Deepak K. Tosh
Orcid: 0000-0001-8492-1066Affiliations:
- University of Texas at El Paso, Department of Computer Science, TX, USA
According to our database1,
Deepak K. Tosh
authored at least 72 papers
between 2011 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on cs.utep.edu
-
on twitter.com
-
on orcid.org
On csauthors.net:
Bibliography
2024
GaTeBaSep: game theory-based security protocol against ARP spoofing attacks in software-defined networks.
Int. J. Inf. Sec., February, 2024
Detecting Masquerade Attacks in Controller Area Networks Using Graph Machine Learning.
CoRR, 2024
Countering ARP spoofing attacks in software-defined networks using a game-theoretic approach.
Comput. Secur., 2024
Proceedings of the IEEE International Systems Conference, 2024
Reconfigurable Network Slicing Orchestration in Network Function Virtualization Compatible Operational Technology Environment.
Proceedings of the IEEE International Conference on Communications, 2024
The Hacker Is Inside the Company! - Instance-Based Learning And Its Application to Defend Against Insider Hacking.
Proceedings of the 25th Annual Conference on Information Technology Education, 2024
Fostering Transparent Research Collaborations Between Two- and Four-Year Institutions in Industrial Cybersecurity Education.
Proceedings of the 25th Annual Conference on Information Technology Education, 2024
Proceedings of the 22nd Mediterranean Communication and Computer Networking Conference, 2024
Proceedings of the International Conference on Computing, Networking and Communications, 2024
2023
Proceedings of the IEEE International Systems Conference, 2023
Integrating 5G Technology for Improved Process Monitoring and Network Slicing in ICS.
Proceedings of the IEEE International Conference on Communications, 2023
Proceedings of the 34th IEEE Annual International Symposium on Personal, 2023
Proceedings of the Decision and Game Theory for Security: 14th International Conference, 2023
2022
Dynamic Risk Assessment and Analysis Framework for Large-Scale Cyber-Physical Systems.
EAI Endorsed Trans. Security Safety, 2022
IEEE Internet Things J., 2022
Cyber-Physical Systems: Prospects, Challenges and Role in Software-Defined Networking and Blockchains.
Future Internet, 2022
Resilient sensor authentication in SCADA by integrating physical unclonable function and blockchain.
Clust. Comput., 2022
Proceedings of the 17th Annual System of Systems Engineering Conference, 2022
Achieving Self-Configurable Runtime State Verification in Critical Cyber-Physical Systems.
Proceedings of the IEEE International Conference on Communications, 2022
Proceedings of the IEEE Military Communications Conference, 2022
Tactical Topology Optimization Methodology for Slice Aware and Reconfigurable Battlefield Networks.
Proceedings of the IEEE Military Communications Conference, 2022
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2022
2021
Introduction to the Special Issue on Decentralized Blockchain Applications and Infrastructures for Next Generation Cyber-Physical Systems.
ACM Trans. Internet Techn., 2021
Leveraging Intel SGX to enable trusted and privacy preserving membership service in distributed ledgers.
Int. J. Inf. Comput. Secur., 2021
Vind: A Blockchain-Enabled Supply Chain Provenance Framework for Energy Delivery Systems.
Frontiers Blockchain, 2021
Hidden Markov Model and Cyber Deception for the Prevention of Adversarial Lateral Movement.
IEEE Access, 2021
Achieving Runtime State Verification Assurance in Critical Cyber-Physical Infrastructures.
Proceedings of the IEEE International Conference on Communications, 2021
Proceedings of the 2021 IEEE Military Communications Conference, 2021
Robust Cyber-threat and Vulnerability Information Analyzer for Dynamic Risk Assessment.
Proceedings of the IEEE International Mediterranean Conference on Communications and Networking, 2021
Proceedings of the 46th IEEE Conference on Local Computer Networks, 2021
CySCPro - Cyber Supply Chain Provenance Framework for Risk Management of Energy Delivery Systems.
Proceedings of the 2021 IEEE International Conference on Blockchain, 2021
2020
Proceedings of the 15th IEEE International Conference of System of Systems Engineering, 2020
Proceedings of the Spring Simulation Conference, 2020
A Blockchain Simulator for Evaluating Consensus Algorithms in Diverse Networking Environments.
