Sajjan G. Shiva
Orcid: 0000-0002-3996-7484
According to our database1,
Sajjan G. Shiva
authored at least 74 papers
between 1976 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Integral-Valued Pythagorean Fuzzy-Set-Based Dyna Q+ Framework for Task Scheduling in Cloud Computing.
Sensors, August, 2024
Ensembling Supervised and Unsupervised Machine Learning Algorithms for Detecting Distributed Denial of Service Attacks.
Algorithms, March, 2024
Proceedings of the 14th IEEE Annual Computing and Communication Workshop and Conference, 2024
Trusting Classifiers with Interpretable Machine Learning Based Feature Selection Backpropagation.
Proceedings of the 14th IEEE Annual Computing and Communication Workshop and Conference, 2024
2023
Proceedings of the International Symposium on Networks, Computers and Communications, 2023
Requirements Elicitation and Stakeholder Communications for Explainable Machine Learning Systems: State of the Art.
Proceedings of the International Conference on Information Technology, 2023
Handling Node Discovery Problem in Fog Computing using Categorical51 Algorithm With Explainability.
Proceedings of the 2023 IEEE World AI IoT Congress (AIIoT), 2023
2022
Network Intrusion Detection and Comparative Analysis Using Ensemble Machine Learning and Feature Selection.
IEEE Trans. Netw. Serv. Manag., December, 2022
Scalable Hindsight Experience Replay based Q-learning Framework with Explainability for Big Data Applications in Fog Computing.
Proceedings of the 12th IEEE Annual Computing and Communication Workshop and Conference, 2022
MVE-based Reinforcement Learning Framework with Explainability for improving Quality of Experience of Application Placement in Fog Computing.
Proceedings of the 2022 IEEE World AI IoT Congress (AIIoT), 2022
Energy Efficient Double Critic Deep Deterministic Policy Gradient Framework for Fog Computing.
Proceedings of the 2022 IEEE World AI IoT Congress (AIIoT), 2022
Man-in-the-Middle attack Explainer for Fog computing using Soft Actor Critic Q-Learning Approach.
Proceedings of the 2022 IEEE World AI IoT Congress (AIIoT), 2022
2021
Proceedings of the 12th IEEE Annual Ubiquitous Computing, 2021
2020
Ensemble Classifiers for Network Intrusion Detection Using a Novel Network Attack Dataset.
Future Internet, 2020
Detecting stealthy false data injection attacks in the smart grid using ensemble-based machine learning.
Comput. Secur., 2020
Proceedings of the 2020 IEEE Symposium Series on Computational Intelligence, 2020
Network Intrusion Detection using Natural Language Processing and Ensemble Machine Learning.
Proceedings of the 2020 IEEE Symposium Series on Computational Intelligence, 2020
Proceedings of the 2020 IEEE Symposium Series on Computational Intelligence, 2020
Proceedings of the 2020 IEEE International Conference on Electro Information Technology, 2020
Proceedings of the 7th IEEE International Conference on Cyber Security and Cloud Computing, 2020
2019
Internet Things, 2019
IEEE Access, 2019
Proceedings of the 19th IEEE International Conference on Software Quality, 2019
Proceedings of the Fourth International Congress on Information and Communication Technology, 2019
Proceedings of the Fourth International Congress on Information and Communication Technology, 2019
2018
Proceedings of the Companion of the The Web Conference 2018 on The Web Conference 2018, 2018
Proceedings of the 2018 IEEE/ACM International Conference on Utility and Cloud Computing Companion, 2018
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018
2017
Security and Privacy in the Internet of Medical Things: Taxonomy and Risk Assessment.
Proceedings of the 42nd IEEE Conference on Local Computer Networks Workshops, 2017
Proceedings of the Tenth International Conference on Contemporary Computing, 2017
2016
Proceedings of the IEEE World Congress on Services, 2016
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016
2015
Comput. Commun., 2015
Towards an Effective Crowdsourcing Recommendation System: A Survey of the State-of-the-Art.
