Maanak Gupta

Orcid: 0000-0001-9189-2478

According to our database1, Maanak Gupta authored at least 79 papers between 2016 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
The $\mathrm {ACAC_{D}}$ model for mutable activity control and chain of dependencies in smart and connected systems.
Int. J. Inf. Sec., October, 2024

ZTA-IoT: A Novel Architecture for Zero-Trust in IoT Systems and an Ensuing Usage Control Model.
ACM Trans. Priv. Secur., August, 2024

RWArmor: a static-informed dynamic analysis approach for early detection of cryptographic windows ransomware.
Int. J. Inf. Sec., February, 2024

Automated machine learning for deep learning based malware detection.
Comput. Secur., February, 2024

Explainable Malware Analysis: Concepts, Approaches and Challenges.
CoRR, 2024

SoK: Leveraging Transformers for Malware Analysis.
CoRR, 2024

Specification and Enforcement of Activity Dependency Policies using XACML.
CoRR, 2024

Intra-Section Code Cave Injection for Adversarial Evasion Attacks on Windows PE Malware File.
CoRR, 2024

Security in 5G Network Slices: Concerns and Opportunities.
IEEE Access, 2024

Explainable Deep Learning Models for Dynamic and Online Malware Classification.
Proceedings of the IEEE International Conference on Smart Computing, 2024

AbuseGPT: Abuse of Generative AI ChatBots to Create Smishing Campaigns.
Proceedings of the 12th International Symposium on Digital Forensics and Security, 2024

Explainability-Informed Targeted Malware Misclassification.
Proceedings of the 33rd International Conference on Computer Communications and Networks, 2024

Explainability Guided Adversarial Evasion Attacks on Malware Detectors.
Proceedings of the 33rd International Conference on Computer Communications and Networks, 2024

2023
A Systematic Survey of Multi-Factor Authentication for Cloud Infrastructure.
Future Internet, April, 2023

Reachability Analysis for Attributes in ABAC With Group Hierarchy.
IEEE Trans. Dependable Secur. Comput., 2023

The ACAC_D Model for Mutable Activity Control and Chain of Dependencies in Smart and Collaborative Systems.
CoRR, 2023

Analyzing and Explaining Black-Box Models for Online Malware Detection.
IEEE Access, 2023

From ChatGPT to ThreatGPT: Impact of Generative AI in Cybersecurity and Privacy.
IEEE Access, 2023

Static-RWArmor: A Static Analysis Approach for Prevention of Cryptographic Windows Ransomware.
Proceedings of the 22nd IEEE International Conference on Trust, 2023

Incorporating the Concept of Bias and Fairness in Cybersecurity Curricular Module.
Proceedings of the 54th ACM Technical Symposium on Computer Science Education, Volume 2, 2023

Trusted Federated Learning Framework for Attack Detection in Edge Industrial Internet of Things.
Proceedings of the Eighth International Conference on Fog and Mobile Edge Computing, 2023

Using Machine Learning for Detection and Classification of Cyber Attacks in Edge IoT.
Proceedings of the IEEE International Conference on Edge Computing and Communications, 2023

Analyzing Edge IoT Digital Forensics Tools: Cyber Attacks Reconstruction and Anti-Forensics Enhancements.
Proceedings of the IEEE Intl Conf on Dependable, 2023

Exploiting Windows PE Structure for Adversarial Malware Evasion Attacks.
Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy, 2023

Utilizing The DLBAC Approach Toward a ZT Score-based Authorization for IoT Systems.
Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy, 2023

Hierarchical Federated Transfer learning and Digital Twin Enhanced Secure Cooperative Smart Farming.
Proceedings of the IEEE International Conference on Big Data, 2023

2022
Secure V2V and V2I Communication in Intelligent Transportation Using Cloudlets.
IEEE Trans. Serv. Comput., 2022

MLS-ABAC: Efficient Multi-Level Security Attribute-Based Access Control scheme.
Future Gener. Comput. Syst., 2022

Machine Learning in Access Control: A Taxonomy and Survey.
CoRR, 2022

BlueSky: Activity Control: A Vision for "Active" Security Models for Smart Collaborative Systems.
Proceedings of the SACMAT '22: The 27th ACM Symposium on Access Control Models and Technologies, New York, NY, USA, June 8, 2022

BlueSky: Towards Convergence of Zero Trust Principles and Score-Based Authorization for IoT Enabled Smart Systems.
Proceedings of the SACMAT '22: The 27th ACM Symposium on Access Control Models and Technologies, New York, NY, USA, June 8, 2022

Online Malware Classification with System-Wide System Calls in Cloud IaaS.
Proceedings of the 23rd IEEE International Conference on Information Reuse and Integration for Data Science, 2022

Attributes Aware Relationship-based Access Control for Smart IoT Systems.
Proceedings of the 8th IEEE International Conference on Collaboration and Internet Computing, 2022

Enforcement of Laws and Privacy Preferences in Modern Computing Systems.
Proceedings of the CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24, 2022

Security and Privacy for Emerging IoT and CPS Domains.
Proceedings of the CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24, 2022

Analysis of Label-Flip Poisoning Attack on Machine Learning Based Malware Detector.
Proceedings of the IEEE International Conference on Big Data, 2022

Access Control Models and Architectures For IoT and Cyber Physical Systems
Springer, ISBN: 978-3-030-81088-7, 2022

