Anoop Singhal
Orcid: 0000-0002-2602-3927
According to our database1,
Anoop Singhal
authored at least 113 papers
between 1984 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Computer, May, 2024
IEEE Trans. Dependable Secur. Comput., 2024
ALERT: A Framework for Efficient Extraction of Attack Techniques from Cyber Threat Intelligence Reports Using Active Learning.
Proceedings of the Data and Applications Security and Privacy XXXVIII, 2024
Proceedings of the 10th ACM International Workshop on Security and Privacy Analytics, 2024
Proceedings of the 10th ACM International Workshop on Security and Privacy Analytics, 2024
2023
IEEE Trans. Dependable Secur. Comput., 2023
Tackling imbalanced data in cybersecurity with transfer learning: a case with ROP payload detection.
Cybersecur., 2023
Revealing Human Attacker Behaviors Using an Adaptive Internet of Things Honeypot Ecosystem.
Proceedings of the Advances in Digital Forensics XIX, 2023
Proceedings of the Information Systems Security - 19th International Conference, 2023
Proceedings of the Foundations and Practice of Security - 16th International Symposium, 2023
Proceedings of the Data and Applications Security and Privacy XXXVII, 2023
Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy, 2023
Proceedings of the IEEE Conference on Communications and Network Security, 2023
2022
Deep learning for detecting logic-flaw-exploiting network attacks: An end-to-end approach.
J. Comput. Secur., 2022
Computer, 2022
Proceedings of the Information Systems Security - 18th International Conference, 2022
Proceedings of the Data and Applications Security and Privacy XXXVI, 2022
Generating Cyber-Physical System Risk Overlays for Attack and Fault Trees using Systems Theory.
Proceedings of the Sat-CPS@CODASPY 2022: Proceedings of the 2022 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems, 2022
2021
Network Attack Surface: Lifting the Concept of Attack Surface to the Network Level for Evaluating Networks' Resilience Against Zero-Day Attacks.
IEEE Trans. Dependable Secur. Comput., 2021
What are Attackers after on IoT Devices? An approach based on a multi-phased multi-faceted IoT honeypot ecosystem and data clustering.
CoRR, 2021
Proceedings of the Advances in Digital Forensics XVII, 2021
Proceedings of the Information Systems Security - 17th International Conference, 2021
Proceedings of the Data and Applications Security and Privacy XXXV, 2021
2020
Generating Comprehensive Data with Protocol Fuzzing for Applying Deep Learning to Detect Network Attacks.
CoRR, 2020
Proceedings of the Advances in Digital Forensics XVI, 2020
Proceedings of the IWSPA@CODASPY '20: Proceedings ofthe Sixth International Workshop on Security and Privacy Analytics, 2020
Proceedings of the IWSPA@CODASPY '20: Proceedings ofthe Sixth International Workshop on Security and Privacy Analytics, 2020
Proceedings of the CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy, 2020
Evolving Advanced Persistent Threat Detection using Provenance Graph and Metric Learning.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020
2019
Mitigating the insider threat of remote administrators in clouds through maintenance task assignments.
J. Comput. Secur., 2019
Optimizing the network diversity to improve the resilience of networks against unknown attacks.
Comput. Commun., 2019
Proceedings of the Advances in Digital Forensics XV, 2019
Proceedings of the Data and Applications Security and Privacy XXXIII, 2019
2018
IEEE Trans. Inf. Forensics Secur., 2018
Probabilistic Inference of the Stealthy Bridges between Enterprise Networks in Cloud.
EAI Endorsed Trans. Security Safety, 2018
Surviving unpatchable vulnerabilities through heterogeneous network hardening options.
J. Comput. Secur., 2018
IEEE Secur. Priv., 2018
Proceedings of the Advances in Digital Forensics XIV, 2018
Assessing Attack Impact on Business Processes by Interconnecting Attack Graphs and Entity Dependency Graphs.
Proceedings of the Data and Applications Security and Privacy XXXII, 2018
Proceedings of the Data and Applications Security and Privacy XXXII, 2018
Proceedings of the From Database to Cyber Security, 2018
2017
Proceedings of the Theory and Models for Cyber Situation Awareness, 2017
Proceedings of the Advances in Digital Forensics XIII - 13th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 30, 2017
Proceedings of the Data and Applications Security and Privacy XXXI, 2017
Securing Networks Against Unpatchable and Unknown Vulnerabilities Using Heterogeneous Hardening Options.
Proceedings of the Data and Applications Security and Privacy XXXI, 2017
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
Proceedings of the Research Advances in Cloud Computing, 2017
2016
Network Diversity: A Security Metric for Evaluating the Resilience of Networks Against Zero-Day Attacks.
IEEE Trans. Inf. Forensics Secur., 2016
SafeConfig'16: Testing and Evaluation for Active & Resilient Cyber Systems Panel Verification of Active and Resilient Systems: Practical or Utopian?
