Detection of DDoS attacks using machine learning algorithms PS Saini, S Behal, S Bhatia 2020 7th International Conference on Computing for Sustainable Global …, 2020 | 98 | 2020 |
Practical modbus flooding attack and detection S Bhatia, NS Kush, C Djamaludin, AJ Akande, E Foo Proceedings of the Twelfth Australasian Information Security Conference …, 2014 | 69 | 2014 |
A framework for generating realistic traffic for Distributed Denial-of-Service attacks and Flash Events S Bhatia, D Schmidt, G Mohay, A Tickle computers & security 40, 95-107, 2014 | 64 | 2014 |
Towards a systematic threat modeling approach for cyber-physical systems G Martins, S Bhatia, X Koutsoukos, K Stouffer, CY Tang, R Candell 2015 Resilience Week (RWS), 1-6, 2015 | 61 | 2015 |
Parametric Differences Between a Real-world Distributed Denial-of-service Attack and a Flash Event S Bhatia, G Mohay, A Tickle, E Ahmed Availability, Reliability and Security (ARES), 2011 Sixth International …, 2011 | 56 | 2011 |
Securing the human: a review of literature on broadening diversity in cybersecurity education X Mountrouidou, D Vosen, C Kari, MQ Azhar, S Bhatia, G Gagne, ... Proceedings of the Working Group Reports on Innovation and Technology in …, 2019 | 53 | 2019 |
Distributed denial of service attacks and defense mechanisms: current landscape and future directions S Bhatia, S Behal, I Ahmed Versatile Cybersecurity, 55-97, 2018 | 53 | 2018 |
Fooling the master: Exploiting weaknesses in the modbus protocol C Parian, T Guldimann, S Bhatia Procedia Computer Science 171, 2453-2458, 2020 | 48 | 2020 |
E-learning course recommender system using collaborative filtering models KK Jena, SK Bhoi, TK Malik, KS Sahoo, NZ Jhanjhi, S Bhatia, F Amsaad Electronics 12 (1), 157, 2022 | 42 | 2022 |
Use of IP Addresses for High Rate Flooding Attack Detection E Ahmed, G Mohay, A Tickle, S Bhatia Security and Privacy–Silver Linings in the Cloud, 124-135, 2010 | 31 | 2010 |
Ensemble-based model for DDoS attack detection and flash event separation S Bhatia 2016 Future Technologies Conference (FTC), 958-967, 2016 | 28 | 2016 |
Ensemble-based DDoS Detection and Mitigation Model S Bhatia, D Schmidt, G Mohay Proceedings of the Fifth International Conference on Security of Information …, 2012 | 28 | 2012 |
Assessing and exploiting security vulnerabilities of unmanned aerial vehicles F Lakew Yihunie, AK Singh, S Bhatia Smart Systems and IoT: Innovations in Computing: Proceeding of SSIC 2019 …, 2020 | 26 | 2020 |
Modelling Web-server Flash Events S Bhatia, G Mohay, D Schmidt, A Tickle Network Computing and Applications (NCA), 2012 11th IEEE International …, 2012 | 26 | 2012 |
Higher education social engineering attack scenario, awareness & training model T Nguyen, S Bhatia Journal of The Colloquium for Information Systems Security Education 8 (1), 8-8, 2020 | 15 | 2020 |
Machine learning for malicious URL detection G Wejinya, S Bhatia ICT Systems and Sustainability: Proceedings of ICT4SD 2020, Volume 1, 463-472, 2021 | 13 | 2021 |
Problem-based learning for cybersecurity education M Shivapurkar, S Bhatia, I Ahmed Journal of The Colloquium for Information Systems Security Education 7 (1), 6-6, 2020 | 13 | 2020 |
An efficient and reliable lightweight PUF for IoT-based applications F Amsaad, A Razaque, M Baza, S Kose, S Bhatia, G Srivastava 2021 IEEE international conference on communications workshops (ICC …, 2021 | 12 | 2021 |
A survey and evaluation of android-based malware evasion techniques and detection frameworks P Faruki, R Bhan, V Jain, S Bhatia, N El Madhoun, R Pamula Information 14 (7), 374, 2023 | 11 | 2023 |
Cybersecurity analysis of load frequency control in power systems: a survey S Saxena, S Bhatia, R Gupta Designs 5 (3), 52, 2021 | 11 | 2021 |