Sudip Saha
Sudip Saha
Facebook Inc.
Verified email at vt.edu - Homepage
Title
Cited by
Cited by
Year
Approximation algorithms for reducing the spectral radius to control epidemic spread
S Saha, A Adiga, BA Prakash, AKS Vullikanti
Proceedings of the 2015 SIAM International Conference on Data Mining, 568-576, 2015
732015
DNS for massive-scale command and control
K Xu, P Butler, S Saha, D Yao
IEEE Transactions on Dependable and Secure Computing 10 (3), 143-153, 2013
712013
Near-Optimal Algorithms for Controlling Propagation at Group Scale on Networks
Y Zhang, A Adiga, S Saha, A Vullikanti, BA Prakash
IEEE Transactions on Knowledge and Data Engineering 28 (12), 3339--3352, 2016
332016
Planning and response in the aftermath of a large crisis: An agent-based informatics framework
C Barrett, K Bisset, S Chandan, J Chen, Y Chungbaek, S Eubank, ...
2013 Winter Simulations Conference (WSC), 1515-1526, 2013
282013
Human initiated cascading failures in societal infrastructures
C Barrett, K Channakeshava, F Huang, J Kim, A Marathe, MV Marathe, ...
PloS one 7 (10), e45406, 2012
242012
A biologically inspired password authentication system
D Dasgupta, S Saha
Proceedings of the 5th Annual Workshop on Cyber Security and Information …, 2009
212009
Modeling the interaction between emergency communications and behavior in the aftermath of a disaster
S Chandan, S Saha, C Barrett, S Eubank, A Marathe, M Marathe, ...
International Conference on Social Computing, Behavioral-Cultural Modeling …, 2013
192013
Equilibria in epidemic containment games
S Saha, A Adiga, A Vullikanti
Proceedings of the AAAI Conference on Artificial Intelligence 28 (1), 2014
172014
Integrated multi-network modeling environment for spectrum management
R Beckman, K Channakeshava, F Huang, J Kim, A Marathe, M Marathe, ...
IEEE Journal on Selected Areas in Communications 31 (6), 1158-1168, 2013
172013
Password security through negative filtering
D Dasgupta, S Saha
2010 International Conference on Emerging Security Technologies, 83-89, 2010
122010
Modeling cellular network traffic with mobile call graph constraints
J Kim, VSA Kumar, A Marathe, G Pei, S Saha, BSP Subbiah
Proceedings of the 2011 Winter Simulation Conference (WSC), 3165-3177, 2011
102011
Quantifying mixed uncertainties in cyber attacker payoffs
R Chatterjee, Samrat, Halappanavar, Mahantesh, Tipireddy, M Oster, ...
2015 IEEE International Symposium on Technologies for Homeland Security (HST), 2015
82015
Identifying vulnerabilities and hardening attack graphs for networked systems
S Saha, AKS Vullikanti, S Halappanavar, Mahantesh, Chatterjee
2016 IEEE Symposium on Technologies for Homeland Security (HST), 2016
62016
Analysis of policy instruments for enhanced competition in spectrum auction
J Kim, A Marathe, G Pei, S Saha, BSP Subbiah, AKS Vullikanti
2012 IEEE International Symposium on Dynamic Spectrum Access Networks, 89-96, 2012
42012
Synthetic gene design with a large number of hidden stops
V Phan, S Saha, A Pandey, TY Wong
International journal of data mining and bioinformatics 4 (4), 377-394, 2010
42010
Impact of geographic complementarity in dynamic spectrum access
J Kim, VSA Kumar, A Marathe, G Pei, S Saha, B Sunapanasubbiah
2011 IEEE International Symposium on Dynamic Spectrum Access Networks …, 2011
32011
Techniques for validation and controlled execution of processes, codes and data: A survey
D Dasgupta, S Saha, A Negatu
2010 International Conference on Security and Cryptography (SECRYPT), 1-9, 2010
32010
Synthetic gene design with a large number of hidden stop codons
V Phan, S Saha, A Pandey, W Tit-Yee
2008 IEEE International Conference on Bioinformatics and Biomedicine, 141-146, 2008
32008
FlipNet: Modeling Covert and Persistent Attacks on Networked Resources
S Saha, A Vullikanti, M Halappanavar
International Conference on Distributed Computing Systems (ICDCS), 2017
22017
Clearing secondary spectrum market with spatio-temporal partitioning
S Saha, A Marathe, G Pei, BSP Subbiah, J Kim, AKS Vullikanti
2012 IEEE International Symposium on Dynamic Spectrum Access Networks, 358-367, 2012
22012
The system can't perform the operation now. Try again later.
Articles 1–20