, eprinttype = {arXiv}, eprint = {2306.07993}, timestamp = {Sun, 18 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2306-07993.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2311-17097, author = {Ying Wang and Shashank Jere and Soumya Banerjee and Lingjia Liu and Sachin Shetty and Shehadi Dayekh}, title = {Anonymous Jamming Detection in 5G with Bayesian Network Model Based Inference Analysis}, journal = {CoRR}, volume = {abs/2311.17097}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2311.17097}, doi = {10.48550/ARXIV.2311.17097}, eprinttype = {arXiv}, eprint = {2311.17097}, timestamp = {Tue, 05 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2311-17097.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2312-00051, author = {Soumya Banerjee and Sandip Roy and Sayyed Farid Ahamed and Devin Quinn and Marc Vucovich and Dhruv Nandakumar and Kevin Choi and Abdul Rahman and Edward Bowen and Sachin Shetty}, title = {{MIA-BAD:} An Approach for Enhancing Membership Inference Attack and its Mitigation with Federated Learning}, journal = {CoRR}, volume = {abs/2312.00051}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2312.00051}, doi = {10.48550/ARXIV.2312.00051}, eprinttype = {arXiv}, eprint = {2312.00051}, timestamp = {Fri, 08 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2312-00051.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2312-09467, author = {Soumya Banerjee and Sarada Prasad Gochhayat and Sachin Shetty}, title = {Performance Analysis of Fixed Broadband Wireless Access in mmWave Band in 5G}, journal = {CoRR}, volume = {abs/2312.09467}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2312.09467}, doi = {10.48550/ARXIV.2312.09467}, eprinttype = {arXiv}, eprint = {2312.09467}, timestamp = {Tue, 09 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2312-09467.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/WazidSDSKR22, author = {Mohammad Wazid and Jaskaran Singh and Ashok Kumar Das and Sachin Shetty and Muhammad Khurram Khan and Joel J. P. C. Rodrigues}, title = {ASCP-IoMT: AI-Enabled Lightweight Secure Communication Protocol for Internet of Medical Things}, journal = {{IEEE} Access}, volume = {10}, pages = {57990--58004}, year = {2022}, url = {https://doi.org/10.1109/ACCESS.2022.3179418}, doi = {10.1109/ACCESS.2022.3179418}, timestamp = {Mon, 13 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/WazidSDSKR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adhoc/TanS22, author = {Le Thanh Tan and Sachin Shetty}, title = {Artificial intelligence-aided privacy preserving trustworthy computation and communication in 5G-based IoT networks}, journal = {Ad Hoc Networks}, volume = {126}, pages = {102752}, year = {2022}, url = {https://doi.org/10.1016/j.adhoc.2021.102752}, doi = {10.1016/J.ADHOC.2021.102752}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/adhoc/TanS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/ShettyWGD22, author = {Sachin S. Shetty and Jhing{-}Fa Wang and Uttam Ghosh and Schahram Dustdar}, title = {Guest Editorial Special Issue on Secure Data Analytics for Emerging Internet of Things}, journal = {{IEEE} Internet Things J.}, volume = {9}, number = {4}, pages = {2463--2467}, year = {2022}, url = {https://doi.org/10.1109/JIOT.2021.3126438}, doi = {10.1109/JIOT.2021.3126438}, timestamp = {Wed, 23 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotj/ShettyWGD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/WazidDS22, author = {Mohammad Wazid and Ashok Kumar Das and Sachin Shetty}, title = {TACAS-IoT: Trust Aggregation Certificate-Based Authentication Scheme for Edge-Enabled IoT Systems}, journal = {{IEEE} Internet Things J.}, volume = {9}, number = {22}, pages = {22643--22656}, year = {2022}, url = {https://doi.org/10.1109/JIOT.2022.3181610}, doi = {10.1109/JIOT.2022.3181610}, timestamp = {Sun, 13 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotj/WazidDS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jbft/BandaraSMLFRZ22, author = {Eranga Bandara and Sachin Shetty and Ravi Mukkamala and Xueping Liang and Peter Foytik and Nalin Ranasinghe and Kasun De Zoysa}, title = {Casper: a blockchain-based system for efficient and secure customer credential verification}, journal = {J. Bank. Financial Technol.}, volume = {6}, number = {1}, pages = {43--62}, year = {2022}, url = {https://doi.org/10.1007/s42786-021-00036-3}, doi = {10.1007/S42786-021-00036-3}, timestamp = {Fri, 01 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jbft/BandaraSMLFRZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jgim/HeZWLS22, author = {Wu He and Zuopeng Justin Zhang and Huanmei Wu and Wenzhuo Li and Sachin Shetty}, title = {A Unified Health Information System Framework for Connecting Data, People, Devices, and Systems}, journal = {J. Glob. Inf. Manag.}, volume = {30}, number = {11}, pages = {1--19}, year = {2022}, url = {https://doi.org/10.4018/jgim.305239}, doi = {10.4018/JGIM.305239}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jgim/HeZWLS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/amcis/0001HSHT22, author = {Justin Zhang and Wu He and Sachin Shetty and Yuming He and Xin Tian}, editor = {Gordan Davis and Sue Brown and Mani R. Subramani and Gove N. Allen and K. D. Joshi and Kevin P. Scheibe}, title = {A Proposed Framework for the Governance of Blockchain Technology}, booktitle = {28th Americas Conference on Information Systems, {AMCIS} 2022, Minneapolis, MN, USA, August 10-14, 2022}, publisher = {Association for Information Systems}, year = {2022}, url = {https://aisel.aisnet.org/amcis2022/sig\_egov/sig\_egov/1}, timestamp = {Tue, 14 Feb 2023 11:57:54 +0100}, biburl = {https://dblp.org/rec/conf/amcis/0001HSHT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/annsim/BandaraSMRL22, author = {Eranga Bandara and Sachin Shetty and Ravi Mukkamala and Abdul Rahaman and Xueping Liang}, editor = {Cristina Ruiz Martin and Niloufar Emami and Mar{\'{\i}}a Julia Blas and Roya Rezaee}, title = {{LUUNU} - Blockchain, MISP, Model Cards and Federated Learning Enabled Cyber Threat Intelligence Sharing Platform}, booktitle = {Annual Modeling and Simulation Conference, {ANNSIM} 2022, San Diego, CA, USA, July 18-20, 2022}, pages = {235--245}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.23919/ANNSIM55834.2022.9859355}, doi = {10.23919/ANNSIM55834.2022.9859355}, timestamp = {Fri, 02 Sep 2022 18:51:53 +0200}, biburl = {https://dblp.org/rec/conf/annsim/BandaraSMRL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccnc/AminFSDG22, author = {Md Ali Reza Al Amin and Peter Foytik and Sachin Shetty and Jessica Dorismond and Marco A. Gamarra}, title = {Deception for Characterizing Adversarial Strategies in Complex Networked Systems}, booktitle = {19th {IEEE} Annual Consumer Communications {\&} Networking Conference, {CCNC} 2022, Las Vegas, NV, USA, January 8-11, 2022}, pages = {429--432}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CCNC49033.2022.9700549}, doi = {10.1109/CCNC49033.2022.9700549}, timestamp = {Mon, 28 Aug 2023 21:17:27 +0200}, biburl = {https://dblp.org/rec/conf/ccnc/AminFSDG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccnc/BandaraSRM0L22, author = {Eranga Bandara and Sachin Shetty and Abdul Rahman and Ravi Mukkamala and Juan Zhao and Xueping Liang}, title = {Bassa-ML - {A} Blockchain and Model Card Integrated Federated Learning Provenance Platform}, booktitle = {19th {IEEE} Annual Consumer Communications {\&} Networking Conference, {CCNC} 2022, Las Vegas, NV, USA, January 8-11, 2022}, pages = {753--759}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CCNC49033.2022.9700513}, doi = {10.1109/CCNC49033.2022.9700513}, timestamp = {Mon, 14 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccnc/BandaraSRM0L22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hpsr/WangJBLSD22, author = {Ying Wang and Shashank Jere and Soumya Banerjee and Lingjia Liu and Sachin Shetty and Shehadi Dayekh}, title = {Anonymous Jamming Detection in 5G with Bayesian Network Model Based Inference Analysis}, booktitle = {23rd {IEEE} International Conference on High Performance Switching and Routing, {HPSR} 2022, Taicang, Jiangsu, China, June 6-8, 2022}, pages = {151--156}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/HPSR54439.2022.9831286}, doi = {10.1109/HPSR54439.2022.9831286}, timestamp = {Mon, 01 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hpsr/WangJBLSD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccn/HasanSIA22, author = {Kamrul Hasan and Sachin Shetty and Tariqul Islam and Imtiaz Ahmed}, title = {Predictive Cyber Defense Remediation against Advanced Persistent Threat in Cyber-Physical Systems}, booktitle = {31st International Conference on Computer Communications and Networks, {ICCCN} 2022, Honolulu, HI, USA, July 25-28, 2022}, pages = {1--10}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ICCCN54977.2022.9868886}, doi = {10.1109/ICCCN54977.2022.9868886}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccn/HasanSIA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ijcnn/ZalamedaKGWSI22, author = {Joseph Zalameda and Brady Kruse and Alexander Glandon and Megan A. Witherow and Sachin Shetty and Khan M. Iftekharuddin}, title = {Generalized Adversarial and Hierarchical Co-occurrence Network based Synthetic Skeleton Generation and Human Identity Recognition}, booktitle = {International Joint Conference on Neural Networks, {IJCNN} 2022, Padua, Italy, July 18-23, 2022}, pages = {1--8}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/IJCNN55064.2022.9892887}, doi = {10.1109/IJCNN55064.2022.9892887}, timestamp = {Mon, 10 Oct 2022 17:40:09 +0200}, biburl = {https://dblp.org/rec/conf/ijcnn/ZalamedaKGWSI22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/milcom/HaqueSKG22, author = {Md Ariful Haque and Sachin Shetty and Charles A. Kamhoua and Kimberly Gold}, title = {Attack Graph Embedded Machine Learning Platform For Cyber Situational Awareness}, booktitle = {{IEEE} Military Communications Conference, {MILCOM} 2022, Rockville, MD, USA, November 28 - December 2, 2022}, pages = {464--469}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/MILCOM55135.2022.10017837}, doi = {10.1109/MILCOM55135.2022.10017837}, timestamp = {Wed, 08 Feb 2023 17:46:14 +0100}, biburl = {https://dblp.org/rec/conf/milcom/HaqueSKG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/milcom/BandaraSMRFLN22, author = {Eranga Bandara and Sachin Shetty and Ravi Mukkamala and Abdul Rahman and Peter Foytik and Xueping Liang and Wee Keong Ng}, title = {Kaputa - Blockchain, Non-Fungible Token and Model Card Integrated 5G/6G Network Slice Broker and Marketplace}, booktitle = {{IEEE} Military Communications Conference, {MILCOM} 2022, Rockville, MD, USA, November 28 - December 2, 2022}, pages = {559--564}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/MILCOM55135.2022.10017900}, doi = {10.1109/MILCOM55135.2022.10017900}, timestamp = {Wed, 08 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/milcom/BandaraSMRFLN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secon/BandaraLSMRN22, author = {Eranga Bandara and Xueping Liang and Sachin Shetty and Ravi Mukkamala and Abdul Rahman and Wee Keong Ng}, title = {Skunk - {A} Blockchain and Zero Trust Security Enabled Federated Learning Platform for 5G/6G Network Slicing}, booktitle = {19th Annual {IEEE} International Conference on Sensing, Communication, and Networking, {SECON} 2022, Stockholm, Sweden, September 20-23, 2022}, pages = {109--117}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/SECON55815.2022.9918536}, doi = {10.1109/SECON55815.2022.9918536}, timestamp = {Fri, 04 Nov 2022 13:53:28 +0100}, biburl = {https://dblp.org/rec/conf/secon/BandaraLSMRN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/AminSFO22, author = {Md Ali Reza Al Amin and Sachin Shetty and Valerio Formicola and Martin Otto}, editor = {Fengjun Li and Kaitai Liang and Zhiqiang Lin and Sokratis K. Katsikas}, title = {Assessing the Quality of Differentially Private Synthetic Data for Intrusion Detection}, booktitle = {Security and Privacy in Communication Networks - 18th {EAI} International Conference, SecureComm 2022, Virtual Event, October 2022, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {462}, pages = {473--490}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-25538-0\_25}, doi = {10.1007/978-3-031-25538-0\_25}, timestamp = {Tue, 11 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/AminSFO22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wcnc/BandaraSRML22, author = {Eranga Bandara and Sachin Shetty and Abdul Rahman and Ravi Mukkamala and Xueping Liang}, title = {Moose: {A} Scalable Blockchain Architecture for 5G Enabled IoT with Sharding and Network Slicing}, booktitle = {{IEEE} Wireless Communications and Networking Conference, {WCNC} 2022, Austin, TX, USA, April 10-13, 2022}, pages = {1194--1199}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/WCNC51071.2022.9771885}, doi = {10.1109/WCNC51071.2022.9771885}, timestamp = {Tue, 24 May 2022 15:39:22 +0200}, biburl = {https://dblp.org/rec/conf/wcnc/BandaraSRML22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wsc/AminSK22, author = {Md Ali Reza Al Amin and Sachin Shetty and Charles A. Kamhoua}, title = {Cyber Deception Metrics For Interconnected Complex Systems}, booktitle = {Winter Simulation Conference, {WSC} 2022, Singapore, December 11-14, 2022}, pages = {473--483}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/WSC57314.2022.10015347}, doi = {10.1109/WSC57314.2022.10015347}, timestamp = {Wed, 08 Feb 2023 22:09:21 +0100}, biburl = {https://dblp.org/rec/conf/wsc/AminSK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wsc/LuS22, author = {Yan Lu and Sachin Shetty}, title = {Towards {AI} Robustness Multi-Agent Adversarial Planning in Game Play}, booktitle = {Winter Simulation Conference, {WSC} 2022, Singapore, December 11-14, 2022}, pages = {2653--2662}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/WSC57314.2022.10015292}, doi = {10.1109/WSC57314.2022.10015292}, timestamp = {Wed, 08 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wsc/LuS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2210-06649, author = {Md. Shirajum Munir and Ki Tae Kim and Apurba Adhikary and Walid Saad and Sachin Shetty and Seong{-}Bae Park and Choong Seon Hong}, title = {Neuro-symbolic Explainable Artificial Intelligence Twin for Zero-touch IoE in Wireless Network}, journal = {CoRR}, volume = {abs/2210.06649}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2210.06649}, doi = {10.48550/ARXIV.2210.06649}, eprinttype = {arXiv}, eprint = {2210.06649}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2210-06649.