Suryadipta Majumdar
Orcid: 0000-0002-6501-4214
According to our database1,
Suryadipta Majumdar
authored at least 44 papers
between 2015 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Traditional IOCs Meet Dynamic App-Device Interactions for IoT-Specific Threat Intelligence.
IEEE Internet Things J., October, 2024
ACE-WARP: A Cost-Effective Approach to Proactive and Non-Disruptive Incident Response in Kubernetes Clusters.
IEEE Trans. Inf. Forensics Secur., 2024
Caught-in-Translation (CiT): Detecting Cross-Level Inconsistency Attacks in Network Functions Virtualization (NFV).
IEEE Trans. Dependable Secur. Comput., 2024
iCAT+: An Interactive Customizable Anonymization Tool Using Automated Translation Through Deep Learning.
IEEE Trans. Dependable Secur. Comput., 2024
On Continuously Verifying Device-level Functional Integrity by Monitoring Correlated Smart Home Devices.
Proceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2024
Phoenix: Surviving Unpatched Vulnerabilities via Accurate and Efficient Filtering of Syscall Sequences.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
CCSM: Building Cross-Cluster Security Models for Edge-Core Environments Involving Multiple Kubernetes Clusters.
Proceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy, 2024
On Detecting Malicious Code Injection by Monitoring Multi-Level Container Activities.
Proceedings of the 14th International Conference on Cloud Computing and Services Science, 2024
2023
On Reducing Underutilization of Security Standards by Deriving Actionable Rules: An Application to IoT.
Proceedings of the Security Standardisation Research - 8th International Conference, 2023
Layered Security Analysis for Container Images: Expanding Lightweight Pre-Deployment Scanning.
Proceedings of the 20th Annual International Conference on Privacy, Security and Trust, 2023
Warping the Defence Timeline: Non-Disruptive Proactive Attack Mitigation for Kubernetes Clusters.
Proceedings of the IEEE International Conference on Communications, 2023
Evaluating the Security Posture of 5G Networks by Combining State Auditing and Event Monitoring.
Proceedings of the Computer Security - ESORICS 2023, 2023
A Tenant-based Two-stage Approach to Auditing the Integrity of Virtual Network Function Chains Hosted on Third-Party Clouds.
Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy, 2023
Towards Evaluation and Understanding of Large Language Models for Cyber Operation Automation.
Proceedings of the IEEE Conference on Communications and Network Security, 2023
2022
IEEE Trans. Dependable Secur. Comput., 2022
DPOAD: Differentially Private Outsourcing of Anomaly Detection through Iterative Sensitivity Learning.
CoRR, 2022
MLFM: Machine Learning Meets Formal Method for Faster Identification of Security Breaches in Network Functions Virtualization (NFV).
Proceedings of the Computer Security - ESORICS 2022, 2022
Proceedings of the CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24, 2022
Proceedings of the IEEE International Conference on Cloud Computing Technology and Science, 2022
2021
SegGuard: Segmentation-Based Anonymization of Network Data in Clouds for Privacy-Preserving Security Auditing.
IEEE Trans. Dependable Secur. Comput., 2021
VMGuard: State-Based Proactive Verification of Virtual Network Isolation With Application to NFV.
IEEE Trans. Dependable Secur. Comput., 2021
Feature Reduction through Data Preprocessing for Intrusion Detection in IoT Networks.
Proceedings of the 3rd IEEE International Conference on Trust, 2021
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Systems, 2021
Proceedings of the Advances in Digital Forensics XVII, 2021
Context-Aware IoT Device Functionality Extraction from Specifications for Ensuring Consumer Security.
Proceedings of the IEEE Conference on Communications and Network Security, 2021
Artificial Packet-Pair Dispersion (APPD): A Blackbox Approach to Verifying the Integrity of NFV Service Chains.
Proceedings of the IEEE Conference on Communications and Network Security, 2021
2020
A multi-level proactive security auditing framework for clouds through automated dependency building.
CCF Trans. Netw., 2020
Proceedings of the Data and Applications Security and Privacy XXXIV, 2020
NFVGuard: Verifying the Security of Multilevel Network Functions Virtualization (NFV) Stack.
Proceedings of the 12th IEEE International Conference on Cloud Computing Technology and Science, 2020
2019
Advances in Information Security 76, Springer, ISBN: 978-3-030-23127-9, 2019
ACM Trans. Priv. Secur., 2019
Learning probabilistic dependencies among events for proactive security auditing in clouds.
J. Comput. Secur., 2019
Proactivizer: Transforming Existing Verification Tools into Efficient Solutions for Runtime Security Enforcement.
Proceedings of the Computer Security - ESORICS 2019, 2019
Proceedings of the 2019 IEEE Conference on Dependable and Secure Computing, 2019
2018
IEEE Trans. Inf. Forensics Secur., 2018
Proceedings of the 4th IEEE Conference on Network Softwarization and Workshops, 2018
Proceedings of the Foundations and Practice of Security - 11th International Symposium, 2018
Stealthy Probing-Based Verification (SPV): An Active Approach to Defending Software Defined Networks Against Topology Poisoning Attacks.
Proceedings of the Computer Security, 2018
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018
2017
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017
Proceedings of the Computer Security - ESORICS 2017, 2017
2016
Proactive Verification of Security Compliance for Clouds Through Pre-computation: Application to OpenStack.
Proceedings of the Computer Security - ESORICS 2016, 2016
Auditing Security Compliance of the Virtualized Infrastructure in the Cloud: Application to OpenStack.
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016
2015
Security Compliance Auditing of Identity and Access Management in the Cloud: Application to OpenStack.
Proceedings of the 7th IEEE International Conference on Cloud Computing Technology and Science, 2015