default search action
Sudip Mittal
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j11]Subash Neupane, Shaswata Mitra, Ivan A. Fernandez, Swayamjit Saha, Sudip Mittal, Jingdao Chen, Nisha Pillai, Shahram Rahimi:
Security Considerations in AI-Robotics: A Survey of Current Methods, Challenges, and Opportunities. IEEE Access 12: 22072-22097 (2024) - [j10]Logan Cummins, Alexander Sommers, Somayeh Bakhtiari Ramezani, Sudip Mittal, Joseph Jabour, Maria Seale, Shahram Rahimi:
Explainable Predictive Maintenance: A Survey of Current Methods, Challenges and Opportunities. IEEE Access 12: 57574-57602 (2024) - [c45]Morgan Reece, Nidhi Rastogi, Theodore Lander, Josiah Dykstra, Sudip Mittal, Andy Sampson:
Defending Multi-Cloud Applications Against Man-in-the-Middle Attacks. SACMAT 2024 - [i51]Shaswata Mitra, Trisha Chakraborty, Subash Neupane, Aritran Piplai, Sudip Mittal:
Use of Graph Neural Networks in Aiding Defensive Cyber Operations. CoRR abs/2401.05680 (2024) - [i50]Logan Cummins, Alexander Sommers, Somayeh Bakhtiari Ramezani, Sudip Mittal, Joseph Jabour, Maria Seale, Shahram Rahimi:
Explainable Predictive Maintenance: A Survey of Current Methods, Challenges and Opportunities. CoRR abs/2401.07871 (2024) - [i49]Shaswata Mitra, Subash Neupane, Trisha Chakraborty, Sudip Mittal, Aritran Piplai, Manas Gaur, Shahram Rahimi:
LOCALINTEL: Generating Organizational Threat Intelligence from Global and Local Cyber Knowledge. CoRR abs/2401.10036 (2024) - [i48]Jesse Ables, Nathaniel Childers, William Anderson, Sudip Mittal, Shahram Rahimi, Ioana Banicescu, Maria Seale:
Eclectic Rule Extraction for Explainability of Deep Neural Network based Intrusion Detection Systems. CoRR abs/2401.10207 (2024) - [i47]Martin Duclos, Ivan A. Fernandez, Kaneesha Moore, Sudip Mittal, Edward Zieglar:
Utilizing Large Language Models to Translate RFC Protocol Specifications to CPSA Definitions. CoRR abs/2402.00890 (2024) - [i46]Hassan S. Al Khatib, Subash Neupane, Harish Kumar Manchukonda, Noorbakhsh Amiri Golilarz, Sudip Mittal, Amin Amirlatifi, Shahram Rahimi:
Patient-Centric Knowledge Graphs: A Survey of Current Methods, Challenges, and Applications. CoRR abs/2402.12608 (2024) - [i45]Di Kevin Gao, Andrew Haverly, Sudip Mittal, Jingdao Chen:
A Bibliometric View of AI Ethics Development. CoRR abs/2403.05551 (2024) - [i44]Subash Neupane, Shaswata Mitra, Sudip Mittal, Noorbakhsh Amiri Golilarz, Shahram Rahimi, Amin Amirlatifi:
MedInsight: A Multi-Source Context Augmentation Framework for Generating Patient-Centric Medical Responses using Large Language Models. CoRR abs/2403.08607 (2024) - [i43]Di Kevin Gao, Andrew Haverly, Sudip Mittal, Jiming Wu, Jingdao Chen:
AI Ethics: A Bibliometric Analysis, Critical Issues, and Key Gaps. CoRR abs/2403.14681 (2024) - [i42]Alexander Sommers, Somayeh Bakhtiari Ramezani, Logan Cummins, Sudip Mittal, Shahram Rahimi, Maria Seale, Joseph Jabour:
