Follow
Sridhar Venkatesan
Sridhar Venkatesan
Peraton Labs
Verified email at peratonlabs.com - Homepage
Title
Cited by
Cited by
Year
A moving target defense approach to mitigate DDoS attacks against proxy-based architectures
S Venkatesan, M Albanese, K Amin, S Jajodia, M Wright
2016 IEEE conference on communications and network security (CNS), 198-206, 2016
662016
Moving target defense against DDoS attacks: An empirical game-theoretic analysis
M Wright, S Venkatesan, M Albanese, MP Wellman
Proceedings of the 2016 ACM Workshop on Moving Target Defense, 93-104, 2016
392016
A moving target defense approach to disrupting stealthy botnets
S Venkatesan, M Albanese, G Cybenko, S Jajodia
Proceedings of the 2016 ACM Workshop on Moving Target Defense, 37-46, 2016
352016
Defending from stealthy botnets using moving target defenses
M Albanese, S Jajodia, S Venkatesan
IEEE Security & Privacy 16 (1), 92-97, 2018
272018
Detecting stealthy botnets in a resource-constrained environment using reinforcement learning
S Venkatesan, M Albanese, A Shah, R Ganesan, S Jajodia
Proceedings of the 2017 workshop on moving target defense, 75-85, 2017
262017
Advancing wsn physical security adopting tpm-based architectures
M Barbareschi, E Battista, A Mazzeo, S Venkatesan
Proceedings of the 2014 IEEE 15th International Conference on Information …, 2014
212014
A framework for moving target defense quantification
W Connell, M Albanese, S Venkatesan
IFIP International Conference on ICT Systems Security and Privacy Protection …, 2017
162017
An efficient IND-CCA2 secure variant of the Niederreiter encryption scheme in the standard model
K Preetha Mathew, S Vasant, S Venkatesan, C Pandu Rangan
Australasian Conference on Information Security and Privacy, 166-179, 2012
152012
A hardware accelerator for data classification within the sensing infrastructure
M Barbareschi, E Battista, N Mazzocca, S Venkatesan
Proceedings of the 2014 IEEE 15th International Conference on Information …, 2014
132014
Identifying stealthy attackers in a game theoretic framework using deception
A Basak, C Kamhoua, S Venkatesan, M Gutierrez, AH Anwar, ...
International Conference on Decision and Game Theory for Security, 21-32, 2019
122019
Harnessing the power of deception in attack graph-based security games
S Milani, W Shen, KS Chan, S Venkatesan, NO Leslie, C Kamhoua, ...
International Conference on Decision and Game Theory for Security, 147-167, 2020
112020
On detecting manifestation of adversary characteristics
S Venkatesan, S Sugrim, R Izmailov, CYJ Chiang, R Chadha, B Doshi, ...
MILCOM 2018-2018 IEEE military communications conference (MILCOM), 431-437, 2018
112018
Disrupting stealthy botnets through strategic placement of detectors
S Venkatesan, M Albanese, S Jajodia
2015 IEEE Conference on Communications and Network Security (CNS), 95-103, 2015
112015
On defensive cyber deception: A case study using SDN
CYJ Chiang, S Venkatesan, S Sugrim, JA Youzwak, R Chadha, EI Colbert, ...
MILCOM 2018-2018 IEEE Military Communications Conference (MILCOM), 110-115, 2018
102018
Learning and planning in the feature deception problem
ZR Shi, AD Procaccia, KS Chan, S Venkatesan, N Ben-Asher, NO Leslie, ...
International Conference on Decision and Game Theory for Security, 23-44, 2020
82020
Measuring the effectiveness of network deception
S Sugrim, S Venkatesan, JA Youzwak, CYJ Chiang, R Chadha, ...
2018 IEEE International Conference on Intelligence and Security Informatics …, 2018
82018
Key Predistribution Scheme for Grid Based Wireless Sensor Networks using Quadruplex Polynomial Shares per Node
V Sridhar, V Raghavendar
Procedia Computer Science 5, 132-140, 2011
82011
A quantitative risk assessment framework for adaptive intrusion detection in the cloud
LH Pham, M Albanese, S Venkatesan
2016 IEEE Conference on Communications and Network Security (CNS), 489-497, 2016
62016
A quantitative framework to model reconnaissance by stealthy attackers and support deception-based defenses
LH Pham, M Albanese, R Chadha, CYJ Chiang, S Venkatesan, ...
2020 IEEE Conference on Communications and Network Security (CNS), 1-9, 2020
42020
Adaptive cyber defenses for botnet detection and mitigation
M Albanese, S Jajodia, S Venkatesan, G Cybenko, T Nguyen
Adversarial and Uncertain Reasoning for Adaptive Cyber Defense, 156-205, 2019
42019
The system can't perform the operation now. Try again later.
Articles 1–20