2021
An Attribute-Based Access Control for Cloud Enabled Industrial Smart Vehicles.
IEEE Trans. Ind. Informatics, 2021

Future Smart Connected Communities to Fight COVID-19 Outbreak.
Internet Things, 2021

Image Watermarking Approach Using a Hybrid Domain Based on Performance Parameter Analysis.
Inf., 2021

Leveraging Aviation Risk Models to Combat Cybersecurity Threats in Vehicular Networks.
Inf., 2021

A Survey on Adversarial Attacks for Malware Analysis.
CoRR, 2021

Game Theory Based Privacy Preserving Approach for Collaborative Deep Learning in IoT.
CoRR, 2021

Reachability Analysis for Attributes in ABAC with Group Hierarchy.
CoRR, 2021

Activity Control Design Principles: Next Generation Access Control for Smart and Collaborative Systems.
IEEE Access, 2021

Recurrent Neural Networks Based Online Behavioural Malware Detection Techniques for Cloud Infrastructure.
IEEE Access, 2021

Attribute-Based Access Control for AWS Internet of Things and Secure Industries of the Future.
IEEE Access, 2021

Quasi-Wireless Capacitive Power Transfer with Secure Data Acquisition for Robotic Systems in Space Infrastructure.
Proceedings of the 2021 IEEE International Conference on Wireless for Space and Extreme Environments, 2021

Edge Centric Secure Data Sharing with Digital Twins in Smart Ecosystems.
Proceedings of the 3rd IEEE International Conference on Trust, 2021

Analyzing Machine Learning Approaches for Online Malware Detection in Cloud.
Proceedings of the IEEE International Conference on Smart Computing, 2021

Towards Activity-Centric Access Control for Smart Collaborative Ecosystems.
Proceedings of the SACMAT '21: The 26th ACM Symposium on Access Control Models and Technologies, 2021

Detecting Anomalous User Behavior in Remote Patient Monitoring.
Proceedings of the 22nd IEEE International Conference on Information Reuse and Integration for Data Science, 2021

Hierarchical Federated Learning based Anomaly Detection using Digital Twins for Smart Healthcare.
Proceedings of the 7th IEEE International Conference on Collaboration and Internet Computing, 2021

Is there a Security Mindset and Can it be Taught?
Proceedings of the CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy, 2021

Ontology driven AI and Access Control Systems for Smart Fisheries.
Proceedings of the SAT-CPS@CODASPY 2021, 2021

AI for Security and Security for AI.
Proceedings of the CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy, 2021

Artificial Intelligence Assisted Malware Analysis.
Proceedings of the SAT-CPS@CODASPY 2021, 2021

Detecting Anomalies using Overlapping Electrical Measurements in Smart Power Grids.
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021

An Ontological Knowledge Representation for Smart Agriculture.
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021

Autoencoder-based Anomaly Detection in Smart Farming Ecosystem.
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021

2020
Next-generation big data federation access control: A reference model.
Future Gener. Comput. Syst., 2020

AI assisted Malware Analysis: A Course for Next Generation Cybersecurity Workforce.
CoRR, 2020

Enabling and Enforcing Social Distancing Measures using Smart City and ITS Infrastructures: A COVID-19 Use Case.
CoRR, 2020

Security and Privacy in Smart Farming: Challenges and Opportunities.
IEEE Access, 2020

Ontologies and Artificial Intelligence Systems for the Cooperative Smart Farming Ecosystem.
IEEE Access, 2020

Learner's Dilemma: IoT Devices Training Strategies in Collaborative Deep Learning.
Proceedings of the 6th IEEE World Forum on Internet of Things, 2020

Knowledge Enrichment by Fusing Representations for Malware Threat Intelligence and Behavior.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2020

Cyber Attacks on Smart Farming Infrastructure.
Proceedings of the 6th IEEE International Conference on Collaboration and Internet Computing, 2020

Analyzing CNN Based Behavioural Malware Detection Techniques on Cloud IaaS.
Proceedings of the Cloud Computing - CLOUD 2020, 2020

Access Control Model for Google Cloud IoT.
Proceedings of the 6th IEEE International Conference on Big Data Security on Cloud, 2020

A Smart-Farming Ontology for Attribute Based Access Control.
Proceedings of the 6th IEEE International Conference on Big Data Security on Cloud, 2020

YieldPredict: A Crop Yield Prediction Framework for Smart Farms.
Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020

2019
Secure Cloud Assisted Smart Cars Using Dynamic Groups and Attribute Based Access Control.
CoRR, 2019

Dynamic Groups and Attribute-Based Access Control for Next-Generation Smart Cars.
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019

2018
Authorization Framework for Secure Cloud Assisted Connected Cars and Vehicular Internet of Things.
Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies, 2018

2017
POSTER: Access Control Model for the Hadoop Ecosystem.
Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies, 2017

Multi-Layer Authorization Framework for a Representative Hadoop Ecosystem Deployment.
Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies, 2017

Object-Tagged RBAC Model for the Hadoop Ecosystem.
Proceedings of the Data and Applications Security and Privacy XXXI, 2017

2016
The \mathrm GURA_G GURA G Administrative Model for User and Group Attribute Assignment.
Proceedings of the Network and System Security - 10th International Conference, 2016


  Loading...