A CCA2 secure Code based encryption scheme in the Standard Model

Sachin Vasant , Sridhar Venkatesan , C. Pandu Rangan . , Preetha Mathew K
GSTF Journal on computing 2 ( 1)

2014
Harnessing the Power of Deception in Attack Graph-Based Security Games.

Charles A. Kamhoua , Kevin S. Chan , Sridhar Venkatesan , Fei Fang
GameSec 147 -167

16
2020
Learning and Planning in the Feature Deception Problem.

Ariel D. Procaccia , Charles A. Kamhoua , Kevin S. Chan , Sridhar Venkatesan
GameSec 23 -44

2020
Detecting Stealthy Botnets in a Resource-Constrained Environment using Reinforcement Learning

Sridhar Venkatesan , Massimiliano Albanese , Ankit Shah , Rajesh Ganesan
Proceedings of the 2017 Workshop on Moving Target Defense 75 -85

17
2017
Advancing WSN physical security adopting TPM-based architectures

Mario Barbareschi , Ermanno Battista , Antonino Mazzeo , Sridhar Venkatesan
information reuse and integration 394 -399

10
2014
A hardware accelerator for data classification within the sensing infrastructure

Mario Barbareschi , Ermanno Battista , Nicola Mazzocca , Sridhar Venkatesan
information reuse and integration 400 -405

8
2014
Measuring the Effectiveness of Network Deception

Shridatt Sugrim , Sridhar Venkatesan , Jason A. Youzwak , Cho-Yu J. Chiang
intelligence and security informatics 142 -147

2
2018
Identifying Stealthy Attackers in a Game Theoretic Framework Using Deception

Anjon Basak , Charles Kamhoua , Sridhar Venkatesan , Marcus Gutierrez
decision and game theory for security 21 -32

2
2019
A Quantitative Framework to Model Reconnaissance by Stealthy Attackers and Support Deception-Based Defenses

Luan Huy Pham , Massimiliano Albanese , Ritu Chadha , Cho-Yu J. Chiang
communications and networking symposium 1 -9

1
2020
A Framework for Studying Autonomic Computing Models in Cyber Deception

Sridhar Venkatesan , Shridatt Sugrim , Jason A. Youzwak , Cho-Yu J. Chiang
Adaptive Autonomous Secure Cyber Systems 89 -107

2020
Defending from Stealthy Botnets Using Moving Target Defenses

Massimiliano Albanese , Sushil Jajodia , Sridhar Venkatesan
ieee symposium on security and privacy 16 ( 1) 92 -97

31
2018
A Framework for Moving Target Defense Quantification

Warren Connell , Massimiliano Albanese , Sridhar Venkatesan
ICT Systems Security and Privacy Protection 124 -138

7
2017
Disrupting stealthy botnets through strategic placement of detectors

Sridhar Venkatesan , Massimiliano Albanese , Sushil Jajodia
communications and networking symposium 95 -103

5
2015
A quantitative risk assessment framework for adaptive Intrusion Detection in the cloud

Luan Huy Pham , Massimiliano Albanese , Sridhar Venkatesan
communications and networking symposium 489 -497

3
2016
On Defensive Cyber Deception: A Case Study Using SDN

Cho-Yu J. Chiang , Sridhar Venkatesan , Shridatt Sugrim , Jason A. Youzwak
military communications conference 110 -115

3
2018
On Detecting Manifestation of Adversary Characteristics

Sridhar Venkatesan , Shridatt Sugrim , Rauf Izmailov , Cho-Yu J. Chiang
military communications conference 431 -437

4
2018
Moving Target Defense Quantification

Massimiliano Albanese , Warren Connell , Sridhar Venkatesan , George Cybenko
Adversarial and Uncertain Reasoning for Adaptive Cyber Defense 94 -111

4
2019
Adaptive Cyber Defenses for Botnet Detection and Mitigation

Massimiliano Albanese , Sushil Jajodia , Sridhar Venkatesan , George Cybenko
Adversarial and Uncertain Reasoning for Adaptive Cyber Defense 156 -205

3
2019
DeBot: A novel network‐based mechanism to detect exfiltration by architectural stealthy botnets

Sridhar Venkatesan , Massimiliano Albanese , Cho-Yu Jason Chiang , Angelo Sapello
Security and Privacy 1 ( 6)

2018
A Code-Based 1-out-of-N Oblivious Transfer Based on McEliece Assumptions

Preetha Mathew K. , Sachin Vasant , Sridhar Venkatesan , C. Pandu Rangan
Information Security Practice and Experience 144 -157

2
2012