Proceedings of the 2016 ACM Workshop on Automated Decision Making for Active Cyber Defense, 2016
Proceedings of the Advances in Digital Forensics XII, 2016
Proceedings of the Foundations and Practice of Security - 9th International Symposium, 2016
Diversifying Network Services Under Cost Constraints for Better Resilience Against Unknown Attacks.
Proceedings of the Data and Applications Security and Privacy XXX, 2016
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
2015
Proceedings of the 2015 Workshop on Automated Decision Making for Active Cyber Defense, 2015
Proceedings of the Advances in Digital Forensics XI, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
2014
Proceedings of the Cyber Defense and Situational Awareness, 2014
k-Zero Day Safety: A Network Security Metric for Measuring the Risk of Unknown Vulnerabilities.
IEEE Trans. Dependable Secur. Comput., 2014
Relating Admissibility Standards for Digital Evidence to Attack Scenario Reconstruction.
J. Digit. Forensics Secur. Law, 2014
Proceedings of the WOSIS 2014, 2014
Inferring the Stealthy Bridges Between Enterprise Network Islands in Cloud Using Cross-Layer Bayesian Networks.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014
Modeling Network Diversity for Evaluating the Robustness of Networks against Zero-Day Attacks.
Proceedings of the Computer Security - ESORICS 2014, 2014
Towards Data Confidentiality and a Vulnerability Analysis Framework for Cloud Computing.
Proceedings of the Secure Cloud Computing, 2014
2013
J. Comput. Secur., 2013
Proceedings of the IEEE 7th International Conference on Software Security and Reliability, 2013
Proceedings of the IEEE 32nd Symposium on Reliable Distributed Systems, 2013
Proceedings of the SECRYPT 2013, 2013
Proceedings of the Advances in Digital Forensics IX, 2013
Proceedings of the E-Business and Telecommunications - International Joint Conference, 2013
2012
Proceedings of the 2012 IEEE International Workshop on Information Forensics and Security, 2012
Proceedings of the IEEE 31st Symposium on Reliable Distributed Systems, 2012
Proceedings of the Seventh International Conference on Availability, 2012
2011
Springer Briefs in Computer Science, Springer, ISBN: 978-1-4614-1860-3, 2011
IEEE Trans. Serv. Comput., 2011
Proceedings of the MILCOM 2011, 2011
Proceedings of the ENTERprise Information Systems - International Conference, 2011
2010
Proceedings of the Data Mining and Knowledge Discovery Handbook, 2nd ed., 2010
Int. J. Next Gener. Comput., 2010
Fine-grained Sharing of Health Records using XSPA Profile for XACML - An Extended Abstract.
Proceedings of the 1st USENIX Workshop on Health Security and Privacy, 2010
<i>k</i>-Zero Day Safety: Measuring the Security Risk of Networks against Unknown Attacks.
Proceedings of the Computer Security, 2010
Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, 2010
2009
Proceedings of the Fifth Cyber Security and Information Intelligence Research Workshop, 2009
2008
J. Comput. Secur., 2008
Proceedings of the Data and Applications Security XXII, 2008
Proceedings of the Data and Applications Security XXII, 2008
Proceedings of the 4th ACM Workshop on Quality of Protection, 2008
2007
Advances in Information Security 31, Springer, ISBN: 978-0-387-26409-7, 2007
Proceedings of the 8th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2007), 2007
Proceedings of the Data and Applications Security XXI, 2007
Proceedings of the 3th ACM Workshop on Quality of Protection, 2007
2006
Distributed Parallel Databases, 2006
Proceedings of the Data and Applications Security XX, 2006
2005
Data Mining for Intrusion Detection.
Proceedings of the Data Mining and Knowledge Discovery Handbook., 2005
2004
Proceedings of the 2004 ACM CIKM International Conference on Information and Knowledge Management, 2004
1998
Proceedings of the Fifteenth National Conference on Artificial Intelligence and Tenth Innovative Applications of Artificial Intelligence Conference, 1998
1996
Proceedings of the Workshop on Databases - Active and Real-Time, 1996
1995
Proceedings of the 8th International Conference on VLSI Design (VLSI Design 1995), 1995
1993
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 1993
Proceedings of the 1993 ACM SIGMOD International Conference on Management of Data, 1993
Can OODB Technology Solve CAD Design Data Management Problems? (Panel Abstract).
Proceedings of the Ninth International Conference on Data Engineering, 1993
1989
Proceedings of the 1989 IEEE International Conference on Computer-Aided Design, 1989
1987
Proceedings of the Third International Conference on Data Engineering, 1987
1985
An Analysis of the Effect of Network Parameters on the Performance of Distributed Database Systems.
IEEE Trans. Software Eng., 1985
1984
Proceedings of the First International Conference on Data Engineering, 1984