Zobrazeno 1 - 10
of 65
pro vyhledávání: '"Deepak K. Tosh"'
Publikováno v:
IEEE Access, Vol 9, Pp 49662-49682 (2021)
Advanced persistent threats (APTs) have emerged as multi-stage attacks that have targeted nation-states and their associated entities, including private and corporate sectors. Cyber deception has emerged as a defense approach to secure our cyber infr
Externí odkaz:
https://doaj.org/article/0b8e5fc46fba4948a5a5248feae8d1b7
Autor:
Adeel A. Malik, Deepak K. Tosh
Publikováno v:
EAI Endorsed Transactions on Security and Safety, Vol 8, Iss 30 (2022)
Cyberspace is growing at full tilt creating an amalgamation of disparate systems. This heterogeneity leads to increased system complexity and security flaws. It is crucial to understand and identify these flaws to prevent catastrophic events. However
Externí odkaz:
https://doaj.org/article/90f8006c638d44f28e6b5ced2391ffe7
Publikováno v:
IEEE Internet of Things Journal. 9:18898-18907
Autor:
Adeel A. Malik, Deepak K. Tosh
Publikováno v:
2023 IEEE International Systems Conference (SysCon).
Due to the veracity and heterogeneity in network traffic, detecting anomalous events is challenging. The computational load on global servers is a significant challenge in terms of efficiency, accuracy, and scalability. Our primary motivation is to i
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::aff53ecad763f777b8bf869ba38db791
Publikováno v:
Cluster Computing. 25:1869-1883
Autor:
Anthony Castanares, Deepak K. Tosh
Publikováno v:
MILCOM 2022 - 2022 IEEE Military Communications Conference (MILCOM).
Autor:
Abel O. Gomez Rivera, Deepak K. Tosh
Publikováno v:
2022 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm).
Autor:
Peter Foytik, Eranga Bandara, Nalin Ranasinghe, Sachin Shetty, Kasun De Zoysa, Deepak K. Tosh
Publikováno v:
Future Generation Computer Systems. 119:154-165
Internet of Things (IoT) platforms have been deployed in several domains to enhance efficiency of business process and improve productivity. Most IoT platforms comprise of heterogeneous software and hardware components which can potentially introduce
Publikováno v:
IEEE Access, Vol 9, Pp 49662-49682 (2021)
Advanced persistent threats (APTs) have emerged as multi-stage attacks that have targeted nation-states and their associated entities, including private and corporate sectors. Cyber deception has emerged as a defense approach to secure our cyber infr