Proceedings of the Spring Simulation Conference, 2020
Achieving Sensor Identification and Data Flow Integrity in Critical Cyber-Physical Infrastructures.
Proceedings of the 2020 IEEE International Conference on Communications, 2020
Proceedings of the 2020 International Symposium on Networks, Computers and Communications, 2020
Proceedings of the 29th International Conference on Computer Communications and Networks, 2020
Proceedings of the 29th International Conference on Computer Communications and Networks, 2020
2019
EAI Endorsed Trans. Security Safety, 2019
IEEE Consumer Electron. Mag., 2019
Online Cyber Deception System Using Partially Observable Monte-Carlo Planning Framework.
Proceedings of the Security and Privacy in Communication Networks, 2019
An Improved Communications in Cyber Physical System Architecture, Protocols and Applications.
Proceedings of the 16th Annual IEEE International Conference on Sensing, 2019
Non-Intrusive Deployment of Blockchain in Establishing Cyber-Infrastructure for Smart City.
Proceedings of the 16th Annual IEEE International Conference on Sensing, 2019
Proceedings of the 2019 IEEE Military Communications Conference, 2019
Evaluating Usability of Permissioned Blockchain for Internet-of-Battlefield Things Security.
Proceedings of the 2019 IEEE Military Communications Conference, 2019
2018
Towards Blockchain Empowered Trusted and Accountable Data Sharing and Collaboration in Mobile Healthcare Applications.
EAI Endorsed Trans. Pervasive Health Technol., 2018
Establishing evolutionary game models for CYBer security information EXchange (CYBEX).
J. Comput. Syst. Sci., 2018
A Reliable Data Provenance and Privacy Preservation Architecture for Business-Driven Cyber-Physical Systems Using Blockchain.
Int. J. Inf. Secur. Priv., 2018
Proceedings of the Communications and Networking Symposium, 2018
Towards a Reliable and Accountable Cyber Supply Chain in Energy Delivery System Using Blockchain.
Proceedings of the Security and Privacy in Communication Networks, 2018
Proceedings of the 2018 IEEE Military Communications Conference, 2018
Proceedings of the IEEE International Smart Cities Conference, 2018
Proceedings of the 11th IEEE International Conference on Cloud Computing, 2018
2017
Consensus protocols for blockchain-based data provenance: Challenges and opportunities.
Proceedings of the 8th IEEE Annual Ubiquitous Computing, 2017
Proceedings of the International Symposium on Performance Evaluation of Computer and Telecommunication Systems, 2017
Proceedings of the International Symposium on Performance Evaluation of Computer and Telecommunication Systems, 2017
3-Way game model for privacy-preserving cybersecurity information exchange framework.
Proceedings of the 2017 IEEE Military Communications Conference, 2017
Towards a Trusted and Privacy Preserving Membership Service in Distributed Ledger Using Intel Software Guard Extensions.
Proceedings of the Information and Communications Security - 19th International Conference, 2017
Three Layer Game Theoretic Decision Framework for Cyber-Investment and Cyber-Insurance.
Proceedings of the Decision and Game Theory for Security - 8th International Conference, 2017
Proceedings of the Game Theory for Networks - 7th International EAI Conference, 2017
Proceedings of the 17th IEEE/ACM International Symposium on Cluster, 2017
ProvChain: A Blockchain-based Data Provenance Architecture in Cloud Environment with Enhanced Privacy and Availability.
Proceedings of the 17th IEEE/ACM International Symposium on Cluster, 2017
An SDN Based Framework for Guaranteeing Security and Performance in Information-Centric Cloud Networks.
Proceedings of the 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), 2017
2015
Proceedings of the 2015 IEEE International Conference on Pervasive Computing and Communication Workshops, 2015
Proceedings of the 2015 IEEE International Conference on Communications, 2015
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015
2013
Proceedings of the 78th IEEE Vehicular Technology Conference, 2013
2011
Proceedings of the International Conference on Soft Computing for Problem Solving (SocProS 2011) December 20-22, 2011, 2011