Follow
Sridhar Venkatesan
Sridhar Venkatesan
Peraton Labs
Verified email at peratonlabs.com - Homepage
Title
Cited by
Cited by
Year
A moving target defense approach to mitigate DDoS attacks against proxy-based architectures
S Venkatesan, M Albanese, K Amin, S Jajodia, M Wright
2016 IEEE conference on communications and network security (CNS), 198-206, 2016
752016
Moving target defense against DDoS attacks: An empirical game-theoretic analysis
M Wright, S Venkatesan, M Albanese, MP Wellman
Proceedings of the 2016 ACM Workshop on Moving Target Defense, 93-104, 2016
512016
A moving target defense approach to disrupting stealthy botnets
S Venkatesan, M Albanese, G Cybenko, S Jajodia
Proceedings of the 2016 ACM Workshop on Moving Target Defense, 37-46, 2016
452016
Defending from stealthy botnets using moving target defenses
M Albanese, S Jajodia, S Venkatesan
IEEE Security & Privacy 16 (1), 92-97, 2018
392018
Detecting stealthy botnets in a resource-constrained environment using reinforcement learning
S Venkatesan, M Albanese, A Shah, R Ganesan, S Jajodia
Proceedings of the 2017 Workshop on Moving Target Defense, 75-85, 2017
302017
Harnessing the power of deception in attack graph-based security games
S Milani, W Shen, KS Chan, S Venkatesan, NO Leslie, C Kamhoua, ...
Decision and Game Theory for Security: 11th International Conference …, 2020
262020
Advancing wsn physical security adopting tpm-based architectures
M Barbareschi, E Battista, A Mazzeo, S Venkatesan
Proceedings of the 2014 IEEE 15th International Conference on Information …, 2014
232014
Identifying stealthy attackers in a game theoretic framework using deception
A Basak, C Kamhoua, S Venkatesan, M Gutierrez, AH Anwar, ...
Decision and Game Theory for Security: 10th International Conference …, 2019
202019
On defensive cyber deception: A case study using SDN
CYJ Chiang, S Venkatesan, S Sugrim, JA Youzwak, R Chadha, EI Colbert, ...
MILCOM 2018-2018 IEEE Military Communications Conference (MILCOM), 110-115, 2018
202018
A framework for moving target defense quantification
W Connell, M Albanese, S Venkatesan
IFIP International Conference on ICT Systems Security and Privacy Protection …, 2017
172017
An efficient IND-CCA2 secure variant of the Niederreiter encryption scheme in the standard model
K Preetha Mathew, S Vasant, S Venkatesan, C Pandu Rangan
Information Security and Privacy: 17th Australasian Conference, ACISP 2012 …, 2012
172012
Poisoning attacks and data sanitization mitigations for machine learning models in network intrusion detection systems
S Venkatesan, H Sikka, R Izmailov, R Chadha, A Oprea, MJ De Lucia
MILCOM 2021-2021 IEEE Military Communications Conference (MILCOM), 874-879, 2021
162021
Measuring the effectiveness of network deception
S Sugrim, S Venkatesan, JA Youzwak, CYJ Chiang, R Chadha, ...
2018 IEEE international conference on Intelligence and Security Informatics …, 2018
162018
Learning and planning in the feature deception problem
ZR Shi, AD Procaccia, KS Chan, S Venkatesan, N Ben-Asher, NO Leslie, ...
Decision and Game Theory for Security: 11th International Conference …, 2020
152020
A hardware accelerator for data classification within the sensing infrastructure
M Barbareschi, E Battista, N Mazzocca, S Venkatesan
Proceedings of the 2014 IEEE 15th International Conference on Information …, 2014
152014
Disrupting stealthy botnets through strategic placement of detectors
S Venkatesan, M Albanese, S Jajodia
2015 IEEE Conference on Communications and Network Security (CNS), 95-103, 2015
142015
On detecting manifestation of adversary characteristics
S Venkatesan, S Sugrim, R Izmailov, CYJ Chiang, R Chadha, B Doshi, ...
MILCOM 2018-2018 IEEE military communications conference (MILCOM), 431-437, 2018
132018
R-Sentry: Deception based ransomware detection using file access patterns
S Sheen, KA Asmitha, S Venkatesan
Computers and Electrical Engineering 103, 108346, 2022
112022
Adaptive cyber defenses for botnet detection and mitigation
M Albanese, S Jajodia, S Venkatesan, G Cybenko, T Nguyen
Adversarial and Uncertain Reasoning for Adaptive Cyber Defense: Control-and …, 2019
92019
Key Predistribution Scheme for Grid Based Wireless Sensor Networks using Quadruplex Polynomial Shares per Node
V Sridhar, V Raghavendar
Procedia Computer Science 5, 132-140, 2011
92011
The system can't perform the operation now. Try again later.
Articles 1–20