Vinay Sachidananda
Orcid: 0000-0001-9582-1538
According to our database1,
Vinay Sachidananda
authored at least 34 papers
between 2008 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
2008
2010
2012
2014
2016
2018
2020
2022
2024
0
1
2
3
4
5
6
7
1
1
1
1
4
1
5
4
1
1
2
1
1
1
3
1
3
1
1
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
J. Supercomput., January, 2025
2023
E-Audit: Distinguishing and investigating suspicious events for APTs attack detection.
J. Syst. Archit., November, 2023
Proceedings of the Ubiquitous Security, 2023
Do NoT Open (DOT): A Unified Generic and Specialized Models for Detecting Malicious Email Attachments.
Proceedings of the 22nd IEEE International Conference on Trust, 2023
Proceedings of the 20th Annual International Conference on Privacy, Security and Trust, 2023
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2023
Proceedings of the IEEE Intl Conf on Dependable, 2023
2022
MARK: Fill in the blanks through a JointGAN based data augmentation for network anomaly detection.
Comput. Secur., 2022
Proceedings of the Security and Privacy in Communication Networks, 2022
Proceedings of the 19th Annual International Conference on Privacy, Security & Trust, 2022
ODDITY: An Ensemble Framework Leverages Contrastive Representation Learning for Superior Anomaly Detection.
Proceedings of the Information and Communications Security - 24th International Conference, 2022
Peekaboo: Hide and Seek with Malware Through Lightweight Multi-feature Based Lenient Hybrid Approach.
Proceedings of the Information and Communications Security - 24th International Conference, 2022
2020
Comput. Secur., 2020
OVER: overhauling vulnerability detection for iot through an adaptable and automated static analysis framework.
Proceedings of the SAC '20: The 35th ACM/SIGAPP Symposium on Applied Computing, online event, [Brno, Czech Republic], March 30, 2020
2019
Spill the Beans: Extrospection of Internet of Things by Exploiting Denial of Service.
EAI Endorsed Trans. Security Safety, 2019
IEEE Internet Things J., 2019
Privacy-Preserving Detection of IoT Devices Connected Behind a NAT in a Smart Home Setup.
CoRR, 2019
Proceedings of the 18th IEEE International Conference On Trust, 2019
2018
Proceedings of the Security and Privacy in Communication Networks, 2018
Proceedings of the Critical Information Infrastructures Security, 2018
2017
Let the Cat Out of the Bag: A Holistic Approach Towards Security Analysis of the Internet of Things.
Proceedings of the 3rd ACM International Workshop on IoT Privacy, Trust, and Security, 2017
2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
2015
Optimized multi-attribute co-design for maximizing efficiency in Wireless Sensor Networks.
Proceedings of the Tenth IEEE International Conference on Intelligent Sensors, 2015
2014
On maximizing the through avoidance efficiency of multipurpose WSNs of over- or under-provisioning of information.
PhD thesis, 2014
2013
Proceedings of the 10th Annual Conference on Wireless On-demand Network Systems and Services, 2013
Information quality aware co-design of sampling and transport in wireless sensor networks.
Proceedings of the 6th Joint IFIP Wireless and Mobile Networking Conference, 2013
Trading transport timeliness and reliability for efficiency in wireless sensor networks.
Proceedings of 10th IEEE International Conference on Networking, Sensing and Control, 2013
2012
Proceedings of the Ninth International Conference on Networked Sensing, 2012
2010
Simulation and Evaluation of Mixed-Mode Environments: Towards Higher Quality of Simulations.
Proceedings of the Simulation, Modeling, and Programming for Autonomous Robots, 2010
Quality of information in wireless sensor networks.
Proceedings of the 15th International Conference on Information Quality, 2010
Quality of Information in Wireless Sensor networks.
Proceedings of the Joint Workshop of the German Research Training Groups in Computer Science, 2010
2008
Proceedings of the Self-Organizing Systems, Third International Workshop, 2008