Generating Synthetic Time Series Data for Cyber-Physical Systems. CoRR abs/2404.08601 (2024) - [i41]Subash Neupane, Elias Hossain, Jason Keith, Himanshu Tripathi, Farbod Ghiasi, Noorbakhsh Amiri Golilarz, Amin Amirlatifi, Sudip Mittal, Shahram Rahimi:
From Questions to Insightful Answers: Building an Informed Chatbot for University Resources. CoRR abs/2405.08120 (2024) - [i40]Alexander Sommers, Logan Cummins, Sudip Mittal, Shahram Rahimi, Maria Seale, Joseph Jabour, Thomas Arnold:
A Survey of Transformer Enabled Time Series Synthesis. CoRR abs/2406.02322 (2024) - [i39]Ivan A. Fernandez, Subash Neupane, Trisha Chakraborty, Shaswata Mitra, Sudip Mittal, Nisha Pillai, Jingdao Chen, Shahram Rahimi:
A Survey on Privacy Attacks Against Digital Twin Systems in AI-Robotics. CoRR abs/2406.18812 (2024) - [i38]Logan Cummins, Alexander Sommers, Sudip Mittal, Shahram Rahimi, Maria Seale, Joseph Jabour, Thomas Arnold:
Explainable Anomaly Detection: Counterfactual driven What-If Analysis. CoRR abs/2408.11935 (2024) - [i37]Aaryan Panda, Damodar Panigrahi, Shaswata Mitra, Sudip Mittal, Shahram Rahimi:
Transfer Learning Applied to Computer Vision Problems: Survey on Current Progress, Limitations, and Opportunities. CoRR abs/2409.07736 (2024) - 2023
- [j9]Aritran Piplai, Anantaa Kotal, Seyedreza Mohseni, Manas Gaur, Sudip Mittal, Anupam Joshi:
Knowledge-Enhanced Neurosymbolic Artificial Intelligence for Cybersecurity and Privacy. IEEE Internet Comput. 27(5): 43-48 (2023) - [j8]Ketki Sane, Karuna Pande Joshi, Sudip Mittal:
Semantically Rich Framework to Automate Cyber Insurance Services. IEEE Trans. Serv. Comput. 16(1): 588-599 (2023) - [c44]Logan Cummins, Brad Killen, Somayeh Bakhtiari Ramezani, Shahram Rahimi, Maria Seale, Sudip Mittal:
A Comparative Study of Continual, Lifelong, and Online Supervised Learning Libraries. FLAIRS 2023 - [c43]Manas Gaur, Efthymia Tsamoura, Sarath Sreedharan, Sudip Mittal:
KiL 2023 : 3rd International Workshop on Knowledge-infused Learning. KDD 2023: 5857-5858 - [c42]Trisha Chakraborty, Shaswata Mitra, Sudip Mittal:
CAPoW: Context-Aware AI-Assisted Proof of Work Based DDoS Defense. SECRYPT 2023: 62-72 - [c41]Shaswata Mitra, Stephen A. Torri, Sudip Mittal:
Survey of Malware Analysis through Control Flow Graph using Machine Learning. TrustCom 2023: 1554-1561 - [i36]Trisha Chakraborty, Shaswata Mitra, Sudip Mittal:
CAPoW: Context-Aware AI-Assisted Proof of Work based DDoS Defense. CoRR abs/2301.11767 (2023) - [i35]Subash Neupane, Ivan A. Fernandez, Wilson Patterson, Sudip Mittal, Milan Parmar, Shahram Rahimi:
TwinExplainer: Explaining Predictions of an Automotive Digital Twin. CoRR abs/2302.00152 (2023) - [i34]Sudip Mittal, Jingdao Chen:
AI Security Threats against Pervasive Robotic Systems: A Course for Next Generation Cybersecurity Workforce. CoRR abs/2302.07953 (2023) - [i33]Jesse Ables, Thomas Kirby, Sudip Mittal, Ioana Banicescu, Shahram Rahimi, William Anderson, Maria Seale:
Explainable Intrusion Detection Systems Using Competitive Learning Techniques. CoRR abs/2303.17387 (2023) - [i32]Shaswata Mitra, Stephen A. Torri, Sudip Mittal:
Survey of Malware Analysis through Control Flow Graph using Machine Learning. CoRR abs/2305.08993 (2023) - [i31]Damodar Panigrahi, William Anderson, Joshua Whitman, Sudip Mittal, Benjamin A. Blakely:
REGARD: Rules of EngaGement for Automated cybeR Defense to aid in Intrusion Response. CoRR abs/2305.13967 (2023) - [i30]Morgan Reece, Theodore Edward Lander Jr., Matthew Stoffolano, Andy Sampson, Josiah Dykstra, Sudip Mittal, Nidhi Rastogi:
Systemic Risk and Vulnerability Analysis of Multi-cloud Environments. CoRR abs/2306.01862 (2023) - [i29]Subash Neupane, Ivan A. Fernandez, Sudip Mittal, Shahram Rahimi:
Impacts and Risk of Generative AI Technology on Cyber Defense. CoRR abs/2306.13033 (2023) - [i28]Aritran Piplai, Anantaa Kotal, Seyedreza Mohseni, Manas Gaur, Sudip Mittal, Anupam Joshi:
Knowledge-enhanced Neuro-Symbolic AI for Cybersecurity and Privacy. CoRR abs/2308.02031 (2023) - [i27]Charles Moore, Shaswata Mitra, Nisha Pillai, Marc Moore, Sudip Mittal, Cindy L. Bethel, Jingdao Chen:
URA*: Uncertainty-aware Path Planning using Image-based Aerial-to-Ground Traversability Estimation for Off-road Environments. CoRR abs/2309.08814 (2023) - [i26]Subash Neupane, Shaswata Mitra, Ivan A. Fernandez, Swayamjit Saha, Sudip Mittal, Jingdao Chen, Nisha Pillai, Shahram Rahimi:
Security Considerations in AI-Robotics: A Survey of Current Methods, Challenges, and Opportunities. CoRR abs/2310.08565 (2023) - [i25]Morgan Reece, Theodore Edward Lander Jr., Sudip Mittal, Nidhi Rastogi, Josiah Dykstra, Andy Sampson:
Emergent (In)Security of Multi-Cloud Environments. CoRR abs/2311.01247 (2023) - 2022
- [j7]Subash Neupane, Jesse Ables, William Anderson, Sudip Mittal, Shahram Rahimi, Ioana Banicescu, Maria Seale:
Explainable Intrusion Detection Systems (X-IDS): A Survey of Current Methods, Challenges, and Opportunities. IEEE Access 10: 112392-112415 (2022) - [j6]Trisha Chakraborty, Shaswata Mitra, Sudip Mittal, Maxwell Young:
AI_Adaptive_POW: An AI assisted Proof Of Work (POW) framework for DDoS defense. Softw. Impacts 13: 100335 (2022) - [j5]Valeria Cardellini, Emiliano Casalicchio, Stefano Iannucci, Matteo Lucantonio, Sudip Mittal, Damodar Panigrahi, Andrea Silvi:
irs-partition: An Intrusion Response System utilizing Deep Q-Networks and system partitions. SoftwareX 19: 101120 (2022) - [c40]Chuyen Nguyen, Caleb Morgan, Sudip Mittal:
Poster CTI4AI: Threat Intelligence Generation and Sharing after Red Teaming AI Models. CCS 2022: 3431-3433 - [c39]Elisa Bertino, Ravi S. Sandhu, Bhavani Thuraisingham, Indrakshi Ray, Wenjia Li, Maanak Gupta, Sudip Mittal:
Security and Privacy for Emerging IoT and CPS Domains. CODASPY 2022: 336-337 - [c38]Murat Kantarcioglu, Barbara Carminati, Sagar Samtani, Sudip Mittal, Maanak Gupta:
Enforcement of Laws and Privacy Preferences in Modern Computing Systems. CODASPY 2022: 338-339 - [c37]Subash Neupane, Ivan A. Fernandez, Wilson Patterson, Sudip Mittal, Shahram Rahimi:
A Temporal Anomaly Detection System for Vehicles utilizing Functional Working Groups and Sensor Channels. CIC 2022: 99-108 - [c36]Trisha Chakraborty, Shaswata Mitra, Sudip Mittal, Maxwell Young:
