Sridhar Venkatesan
Sridhar Venkatesan
Verified email at gmu.edu - Homepage
Title
Cited by
Cited by
Year
A moving target defense approach to mitigate DDoS attacks against proxy-based architectures
S Venkatesan, M Albanese, K Amin, S Jajodia, M Wright
2016 IEEE conference on communications and network security (CNS), 198-206, 2016
362016
Moving target defense against DDoS attacks: An empirical game-theoretic analysis
M Wright, S Venkatesan, M Albanese, MP Wellman
Proceedings of the 2016 ACM Workshop on Moving Target Defense, 93-104, 2016
222016
A moving target defense approach to disrupting stealthy botnets
S Venkatesan, M Albanese, G Cybenko, S Jajodia
Proceedings of the 2016 ACM Workshop on Moving Target Defense, 37-46, 2016
202016
Advancing wsn physical security adopting tpm-based architectures
M Barbareschi, E Battista, A Mazzeo, S Venkatesan
Proceedings of the 2014 IEEE 15th International Conference on Information …, 2014
182014
An efficient IND-CCA2 secure variant of the Niederreiter encryption scheme in the standard model
KP Mathew, S Vasant, S Venkatesan, CP Rangan
Australasian Conference on Information Security and Privacy, 166-179, 2012
152012
Detecting stealthy botnets in a resource-constrained environment using reinforcement learning
S Venkatesan, M Albanese, A Shah, R Ganesan, S Jajodia
Proceedings of the 2017 Workshop on Moving Target Defense, 75-85, 2017
142017
A hardware accelerator for data classification within the sensing infrastructure
M Barbareschi, E Battista, N Mazzocca, S Venkatesan
Proceedings of the 2014 IEEE 15th International Conference on Information …, 2014
112014
A framework for moving target defense quantification
W Connell, M Albanese, S Venkatesan
IFIP International Conference on ICT Systems Security and Privacy Protection …, 2017
102017
Key Predistribution Scheme for Grid Based Wireless Sensor Networks using Quadruplex Polynomial Shares per Node
V Sridhar, V Raghavendar
Procedia Computer Science 5, 132-140, 2011
82011
Defending from stealthy botnets using moving target defenses
M Albanese, S Jajodia, S Venkatesan
IEEE Security & Privacy 16 (1), 92-97, 2018
72018
Disrupting stealthy botnets through strategic placement of detectors
S Venkatesan, M Albanese, S Jajodia
2015 IEEE Conference on Communications and Network Security (CNS), 95-103, 2015
62015
A quantitative risk assessment framework for adaptive Intrusion Detection in the cloud
LH Pham, M Albanese, S Venkatesan
2016 IEEE Conference on Communications and Network Security (CNS), 489-497, 2016
42016
A code-based 1-out-of-N oblivious transfer based on mceliece assumptions
S Vasant, S Venkatesan, CP Rangan
International Conference on Information Security Practice and Experience …, 2012
4*2012
On Detecting Manifestation of Adversary Characteristics
S Venkatesan, S Sugrim, R Izmailov, CYJ Chiang, R Chadha, B Doshi, ...
MILCOM 2018-2018 IEEE military communications conference (MILCOM), 431-437, 2018
32018
Moving target defense quantification
M Albanese, W Connell, S Venkatesan, G Cybenko
Adversarial and Uncertain Reasoning for Adaptive Cyber Defense, 94-111, 2019
22019
On defensive cyber deception: A case study using SDN
CYJ Chiang, S Venkatesan, S Sugrim, JA Youzwak, R Chadha, EI Colbert, ...
MILCOM 2018-2018 IEEE Military Communications Conference (MILCOM), 110-115, 2018
12018
A Framework for Studying Autonomic Computing Models in Cyber Deception
S Venkatesan, S Sugrim, JA Youzwak, CYJ Chiang, R Chadha
Adaptive Autonomous Secure Cyber Systems, 89-107, 2020
2020
VulnerVAN: A Vulnerable Network Generation Tool
S Venkatesan, JA Youzwak, S Sugrim, CYJ Chiang, A Poylisher, ...
MILCOM 2019-2019 IEEE Military Communications Conference (MILCOM), 1-6, 2019
2019
Identifying Stealthy Attackers in a Game Theoretic Framework Using Deception
A Basak, C Kamhoua, S Venkatesan, M Gutierrez, AH Anwar, ...
International Conference on Decision and Game Theory for Security, 21-32, 2019
2019
Learning and Planning in Feature Deception Games
ZR Shi, AD Procaccia, KS Chan, S Venkatesan, N Ben-Asher, NO Leslie, ...
arXiv preprint arXiv:1905.04833, 2019
2019
The system can't perform the operation now. Try again later.
Articles 1–20