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/WazidDSGR21, author = {Mohammad Wazid and Ashok Kumar Das and Sachin Shetty and Prosanta Gope and Joel J. P. C. Rodrigues}, title = {Security in 5G-Enabled Internet of Things Communication: Issues, Challenges, and Future Research Roadmap}, journal = {{IEEE} Access}, volume = {9}, pages = {4466--4489}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2020.3047895}, doi = {10.1109/ACCESS.2020.3047895}, timestamp = {Tue, 26 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/WazidDSGR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/AminSNTK21, author = {Md Ali Reza Al Amin and Sachin Shetty and Laurent Njilla and Deepak K. Tosh and Charles A. Kamhoua}, title = {Hidden Markov Model and Cyber Deception for the Prevention of Adversarial Lateral Movement}, journal = {{IEEE} Access}, volume = {9}, pages = {49662--49682}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2021.3069105}, doi = {10.1109/ACCESS.2021.3069105}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/AminSNTK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecurity/KavakPVDGS21, author = {Hamdi Kavak and Jose J. Padilla and Daniele Vernon{-}Bido and Saikou Y. Diallo and Ross Gore and Sachin Shetty}, title = {Simulation for cybersecurity: state of the art and future directions}, journal = {J. Cybersecur.}, volume = {7}, number = {1}, year = {2021}, url = {https://doi.org/10.1093/cybsec/tyab005}, doi = {10.1093/CYBSEC/TYAB005}, timestamp = {Wed, 07 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cybersecurity/KavakPVDGS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fbloc/BandaraSTL21, author = {Eranga Bandara and Sachin Shetty and Deepak K. Tosh and Xueping Liang}, title = {Vind: {A} Blockchain-Enabled Supply Chain Provenance Framework for Energy Delivery Systems}, journal = {Frontiers Blockchain}, volume = {4}, pages = {607320}, year = {2021}, url = {https://doi.org/10.3389/fbloc.2021.607320}, doi = {10.3389/FBLOC.2021.607320}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fbloc/BandaraSTL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/BandaraTFSRZ21, author = {Eranga Bandara and Deepak K. Tosh and Peter Foytik and Sachin Shetty and Nalin Ranasinghe and Kasun De Zoysa}, title = {Tikiri - Towards a lightweight blockchain for IoT}, journal = {Future Gener. Comput. Syst.}, volume = {119}, pages = {154--165}, year = {2021}, url = {https://doi.org/10.1016/j.future.2021.02.006}, doi = {10.1016/J.FUTURE.2021.02.006}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fgcs/BandaraTFSRZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/LiangSTFZ21, author = {Xueping Liang and Sachin Shetty and Deepak K. Tosh and Peter Foytik and Lingchen Zhang}, title = {Leveraging Intel {SGX} to enable trusted and privacy preserving membership service in distributed ledgers}, journal = {Int. J. Inf. Comput. Secur.}, volume = {16}, number = {1/2}, pages = {63--83}, year = {2021}, url = {https://doi.org/10.1504/IJICS.2021.117395}, doi = {10.1504/IJICS.2021.117395}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijics/LiangSTFZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipm/BandaraLFSHBRZ21, author = {Eranga Bandara and Xueping Liang and Peter Foytik and Sachin Shetty and Crissie Hall and Daniel Bowden and Nalin Ranasinghe and Kasun De Zoysa}, title = {A blockchain empowered and privacy preserving digital contact tracing platform}, journal = {Inf. Process. Manag.}, volume = {58}, number = {4}, pages = {102572}, year = {2021}, url = {https://doi.org/10.1016/j.ipm.2021.102572}, doi = {10.1016/J.IPM.2021.102572}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipm/BandaraLFSHBRZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsa/BandaraLFSRZ21, author = {Eranga Bandara and Xueping Liang and Peter Foytik and Sachin Shetty and Nalin Ranasinghe and Kasun De Zoysa}, title = {Rahasak - Scalable blockchain architecture for enterprise applications}, journal = {J. Syst. Archit.}, volume = {116}, pages = {102061}, year = {2021}, url = {https://doi.org/10.1016/j.sysarc.2021.102061}, doi = {10.1016/J.SYSARC.2021.102061}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsa/BandaraLFSRZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/ImoizeATS21, author = {Agbotiname Lucky Imoize and Oluwadara Adedeji and Nistha Tandiya and Sachin Shetty}, title = {6G Enabled Smart Infrastructure for Sustainable Society: Opportunities, Challenges, and Research Roadmap}, journal = {Sensors}, volume = {21}, number = {5}, pages = {1709}, year = {2021}, url = {https://doi.org/10.3390/s21051709}, doi = {10.3390/S21051709}, timestamp = {Thu, 29 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/ImoizeATS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/HasanSUHI21, author = {Kamrul Hasan and Sachin Shetty and Sharif Ullah and Amin Hassanzadeh and Tariqul Islam}, title = {Criticality based Optimal Cyber Defense Remediation in Energy Delivery Systems}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {8}, number = {28}, pages = {e5}, year = {2021}, url = {https://doi.org/10.4108/eai.10-9-2021.170949}, doi = {10.4108/EAI.10-9-2021.170949}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sesa/HasanSUHI21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/annsim/DavenportS21, author = {Amanda Davenport and Sachin Shetty}, editor = {Cristina Ruiz Martin and Mar{\'{\i}}a Julia Blas and Alonso Inostrosa{-}Psijas}, title = {Comparative Analysis of Elliptic Curve and Lattice Based Cryptography}, booktitle = {Annual Modeling and Simulation Conference, {ANNSIM} 2021, Virtual Event / Fairfax, VA, USA, July 19-22, 2021}, pages = {1--9}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.23919/ANNSIM52504.2021.9552144}, doi = {10.23919/ANNSIM52504.2021.9552144}, timestamp = {Wed, 13 Oct 2021 15:47:26 +0200}, biburl = {https://dblp.org/rec/conf/annsim/DavenportS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/blockchain2/BandaraTSK21, author = {Eranga Bandara and Deepak K. Tosh and Sachin Shetty and Bheshaj Krishnappa}, editor = {Yang Xiang and Ziyuan Wang and Honggang Wang and Valtteri Niemi}, title = {CySCPro - Cyber Supply Chain Provenance Framework for Risk Management of Energy Delivery Systems}, booktitle = {2021 {IEEE} International Conference on Blockchain, Blockchain 2021, Melbourne, Australia, December 6-8, 2021}, pages = {65--72}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/Blockchain53845.2021.00020}, doi = {10.1109/BLOCKCHAIN53845.2021.00020}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/blockchain2/BandaraTSK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/euc/YuchiYDLGS21, author = {Xuebiao Yuchi and Zhiwei Yan and Kejun Dong and Hongtao Li and Guanggang Geng and Sachin Shetty}, editor = {Shaohua Wan and Xiaochun Cheng and Celimuge Wu}, title = {Dealing with the Domain Name Abuse: Issues and Approaches}, booktitle = {19th {IEEE} International Conference on Embedded and Ubiquitous Computing, {EUC} 2021, Shenyang, China, October 20-22, 2021}, pages = {166--173}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/EUC53437.2021.00032}, doi = {10.1109/EUC53437.2021.00032}, timestamp = {Tue, 20 Feb 2024 19:40:20 +0100}, biburl = {https://dblp.org/rec/conf/euc/YuchiYDLGS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/AhamedASLF21, author = {Sayyed Farid Ahamed and Priyanka Aggarwal and Sachin Shetty and Erin Lanus and Laura J. Freeman}, title = {{ATTL:} An Automated Targeted Transfer Learning with Deep Neural Networks}, booktitle = {{IEEE} Global Communications Conference, {GLOBECOM} 2021, Madrid, Spain, December 7-11, 2021}, pages = {1--7}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/GLOBECOM46510.2021.9685826}, doi = {10.1109/GLOBECOM46510.2021.9685826}, timestamp = {Mon, 07 Feb 2022 09:24:07 +0100}, biburl = {https://dblp.org/rec/conf/globecom/AhamedASLF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccn/BandaraLFSZ21, author = {Eranga Bandara and Xueping Liang and Peter Foytik and Sachin Shetty and Kasun De Zoysa}, title = {A Blockchain and Self-Sovereign Identity Empowered Digital Identity Platform}, booktitle = {30th International Conference on Computer Communications and Networks, {ICCCN} 2021, Athens, Greece, July 19-22, 2021}, pages = {1--7}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ICCCN52240.2021.9522184}, doi = {10.1109/ICCCN52240.2021.9522184}, timestamp = {Wed, 22 Sep 2021 16:08:30 +0200}, biburl = {https://dblp.org/rec/conf/icccn/BandaraLFSZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iri/LuS21, author = {Yan Lu and Sachin Shetty}, title = {Multi-Class Malware Classification Using Deep Residual Network with Non-SoftMax Classifier}, booktitle = {22nd {IEEE} International Conference on Information Reuse and Integration for Data Science, {IRI} 2021, Las Vegas, NV, USA, August 10-12, 2021}, pages = {201--207}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/IRI51335.2021.00033}, doi = {10.1109/IRI51335.2021.00033}, timestamp = {Tue, 23 Nov 2021 09:27:31 +0100}, biburl = {https://dblp.org/rec/conf/iri/LuS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/milcom/BandaraSRM21, author = {Eranga Bandara and Sachin Shetty and Abdul Rahman and Ravi Mukkamala}, title = {Let'sTrace - Blockchain, Federated Learning and TUF/In-ToTo Enabled Cyber Supply Chain Provenance Platform}, booktitle = {2021 {IEEE} Military Communications Conference, {MILCOM} 2021, San Diego, CA, USA, November 29 - Dec. 2, 2021}, pages = {470--476}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/MILCOM52596.2021.9653024}, doi = {10.1109/MILCOM52596.2021.9653024}, timestamp = {Wed, 12 Jan 2022 09:10:31 +0100}, biburl = {https://dblp.org/rec/conf/milcom/BandaraSRM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sai/BandaraLFSRZN21, author = {Eranga Bandara and Xueping Liang and Peter Foytik and Sachin Shetty and Nalin Ranasinghe and Kasun De Zoysa and Wee Keong Ng}, editor = {Kohei Arai}, title = {Promize - Blockchain and Self Sovereign Identity Empowered Mobile {ATM} Platform}, booktitle = {Intelligent Computing - Proceedings of the 2021 Computing Conference, Volume 2, {SAI} 2021, Virtual Event, 15-16 July, 2021}, series = {Lecture Notes in Networks and Systems}, volume = {284}, pages = {891--911}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-80126-7\_63}, doi = {10.1007/978-3-030-80126-7\_63}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sai/BandaraLFSRZN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/smartcomp/BandaraLFS21, author = {Eranga Bandara and Xueping Liang and Peter Foytik and Sachin Shetty}, title = {Blockchain and Self-Sovereign Identity Empowered Cyber Threat Information Sharing Platform}, booktitle = {{IEEE} International Conference on Smart Computing, {SMARTCOMP} 2021, Irvine, CA, USA, August 23-27, 2021}, pages = {258--263}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/SMARTCOMP52413.2021.00057}, doi = {10.1109/SMARTCOMP52413.2021.00057}, timestamp = {Tue, 12 Oct 2021 18:03:31 +0200}, biburl = {https://dblp.org/rec/conf/smartcomp/BandaraLFS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/smartgridcomm/RiveraTS21, author = {Abel O. Gomez Rivera and Deepak K. Tosh and Sachin Shetty}, title = {Achieving Runtime State Verification Assurance in Critical Cyber-Physical Infrastructures}, booktitle = {{IEEE} International Conference on Communications, Control, and Computing Technologies for Smart Grids, SmartGridComm 2021, Aachen, Germany, October 25-28, 2021}, pages = {245--251}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/SmartGridComm51999.2021.9632340}, doi = {10.1109/SMARTGRIDCOMM51999.2021.9632340}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/smartgridcomm/RiveraTS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tpsisa/KamhouaBFAS21, author = {Georges A. Kamhoua and Eranga Bandara and Peter Foytik and Priyanka Aggarwal and Sachin Shetty}, title = {Resilient and Verifiable Federated Learning against Byzantine Colluding Attacks}, booktitle = {3rd {IEEE} International Conference on Trust, Privacy and Security in Intelligent Systems and Applications, {TPS-ISA} 2021, Atlanta, GA, USA, December 13-15, 2021}, pages = {31--40}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/TPSISA52974.2021.00004}, doi = {10.1109/TPSISA52974.2021.00004}, timestamp = {Thu, 21 Apr 2022 16:21:01 +0200}, biburl = {https://dblp.org/rec/conf/tpsisa/KamhouaBFAS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tpsisa/AggarwalASF21, author = {Priyanka Aggarwal and Sayyed Farid Ahamed and Sachin Shetty and Laura J. Freeman}, title = {Selective Targeted Transfer Learning for Malware Classification}, booktitle = {3rd {IEEE} International Conference on Trust, Privacy and Security in Intelligent Systems and Applications, {TPS-ISA} 2021, Atlanta, GA, USA, December 13-15, 2021}, pages = {114--120}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/TPSISA52974.2021.00013}, doi = {10.1109/TPSISA52974.2021.00013}, timestamp = {Thu, 21 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tpsisa/AggarwalASF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/WazidDSJ20, author = {Mohammad Wazid and Ashok Kumar Das and Sachin Shetty and Minho Jo}, title = {A Tutorial and Future Research for Building a Blockchain-Based Secure Communication Scheme for Internet of Intelligent Things}, journal = {{IEEE} Access}, volume = {8}, pages = {88700--88716}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.2992467}, doi = {10.1109/ACCESS.2020.2992467}, timestamp = {Tue, 16 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/WazidDSJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/GochhayatSMFKN20, author = {Sarada Prasad Gochhayat and Sachin Shetty and Ravi Mukkamala and Peter Foytik and Georges A. Kamhoua and Laurent Njilla}, title = {Measuring Decentrality in Blockchain Based Systems}, journal = {{IEEE} Access}, volume = {8}, pages = {178372--178390}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.3026577}, doi = {10.1109/ACCESS.2020.3026577}, timestamp = {Tue, 20 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/GochhayatSMFKN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comsur/SaadSNKSNM20, author = {Muhammad Saad and Jeffrey Spaulding and Laurent Njilla and Charles A. Kamhoua and Sachin Shetty and DaeHun Nyang and David Mohaisen}, title = {Exploring the Attack Surface of Blockchain: {A} Comprehensive Survey}, journal = {{IEEE} Commun. Surv. Tutorials}, volume = {22}, number = {3}, pages = {1977--2008}, year = {2020}, url = {https://doi.org/10.1109/COMST.2020.2975999}, doi = {10.1109/COMST.2020.2975999}, timestamp = {Tue, 20 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comsur/SaadSNKSNM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/HaqueSKG20, author = {Md Ariful Haque and Sachin Shetty and Charles A. Kamhoua and Kimberly Gold}, title = {Integrating Mission-Centric Impact Assessment to Operational Resiliency in Cyber-Physical Systems}, booktitle = {{IEEE} Global Communications Conference, {GLOBECOM} 2020, Virtual Event, Taiwan, December 7-11, 2020}, pages = {1--7}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/GLOBECOM42002.2020.9322321}, doi = {10.1109/GLOBECOM42002.2020.9322321}, timestamp = {Mon, 01 Feb 2021 08:43:43 +0100}, biburl = {https://dblp.org/rec/conf/globecom/HaqueSKG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbc/BandaraLSNFRZLL20, author = {Eranga Bandara and Xueping Liang and Sachin Shetty and Wee Keong Ng and Peter Foytik and Nalin Ranasinghe and Kasun De Zoysa and B{\aa}rd Lang{\"{o}}y and David Larsson}, editor = {Zhixiong Chen and Laizhong Cui and Balaji Palanisamy and Liang{-}Jie Zhang}, title = {Lekana - Blockchain Based Archive Storage for Large-Scale Cloud Systems}, booktitle = {Blockchain - {ICBC} 2020 - Third International Conference, Held as Part of the Services Conference Federation, {SCF} 2020, Honolulu, HI, USA, September 18-20, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12404}, pages = {169--184}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-59638-5\_12}, doi = {10.1007/978-3-030-59638-5\_12}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbc/BandaraLSNFRZLL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/WazidDSR20, author = {Mohammad Wazid and Ashok Kumar Das and Sachin Shetty and Joel J. P. C. Rodrigues}, title = {On the Design of Secure Communication Framework for Blockchain-Based Internet of Intelligent Battlefield Things Environment}, booktitle = {39th {IEEE} Conference on Computer Communications, {INFOCOM} Workshops 2020, Toronto, ON, Canada, July 6-9, 2020}, pages = {888--893}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/INFOCOMWKSHPS50562.2020.9163066}, doi = {10.1109/INFOCOMWKSHPS50562.2020.9163066}, timestamp = {Tue, 18 Aug 2020 11:30:21 +0200}, biburl = {https://dblp.org/rec/conf/infocom/WazidDSR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isc2/BandaraLFSRZ20, author = {Eranga Bandara and Xueping Liang and Peter Foytik and Sachin Shetty and Nalin Ranasinghe and Kasun De Zoysa}, title = {Bassa-Scalable Blockchain Architecture for Smart Cities}, booktitle = {{IEEE} International Smart Cities Conference, {ISC2} 2020, Piscataway, NJ, USA, September 28 - October 1, 2020}, pages = {1--8}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/ISC251055.2020.9239072}, doi = {10.1109/ISC251055.2020.9239072}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isc2/BandaraLFSRZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobihealth/BandaraLFSHBRZN20, author = {Eranga Bandara and Xueping Liang and Peter Foytik and Sachin Shetty and Crissie Hall and Daniel Bowden and Nalin Ranasinghe and Kasun De Zoysa and Wee Keong Ng}, editor = {Juan Ye and Michael J. O'Grady and Gabriele Civitarese and Kristina Y. Yordanova}, title = {Connect - Blockchain and Self-Sovereign Identity Empowered Contact Tracing Platform}, booktitle = {Wireless Mobile Communication and Healthcare - 9th {EAI} International Conference, MobiHealth 2020, Virtual Event, November 19, 2020, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {362}, pages = {208--223}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-70569-5\_13}, doi = {10.1007/978-3-030-70569-5\_13}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mobihealth/BandaraLFSHBRZN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/HaqueSKG20, author = {Md Ariful Haque and Sachin Shetty and Charles A. Kamhoua and Kimberly Gold}, editor = {Noseong Park and Kun Sun and Sara Foresti and Kevin R. B. Butler and Nitesh Saxena}, title = {Modeling Mission Impact of Cyber Attacks on Energy Delivery Systems}, booktitle = {Security and Privacy in Communication Networks - 16th {EAI} International Conference, SecureComm 2020, Washington, DC, USA, October 21-23, 2020, Proceedings, Part {II}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {336}, pages = {41--61}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-63095-9\_3}, doi = {10.1007/978-3-030-63095-9\_3}, timestamp = {Tue, 15 Dec 2020 15:30:59 +0100}, biburl = {https://dblp.org/rec/conf/securecomm/HaqueSKG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/springsim/FoytikSGHTN20, author = {Peter Foytik and Sachin Shetty and Sarada Prasad Gochhayat and Eranga Herath and Deepak K. Tosh and Laurent Njilla}, editor = {Fernando J. Barros and Xiaolin Hu and Hamdi Kavak and Alberto A. Del Barrio}, title = {A Blockchain Simulator for Evaluating Consensus Algorithms in Diverse Networking Environments}, booktitle = {Spring Simulation Conference, SpringSim 2020, Fairfax, VA, USA, May 18-21, 2020}, pages = {1--12}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.22360/SpringSim.2020.CSE.003}, doi = {10.22360/SPRINGSIM.2020.CSE.003}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/springsim/FoytikSGHTN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/springsim/LiangSFT20, author = {Xueping Liang and Sachin Shetty and Peter Foytik and Deepak K. Tosh}, editor = {Fernando J. Barros and Xiaolin Hu and Hamdi Kavak and Alberto A. Del Barrio}, title = {Enforcing Security and Privacy in Distributed Ledgers by Intel {SGX}}, booktitle = {Spring Simulation Conference, SpringSim 2020, Fairfax, VA, USA, May 18-21, 2020}, pages = {1--12}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.22360/SpringSim.2020.CSE.002}, doi = {10.22360/SPRINGSIM.2020.CSE.002}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/springsim/LiangSFT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sscc/BandaraLFSRZN20, author = {Eranga Bandara and Xueping Liang and Peter Foytik and Sachin Shetty and Nalin Ranasinghe and Kasun De Zoysa and Wee Keong Ng}, editor = {Sabu M. Thampi and Guojun Wang and Danda B. Rawat and Ryan K. L. Ko and Chun{-}I Fan}, title = {SaaS - Microservices-Based Scalable Smart Contract Architecture}, booktitle = {Security in Computing and Communications - 8th International Symposium, {SSCC} 2020, Chennai, India, October 14-17, 2020, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1364}, pages = {228--243}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-981-16-0422-5\_16}, doi = {10.1007/978-981-16-0422-5\_16}, timestamp = {Thu, 11 Feb 2021 15:38:25 +0100}, biburl = {https://dblp.org/rec/conf/sscc/BandaraLFSRZN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2007-11536, author = {Uttam Ghosh and Pushpita Chatterjee and Sachin Shetty and Raja Datta}, title = {An SDN-IoT-based Framework for Future Smart Cities: Addressing Perspective}, journal = {CoRR}, volume = {abs/2007.11536}, year = {2020}, url = {https://arxiv.org/abs/2007.11536}, eprinttype = {arXiv}, eprint = {2007.11536}, timestamp = {Wed, 29 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2007-11536.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/WazidDRSP19, author = {Mohammad Wazid and Ashok Kumar Das and Joel J. P. C. Rodrigues and Sachin Shetty and Youngho Park}, title = {IoMT Malware Detection Approaches: Analysis and Research Challenges}, journal = {{IEEE} Access}, volume = {7}, pages = {182459--182476}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2960412}, doi = {10.1109/ACCESS.2019.2960412}, timestamp = {Wed, 15 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/WazidDRSP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cem/ToshSLKN19, author = {Deepak K. Tosh and Sachin Shetty and Xueping Liang and Charles A. Kamhoua and Laurent L. Njilla}, title = {Data Provenance in the Cloud: {A} Blockchain-Based Approach}, journal = {{IEEE} Consumer Electron. Mag.}, volume = {8}, number = {4}, pages = {38--44}, year = {2019}, url = {https://doi.org/10.1109/MCE.2019.2892222}, doi = {10.1109/MCE.2019.2892222}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cem/ToshSLKN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/MazikuSN19, author = {Hellen Maziku and Sachin Shetty and David M. Nicol}, title = {Security risk assessment for SDN-enabled smart grids}, journal = {Comput. Commun.}, volume = {133}, pages = {1--11}, year = {2019}, url = {https://doi.org/10.1016/j.comcom.2018.10.007}, doi = {10.1016/J.COMCOM.2018.10.007}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comcom/MazikuSN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejisec/ZhaoSPKK19, author = {Juan Zhao and Sachin Shetty and Jan Wei Pan and Charles A. Kamhoua and Kevin A. Kwiat}, title = {Transfer learning for detecting unknown network attacks}, journal = {{EURASIP} J. Inf. Secur.}, volume = {2019}, pages = {1}, year = {2019}, url = {https://doi.org/10.1186/s13635-019-0084-4}, doi = {10.1186/S13635-019-0084-4}, timestamp = {Tue, 08 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejisec/ZhaoSPKK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/WazidBDSRP19, author = {Mohammad Wazid and Palak Bagga and Ashok Kumar Das and Sachin Shetty and Joel J. P. C. Rodrigues and Youngho Park}, title = {AKM-IoV: Authenticated Key Management Protocol in Fog Computing-Based Internet of Vehicles Deployment}, journal = {{IEEE} Internet Things J.}, volume = {6}, number = {5}, pages = {8804--8817}, year = {2019}, url = {https://doi.org/10.1109/JIOT.2019.2923611}, doi = {10.1109/JIOT.2019.2923611}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/WazidBDSRP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/WazidDSRP19, author = {Mohammad Wazid and Ashok Kumar Das and Sachin Shetty and Joel J. P. C. Rodrigues and Youngho Park}, title = {LDAKM-EIoT: Lightweight Device Authentication and Key Management Mechanism for Edge-Based IoT Deployment}, journal = {Sensors}, volume = {19}, number = {24}, pages = {5539}, year = {2019}, url = {https://doi.org/10.3390/s19245539}, doi = {10.3390/S19245539}, timestamp = {Sat, 30 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/WazidDSRP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/AminSNTK19, author = {Md Ali Reza Al Amin and Sachin Shetty and Laurent Njilla and Deepak K. Tosh and Charles Kamouha}, title = {Attacker Capability based Dynamic Deception Model for Large-Scale Networks}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {6}, number = {21}, pages = {e2}, year = {2019}, url = {https://doi.org/10.4108/eai.13-7-2018.162808}, doi = {10.4108/EAI.13-7-2018.162808}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sesa/AminSNTK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigdatasec/HaqueSK19, author = {Md Ariful Haque and Sachin Shetty and Bheshaj Krishnappa}, title = {{ICS-CRAT:} {A} Cyber Resilience Assessment Tool for Industrial Control Systems}, booktitle = {5th {IEEE} International Conference on Big Data Security on Cloud, {IEEE} International Conference on High Performance and Smart Computing, and {IEEE} International Conference on Intelligent Data and Security, BigDataSecurity/HPSC/IDS 2019, Washington, DC, USA, May 27-29, 2019}, pages = {273--281}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/BigDataSecurity-HPSC-IDS.2019.00058}, doi = {10.1109/BIGDATASECURITY-HPSC-IDS.2019.00058}, timestamp = {Wed, 14 Jul 2021 09:36:14 +0200}, biburl = {https://dblp.org/rec/conf/bigdatasec/HaqueSK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/blockchain2/GochhayatBSF19, author = {Sarada Prasad Gochhayat and Eranga Bandara and Sachin Shetty and Peter Foytik}, title = {Yugala: Blockchain Based Encrypted Cloud Storage for IoT Data}, booktitle = {{IEEE} International Conference on Blockchain, Blockchain 2019, Atlanta, GA, USA, July 14-17, 2019}, pages = {483--489}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/Blockchain.2019.00073}, doi = {10.1109/BLOCKCHAIN.2019.00073}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/blockchain2/GochhayatBSF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/blockchain2/DavenportS19, author = {Amanda Davenport and Sachin Shetty}, title = {Air Gapped Wallet Schemes and Private Key Leakage in Permissioned Blockchain Platforms}, booktitle = {{IEEE} International Conference on Blockchain, Blockchain 2019, Atlanta, GA, USA, July 14-17, 2019}, pages = {541--545}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/Blockchain.2019.00004}, doi = {10.1109/BLOCKCHAIN.2019.00004}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/blockchain2/DavenportS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/coinco/HasanSU19, author = {Kamrul Hasan and Sachin Shetty and Sharif Ullah}, title = {Artificial Intelligence Empowered Cyber Threat Detection and Protection for Power Utilities}, booktitle = {5th {IEEE} International Conference on Collaboration and Internet Computing, {CIC} 2019, Los Angeles, CA, USA, December 12-14, 2019}, pages = {354--359}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CIC48465.2019.00049}, doi = {10.1109/CIC48465.2019.00049}, timestamp = {Fri, 27 May 2022 15:04:14 +0200}, biburl = {https://dblp.org/rec/conf/coinco/HasanSU19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eenergy/LiangS19, author = {Xueping Liang and Sachin Shetty}, title = {A State-aware Proof of Stake Consensus Protocol for Power System Resilience}, booktitle = {Proceedings of the Tenth {ACM} International Conference on Future Energy Systems, e-Energy 2019, Phoenix, AZ, USA, June 25-28, 2019}, pages = {431--432}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3307772.3330177}, doi = {10.1145/3307772.3330177}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eenergy/LiangS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/GamarraSNNG19, author = {Marco A. Gamarra and Sachin Shetty and David M. Nicol and Laurent Njilla and Oscar R. Gonz{\'{a}}lez}, title = {Modeling Stepping Stone Attacks with Constraints in Cyber Infrastructure}, booktitle = {2019 {IEEE} Global Communications Conference, {GLOBECOM} 2019, Waikoloa, HI, USA, December 9-13, 2019}, pages = {1--7}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/GLOBECOM38437.2019.9014266}, doi = {10.1109/GLOBECOM38437.2019.9014266}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/globecom/GamarraSNNG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/HasanSUHH19, author = {Kamrul Hasan and Sachin Shetty and Sharif Ullah and Amin Hassanzadeh and Ethan Hadar}, title = {Towards Optimal Cyber Defense Remediation in Energy Delivery Systems}, booktitle = {2019 {IEEE} Global Communications Conference, {GLOBECOM} 2019, Waikoloa, HI, USA, December 9-13, 2019}, pages = {1--7}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/GLOBECOM38437.2019.9013517}, doi = {10.1109/GLOBECOM38437.2019.9013517}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/globecom/HasanSUHH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/GamarraSGNPK19, author = {Marco A. Gamarra and Sachin Shetty and Oscar R. Gonz{\'{a}}lez and Laurent Njilla and Marcus Pendleton and Charles A. Kamhoua}, title = {Dual Redundant Cyber-Attack Tolerant Control Systems Strategy for Cyber-Physical Systems}, booktitle = {2019 {IEEE} International Conference on Communications, {ICC} 2019, Shanghai, China, May 20-24, 2019}, pages = {1--7}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ICC.2019.8761260}, doi = {10.1109/ICC.2019.8761260}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icc/GamarraSGNPK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isc2/DavenportS19, author = {Amanda Davenport and Sachin Shetty}, title = {Modeling Threat of Leaking Private Keys from Air-Gapped Blockchain Wallets}, booktitle = {2019 {IEEE} International Smart Cities Conference, {ISC2} 2019, Casablanca, Morocco, October 14-17, 2019}, pages = {9--13}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ISC246665.2019.9071725}, doi = {10.1109/ISC246665.2019.9071725}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isc2/DavenportS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/milcom/HasanSHU19, author = {Kamrul Hasan and Sachin Shetty and Amin Hassanzadeh and Sharif Ullah}, title = {Towards Optimal Cyber Defense Remediation in Cyber Physical Systems by Balancing Operational Resilience and Strategic Risk}, booktitle = {2019 {IEEE} Military Communications Conference, {MILCOM} 2019, Norfolk, VA, USA, November 12-14, 2019}, pages = {1--8}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/MILCOM47813.2019.9021076}, doi = {10.1109/MILCOM47813.2019.9021076}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/milcom/HasanSHU19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/UllahSNHH19, author = {Sharif Ullah and Sachin Shetty and Anup Nayak and Amin Hassanzadeh and Kamrul Hasan}, editor = {Songqing Chen and Kim{-}Kwang Raymond Choo and Xinwen Fu and Wenjing Lou and Aziz Mohaisen}, title = {Cyber Threat Analysis Based on Characterizing Adversarial Behavior for Energy Delivery System}, booktitle = {Security and Privacy in Communication Networks - 15th {EAI} International Conference, SecureComm 2019, Orlando, FL, USA, October 23-25, 2019, Proceedings, Part {II}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {305}, pages = {146--160}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-37231-6\_8}, doi = {10.1007/978-3-030-37231-6\_8}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/UllahSNHH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/AminSNTK19, author = {Md Ali Reza Al Amin and Sachin Shetty and Laurent Njilla and Deepak K. Tosh and Charles A. Kamhoua}, editor = {Songqing Chen and Kim{-}Kwang Raymond Choo and Xinwen Fu and Wenjing Lou and Aziz Mohaisen}, title = {Online Cyber Deception System Using Partially Observable Monte-Carlo Planning Framework}, booktitle = {Security and Privacy in Communication Networks - 15th {EAI} International Conference, SecureComm 2019, Orlando, FL, USA, October 23-25, 2019, Proceedings, Part {II}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {305}, pages = {205--223}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-37231-6\_11}, doi = {10.1007/978-3-030-37231-6\_11}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/AminSNTK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/springsim/AlmutairiHS19, author = {Laila M. Almutairi and Liang Hong and Sachin Shetty}, editor = {Alberto A. Del Barrio and Christopher J. Lynch and Fernando J. Barros and Xiaolin Hu and Andrea D'Ambrogio}, title = {Security Analysis of Multiple {SDN} Controllers Based on Stochastic Petri Nets}, booktitle = {2019 Spring Simulation Conference, SpringSim 2019, Tucson, AZ, USA, April 29 - May 2, 2019}, pages = {1--12}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.23919/SpringSim.2019.8732908}, doi = {10.23919/SPRINGSIM.2019.8732908}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/springsim/AlmutairiHS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wsc/ShettyRCMBZ19, author = {Sachin Shetty and Indrajit Ray and Nurcin Celik and Michael Mesham and Nathaniel Bastian and Quanyan Zhu}, title = {Simulation for Cyber Risk Management - Where are we, and Where do we Want to Go?}, booktitle = {2019 Winter Simulation Conference, {WSC} 2019, National Harbor, MD, USA, December 8-11, 2019}, pages = {726--737}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/WSC40007.2019.9004688}, doi = {10.1109/WSC40007.2019.9004688}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wsc/ShettyRCMBZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1904-03487, author = {Muhammad Saad and Jeffrey Spaulding and Laurent Njilla and Charles A. Kamhoua and Sachin Shetty and DaeHun Nyang and Aziz Mohaisen}, title = {Exploring the Attack Surface of Blockchain: {A} Systematic Overview}, journal = {CoRR}, volume = {abs/1904.03487}, year = {2019}, url = {http://arxiv.org/abs/1904.03487}, eprinttype = {arXiv}, eprint = {1904.03487}, timestamp = {Tue, 20 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1904-03487.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisp/LiangSTZLL18, author = {Xueping Liang and Sachin Shetty and Deepak K. Tosh and Juan Zhao and Danyi Li and Jihong Liu}, title = {A Reliable Data Provenance and Privacy Preservation Architecture for Business-Driven Cyber-Physical Systems Using Blockchain}, journal = {Int. J. Inf. Secur. Priv.}, volume = {12}, number = {4}, pages = {68--81}, year = {2018}, url = {https://doi.org/10.4018/IJISP.2018100105}, doi = {10.4018/IJISP.2018100105}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisp/LiangSTZLL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/phat/LiangSTBNK18, author = {Xueping Liang and Sachin Shetty and Deepak K. Tosh and Daniel Bowden and Laurent Njilla and Charles A. Kamhoua}, title = {Towards Blockchain Empowered Trusted and Accountable Data Sharing and Collaboration in Mobile Healthcare Applications}, journal = {{EAI} Endorsed Trans. Pervasive Health Technol.}, volume = {4}, number = {15}, pages = {e3}, year = {2018}, url = {https://doi.org/10.4108/eai.24-7-2018.159338}, doi = {10.4108/EAI.24-7-2018.159338}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/phat/LiangSTBNK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEcloud/ToshSFKN18, author = {Deepak K. Tosh and Sachin Shetty and Peter Foytik and Charles A. Kamhoua and Laurent Njilla}, title = {CloudPoS: {A} Proof-of-Stake Consensus Design for Blockchain Integrated Cloud}, booktitle = {11th {IEEE} International Conference on Cloud Computing, {CLOUD} 2018, San Francisco, CA, USA, July 2-7, 2018}, pages = {302--309}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/CLOUD.2018.00045}, doi = {10.1109/CLOUD.2018.00045}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEcloud/ToshSFKN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccta/HasanSHSC18, author = {Kamrul Hasan and Sachin Shetty and Amin Hassanzadeh and Malek Ben Salem and Jay Chen}, title = {Self-Healing Cyber Resilient Framework for Software Defined Networking-Enabled Energy Delivery System}, booktitle = {{IEEE} Conference on Control Technology and Applications, {CCTA} 2018, Copenhagen, Denmark, August 21-24, 2018}, pages = {1692--1697}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CCTA.2018.8511421}, doi = {10.1109/CCTA.2018.8511421}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccta/HasanSHSC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/HasanSHSC18, author = {Kamrul Hasan and Sachin Shetty and Amin Hassanzadeh and Malek Ben Salem and Jay Chen}, title = {Modeling Cost of Countermeasures in Software Defined Networking-enabled Energy Delivery Systems}, booktitle = {2018 {IEEE} Conference on Communications and Network Security, {CNS} 2018, Beijing, China, May 30 - June 1, 2018}, pages = {1--9}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CNS.2018.8433172}, doi = {10.1109/CNS.2018.8433172}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/cns/HasanSHSC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/GamarraSNGKN18, author = {Marco A. Gamarra and Sachin Shetty and David M. Nicol and Oscar Gonazlez and Charles A. Kamhoua and Laurent Njilla}, title = {Analysis of Stepping Stone Attacks in Dynamic Vulnerability Graphs}, booktitle = {2018 {IEEE} International Conference on Communications, {ICC} 2018, Kansas City, MO, USA, May 20-24, 2018}, pages = {1--7}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ICC.2018.8422723}, doi = {10.1109/ICC.2018.8422723}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/icc/GamarraSNGKN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccnc/MazikuSJKNK18, author = {Hellen Maziku and Sachin Shetty and Dong Jin and Charles A. Kamhoua and Laurent Njilla and Kevin A. Kwiat}, title = {Diversity Modeling to Evaluate Security of Multiple {SDN} Controllers}, booktitle = {2018 International Conference on Computing, Networking and Communications, {ICNC} 2018, Maui, HI, USA, March 5-8, 2018}, pages = {344--348}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/ICCNC.2018.8390296}, doi = {10.1109/ICCNC.2018.8390296}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccnc/MazikuSJKNK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isc2/DavenportSL18, author = {Amanda Davenport and Sachin Shetty and Xueping Liang}, title = {Attack Surface Analysis of Permissioned Blockchain Platforms for Smart Cities}, booktitle = {{IEEE} International Smart Cities Conference, {ISC2} 2018, Kansas City, MO, USA, September 16-19, 2018}, pages = {1--6}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ISC2.2018.8656983}, doi = {10.1109/ISC2.2018.8656983}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isc2/DavenportSL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isc2/LiangST18, author = {Xueping Liang and Sachin Shetty and Deepak K. Tosh}, title = {Exploring the Attack Surfaces in Blockchain Enabled Smart Cities}, booktitle = {{IEEE} International Smart Cities Conference, {ISC2} 2018, Kansas City, MO, USA, September 16-19, 2018}, pages = {1--8}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ISC2.2018.8656852}, doi = {10.1109/ISC2.2018.8656852}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isc2/LiangST18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isc2/QiuLSB18, author = {Jinglin Qiu and Xueping Liang and Sachin Shetty and Daniel Bowden}, title = {Towards Secure and Smart Healthcare in Smart Cities Using Blockchain}, booktitle = {{IEEE} International Smart Cities Conference, {ISC2} 2018, Kansas City, MO, USA, September 16-19, 2018}, pages = {1--4}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ISC2.2018.8656914}, doi = {10.1109/ISC2.2018.8656914}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isc2/QiuLSB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/HaqueTSK18, author = {Md Ariful Haque and Gael Kamdem De Teyou and Sachin Shetty and Bheshaj Krishnappa}, title = {Cyber Resilience Framework for Industrial Control Systems: Concepts, Metrics, and Insights}, booktitle = {2018 {IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2018, Miami, FL, USA, November 9-11, 2018}, pages = {25--30}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ISI.2018.8587398}, doi = {10.1109/ISI.2018.8587398}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/HaqueTSK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/milcom/MuallemSHP18, author = {Asmah Muallem and Sachin Shetty and Liang Hong and Jan Wei Pan}, title = {{TDDEHT:} Threat Detection Using Distributed Ensembles of Hoeffding Trees on Streaming Cyber Datasets}, booktitle = {2018 {IEEE} Military Communications Conference, {MILCOM} 2018, Los Angeles, CA, USA, October 29-31, 2018}, pages = {1--6}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/MILCOM.2018.8599734}, doi = {10.1109/MILCOM.2018.8599734}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/milcom/MuallemSHP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/milcom/ToshSFNK18, author = {Deepak K. Tosh and Sachin Shetty and Peter Foytik and Laurent Njilla and Charles A. Kamhoua}, title = {Blockchain-Empowered Secure Internet -of- Battlefield Things (IoBT) Architecture}, booktitle = {2018 {IEEE} Military Communications Conference, {MILCOM} 2018, Los Angeles, CA, USA, October 29-31, 2018}, pages = {593--598}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/MILCOM.2018.8599758}, doi = {10.1109/MILCOM.2018.8599758}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/milcom/ToshSFNK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/LiangSTJL18, author = {Xueping Liang and Sachin Shetty and Deepak K. Tosh and Yafei Ji and Danyi Li}, editor = {Raheem Beyah and Bing Chang and Yingjiu Li and Sencun Zhu}, title = {Towards a Reliable and Accountable Cyber Supply Chain in Energy Delivery System Using Blockchain}, booktitle = {Security and Privacy in Communication Networks - 14th International Conference, SecureComm 2018, Singapore, August 8-10, 2018, Proceedings, Part {II}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {255}, pages = {43--62}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-01704-0\_3}, doi = {10.1007/978-3-030-01704-0\_3}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/LiangSTJL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/springsim/TolkBDRMSTVY18, author = {Andreas Tolk and Fernando