A Policy Driven AI-Assisted PoW Framework. DSN (Supplements) 2022: 37-38 - [c35]Jesse Ables, Thomas Kirby, William Anderson, Sudip Mittal, Shahram Rahimi, Ioana Banicescu, Maria Seale:
Creating an Explainable Intrusion Detection System Using Self Organizing Maps. SSCI 2022: 404-412 - [i24]Valeria Cardellini, Emiliano Casalicchio, Stefano Iannucci, Matteo Lucantonio, Sudip Mittal, Damodar Panigrahi, Andrea Silvi:
An Intrusion Response System utilizing Deep Q-Networks and System Partitions. CoRR abs/2202.08182 (2022) - [i23]Trisha Chakraborty, Shaswata Mitra, Sudip Mittal, Maxwell Young:
A Policy Driven AI-Assisted PoW Framework. CoRR abs/2203.10698 (2022) - [i22]Subash Neupane, Jesse Ables, William Anderson, Sudip Mittal, Shahram Rahimi, Ioana Banicescu, Maria Seale:
Explainable Intrusion Detection Systems (X-IDS): A Survey of Current Methods, Challenges, and Opportunities. CoRR abs/2207.06236 (2022) - [i21]Jesse Ables, Thomas Kirby, William Anderson, Sudip Mittal, Shahram Rahimi, Ioana Banicescu, Maria Seale:
Creating an Explainable Intrusion Detection System Using Self Organizing Maps. CoRR abs/2207.07465 (2022) - [i20]Chuyen Nguyen, Caleb Morgan, Sudip Mittal:
CTI4AI: Threat Intelligence Generation and Sharing after Red Teaming AI Models. CoRR abs/2208.07476 (2022) - [i19]William Anderson, Kaneesha Moore, Jesse Ables, Sudip Mittal, Shahram Rahimi, Ioana Banicescu, Maria Seale:
Designing an Artificial Immune System inspired Intrusion Detection System. CoRR abs/2208.07801 (2022) - [i18]Subash Neupane, Ivan A. Fernandez, Wilson Patterson, Sudip Mittal, Shahram Rahimi:
A Temporal Anomaly Detection System for Vehicles utilizing Functional Working Groups and Sensor Channels. CoRR abs/2209.06828 (2022) - [i17]Morgan Reece, Sudip Mittal:
Self-Sovereign Identity in a World of Authentication: Architecture and Domain Usecases. CoRR abs/2209.11647 (2022) - [i16]Wilson Patterson, Ivan A. Fernandez, Subash Neupane, Milan Parmar, Sudip Mittal, Shahram Rahimi:
A White-Box Adversarial Attack Against a Digital Twin. CoRR abs/2210.14018 (2022) - [i15]Keith Strandell, Sudip Mittal:
Risks to Zero Trust in a Federated Mission Partner Environment. CoRR abs/2211.17073 (2022) - 2021
- [j4]Sudip Mittal:
Secure V2V and V2I Technologies for the Next-Generation Intelligent Transportation Systems. Computer 54(2): 4-6 (2021) - [c34]Shaswata Mitra, Aritran Piplai, Sudip Mittal, Anupam Joshi:
Combating Fake Cyber Threat Intelligence using Provenance in Cybersecurity Knowledge Graphs. IEEE BigData 2021: 3316-3323 - [c33]Sai Sree Laya Chukkapalli, Shaik Barakhat Aziz, Nouran Alotaibi, Sudip Mittal, Maanak Gupta, Mahmoud Abdelsalam:
Ontology driven AI and Access Control Systems for Smart Fisheries. SAT-CPS@CODASPY 2021: 59-68 - [c32]Mahmoud Abdelsalam, Maanak Gupta, Sudip Mittal:
Artificial Intelligence Assisted Malware Analysis. SAT-CPS@CODASPY 2021: 75-77 - [c31]Elisa Bertino, Murat Kantarcioglu, Cuneyt Gurcan Akcora, Sagar Samtani, Sudip Mittal, Maanak Gupta:
AI for Security and Security for AI. CODASPY 2021: 333-334 - [c30]Ambareen Siraj, Nigamanth Sridhar, John A. Drew Hamilton, Latifur Khan, Siddharth Kaza, Maanak Gupta, Sudip Mittal:
Is there a Security Mindset and Can it be Taught? CODASPY 2021: 335-336 - [c29]Caitlin Moroney, Evan Crothers, Sudip Mittal, Anupam Joshi, Tülay Adali, Christine Mallinson, Nathalie Japkowicz, Zois Boukouvalas:
The Case for Latent Variable Vs Deep Learning Methods in Misinformation Detection: An Application to COVID-19. DS 2021: 422-432 - [c28]Priyanka Ranade, Aritran Piplai, Sudip Mittal, Anupam Joshi, Tim Finin:
Generating Fake Cyber Threat Intelligence Using Transformer-Based Models. IJCNN 2021: 1-9 - [c27]Sai Sree Laya Chukkapalli, Nisha Pillai, Sudip Mittal, Anupam Joshi:
Cyber-Physical System Security Surveillance using Knowledge Graph based Digital Twins - A Smart Farming Usecase. ISI 2021: 1-6 - [c26]Sai Sree Laya Chukkapalli, Priyanka Ranade, Sudip Mittal, Anupam Joshi:
A Privacy Preserving Anomaly Detection Framework for Cooperative Smart Farming Ecosystem. TPS-ISA 2021: 340-347 - [e1]Maanak Gupta, Mahmoud Abdelsalam, Sudip Mittal:
SAT-CPS@CODASPY 2021, Proceedings of the 2021 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems, Virtual Event, USA, April 28, 2021. ACM 2021, ISBN 978-1-4503-8319-6 [contents] - [i14]Priyanka Ranade, Aritran Piplai, Sudip Mittal, Anupam Joshi, Tim Finin:
Generating Fake Cyber Threat Intelligence Using Transformer-Based Models. CoRR abs/2102.04351 (2021) - 2020
- [j3]Maanak Gupta, Mahmoud Abdelsalam, Sajad Khorsandroo, Sudip Mittal:
Security and Privacy in Smart Farming: Challenges and Opportunities. IEEE Access 8: 34564-34584 (2020) - [j2]Sai Sree Laya Chukkapalli, Sudip Mittal, Maanak Gupta, Mahmoud Abdelsalam, Anupam Joshi, Ravi S. Sandhu, Karuna P. Joshi:
Ontologies and Artificial Intelligence Systems for the Cooperative Smart Farming Ecosystem. IEEE Access 8: 164045-164064 (2020) - [j1]Aritran Piplai, Sudip Mittal, Anupam Joshi, Tim Finin, James Holt, Richard Zak:
Creating Cybersecurity Knowledge Graphs From Malware After Action Reports. IEEE Access 8: 211691-211703 (2020) - [c25]Nitu Kedarmal Choudhary, Sai Sree Laya Chukkapalli, Sudip Mittal, Maanak Gupta, Mahmoud Abdelsalam, Anupam Joshi:
YieldPredict: A Crop Yield Prediction Framework for Smart Farms. IEEE BigData 2020: 2340-2349 - [c24]Aritran Piplai, Priyanka Ranade, Anantaa Kotal, Sudip Mittal, Sandeep Nair Narayanan, Anupam Joshi:
Using Knowledge Graphs and Reinforcement Learning for Malware Analysis. IEEE BigData 2020: 2626-2633 - [c23]Sai Sree Laya Chukkapalli, Aritran Piplai, Sudip Mittal, Maanak Gupta, Anupam Joshi:
A Smart-Farming Ontology for Attribute Based Access Control. BigDataSecurity/HPSC/IDS 2020: 29-34 - [c22]Andrew McDole, Mahmoud Abdelsalam, Maanak Gupta, Sudip Mittal:
Analyzing CNN Based Behavioural Malware Detection Techniques on Cloud IaaS. CLOUD 2020: 64-79 - [c21]Sina Sontowski, Maanak Gupta, Sai Sree Laya Chukkapalli, Mahmoud Abdelsalam, Sudip Mittal, Anupam Joshi, Ravi S. Sandhu:
Cyber Attacks on Smart Farming Infrastructure. CIC 2020: 135-143 - [c20]Aritran Piplai, Sudip Mittal, Mahmoud Abdelsalam, Maanak Gupta, Anupam Joshi, Tim Finin:
Knowledge Enrichment by Fusing Representations for Malware Threat Intelligence and Behavior. ISI 2020: 1-6 - [c19]Matthew Sills, Priyanka Ranade, Sudip Mittal:
Cybersecurity Threat Intelligence Augmentation and Embedding Improvement - A Healthcare Usecase. ISI 2020: 1-6 - [i13]Andrew McDole, Mahmoud Abdelsalam, Maanak Gupta, Sudip Mittal:
Analyzing CNN Based Behavioural Malware Detection Techniques on Cloud IaaS. CoRR abs/2002.06383 (2020) - [i12]Maanak Gupta, Mahmoud Abdelsalam, Sudip Mittal:
Enabling and Enforcing Social Distancing Measures using Smart City and ITS Infrastructures: A COVID-19 Use Case. CoRR abs/2004.09246 (2020) - [i11]Zois Boukouvalas, Christine Mallinson, Evan Crothers, Nathalie Japkowicz, Aritran Piplai, Sudip Mittal, Anupam Joshi, Tülay Adali:
Independent Component Analysis for Trustworthy Cyberspace during High Impact Events: An Application to Covid-19. CoRR abs/2006.01284 (2020) - [i10]Maanak Gupta, Sudip Mittal, Mahmoud Abdelsalam:
AI assisted Malware Analysis: A Course for Next Generation Cybersecurity Workforce. CoRR abs/2009.11101 (2020)
2010 – 2019
- 2019
- [c18]Aditya Pingle, Aritran Piplai, Sudip Mittal, Anupam Joshi, James Holt, Richard Zak:
RelExt: relation extraction using deep learning approaches for cybersecurity knowledge graph improvement. ASONAM 2019: 879-886 - [c17]Sowmya Ramapatruni, Sandeep Nair Narayanan, Sudip Mittal, Anupam Joshi, Karuna P. Joshi:
Anomaly Detection Models for Smart Home Security. BigDataSecurity/HPSC/IDS 2019: 19-24 - [c16]Ketki Joshi, Karuna Pande Joshi, Sudip Mittal:
A Semantic Approach for Automating Knowledge in Policies of Cyber Insurance Services. ICWS 2019: 33-40 - [c15]Nitika Khurana, Sudip Mittal, Aritran Piplai, Anupam Joshi:
Preventing Poisoning Attacks On AI Based Threat Intelligence Systems. MLSP 2019: 1-6 - [i9]Aditya Pingle, Aritran Piplai, Sudip Mittal, Anupam Joshi, James Holt, Richard Zak:
RelExt: Relation Extraction using Deep Learning approaches for Cybersecurity Knowledge Graph Improvement. CoRR abs/1905.02497 (2019) - [i8]Sudip Mittal, Anupam Joshi, Tim Finin:
Cyber-All-Intel: An AI for Security related Threat Intelligence. CoRR abs/1905.02895 (2019) - 2018
- [c14]Vishal Rathod, Sandeep Nair Narayanan, Sudip Mittal, Anupam Joshi:
Semantically Rich, Context Aware Access Control for Openstack. CIC 2018: 460-465 - [c13]Lorenzo Neil, Sudip Mittal, Anupam Joshi:
Mining Threat Intelligence about Open-Source Projects and Libraries from Code Repository Issues and Bug Reports. ISI 2018: 7-12 - [c12]Priyanka Ranade, Sudip Mittal, Anupam Joshi, Karuna Pande Joshi:
Using Deep Neural Networks to Translate Multi-lingual Threat Intelligence. ISI 2018: 238-243 - [i7]Nitika Khurana, Sudip Mittal, Anupam Joshi:
Preventing Poisoning Attacks on AI based Threat Intelligence Systems. CoRR abs/1807.07418 (2018) - [i6]Priyanka Ranade, Sudip Mittal, Anupam Joshi, Karuna P. Joshi:
Using Deep Neural Networks to Translate Multi-lingual Threat Intelligence. CoRR abs/1807.07517 (2018) - [i5]Lorenzo Neil, Sudip Mittal, Anupam Joshi:
Mining Threat Intelligence about Open-Source Projects and Libraries from Code Repository Issues and Bug Reports. CoRR abs/1808.04673 (2018) - 2017
- [c11]Sudip Mittal, Aditi Gupta, Karuna P. Joshi, Claudia Pearce, Anupam Joshi:
A Question and Answering System for Management of Cloud Service Level Agreements. CLOUD 2017: 684-687 - [c10]Maithilee P. Joshi, Sudip Mittal, Karuna P. Joshi, Tim Finin:
Semantically Rich, Oblivious Access Control Using ABAC for Secure Cloud Storage. EDGE 2017: 142-149 - [i4]Sudip Mittal, Anupam Joshi, Tim Finin:
Thinking, Fast and Slow: Combining Vector Spaces and Knowledge Graphs. CoRR abs/1708.03310 (2017) - 2016
- [c9]Aditi Gupta, Sudip Mittal, Karuna P. Joshi, Claudia Pearce, Anupam Joshi:
Streamlining Management of Multiple Cloud Services. CLOUD 2016: 481-488 - [c8]Karuna P. Joshi, Aditi Gupta, Sudip Mittal, Claudia Pearce, Anupam Joshi, Tim Finin:
ALDA: Cognitive Assistant for Legal Document Analytics. AAAI Fall Symposia 2016 - [c7]Sudip Mittal, Prajit Kumar Das, Varish Mulwad, Anupam Joshi, Tim Finin:
CyberTwitter: Using Twitter to generate alerts for cybersecurity threats and vulnerabilities. ASONAM 2016: 860-867 - [c6]Karuna P. Joshi, Aditi Gupta, Sudip Mittal, Claudia Pearce, Anupam Joshi, Tim Finin:
Semantic approach to automating management of big data privacy policies. IEEE BigData 2016: 482-491 - [c5]Sudip Mittal, Karuna P. Joshi, Claudia Pearce, Anupam Joshi:
Automatic Extraction of Metrics from SLAs for Cloud Service Management. IC2E 2016: 139-142 - [c4]Sandeep Nair Narayanan, Sudip Mittal, Anupam Joshi:
Using semantic technologies to mine vehicular context for security. Sarnoff Symposium 2016: 124-129 - [c3]Sandeep Nair Narayanan, Sudip Mittal, Anupam Joshi:
OBD_SecureAlert: An Anomaly Detection System for Vehicles. SMARTCOMP 2016: 1-6 - 2015
- [c2]Sudip Mittal, Karuna P. Joshi, Claudia Pearce, Anupam Joshi:
Parallelizing natural language techniques for knowledge extraction from cloud service level agreements. IEEE BigData 2015: 2831-2833 - [i3]Sandeep Nair Narayanan, Sudip Mittal, Anupam Joshi:
Using Data Analytics to Detect Anomalous States in Vehicles. CoRR abs/1512.08048 (2015) - 2014
- [c1]Sudip Mittal, Neha Gupta, Prateek Dewan, Ponnurangam Kumaraguru:
Pinned it! A Large Scale Study of the Pinterest Network. CODS 2014: 1-10 - [i2]Sudip Mittal, Ponnurangam Kumaraguru:
Broker Bots: Analyzing automated activity during High Impact Events on Twitter. CoRR abs/1406.4286 (2014) - 2013
- [i1]Sudip Mittal, Neha Gupta, Prateek Dewan, Ponnurangam Kumaraguru:
The Pin-Bang Theory: Discovering The Pinterest World. CoRR abs/1307.4952 (2013)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-15 00:20 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint