Deepak K. Tosh

Orcid: 0000-0001-8492-1066

Affiliations:
  • University of Texas at El Paso, Department of Computer Science, TX, USA


According to our database1, Deepak K. Tosh authored at least 72 papers between 2011 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
GaTeBaSep: game theory-based security protocol against ARP spoofing attacks in software-defined networks.
Int. J. Inf. Sec., February, 2024

Detecting Masquerade Attacks in Controller Area Networks Using Graph Machine Learning.
CoRR, 2024

Countering ARP spoofing attacks in software-defined networks using a game-theoretic approach.
Comput. Secur., 2024

Towards Developing a Scalable Cyber Risk Assessment and Mitigation Framework.
Proceedings of the IEEE International Systems Conference, 2024

Reconfigurable Network Slicing Orchestration in Network Function Virtualization Compatible Operational Technology Environment.
Proceedings of the IEEE International Conference on Communications, 2024

The Hacker Is Inside the Company! - Instance-Based Learning And Its Application to Defend Against Insider Hacking.
Proceedings of the 25th Annual Conference on Information Technology Education, 2024

Fostering Transparent Research Collaborations Between Two- and Four-Year Institutions in Industrial Cybersecurity Education.
Proceedings of the 25th Annual Conference on Information Technology Education, 2024

Enhancing Network Anomaly Detection Using Graph Neural Networks.
Proceedings of the 22nd Mediterranean Communication and Computer Networking Conference, 2024

Deception-Based IDS Against ARP Spoofing Attacks in Software-Defined Networks.
Proceedings of the International Conference on Computing, Networking and Communications, 2024

2023
A Survey of Network Requirements for Enabling Effective Cyber Deception.
CoRR, 2023

Dynamic Vulnerability Classification for Enhanced Cyber Situational Awareness.
Proceedings of the IEEE International Systems Conference, 2023

Integrating 5G Technology for Improved Process Monitoring and Network Slicing in ICS.
Proceedings of the IEEE International Conference on Communications, 2023

Optimal Honeypot Allocation using Core Attack Graph in Cyber Deception Games.
Proceedings of the 34th IEEE Annual International Symposium on Personal, 2023

FlipPath Game to Counter Stealthy Attacks in SDN-Based Tactical Networks.
Proceedings of the Decision and Game Theory for Security: 14th International Conference, 2023

2022
Dynamic Risk Assessment and Analysis Framework for Large-Scale Cyber-Physical Systems.
EAI Endorsed Trans. Security Safety, 2022

Edge-Based Optimal Routing in SDN-Enabled Industrial Internet of Things.
IEEE Internet Things J., 2022

Cyber-Physical Systems: Prospects, Challenges and Role in Software-Defined Networking and Blockchains.
Future Internet, 2022

Resilient sensor authentication in SCADA by integrating physical unclonable function and blockchain.
Clust. Comput., 2022

Condition monitoring and anomaly detection in cyber-physical systems.
Proceedings of the 17th Annual System of Systems Engineering Conference, 2022

Achieving Self-Configurable Runtime State Verification in Critical Cyber-Physical Systems.
Proceedings of the IEEE International Conference on Communications, 2022

Network Anomaly Detection Using Federated Learning.
Proceedings of the IEEE Military Communications Conference, 2022

Tactical Topology Optimization Methodology for Slice Aware and Reconfigurable Battlefield Networks.
Proceedings of the IEEE Military Communications Conference, 2022

Enabling Device Trustworthiness for SDN-Enabled Internet -of- Battlefield Things.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2022

2021
Introduction to the Special Issue on Decentralized Blockchain Applications and Infrastructures for Next Generation Cyber-Physical Systems.
ACM Trans. Internet Techn., 2021

Leveraging Intel SGX to enable trusted and privacy preserving membership service in distributed ledgers.
Int. J. Inf. Comput. Secur., 2021

Tikiri - Towards a lightweight blockchain for IoT.
Future Gener. Comput. Syst., 2021

Vind: A Blockchain-Enabled Supply Chain Provenance Framework for Energy Delivery Systems.
Frontiers Blockchain, 2021

Hidden Markov Model and Cyber Deception for the Prevention of Adversarial Lateral Movement.
IEEE Access, 2021

Achieving Runtime State Verification Assurance in Critical Cyber-Physical Infrastructures.
Proceedings of the IEEE International Conference on Communications, 2021

Slice Aware Framework for Intelligent and Reconfigurable Battlefield Networks.
Proceedings of the 2021 IEEE Military Communications Conference, 2021

Robust Cyber-threat and Vulnerability Information Analyzer for Dynamic Risk Assessment.
Proceedings of the IEEE International Mediterranean Conference on Communications and Networking, 2021

Robust Authentication and Data Flow Integrity for P2P SCADA Infrastructures.
Proceedings of the 46th IEEE Conference on Local Computer Networks, 2021

CySCPro - Cyber Supply Chain Provenance Framework for Risk Management of Energy Delivery Systems.
Proceedings of the 2021 IEEE International Conference on Blockchain, 2021

2020
Towards Security of Cyber-Physical Systems using Quantum Computing Algorithms.
Proceedings of the 15th IEEE International Conference of System of Systems Engineering, 2020

Enforcing Security and Privacy in Distributed Ledgers by Intel SGX.
Proceedings of the Spring Simulation Conference, 2020

A Blockchain Simulator for Evaluating Consensus Algorithms in Diverse Networking Environments.
Proceedings of the Spring Simulation Conference, 2020

Achieving Sensor Identification and Data Flow Integrity in Critical Cyber-Physical Infrastructures.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

Privacy Preserving Path Planning in an Adversarial Zone.
Proceedings of the 2020 International Symposium on Networks, Computers and Communications, 2020

Quantitative Risk Modeling and Analysis for Large-Scale Cyber-Physical Systems.
Proceedings of the 29th International Conference on Computer Communications and Networks, 2020

Quality-driven Energy Optimization in Internet of Things.
Proceedings of the 29th International Conference on Computer Communications and Networks, 2020

2019
Attacker Capability based Dynamic Deception Model for Large-Scale Networks.
EAI Endorsed Trans. Security Safety, 2019

Data Provenance in the Cloud: A Blockchain-Based Approach.
IEEE Consumer Electron. Mag., 2019

Online Cyber Deception System Using Partially Observable Monte-Carlo Planning Framework.
Proceedings of the Security and Privacy in Communication Networks, 2019

An Improved Communications in Cyber Physical System Architecture, Protocols and Applications.
Proceedings of the 16th Annual IEEE International Conference on Sensing, 2019

Non-Intrusive Deployment of Blockchain in Establishing Cyber-Infrastructure for Smart City.
Proceedings of the 16th Annual IEEE International Conference on Sensing, 2019

Scalable Blockchain Implementation for Edge-based Internet of Things Platform.
Proceedings of the 2019 IEEE Military Communications Conference, 2019

Evaluating Usability of Permissioned Blockchain for Internet-of-Battlefield Things Security.
Proceedings of the 2019 IEEE Military Communications Conference, 2019

2018
Towards Blockchain Empowered Trusted and Accountable Data Sharing and Collaboration in Mobile Healthcare Applications.
EAI Endorsed Trans. Pervasive Health Technol., 2018

Establishing evolutionary game models for CYBer security information EXchange (CYBEX).
J. Comput. Syst. Sci., 2018

A Reliable Data Provenance and Privacy Preservation Architecture for Business-Driven Cyber-Physical Systems Using Blockchain.
Int. J. Inf. Secur. Priv., 2018

Security game for cyber physical systems.
Proceedings of the Communications and Networking Symposium, 2018

Towards a Reliable and Accountable Cyber Supply Chain in Energy Delivery System Using Blockchain.
Proceedings of the Security and Privacy in Communication Networks, 2018

Blockchain-Empowered Secure Internet -of- Battlefield Things (IoBT) Architecture.
Proceedings of the 2018 IEEE Military Communications Conference, 2018

Exploring the Attack Surfaces in Blockchain Enabled Smart Cities.
Proceedings of the IEEE International Smart Cities Conference, 2018

CloudPoS: A Proof-of-Stake Consensus Design for Blockchain Integrated Cloud.
Proceedings of the 11th IEEE International Conference on Cloud Computing, 2018

2017
Consensus protocols for blockchain-based data provenance: Challenges and opportunities.
Proceedings of the 8th IEEE Annual Ubiquitous Computing, 2017

Privacy-preserving cybersecurity information exchange mechanism.
Proceedings of the International Symposium on Performance Evaluation of Computer and Telecommunication Systems, 2017

Attribute based sharing in cybersecurity information exchange framework.
Proceedings of the International Symposium on Performance Evaluation of Computer and Telecommunication Systems, 2017

3-Way game model for privacy-preserving cybersecurity information exchange framework.
Proceedings of the 2017 IEEE Military Communications Conference, 2017

Towards a Trusted and Privacy Preserving Membership Service in Distributed Ledger Using Intel Software Guard Extensions.
Proceedings of the Information and Communications Security - 19th International Conference, 2017

Three Layer Game Theoretic Decision Framework for Cyber-Investment and Cyber-Insurance.
Proceedings of the Decision and Game Theory for Security - 8th International Conference, 2017

Risk Management Using Cyber-Threat Information Sharing and Cyber-Insurance.
Proceedings of the Game Theory for Networks - 7th International EAI Conference, 2017

Security Implications of Blockchain Cloud with Analysis of Block Withholding Attack.
Proceedings of the 17th IEEE/ACM International Symposium on Cluster, 2017

ProvChain: A Blockchain-based Data Provenance Architecture in Cloud Environment with Enhanced Privacy and Availability.
Proceedings of the 17th IEEE/ACM International Symposium on Cluster, 2017

An SDN Based Framework for Guaranteeing Security and Performance in Information-Centric Cloud Networks.
Proceedings of the 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), 2017

2015
Heterogeneous access network(s) selection in multi-interface radio devices.
Proceedings of the 2015 IEEE International Conference on Pervasive Computing and Communication Workshops, 2015

An evolutionary game-theoretic framework for cyber-threat information sharing.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Cyber-Investment and Cyber-Information Exchange Decision Modeling.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

Game Theoretic Modeling to Enforce Security Information Sharing among Firms.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

Cyber-Threats Information Sharing in Cloud Computing: A Game Theoretic Approach.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

2013
Self-Coexistence in Cognitive Radio Networks Using Multi-Stage Perception Learning.
Proceedings of the 78th IEEE Vehicular Technology Conference, 2013

2011
Cognitive Radio Parameter Adaptation Using Multi-objective Evolutionary Algorithm.
Proceedings of the International Conference on Soft Computing for Problem Solving (SocProS 2011) December 20-22, 2011, 2011


  Loading...