J. Barros and Andrea D'Ambrogio and Akshay Rajhans and Pieter J. Mosterman and Sachin S. Shetty and Mamadou K. Traor{\'{e}} and Hans Vangheluwe and Levent Yilmaz}, editor = {Saurabh Mittal and Jos{\'{e}} Luis Risco{-}Mart{\'{\i}}n and Marco L{\"{u}}tzenberger}, title = {Hybrid simulation for cyber physical systems: a panel on where are we going regarding complexity, intelligence, and adaptability of {CPS} using simulation}, booktitle = {Proceedings of the Symposium on Modeling and Simulation of Complexity in Intelligent, Adaptive and Autonomous Systems, SpringSim {(MSCIAAS)} 2018, Baltimore, MD, USA, April 15-18, 2018}, pages = {3:1--3:19}, publisher = {{ACM}}, year = {2018}, url = {http://dl.acm.org/citation.cfm?id=3213230}, timestamp = {Tue, 22 May 2018 08:32:41 +0200}, biburl = {https://dblp.org/rec/conf/springsim/TolkBDRMSTVY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/springsim/HaqueSK18, author = {Md Ariful Haque and Sachin Shetty and Gael Kamdem}, editor = {Erika Frydenlund and Shafagh Jafer and Hamdi Kavak}, title = {Improving bulk power system resilience by ranking critical nodes in the vulnerability graph}, booktitle = {Proceedings of the Annual Simulation Symposium, SpringSim {(ANSS)} 2018, Baltimore, MD, USA, April 15-18, 2018}, pages = {8:1--8:12}, publisher = {{ACM}}, year = {2018}, url = {http://dl.acm.org/citation.cfm?id=3213040}, timestamp = {Tue, 22 May 2018 08:07:22 +0200}, biburl = {https://dblp.org/rec/conf/springsim/HaqueSK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/springsim/HasanSST18, author = {Kamrul Hasan and Sachin Shetty and John Sokolowski and Deepak K. Tosh}, editor = {Abdolreza Abhari and Hala ElAarag}, title = {Security game for cyber physical systems}, booktitle = {Proceedings of the Communications and Networking Symposium, SpringSim {(CNS)} 2018, Baltimore, MD, USA, April 15-18, 2018}, pages = {12:1--12:12}, publisher = {{ACM}}, year = {2018}, url = {http://dl.acm.org/citation.cfm?id=3213212}, timestamp = {Tue, 22 May 2018 08:28:20 +0200}, biburl = {https://dblp.org/rec/conf/springsim/HasanSST18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ElsaidRTSS17, author = {Lubna Elsaid and Leonardo Jim{\'{e}}nez Rodr{\'{\i}}guez and Nghi H. Tran and Sachin Shetty and Shivakumar Sastry}, title = {Secrecy Rates and Optimal Power Allocation for Full-Duplex Decode-and-Forward Relay Wire-Tap Channels}, journal = {{IEEE} Access}, volume = {5}, pages = {10469--10477}, year = {2017}, url = {https://doi.org/10.1109/ACCESS.2017.2712766}, doi = {10.1109/ACCESS.2017.2712766}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/ElsaidRTSS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnc/HongCSLC17, author = {Liang Hong and Wei Chen and Sachin Shetty and Dan Chia{-}Tien Lo and Reginald Cooper}, title = {Strong Security Approach with Compromised Nodes Detection in Cognitive Radio Sensor Networks}, journal = {Int. J. Netw. Comput.}, volume = {7}, number = {1}, pages = {50--68}, year = {2017}, url = {http://www.ijnc.org/index.php/ijnc/article/view/142}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnc/HongCSLC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvt/DangRTSS17, author = {Cuong Dang and Leonardo Jim{\'{e}}nez Rodr{\'{\i}}guez and Nghi H. Tran and Sachin Shetty and Shivakumar Sastry}, title = {On Secrecy Rate and Optimal Power Allocation of the Full-Duplex Amplify-and-Forward Relay Wire-Tap Channel}, journal = {{IEEE} Trans. Veh. Technol.}, volume = {66}, number = {5}, pages = {3887--3899}, year = {2017}, url = {https://doi.org/10.1109/TVT.2016.2600658}, doi = {10.1109/TVT.2016.2600658}, timestamp = {Fri, 21 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tvt/DangRTSS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEcloud/LiangSZKK17, author = {Xueping Liang and Sachin Shetty and Lingchen Zhang and Charles A. Kamhoua and Kevin A. Kwiat}, editor = {Geoffrey C. Fox}, title = {Man in the Cloud {(MITC)} Defender: SGX-Based User Credential Protection for Synchronization Applications in Cloud Computing Platform}, booktitle = {2017 {IEEE} 10th International Conference on Cloud Computing (CLOUD), Honolulu, HI, USA, June 25-30, 2017}, pages = {302--309}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/CLOUD.2017.46}, doi = {10.1109/CLOUD.2017.46}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEcloud/LiangSZKK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEcloud/GhoshCTSXK17, author = {Uttam Ghosh and Pushpita Chatterjee and Deepak K. Tosh and Sachin Shetty and Kaiqi Xiong and Charles A. Kamhoua}, editor = {Geoffrey C. Fox}, title = {An {SDN} Based Framework for Guaranteeing Security and Performance in Information-Centric Cloud Networks}, booktitle = {2017 {IEEE} 10th International Conference on Cloud Computing (CLOUD), Honolulu, HI, USA, June 25-30, 2017}, pages = {749--752}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/CLOUD.2017.106}, doi = {10.1109/CLOUD.2017.106}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEcloud/GhoshCTSXK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccgrid/ToshSLKKN17, author = {Deepak K. Tosh and Sachin Shetty and Xueping Liang and Charles A. Kamhoua and Kevin A. Kwiat and Laurent Njilla}, title = {Security Implications of Blockchain Cloud with Analysis of Block Withholding Attack}, booktitle = {Proceedings of the 17th {IEEE/ACM} International Symposium on Cluster, Cloud and Grid Computing, {CCGRID} 2017, Madrid, Spain, May 14-17, 2017}, pages = {458--467}, publisher = {{IEEE} Computer Society / {ACM}}, year = {2017}, url = {https://doi.org/10.1109/CCGRID.2017.111}, doi = {10.1109/CCGRID.2017.111}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccgrid/ToshSLKKN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccgrid/LiangSTKKN17, author = {Xueping Liang and Sachin Shetty and Deepak K. Tosh and Charles A. Kamhoua and Kevin A. Kwiat and Laurent Njilla}, title = {ProvChain: {A} Blockchain-based Data Provenance Architecture in Cloud Environment with Enhanced Privacy and Availability}, booktitle = {Proceedings of the 17th {IEEE/ACM} International Symposium on Cluster, Cloud and Grid Computing, {CCGRID} 2017, Madrid, Spain, May 14-17, 2017}, pages = {468--477}, publisher = {{IEEE} Computer Society / {ACM}}, year = {2017}, url = {https://doi.org/10.1109/CCGRID.2017.8}, doi = {10.1109/CCGRID.2017.8}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccgrid/LiangSTKKN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccnc/HasanSO17, author = {Kamrul Hasan and Sachin Shetty and Taiwo Oyedare}, title = {Cross layer attacks on {GSM} mobile networks using software defined radios}, booktitle = {14th {IEEE} Annual Consumer Communications {\&} Networking Conference, {CCNC} 2017, Las Vegas, NV, USA, January 8-11, 2017}, pages = {357--360}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/CCNC.2017.7983134}, doi = {10.1109/CCNC.2017.7983134}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/ccnc/HasanSO17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/edge/Al-SalahHS17, author = {Tulha Al{-}Salah and Liang Hong and Sachin Shetty}, title = {Attack Surface Expansion Using Decoys to Protect Virtualized Infrastructure}, booktitle = {{IEEE} International Conference on Edge Computing, {EDGE} 2017, Honolulu, HI, USA, June 25-30, 2017}, pages = {216--219}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/IEEE.EDGE.2017.38}, doi = {10.1109/IEEE.EDGE.2017.38}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/edge/Al-SalahHS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamenets/ToshSSKK17, author = {Deepak K. Tosh and Sachin Shetty and Shamik Sengupta and Jay P. Kesan and Charles A. Kamhoua}, editor = {Lingjie Duan and Anibal Sanjab and Husheng Li and Xu Chen and Donatello Materassi and Rachid El Azouzi}, title = {Risk Management Using Cyber-Threat Information Sharing and Cyber-Insurance}, booktitle = {Game Theory for Networks - 7th International {EAI} Conference, GameNets 2017 Knoxville, TN, USA, May 9, 2017, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {212}, pages = {154--164}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-67540-4\_14}, doi = {10.1007/978-3-319-67540-4\_14}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamenets/ToshSSKK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/ToshVSSKNK17, author = {Deepak K. Tosh and Iman Vakilinia and Sachin Shetty and Shamik Sengupta and Charles A. Kamhoua and Laurent Njilla and Kevin A. Kwiat}, editor = {Stefan Rass and Bo An and Christopher Kiekintveld and Fei Fang and Stefan Schauer}, title = {Three Layer Game Theoretic Decision Framework for Cyber-Investment and Cyber-Insurance}, booktitle = {Decision and Game Theory for Security - 8th International Conference, GameSec 2017, Vienna, Austria, October 23-25, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10575}, pages = {519--532}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68711-7\_28}, doi = {10.1007/978-3-319-68711-7\_28}, timestamp = {Wed, 07 Feb 2024 17:23:12 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/ToshVSSKNK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccnc/MazikuS17, author = {Hellen Maziku and Sachin Shetty}, title = {Software Defined Networking enabled resilience for {IEC} 61850-based substation communication systems}, booktitle = {2017 International Conference on Computing, Networking and Communications, {ICNC} 2017, Silicon Valley, CA, USA, January 26-29, 2017}, pages = {690--694}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/ICCNC.2017.7876213}, doi = {10.1109/ICCNC.2017.7876213}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccnc/MazikuS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcsw/GhoshCS17, author = {Uttam Ghosh and Pushpita Chatterjee and Sachin Shetty}, editor = {Aibek Musaev and Jo{\~{a}}o Eduardo Ferreira and Teruo Higashino}, title = {A Security Framework for SDN-Enabled Smart Power Grids}, booktitle = {37th {IEEE} International Conference on Distributed Computing Systems Workshops, {ICDCS} Workshops 2017, Atlanta, GA, USA, June 5-8, 2017}, pages = {113--118}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/ICDCSW.2017.20}, doi = {10.1109/ICDCSW.2017.20}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcsw/GhoshCS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcsw/KamdemKLSN17, author = {Gael Kamdem and Charles A. Kamhoua and Yue Lu and Sachin Shetty and Laurent Njilla}, editor = {Aibek Musaev and Jo{\~{a}}o Eduardo Ferreira and Teruo Higashino}, title = {A Markov Game Theoritic Approach for Power Grid Security}, booktitle = {37th {IEEE} International Conference on Distributed Computing Systems Workshops, {ICDCS} Workshops 2017, Atlanta, GA, USA, June 5-8, 2017}, pages = {139--144}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/ICDCSW.2017.63}, doi = {10.1109/ICDCSW.2017.63}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcsw/KamdemKLSN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/LiangSTFZ17, author = {Xueping Liang and Sachin Shetty and Deepak K. Tosh and Peter Foytik and Lingchen Zhang}, editor = {Sihan Qing and Chris Mitchell and Liqun Chen and Dongmei Liu}, title = {Towards a Trusted and Privacy Preserving Membership Service in Distributed Ledger Using Intel Software Guard Extensions}, booktitle = {Information and Communications Security - 19th International Conference, {ICICS} 2017, Beijing, China, December 6-8, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10631}, pages = {304--310}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-89500-0\_27}, doi = {10.1007/978-3-319-89500-0\_27}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/LiangSTFZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/LiangSZBLL17, author = {Xueping Liang and Sachin Shetty and Juan Zhao and Daniel Bowden and Danyi Li and Jihong Liu}, editor = {Sihan Qing and Chris Mitchell and Liqun Chen and Dongmei Liu}, title = {Towards Decentralized Accountability and Self-sovereignty in Healthcare Systems}, booktitle = {Information and Communications Security - 19th International Conference, {ICICS} 2017, Beijing, China, December 6-8, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10631}, pages = {387--398}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-89500-0\_34}, doi = {10.1007/978-3-319-89500-0\_34}, timestamp = {Tue, 08 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/LiangSZBLL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/milcom/ZhaoSP17, author = {Juan Zhao and Sachin Shetty and Jan Wei Pan}, title = {Feature-based transfer learning for network security}, booktitle = {2017 {IEEE} Military Communications Conference, {MILCOM} 2017, Baltimore, MD, USA, October 23-25, 2017}, pages = {17--22}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/MILCOM.2017.8170749}, doi = {10.1109/MILCOM.2017.8170749}, timestamp = {Tue, 08 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/milcom/ZhaoSP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/milcom/LiangZSL17, author = {Xueping Liang and Juan Zhao and Sachin Shetty and Danyi Li}, title = {Towards data assurance and resilience in IoT using blockchain}, booktitle = {2017 {IEEE} Military Communications Conference, {MILCOM} 2017, Baltimore, MD, USA, October 23-25, 2017}, pages = {261--266}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/MILCOM.2017.8170858}, doi = {10.1109/MILCOM.2017.8170858}, timestamp = {Tue, 08 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/milcom/LiangZSL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/milcom/AlmutairiS17, author = {Laila M. Almutairi and Sachin Shetty}, title = {Generalized stochastic Petri Net model based security risk assessment of software defined networks}, booktitle = {2017 {IEEE} Military Communications Conference, {MILCOM} 2017, Baltimore, MD, USA, October 23-25, 2017}, pages = {545--550}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/MILCOM.2017.8170813}, doi = {10.1109/MILCOM.2017.8170813}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/milcom/AlmutairiS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pimrc/LiangZSLL17, author = {Xueping Liang and Juan Zhao and Sachin Shetty and Jihong Liu and Danyi Li}, title = {Integrating blockchain for data sharing and collaboration in mobile healthcare applications}, booktitle = {28th {IEEE} Annual International Symposium on Personal, Indoor, and Mobile Radio Communications, {PIMRC} 2017, Montreal, QC, Canada, October 8-13, 2017}, pages = {1--5}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/PIMRC.2017.8292361}, doi = {10.1109/PIMRC.2017.8292361}, timestamp = {Tue, 08 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pimrc/LiangZSLL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uemcom/ToshSLKN17, author = {Deepak K. Tosh and Sachin Shetty and Xueping Liang and Charles A. Kamhoua and Laurent Njilla}, title = {Consensus protocols for blockchain-based data provenance: Challenges and opportunities}, booktitle = {8th {IEEE} Annual Ubiquitous Computing, Electronics and Mobile Communication Conference, {UEMCON} 2017, New York City, NY, USA, October 19-21, 2017}, pages = {469--474}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/UEMCON.2017.8249088}, doi = {10.1109/UEMCON.2017.8249088}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uemcom/ToshSLKN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/wn/ShettyYS16, author = {Sachin Shetty and Xuebiao Yuchi and Min Song}, title = {Moving Target Defense for Distributed Systems}, series = {Wireless Networks}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-31032-9}, doi = {10.1007/978-3-319-31032-9}, isbn = {978-3-319-31031-2}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/wn/ShettyYS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijghpc/RawatS16, author = {Danda B. Rawat and Sachin Shetty}, title = {Game Theoretic Cloud-Assisted Opportunistic Spectrum Access in Cognitive Radio Networks}, journal = {Int. J. Grid High Perform. Comput.