Proceedings of the 2015 IEEE Symposium on Service-Oriented System Engineering, 2015
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015
Proceedings of the Ninth International Conference on Complex, 2015
2014
Secur. Commun. Networks, 2014
Proceedings of the 9th International Conference for Internet Technology and Secured Transactions, 2014
2013
Proceedings of the Security and Privacy Protection in Information Processing Systems, 2013
Proceedings of the Tenth International Conference on Information Technology: New Generations, 2013
Proceedings of the 8th International Conference for Internet Technology and Secured Transactions, 2013
Proceedings of the 2013 IEEE Global Communications Conference, 2013
Proceedings of the 2013 IEEE Sixth International Conference on Cloud Computing, Santa Clara, CA, USA, June 28, 2013
2012
Evaluating security and privacy in cloud computing services: A Stakeholder's perspective.
Proceedings of the 7th International Conference for Internet Technology and Secured Transactions, 2012
Securing cloud infrastructure against co-resident DoS attacks using game theoretic defense mechanisms.
Proceedings of the 2012 International Conference on Advances in Computing, 2012
Proceedings of the 2012 International Conference on Cyber Security, 2012
2011
Proceedings of the 2011 IEEE Symposium on Computational Intelligence in Cyber Security, 2011
2010
On modeling and simulation of game theory-based defense mechanisms against DoS and DDoS attacks.
Proceedings of the 2010 Spring Simulation Multiconference, 2010
Knowledge Engineering to Visualize Complexity for Legacy Modernization Planning.
Proceedings of the 22nd International Conference on Software Engineering & Knowledge Engineering (SEKE'2010), Redwood City, San Francisco Bay, CA, USA, July 1, 2010
An Approach to Overcoming Knowledge Sharing Challenges in a Corporate IT Environment.
Proceedings of the 5th IEEE International Conference on Global Software Engineering, 2010
Proceedings of the 43rd Hawaii International International Conference on Systems Science (HICSS-43 2010), 2010
Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, 2010
2009
Int. J. Distributed Sens. Networks, 2009
Clustering of Defect Reports Using Graph Partitioning Algorithms.
Proceedings of the 21st International Conference on Software Engineering & Knowledge Engineering (SEKE'2009), 2009
Proceedings of the 4th IEEE International Conference on Global Software Engineering, 2009
2008
Automatic Clustering of Defect Reports.
Proceedings of the Twentieth International Conference on Software Engineering & Knowledge Engineering (SEKE'2008), 2008
2007
Proceedings of the Fourth International Conference on Information Technology: New Generations (ITNG 2007), 2007
2005
Will earlier projects plus a disciplined process enforce SE principles throughout the CS curriculum?
Proceedings of the 27th International Conference on Software Engineering (ICSE 2005), 2005
Comparing Agent Software Development Methodologies using the CMMI Engineering Process Model.
Proceedings of the A Conference on a Human Scale. 11th Americas Conference on Information Systems, 2005
Proceedings of the A Conference on a Human Scale. 11th Americas Conference on Information Systems, 2005
2004
CMMI Framework in Small Business Environment - A Case Study.
Proceedings of the International Conference on Software Engineering Research and Practice, 2004
Software Practices in Academia.
Proceedings of the International Conference on Software Engineering Research and Practice, 2004
1996
Proceedings of the annual meeting of the Ada programming world, 1996
1994
1990
A file integrity checking system to detect and recover from program modification attacks in multi-user computer systems.
Comput. Secur., 1990
1989
Proceedings of the Computer Trends in the 1990s, 1989
1982
Proceedings of the 19th Design Automation Conference, 1982
1981
On the Description of Multiprocessor Architectures.
Proceedings of the IEEE Real-Time Systems Symposium, 1981
1980
Proceedings of the 17th Design Automation Conference, 1980
1976