Ankit Shah
제목
인용
인용
연도
Dynamic scheduling of cybersecurity analysts for minimizing risk using reinforcement learning
R Ganesan, S Jajodia, A Shah, H Cam
ACM Transactions on Intelligent Systems and Technology (TIST) 8 (1), 1-21, 2016
422016
Vulcon: A system for vulnerability prioritization, mitigation, and management
KA Farris, A Shah, G Cybenko, R Ganesan, S Jajodia
ACM Transactions on Privacy and Security (TOPS) 21 (4), 1-28, 2018
342018
Detecting Stealthy Botnets in a Resource-Constrained Environment Using Reinforcement Learning
S Venkatesan, M Albanese, A Shah, R Ganesan, S Jajodia
Proceedings of the 4th ACM Workshop on Moving Target Defense, 75-85, 2017
242017
A methodology to measure and monitor level of operational effectiveness of a CSOC
A Shah, R Ganesan, S Jajodia, H Cam
International Journal of Information Security 17 (2), 121-134, 2018
202018
Understanding tradeoffs between throughput, quality, and cost of alert analysis in a csoc
A Shah, R Ganesan, S Jajodia, H Cam
IEEE Transactions on Information Forensics and Security 14 (5), 1155-1170, 2018
142018
A methodology for ensuring fair allocation of CSOC effort for alert investigation
A Shah, R Ganesan, S Jajodia
International Journal of Information Security 18 (2), 199-218, 2019
82019
Dynamic optimization of the level of operational effectiveness of a CSOC under adverse conditions
A Shah, R Ganesan, S Jajodia, H Cam
ACM Transactions on Intelligent Systems and Technology (TIST) 9 (5), 1-20, 2018
72018
Adaptive reallocation of cybersecurity analysts to sensors for balancing risk between sensors
A Shah, R Ganesan, S Jajodia, H Cam
Service Oriented Computing and Applications 12 (2), 123-135, 2018
62018
Optimal assignment of sensors to analysts in a cybersecurity operations center
A Shah, R Ganesan, S Jajodia, H Cam
IEEE Systems Journal 13 (1), 1060-1071, 2018
52018
A strategy for effective alert analysis at a cyber security operations center
R Ganesan, A Shah
From Database to Cyber Security, 206-226, 2018
42018
A Novel Metric for Measuring Operational Effectiveness of a Cybersecurity Operations Center
R Ganesan, A Shah, S Jajodia, H Cam
Network Security Metrics, 177-207, 2017
42017
Vulnerability selection for remediation: An empirical analysis
A Shah, KA Farris, R Ganesan, S Jajodia
The Journal of Defense Modeling and Simulation, 1548512919874129, 2019
32019
A Reinforcement Learning Approach for Rebalancing Electric Vehicle Sharing Systems
A Bogyrbayeva, S Jang, A Shah, YJ Jang, C Kwon
IEEE Transactions on Intelligent Transportation Systems, 2021
22021
Two Can Play That Game: An Adversarial Evaluation of a Cyber-Alert Inspection System
A Shah, A Sinha, R Ganesan, S Jajodia, H Cam
ACM Transactions on Intelligent Systems and Technology (TIST) 11 (3), 1-20, 2020
22020
An outsourcing model for alert analysis in a cybersecurity operations center
A Shah, R Ganesan, S Jajodia, H Cam
ACM Transactions on the Web (TWEB) 14 (1), 1-22, 2020
22020
Optimizing alert data management processes at a cyber security operations center
R Ganesan, A Shah, S Jajodia, H Cam
Adversarial and Uncertain Reasoning for Adaptive Cyber Defense, 206-231, 2019
22019
A two-step approach to optimal selection of alerts for investigation in a CSOC
A Shah, R Ganesan, S Jajodia, H Cam
IEEE Transactions on Information Forensics and Security 14 (7), 1857-1870, 2018
22018
Maintaining the level of operational effectiveness of a CSOC under adverse conditions
A Shah, R Ganesan, S Jajodia, H Cam
International Journal of Information Security, 1-15, 2021
2021
Adaptive Alert Management for Balancing Optimal Performance among Distributed CSOCs using Reinforcement Learning
A Shah, R Ganesan, S Jajodia, P Samarati, H Cam
IEEE Transactions on Parallel and Distributed Systems 31 (1), 16-33, 2019
2019
현재 시스템이 작동되지 않습니다. 나중에 다시 시도해 주세요.
학술자료 1–19