}, volume = {8}, number = {2}, pages = {94--110}, year = {2016}, url = {https://doi.org/10.4018/IJGHPC.2016040106}, doi = {10.4018/IJGHPC.2016040106}, timestamp = {Thu, 16 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijghpc/RawatS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcnc/SharahOS16, author = {Ashraf Al Sharah and Taiwo Oyedare and Sachin Shetty}, title = {Detecting and Mitigating Smart Insider Jamming Attacks in MANETs Using Reputation-Based Coalition Game}, journal = {J. Comput. Networks Commun.}, volume = {2016}, pages = {4289176:1--4289176:13}, year = {2016}, url = {https://doi.org/10.1155/2016/4289176}, doi = {10.1155/2016/4289176}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcnc/SharahOS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sj/RawatSX16, author = {Danda B. Rawat and Sachin Shetty and Chunsheng Xin}, title = {Stackelberg-Game-Based Dynamic Spectrum Access in Heterogeneous Wireless Systems}, journal = {{IEEE} Syst. J.}, volume = {10}, number = {4}, pages = {1494--1504}, year = {2016}, url = {https://doi.org/10.1109/JSYST.2014.2347048}, doi = {10.1109/JSYST.2014.2347048}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sj/RawatSX16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ant/McNeilSGB16, author = {Paul McNeil and Sachin Shetty and Divya Guntu and Gauree Barve}, editor = {Elhadi M. Shakshuki}, title = {{SCREDENT:} Scalable Real-time Anomalies Detection and Notification of Targeted Malware in Mobile Devices}, booktitle = {The 7th International Conference on Ambient Systems, Networks and Technologies {(ANT} 2016) / The 6th International Conference on Sustainable Energy Information Technology {(SEIT-2016)} / Affiliated Workshops, May 23-26, 2016, Madrid, Spain}, series = {Procedia Computer Science}, volume = {83}, pages = {1219--1225}, publisher = {Elsevier}, year = {2016}, url = {https://doi.org/10.1016/j.procs.2016.04.254}, doi = {10.1016/J.PROCS.2016.04.254}, timestamp = {Thu, 08 Jul 2021 16:04:01 +0200}, biburl = {https://dblp.org/rec/conf/ant/McNeilSGB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccnc/AlamBHS16, author = {Md Monzurul Alam and Sudeep Bhattarai and Liang Hong and Sachin Shetty}, title = {Robust cooperative beamforming against steering vector uncertainty in cognitive radio networks}, booktitle = {13th {IEEE} Annual Consumer Communications {\&} Networking Conference, {CCNC} 2016, Las Vegas, NV, USA, January 9-12, 2016}, pages = {656--661}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CCNC.2016.7444858}, doi = {10.1109/CCNC.2016.7444858}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/ccnc/AlamBHS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ficloud/AlghamdiS16, author = {Abdullah Alghamdi and Sachin Shetty}, editor = {Muhammad Younas and Irfan Awan and Winston Seah}, title = {Survey Toward a Smart Campus Using the Internet of Things}, booktitle = {4th {IEEE} International Conference on Future Internet of Things and Cloud, FiCloud 2016, Vienna, Austria, August 22-24, 2016}, pages = {235--239}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/FiCloud.2016.41}, doi = {10.1109/FICLOUD.2016.41}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ficloud/AlghamdiS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ipccc/AldarrajiHS16, author = {Ali Aldarraji and Liang Hong and Sachin Shetty}, title = {Polarized beamforming for enhanced countermeasure of wireless jamming attacks}, booktitle = {35th {IEEE} International Performance Computing and Communications Conference, {IPCCC} 2016, Las Vegas, NV, USA, December 9-11, 2016}, pages = {1--2}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/PCCC.2016.7820612}, doi = {10.1109/PCCC.2016.7820612}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ipccc/AldarrajiHS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ipps/0003HSLC16, author = {Wei Chen and Liang Hong and Sachin Shetty and Dan Chia{-}Tien Lo and Reginald Cooper}, title = {Cross-Layered Security Approach with Compromised Nodes Detection in Cooperative Sensor Networks}, booktitle = {2016 {IEEE} International Parallel and Distributed Processing Symposium Workshops, {IPDPS} Workshops 2016, Chicago, IL, USA, May 23-27, 2016}, pages = {499--508}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/IPDPSW.2016.88}, doi = {10.1109/IPDPSW.2016.88}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ipps/0003HSLC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/services/YuchiS16, author = {Xuebiao Yuchi and Sachin Shetty}, editor = {Rami Bahsoon and Liang{-}Jie Zhang}, title = {Hierarchical Random Graph Based Network Diversity Modeling for the Cloud}, booktitle = {{IEEE} World Congress on Services, {SERVICES} 2016, San Francisco, CA, USA, June 27 - July 2, 2016}, pages = {35--38}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/SERVICES.2016.11}, doi = {10.1109/SERVICES.2016.11}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/services/YuchiS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/services/YuchiS16a, author = {Xuebiao Yuchi and Sachin Shetty}, editor = {Rami Bahsoon and Liang{-}Jie Zhang}, title = {Towards Network-Topology Aware Virtual Machine Placement in Cloud Datacenters}, booktitle = {{IEEE} World Congress on Services, {SERVICES} 2016, San Francisco, CA, USA, June 27 - July 2, 2016}, pages = {95--96}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/SERVICES.2016.19}, doi = {10.1109/SERVICES.2016.19}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/services/YuchiS16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wwic/OyedareSS16, author = {Taiwo Oyedare and Ashraf Al Sharah and Sachin Shetty}, editor = {Lefteris Mamatas and Ibrahim Matta and Panagiotis Papadimitriou and Yevgeni Koucheryavy}, title = {A Reputation-Based Coalition Game to Prevent Smart Insider Jamming Attacks in MANETs}, booktitle = {Wired/Wireless Internet Communications - 14th {IFIP} {WG} 6.2 International Conference, {WWIC} 2016, Thessaloniki, Greece, May 25-27, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9674}, pages = {241--253}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-33936-8\_19}, doi = {10.1007/978-3-319-33936-8\_19}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wwic/OyedareSS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/sbece/RawatSS15, author = {Danda B. Rawat and Min Song and Sachin Shetty}, title = {Dynamic Spectrum Access for Wireless Networks}, series = {Springer Briefs in Electrical and Computer Engineering}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-15299-8}, doi = {10.1007/978-3-319-15299-8}, isbn = {978-3-319-15298-1}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/sbece/RawatSS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cm/RodriguezTDLES15, author = {Leonardo Jim{\'{e}}nez Rodr{\'{\i}}guez and Nghi H. Tran and Trung Quang Duong and Tho Le{-}Ngoc and Maged Elkashlan and Sachin Shetty}, title = {Physical layer security in wireless cooperative relay networks: state of the art and beyond}, journal = {{IEEE} Commun. Mag.}, volume = {53}, number = {12}, pages = {32--39}, year = {2015}, url = {https://doi.org/10.1109/MCOM.2015.7355563}, doi = {10.1109/MCOM.2015.7355563}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cm/RodriguezTDLES15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-com/LeHTDS15, author = {Anh D. Le and Sanjeewa P. Herath and Nghi H. Tran and Trung Quang Duong and Sachin Shetty}, title = {Achievable rates and outage probability of cognitive radio with dynamic frequency hopping under imperfect spectrum sensing}, journal = {{IET} Commun.}, volume = {9}, number = {17}, pages = {2160--2167}, year = {2015}, url = {https://doi.org/10.1049/iet-com.2015.0094}, doi = {10.1049/IET-COM.2015.0094}, timestamp = {Tue, 08 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-com/LeHTDS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijmheur/BiswalSR15, author = {Biswajit Biswal and Sachin Shetty and Tamara Rogers}, title = {Enhanced learning classifier to locate data in cloud data centres}, journal = {Int. J. Metaheuristics}, volume = {4}, number = {2}, pages = {141--158}, year = {2015}, url = {https://doi.org/10.1504/IJMHEUR.2015.074248}, doi = {10.1504/IJMHEUR.2015.074248}, timestamp = {Tue, 01 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijmheur/BiswalSR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aina/SharmaRBS15, author = {Nimish Sharma and Danda B. Rawat and Bhed Bahadur Bista and Sachin Shetty}, editor = {Leonard Barolli and Makoto Takizawa and Fatos Xhafa and Tomoya Enokido and Jong Hyuk Park}, title = {A Testbed Using {USRP(TM)} and LabView(R) for Dynamic Spectrum Access in Cognitive Radio Networks}, booktitle = {29th {IEEE} International Conference on Advanced Information Networking and Applications, {AINA} 2015, Gwangju, South Korea, March 24-27, 2015}, pages = {735--740}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/AINA.2015.261}, doi = {10.1109/AINA.2015.261}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aina/SharmaRBS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LiS15, author = {Depeng Li and Sachin Shetty}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {{POSTER:} Toward Energy-Wasting Misbehavior Detection Platform with Privacy Preservation in Building Energy Use}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {1647--1649}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2810128}, doi = {10.1145/2810103.2810128}, timestamp = {Mon, 21 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/LiS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/milcom/GoldSR15, author = {Kimberly Gold and Sachin Shetty and Tamara Rogers}, editor = {Qinqing Zhang and Jerry Brand and Thomas G. MacDonald and Bharat T. Doshi and Bonnie L. Gorsic}, title = {A testbed for modeling and detecting attacks on {NFC} enabled mobile devices}, booktitle = {34th {IEEE} Military Communications Conference, {MILCOM} 2015, Tampa, FL, USA, October 26-28, 2015}, pages = {635--640}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/MILCOM.2015.7357515}, doi = {10.1109/MILCOM.2015.7357515}, timestamp = {Thu, 07 Nov 2019 09:04:27 +0100}, biburl = {https://dblp.org/rec/conf/milcom/GoldSR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/milcom/YuchiS15, author = {Xuebiao Yuchi and Sachin Shetty}, editor = {Qinqing Zhang and Jerry Brand and Thomas G. MacDonald and Bharat T. Doshi and Bonnie L. Gorsic}, title = {Enabling security-aware virtual machine placement in IaaS clouds}, booktitle = {34th {IEEE} Military Communications Conference, {MILCOM} 2015, Tampa, FL, USA, October 26-28, 2015}, pages = {1554--1559}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/MILCOM.2015.7357666}, doi = {10.1109/MILCOM.2015.7357666}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/milcom/YuchiS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vtc/LeTSS15, author = {Anh D. Le and Nghi H. Tran and Sachin Shetty and Shivakumar Sastry}, title = {Achievable Rate and Outage Probability of Cognitive Radio with Finite-Alphabet Inputs under Imperfect Spectrum Sensing}, booktitle = {{IEEE} 81st Vehicular Technology Conference, {VTC} Spring 2015, Glasgow, United Kingdom, 11-14 May, 2015}, pages = {1--5}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/VTCSpring.2015.7145664}, doi = {10.1109/VTCSPRING.2015.7145664}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/vtc/LeTSS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wcnc/DangRTSS15, author = {Cuong Dang and Leonardo Jim{\'{e}}nez Rodr{\'{\i}}guez and Nghi H. Tran and Sachin Shetty and Shivakumar Sastry}, title = {Secrecy capacity of the full-duplex {AF} relay wire-tap channel under residual self-interference}, booktitle = {2015 {IEEE} Wireless Communications and Networking Conference, {WCNC} 2015, New Orleans, LA, USA, March 9-12, 2015}, pages = {99--104}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/WCNC.2015.7127452}, doi = {10.1109/WCNC.2015.7127452}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/wcnc/DangRTSS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wcnc/RawatLSBS15, author = {Danda B. Rawat and Swetha Reddy Lenkala and Nimish Sharma and Bhed Bahadur Bista and Sachin Shetty}, title = {Cloud-assisted GPS-driven dynamic spectrum access in cognitive radio vehicular networks for transportation cyber physical systems}, booktitle = {2015 {IEEE} Wireless Communications and Networking Conference, {WCNC} 2015, New Orleans, LA, USA, March 9-12, 2015}, pages = {1942--1947}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/WCNC.2015.7127765}, doi = {10.1109/WCNC.2015.7127765}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wcnc/RawatLSBS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijbpim/ShettyBM14, author = {Sachin Shetty and Biswajit Biswal and Hellen Maziku}, title = {Auditing and analysis of network traffic in cloud environment}, journal = {Int. J. Bus. Process. Integr. Manag.