Ankit Shah

Orcid: 0000-0002-8314-6392

Affiliations:
  • George Mason University, Center for Secure Information Systems, Fairfax, VA, USA


According to our database1, Ankit Shah authored at least 29 papers between 2016 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A Machine Learning and Optimization Framework for Efficient Alert Management in a Cybersecurity Operations Center.
DTRAP, 2024

A sequential deep learning framework for a robust and resilient network intrusion detection system.
Comput. Secur., 2024

2023
Deep VULMAN: A deep reinforcement learning-enabled cyber vulnerability management framework.
Expert Syst. Appl., July, 2023

An AI-Assisted Systematic Literature Review of the Impact of Vehicle Automation on Energy Consumption.
IEEE Trans. Intell. Veh., June, 2023

A Novel Team Formation Framework Based on Performance in a Cybersecurity Operations Center.
IEEE Trans. Serv. Comput., 2023

Towards Optimal Triage and Mitigation of Context-Sensitive Cyber Vulnerabilities.
IEEE Trans. Dependable Secur. Comput., 2023

Towards optimal foreign object debris detection in an airport environment.
Expert Syst. Appl., 2023

A Multi-Agent Reinforcement Learning Framework for Evaluating the U.S. Ending the HIV Epidemic Plan.
CoRR, 2023

Deep PackGen: A Deep Reinforcement Learning Framework for Adversarial Network Packet Generation.
CoRR, 2023

Toward Optimal Defect Detection in Assembled Printed Circuit Boards Under Adverse Conditions.
IEEE Access, 2023

Empirical Evaluation of Autoencoder Models for Anomaly Detection in Packet-based NIDS.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2023

2022
A Reinforcement Learning Approach for Rebalancing Electric Vehicle Sharing Systems.
IEEE Trans. Intell. Transp. Syst., 2022

Maintaining the level of operational effectiveness of a CSOC under adverse conditions.
Int. J. Inf. Sec., 2022

2021
Adversarial Deep Reinforcement Learning Enabled Threat Analytics Framework for Constrained Spatio-Temporal Movement Intelligence Data.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2021

2020
An Outsourcing Model for Alert Analysis in a Cybersecurity Operations Center.
ACM Trans. Web, 2020

Adaptive Alert Management for Balancing Optimal Performance among Distributed CSOCs using Reinforcement Learning.
IEEE Trans. Parallel Distributed Syst., 2020

Two Can Play That Game: An Adversarial Evaluation of a Cyber-Alert Inspection System.
ACM Trans. Intell. Syst. Technol., 2020

2019
Optimizing Alert Data Management Processes at a Cyber Security Operations Center.
Proceedings of the Adversarial and Uncertain Reasoning for Adaptive Cyber Defense, 2019

A Two-Step Approach to Optimal Selection of Alerts for Investigation in a CSOC.
IEEE Trans. Inf. Forensics Secur., 2019

Understanding Tradeoffs Between Throughput, Quality, and Cost of Alert Analysis in a CSOC.
IEEE Trans. Inf. Forensics Secur., 2019

Optimal Assignment of Sensors to Analysts in a Cybersecurity Operations Center.
IEEE Syst. J., 2019

A methodology for ensuring fair allocation of CSOC effort for alert investigation.
Int. J. Inf. Sec., 2019

2018
Dynamic Optimization of the Level of Operational Effectiveness of a CSOC Under Adverse Conditions.
ACM Trans. Intell. Syst. Technol., 2018

VULCON: A System for Vulnerability Prioritization, Mitigation, and Management.
ACM Trans. Priv. Secur., 2018

Adaptive reallocation of cybersecurity analysts to sensors for balancing risk between sensors.
Serv. Oriented Comput. Appl., 2018

A methodology to measure and monitor level of operational effectiveness of a CSOC.
Int. J. Inf. Sec., 2018

A Strategy for Effective Alert Analysis at a Cyber Security Operations Center.
Proceedings of the From Database to Cyber Security, 2018

2017
Detecting Stealthy Botnets in a Resource-Constrained Environment using Reinforcement Learning.
Proceedings of the 2017 Workshop on Moving Target Defense, 2017

2016
Dynamic Scheduling of Cybersecurity Analysts for Minimizing Risk Using Reinforcement Learning.
ACM Trans. Intell. Syst. Technol., 2016


  Loading...