A survey of game theory as applied to network security S Roy, C Ellis, S Shiva, D Dasgupta, V Shandilya, Q Wu 2010 43rd Hawaii international conference on system sciences, 1-10, 2010 | 688 | 2010 |
Comparative analysis of decision tree classification algorithms A Priyam, GR Abhijeeta, A Rathee, S Srivastava International Journal of current engineering and technology 3 (2), 334-337, 2013 | 282 | 2013 |
Comparative analysis of serial decision tree classification algorithms MN Anyanwu, SG Shiva International Journal of Computer Science and Security 3 (3), 230-240, 2009 | 266 | 2009 |
AVOIDIT: A cyber attack taxonomy C Simmons, C Ellis, S Shiva, D Dasgupta, Q Wu University of Memphis, Technical Report CS-09-003, 2009 | 259 | 2009 |
Security and privacy in the internet of medical things: taxonomy and risk assessment F Alsubaei, A Abuhussein, S Shiva 2017 IEEE 42nd conference on local computer networks workshops (LCN …, 2017 | 199 | 2017 |
IoMT-SAF: Internet of medical things security assessment framework F Alsubaei, A Abuhussein, V Shandilya, S Shiva Internet of Things 8, 100123, 2019 | 170 | 2019 |
Game theory for cyber security S Shiva, S Roy, D Dasgupta Proceedings of the Sixth Annual Workshop on Cyber Security and Information …, 2010 | 124 | 2010 |
Computer organization, design, and architecture SG Shiva CRC Press, 2007 | 115 | 2007 |
DDoS intrusion detection through machine learning ensemble S Das, AM Mahfouz, D Venugopal, S Shiva 2019 IEEE 19th international conference on software Quality, Reliability and …, 2019 | 104 | 2019 |
Detecting stealthy false data injection attacks in the smart grid using ensemble-based machine learning M Ashrafuzzaman, S Das, Y Chakhchoukh, S Shiva, FT Sheldon Computers & Security 97, 101994, 2020 | 93 | 2020 |
Use of attack graphs in security systems V Shandilya, CB Simmons, S Shiva Journal of Computer Networks and Communications 2014 (1), 818957, 2014 | 88 | 2014 |
On modeling and simulation of game theory-based defense mechanisms against DoS and DDoS attacks Q Wu, S Shiva, S Roy, C Ellis, V Datla Proceedings of the 2010 spring simulation multiconference, 1-8, 2010 | 80 | 2010 |
Comparative analysis of ML classifiers for network intrusion detection AM Mahfouz, D Venugopal, SG Shiva Fourth International Congress on Information and Communication Technology …, 2020 | 73 | 2020 |
Ensemble classifiers for network intrusion detection using a novel network attack dataset A Mahfouz, A Abuhussein, D Venugopal, S Shiva Future Internet 12 (11), 180, 2020 | 70 | 2020 |
Game theory-based defense mechanisms against DDoS attacks on TCP/TCP-friendly flows HS Bedi, S Roy, S Shiva 2011 IEEE symposium on computational intelligence in cyber security (CICS …, 2011 | 67 | 2011 |
Software reuse: Research and practice SG Shiva, L Abou Shala Fourth International Conference on Information Technology (ITNG'07), 603-609, 2007 | 65 | 2007 |
Securing cloud infrastructure against co-resident DoS attacks using game theoretic defense mechanisms HS Bedi, S Shiva Proceedings of the international conference on advances in computing …, 2012 | 64 | 2012 |
Ontology-based security recommendation for the internet of medical things F Alsubaei, A Abuhussein, S Shiva IEEE Access 7, 48948-48960, 2019 | 55 | 2019 |
Introduction to logic design SG Shiva CRC Press, 2018 | 51 | 2018 |
Evaluating security and privacy in cloud computing services: A Stakeholder's perspective A Abuhussein, H Bedi, S Shiva 2012 international conference for internet technology and secured …, 2012 | 51 | 2012 |