}, volume = {7}, number = {2}, pages = {153--165}, year = {2014}, url = {https://doi.org/10.1504/IJBPIM.2014.063519}, doi = {10.1504/IJBPIM.2014.063519}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijbpim/ShettyBM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcc/RawatSR14, author = {Danda B. Rawat and Sachin Shetty and Khurram Raza}, title = {Geolocation-aware resource management in cloud computing-based cognitive radio networks}, journal = {Int. J. Cloud Comput.}, volume = {3}, number = {3}, pages = {267--287}, year = {2014}, url = {https://doi.org/10.1504/IJCC.2014.064765}, doi = {10.1504/IJCC.2014.064765}, timestamp = {Sun, 06 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcc/RawatSR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cloudnet/MazikuS14, author = {Hellen Maziku and Sachin Shetty}, title = {Towards a network aware {VM} migration: Evaluating the cost of {VM} migration in cloud data centers}, booktitle = {3rd {IEEE} International Conference on Cloud Networking, CloudNet 2014, Luxembourg, Luxembourg, October 8-10, 2014}, pages = {114--119}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CloudNet.2014.6968978}, doi = {10.1109/CLOUDNET.2014.6968978}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cloudnet/MazikuS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cloudnet/BiswalSR14, author = {Biswajit Biswal and Sachin Shetty and Tamara Rogers}, title = {Enhanced learning classifier to locate data in cloud datacenters}, booktitle = {3rd {IEEE} International Conference on Cloud Networking, CloudNet 2014, Luxembourg, Luxembourg, October 8-10, 2014}, pages = {375--380}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CloudNet.2014.6969024}, doi = {10.1109/CLOUDNET.2014.6969024}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cloudnet/BiswalSR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/ZhangS0J14, author = {Lingchen Zhang and Sachin Shetty and Peng Liu and Jiwu Jing}, editor = {Miroslaw Kutylowski and Jaideep Vaidya}, title = {RootkitDet: Practical End-to-End Defense against Kernel Rootkits in a Cloud Environment}, booktitle = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8713}, pages = {475--493}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11212-1\_27}, doi = {10.1007/978-3-319-11212-1\_27}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/ZhangS0J14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gree/MazikuS14, author = {Hellen Maziku and Sachin Shetty}, title = {Network Aware {VM} Migration in Cloud Data Centers}, booktitle = {2014 Third {GENI} Research and Educational Experiment Workshop, Atlanta, GA, USA, March 19-20, 2014}, pages = {25--28}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/GREE.2014.18}, doi = {10.1109/GREE.2014.18}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gree/MazikuS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ic2e/RawatSR14, author = {Danda B. Rawat and Sachin Shetty and Khurram Raza}, title = {Game Theoretic Dynamic Spectrum Access in Cloud-Based Cognitive Radio Networks}, booktitle = {2014 {IEEE} International Conference on Cloud Engineering, Boston, MA, USA, March 11-14, 2014}, pages = {586--591}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/IC2E.2014.16}, doi = {10.1109/IC2E.2014.16}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ic2e/RawatSR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/AlamBHS14, author = {Md Monzurul Alam and Sudeep Bhattarai and Liang Hong and Sachin Shetty}, title = {Robust transmit beamforming against steering vector uncertainty in cognitive radio networks}, booktitle = {2014 Proceedings {IEEE} {INFOCOM} Workshops, Toronto, ON, Canada, April 27 - May 2, 2014}, pages = {700--705}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/INFCOMW.2014.6849316}, doi = {10.1109/INFCOMW.2014.6849316}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/infocom/AlamBHS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ipccc/RawatLSS14, author = {Danda B. Rawat and Swetha Reddy Lenkala and Nimish Sharma and Sachin Shetty}, title = {Cloud-assisted dynamic spectrum access for {VANET} in transportation cyber-physical systems}, booktitle = {{IEEE} 33rd International Performance Computing and Communications Conference, {IPCCC} 2014, Austin, TX, USA, December 5-7, 2014}, pages = {1--2}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/PCCC.2014.7017032}, doi = {10.1109/PCCC.2014.7017032}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ipccc/RawatLSS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ivs/RawatS14, author = {Danda B. Rawat and Sachin Shetty}, title = {Enhancing connectivity for spectrum-agile Vehicular Ad hoc NETworks in fading channels}, booktitle = {2014 {IEEE} Intelligent Vehicles Symposium Proceedings, Dearborn, MI, USA, June 8-11, 2014}, pages = {957--962}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/IVS.2014.6856517}, doi = {10.1109/IVS.2014.6856517}, timestamp = {Wed, 16 Oct 2019 14:14:57 +0200}, biburl = {https://dblp.org/rec/conf/ivs/RawatS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccgrid/LenkalaSX13, author = {Swetha Reddy Lenkala and Sachin Shetty and Kaiqi Xiong}, title = {Security Risk Assessment of Cloud Carrier}, booktitle = {13th {IEEE/ACM} International Symposium on Cluster, Cloud, and Grid Computing, CCGrid 2013, Delft, Netherlands, May 13-16, 2013}, pages = {442--449}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/CCGrid.2013.28}, doi = {10.1109/CCGRID.2013.28}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccgrid/LenkalaSX13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisis/RawatBSY13, author = {Danda B. Rawat and Bhed Bahadur Bista and Sachin Shetty and Gongjun Yan}, editor = {Leonard Barolli and Fatos Xhafa and Hsing{-}Chung Chen and Antonio Fernandez G{\'{o}}mez{-}Skarmeta and Farooq Hussain}, title = {Waiting Probability Analysis for Dynamic Spectrum Access in Cognitive Radio Networks}, booktitle = {Seventh International Conference on Complex, Intelligent, and Software Intensive Systems, {CISIS} 2013, Taichung, Taiwan, July 3-5, 2013}, pages = {15--20}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/CISIS.2013.13}, doi = {10.1109/CISIS.2013.13}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cisis/RawatBSY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globalsip/RawatS13, author = {Danda B. Rawat and Sachin Shetty}, title = {Game theoretic approach to dynamic spectrum access with multi-radio and QoS requirements}, booktitle = {{IEEE} Global Conference on Signal and Information Processing, GlobalSIP 2013, Austin, TX, USA, December 3-5, 2013}, pages = {1150--1153}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/GlobalSIP.2013.6737110}, doi = {10.1109/GLOBALSIP.2013.6737110}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/globalsip/RawatS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icacci/MeenaS13, author = {S. M. Meena and Sachin S. Shetty}, title = {Trace transform based identifier for speech based image retrieval on mobile phones}, booktitle = {International Conference on Advances in Computing, Communications and Informatics, {ICACCI} 2013, Mysore, India, August 22-25, 2013}, pages = {967--972}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICACCI.2013.6637307}, doi = {10.1109/ICACCI.2013.6637307}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/icacci/MeenaS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccve/AlamBHS13, author = {Md Monzurul Alam and Sudeep Bhattarai and Liang Hong and Sachin Shetty}, title = {Robust beamforming for cognitive radio based vehicular communication}, booktitle = {International Conference on Connected Vehicles and Expo, {ICCVE} 2012, Las Vegas, NV, USA, December 2-6, 2013}, pages = {838--839}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICCVE.2013.6799910}, doi = {10.1109/ICCVE.2013.6799910}, timestamp = {Mon, 09 Aug 2021 14:54:01 +0200}, biburl = {https://dblp.org/rec/conf/iccve/AlamBHS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/services/NixKS13, author = {Robert Nix and Murat Kantarcioglu and Sachin Shetty}, title = {Toward a Real-Time Cloud Auditing Paradigm}, booktitle = {{IEEE} Ninth World Congress on Services, {SERVICES} 2013, Santa Clara, CA, USA, June 28 - July 3, 2013}, pages = {255--259}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/SERVICES.2013.43}, doi = {10.1109/SERVICES.2013.43}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/services/NixKS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/services/Shetty13, author = {Sachin Shetty}, title = {Auditing and Analysis of Network Traffic in Cloud Environment}, booktitle = {{IEEE} Ninth World Congress on Services, {SERVICES} 2013, Santa Clara, CA, USA, June 28 - July 3, 2013}, pages = {260--267}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/SERVICES.2013.42}, doi = {10.1109/SERVICES.2013.42}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/services/Shetty13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wpmc/BhattaraiHS13, author = {Sudeep Bhattarai and Liang Hong and Sachin Shetty}, title = {Optimum transmit beamforming scheme for underlay cognitive radio networks}, booktitle = {The 16th International Symposium on Wireless Personal Multimedia Communications, {WPMC} 2013, Atlantic City, NJ, USA, June 24-27, 2013}, pages = {1--6}, publisher = {{IEEE}}, year = {2013}, url = {https://ieeexplore.ieee.org/document/6618606/}, timestamp = {Thu, 12 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wpmc/BhattaraiHS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcbdd/TangCS12, author = {Ying Tang and David Carbonetta and Sachin Shetty}, title = {Development of an integrated network visualisation and graph analysis tool for biological networks}, journal = {Int. J. Comput. Biol. Drug Des.}, volume = {5}, number = {2}, pages = {152--163}, year = {2012}, url = {https://doi.org/10.1504/IJCBDD.2012.048318}, doi = {10.1504/IJCBDD.2012.048318}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcbdd/TangCS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccgrid/MukkavilliS12, author = {Sai Kiran Mukkavilli and Sachin Shetty}, title = {Mining Concept Drifting Network Traffic in Cloud Computing Environments}, booktitle = {12th {IEEE/ACM} International Symposium on Cluster, Cloud and Grid Computing, CCGrid 2012, Ottawa, Canada, May 13-16, 2012}, pages = {721--722}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/CCGrid.2012.142}, doi = {10.1109/CCGRID.2012.142}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccgrid/MukkavilliS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/ShettyLX12, author = {Sachin Shetty and Nicholas Luna and Kaiqi Xiong}, title = {Assessing network path vulnerabilities for secure cloud computing}, booktitle = {Proceedings of {IEEE} International Conference on Communications, {ICC} 2012, Ottawa, ON, Canada, June 10-15, 2012}, pages = {5548--5552}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/ICC.2012.6364720}, doi = {10.1109/ICC.2012.6364720}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/icc/ShettyLX12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iconip/RavalRSS12, author = {Kalpesh Raval and Ravi Prakash Ramachandran and Sachin S. Shetty and Brett Y. Smolenski}, editor = {Tingwen Huang and Zhigang Zeng and Chuandong Li and Chi{-}Sing Leung}, title = {Feature and Signal Enhancement for Robust Speaker Identification of {G.729} Decoded Speech}, booktitle = {Neural Information Processing - 19th International Conference, {ICONIP} 2012, Doha, Qatar, November 12-15, 2012, Proceedings, Part {V}}, series = {Lecture Notes in Computer Science}, volume = {7667}, pages = {345--352}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34500-5\_41}, doi = {10.1007/978-3-642-34500-5\_41}, timestamp = {Wed, 03 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iconip/RavalRSS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icppw/RawatSR12, author = {Danda B. Rawat and Sachin Shetty and Khurram Raza}, title = {Secure Radio Resource Management in Cloud Computing Based Cognitive Radio Networks}, booktitle = {41st International Conference on Parallel Processing Workshops, {ICPPW} 2012, Pittsburgh, PA, USA, September 10-13, 2012}, pages = {288--295}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/ICPPW.2012.43}, doi = {10.1109/ICPPW.2012.43}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icppw/RawatSR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscas/RamachandranPDS12, author = {Ravi Prakash Ramachandran and Robi Polikar and Kevin D. Dahm and Sachin S. Shetty}, title = {Open-ended design and performance evaluation of a biometric speaker identification system}, booktitle = {2012 {IEEE} International Symposium on Circuits and Systems, {ISCAS} 2012, Seoul, Korea (South), May 20-23, 2012}, pages = {2697--2700}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/ISCAS.2012.6271864}, doi = {10.1109/ISCAS.2012.6271864}, timestamp = {Wed, 03 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iscas/RamachandranPDS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/milcom/MazikuSHR12, author = {Hellen Maziku and Sachin Shetty and Keesook Han and Tamara Rogers}, title = {Enhancing the classification accuracy of {IP} geolocation}, booktitle = {31st {IEEE} Military Communications Conference, {MILCOM} 2012, Orlando, FL, USA, October 29 - November 1, 2012}, pages = {1--6}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/MILCOM.2012.6415842}, doi = {10.1109/MILCOM.2012.6415842}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/milcom/MazikuSHR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mwscas/ThayasivamSKR12, author = {Umashanger Thayasivam and Sachin S. Shetty and Chinthaka Kuruwita and Ravi Prakash Ramachandran}, title = {Detection of anomalies in network traffic using {L2E} for accurate speaker recognition}, booktitle = {55th {IEEE} International Midwest Symposium on Circuits and Systems, {MWSCAS} 2012, Boise, ID, USA, August 5-8, 2012}, pages = {884--887}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/MWSCAS.2012.6292162}, doi = {10.1109/MWSCAS.2012.6292162}, timestamp = {Mon, 09 Aug 2021 14:54:01 +0200}, biburl = {https://dblp.org/rec/conf/mwscas/ThayasivamSKR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ppna/SongSJP11, author = {Min Song and Sachin Shetty and Wenbin Jiang and Eun Kyo Park}, title = {Special issue on information dissemination and new services in {P2P} systems}, journal = {Peer-to-Peer Netw. Appl.}, volume = {4}, number = {1}, pages = {1--2}, year = {2011}, url = {https://doi.org/10.1007/s12083-010-0095-x}, doi = {10.1007/S12083-010-0095-X}, timestamp = {Mon, 04 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ppna/SongSJP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cogsima/KhoshnawZSM11, author = {Abdulqadir Khoshnaw and Saleh Zein{-}Sabatto and Sachin Shetty and Mohan Malkani}, editor = {Gabriel Jakobson and Mica R. Endsley and Mitch Kokar}, title = {Development of information fusion model for layered sensing systems using computing with words}, booktitle = {{IEEE} International Inter-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support, CogSIMA 2011, Miami, FL, USA, February 21-24, 2011}, pages = {183--188}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/COGSIMA.2011.5753442}, doi = {10.1109/COGSIMA.2011.5753442}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cogsima/KhoshnawZSM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eusipco/ShettyAR11, author = {Sachin Shetty and Kodzo Agbedanu and Ravi Prakash Ramachandran}, title = {Opportunistic spectrum access in multi-user multi-channel cognitive radio networks}, booktitle = {Proceedings of the 19th European Signal Processing Conference, {EUSIPCO} 2011, Barcelona, Spain, August 29 - Sept. 2, 2011}, pages = {1229--1233}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/7074060/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eusipco/ShettyAR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icnsc/TangS11, author = {Gina Tang and Sachin Shetty}, title = {Adaptive virtual reality game system for personalized problem-based learning}, booktitle = {Proceedings of the {IEEE} International Conference on Networking, Sensing and Control, {ICNSC} 2011, Delft, The Netherlands, 11-13 April 2011}, pages = {1--6}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ICNSC.2011.5874957}, doi = {10.1109/ICNSC.2011.5874957}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/icnsc/TangS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ShivarajSS10, author = {Gayathri Shivaraj and Min Song and Sachin Shetty}, title = {Using Hidden Markov Model to detect rogue access points}, journal = {Secur. Commun. Networks}, volume = {3}, number = {5}, pages = {394--407}, year = {2010}, url = {https://doi.org/10.1002/sec.190}, doi = {10.1002/SEC.190}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ShivarajSS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/apccas/MudrowskyRS10, author = {Robert W. Mudrowsky and Ravi Prakash Ramachandran and Sachin S. Shetty}, title = {The affine transform and feature fusion for robust speaker identification in the presence of speech coding distortion}, booktitle = {{IEEE} Asia Pacific Conference on Circuits and Systems, {APCCAS} 2010, Kuala Lumpur, Malaysia, December 6-9, 2010}, pages = {1063--1066}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/APCCAS.2010.5774905}, doi = {10.1109/APCCAS.2010.5774905}, timestamp = {Wed, 03 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/apccas/MudrowskyRS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesem/TangSC10, author = {Ying Tang and Sachin Shetty and Xiufang Chen}, title = {Empowering students with engineering literacy and problem-solving through interactive virtual reality games}, booktitle = {2010 International {IEEE} Consumer Electronics Society's Games Innovations Conference, {ICE-GIC} 2010, Hong Kong, December 21-23, 2010}, pages = {64--69}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/ICEGIC.2010.5716890}, doi = {10.1109/ICEGIC.2010.5716890}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesem/TangSC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/XinSMSS10, author = {Chunsheng Xin and Min Song and Liangping Ma and Sachin Shetty and Chien{-}Chung Shen}, title = {Control-Free Dynamic Spectrum Access for Cognitive Radio Networks}, booktitle = {Proceedings of {IEEE} International Conference on Communications, {ICC} 2010, Cape Town, South Africa, 23-27 May 2010}, pages = {1--5}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/ICC.2010.5502048}, doi = {10.1109/ICC.2010.5502048}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/icc/XinSMSS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icnsc/ShettyTC10, author = {Sachin Shetty and Ying Tang and William Collani}, title = {{TCP} Venoplus - {A} cross-layer approach to improve {TCP} performance in wired-cum-wireless networks using signal strength}, booktitle = {Proceedings of the {IEEE} International Conference on Networking, Sensing and Control, {ICNSC} 2010, Chicago, IL, USA, 10-12 April 2010}, pages = {693--697}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/ICNSC.2010.5461571}, doi = {10.1109/ICNSC.2010.5461571}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/icnsc/ShettyTC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscas/RamachandranS10, author = {Ravi Prakash Ramachandran and Sachin S. Shetty}, title = {Blind channel estimation based robust physical layer key generation in {MIMO} networks}, booktitle = {International Symposium on Circuits and Systems {(ISCAS} 2010), May 30 - June 2, 2010, Paris, France}, pages = {2522--2525}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/ISCAS.2010.5537122}, doi = {10.1109/ISCAS.2010.5537122}, timestamp = {Wed, 03 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iscas/RamachandranS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcmse/ShettySYM09, author = {Sachin Shetty and Min Song and HouJun Yang and Lisa Matthews}, title = {Learning distributed bayesian network structure using majority-based method}, journal = {J. Comput. Methods Sci. Eng.}, volume = {9}, number = {4-6}, pages = {53--68}, year = {2009}, url = {https://doi.org/10.3233/JCM-2009-0235}, doi = {10.3233/JCM-2009-0235}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcmse/ShettySYM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/ShettySXP09, author = {Sachin Shetty and Min Song and Chunsheng Xin and E. K. Park}, title = {A Learning-based Multiuser Opportunistic Spectrum Access Approach in Unslotted Primary Networks}, booktitle = {{INFOCOM} 2009. 28th {IEEE} International Conference on Computer Communications, Joint Conference of the {IEEE} Computer and Communications Societies, 19-25 April 2009, Rio de Janeiro, Brazil}, pages = {2966--2970}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/INFCOM.2009.5062268}, doi = {10.1109/INFCOM.2009.5062268}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/infocom/ShettySXP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mue/ShettySW09, author = {Sachin Shetty and Min Song and Jun Wang}, title = {Distributed Adaptive Protocols for Information Dissemination in Large-Scale Communication Systems}, booktitle = {2009 Third International Conference on Multimedia and Ubiquitous Engineering, {MUE} 2009, Qingdao, China, June 4-6, 2009}, pages = {279--286}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/MUE.2009.56}, doi = {10.1109/MUE.2009.56}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mue/ShettySW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rtcsa/ZhouSSS09, author = {Gang Zhou and Sachin Shetty and George Simmons and Min Song}, title = {{PLL} Based Time Synchronization in Wireless Sensor Networks}, booktitle = {15th {IEEE} International Conference on Embedded and Real-Time Computing Systems and Applications, {RTCSA} 2009, Beijing, China, 24-26 August 2009}, pages = {51--56}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/RTCSA.2009.12}, doi = {10.1109/RTCSA.2009.12}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/rtcsa/ZhouSSS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sede/Shetty08, author = {Sachin Shetty}, editor = {Hisham Al{-}Mubaid and Rym Zalila{-}Wenkstern}, title = {Min Song, Youjun Yang, Mary Mathews: Learning Bayesian Network over Distributed Databases Using Majority-based Method}, booktitle = {17th International Conference on Software Engineering and Data Engineering (SEDE-2008), June 30 - July 2, 2008, Omni Los Angeles Hotel at California Plaza, Los Angeles, California, USA, Proceedings}, pages = {209--215}, publisher = {{ISCA}}, year = {2008}, timestamp = {Wed, 21 Jan 2009 10:04:27 +0100}, biburl = {https://dblp.org/rec/conf/sede/Shetty08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/monet/SongSG07, author = {Min Song and Sachin Shetty and Deepthi Gopalpet}, title = {Coexistence of {IEEE} 802.11b and Bluetooth: An Integrated Performance Analysis}, journal = {Mob. Networks Appl.}, volume = {12}, number = {5-6}, pages = {450--459}, year = {2007}, url = {https://doi.org/10.1007/s11036-008-0047-3}, doi = {10.1007/S11036-008-0047-3}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/monet/SongSG07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cata/ShettySAAB07, author = {Sachin Shetty and Min Song and Robert Ash and Ersin Ancel and Kenneth Bone}, editor = {Bidyut Gupta}, title = {Wireless Sensor Payload Design for Sounding Rocket}, booktitle = {22nd International Conference on Computers and Their Applications, CATA-2007, Honolulu, Hawaii, USA, March 28-30, 2007}, pages = {295--300}, publisher = {{ISCA}}, year = {2007}, timestamp = {Mon, 09 Aug 2021 16:27:19 +0200}, biburl = {https://dblp.org/rec/conf/cata/ShettySAAB07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/snpd/MathewsSSM07, author = {Mary Mathews and Min Song and Sachin Shetty and Rick McKenzie}, editor = {Wenying Feng and Feng Gao}, title = {Detecting Compromised Nodes in Wireless Sensor Networks}, booktitle = {Proceedings of the 8th {ACIS} International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, {SNPD} 2007, July 30 - August 1, 2007, Qingdao, China}, pages = {273--278}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/SNPD.2007.538}, doi = {10.1109/SNPD.2007.538}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/snpd/MathewsSSM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccnmc/SongSL05, author = {Min Song and Sachin Shetty and Wu Li}, editor = {Xicheng Lu and Wei Zhao}, title = {Fair and Smooth Scheduling for Virtual Output Queuing Switches Achieving 100{\%} Throughput}, booktitle = {Networking and Mobile Computing, Third International Conference, {ICCNMC} 2005, Zhangjiajie, China, August 2-4, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3619}, pages = {405--413}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11534310\_44}, doi = {10.1007/11534310\_44}, timestamp = {Fri, 09 Apr 2021 18:41:16 +0200}, biburl = {https://dblp.org/rec/conf/iccnmc/SongSL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itre/ShettyS05, author = {Sachin Shetty and Min Song}, title = {Structure learning of Bayesian networks using a semantic genetic algorithm-based approach}, booktitle = {{ITRE} 2005 - 3rd International Conference on Information Technology: Research and Education, June 27-30 2005, Hsinchu, Taiwan, Proceedings}, pages = {454--458}, publisher = {{IEEE}}, year = {2005}, url = {https://doi.org/10.1109/ITRE.2005.1503164}, doi = {10.1109/ITRE.2005.1503164}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/itre/ShettyS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ISCApdcs/SongSAY04, author = {Min Song and Sachin Shetty and Mansoor Alam and HouJun Yang}, editor = {David A. Bader and Ashfaq A. Khokhar}, title = {A New Multicast Queuing Mechanism for High-Speed Packet Switches}, booktitle = {Proceedings of the {ISCA} 17th International Conference on Parallel and Distributed Computing Systems, September 15-17, 2004, The Canterbury Hotel, San Francisco, California, {USA}}, pages = {327--332}, publisher = {{ISCA}}, year = {2004}, timestamp = {Mon, 09 Aug 2021 16:35:42 +0200}, biburl = {https://dblp.org/rec/conf/ISCApdcs/SongSAY04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ISCApdcs/SongSLY03, author = {Min Song and Sachin Shetty and Guillermo Loaisiga and HouJun Yang}, editor = {Seong{-}Moo Yoo and Hee Yong Youn}, title = {Efficient Queuing Scheme for Multicast Switches in Overlay Networks}, booktitle = {Proceedings of the {ISCA} 16th International Conference on Parallel and Distributed Computing Systems, August 13-15, 2003, Atlantis Hotel, Reno, Nevada, {USA}}, pages = {76--81}, publisher = {{ISCA}}, year = {2003}, timestamp = {Mon, 09 Aug 2021 16:35:48 +0200}, biburl = {https://dblp.org/rec/conf/ISCApdcs/SongSLY03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/caine/SongSZ03, author = {Min Song and Sachin Shetty and Weiying Zhu}, editor = {Kendall E. Nygard}, title = {Evolutionary Programming in a Distributed Packet Scheduling Architecture}, booktitle = {Proceedings of the 16th International Conference on Computer Applications in Industry and Engineering, November 11-13, 2003, Imperial Palace Hotel, Las Vegas, Nevada, {USA}}, pages = {230--233}, publisher = {{ISCA}}, year = {2003}, timestamp = {Thu, 20 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/caine/SongSZ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ISCAicis/SongASJ02, author = {Min Song and Mansoor Alam and Sachin Shetty and Uday Jarajapu}, editor = {Adel Said Elmaghraby and Robert Dees}, title = {Evolutionary Scheduling in a Multi-Service Routing Switch}, booktitle = {Proceedings of the 11th Conference on Intelligent Systems: Emerging Technologies, July 18-20, 2002, Boston, Massachusetts, {USA}}, pages = {38--43}, publisher = {{ISCA}}, year = {2002}, timestamp = {Mon, 09 Aug 2021 16:17:38 +0200}, biburl = {https://dblp.org/rec/conf/ISCAicis/SongASJ02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icassp/ShettyMC01, author = {Sachin Shetty and John N. McDonald and Douglas Cochran}, title = {A windowing condition for characterization of finite signals from spectral phase or magnitude}, booktitle = {{IEEE} International Conference on Acoustics, Speech, and Signal Processing, {ICASSP} 2001, 7-11 May, 2001, Salt Palace Convention Center, Salt Lake City, Utah, USA, Proceedings}, pages = {3889--3892}, publisher = {{IEEE}}, year = {2001}, url = {https://doi.org/10.1109/ICASSP.2001.940693}, doi = {10.1109/ICASSP.2001.940693}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icassp/ShettyMC01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.