Security and privacy in smart farming: Challenges and opportunities M Gupta, M Abdelsalam, S Khorsandroo, S Mittal IEEE access 8, 34564-34584, 2020 | 420 | 2020 |
Cybertwitter: Using twitter to generate alerts for cybersecurity threats and vulnerabilities S Mittal, PK Das, V Mulwad, A Joshi, T Finin 2016 IEEE/ACM International Conference on Advances in Social Networks …, 2016 | 243 | 2016 |
Enabling and enforcing social distancing measures using smart city and its infrastructures: a COVID-19 Use case M Gupta, M Abdelsalam, S Mittal arXiv preprint arXiv:2004.09246, 2020 | 126 | 2020 |
Generating digital twin models using knowledge graphs for industrial production lines A Banerjee, R Dalal, S Mittal, KP Joshi 9th International ACM Web Science Conference 2017 - Industrial Knowledge Graphs, 2017 | 126 | 2017 |
RelExt: Relation Extraction using Deep Learning approaches for Cybersecurity Knowledge Graph Improvement A Pingle, A Piplai, S Mittal, A Joshi, J Holt, R Zak International Conference on Advances in Social Networks Analysis and Mining …, 2019 | 124 | 2019 |
OBD_SecureAlert: An anomaly detection system for vehicles SN Narayanan, S Mittal, A Joshi 2016 IEEE International Conference on Smart Computing (SMARTCOMP), 1-6, 2016 | 123 | 2016 |
Cyber attacks on smart farming infrastructure S Sontowski, M Gupta, SSL Chukkapalli, M Abdelsalam, S Mittal, A Joshi, ... 6th IEEE International Conference on Collaboration and Internet Computing …, 2020 | 111 | 2020 |
Ontologies and artificial intelligence systems for the cooperative smart farming ecosystem SSL Chukkapalli, S Mittal, M Gupta, M Abdelsalam, A Joshi, R Sandhu, ... Ieee Access 8, 164045-164064, 2020 | 89 | 2020 |
Creating cybersecurity knowledge graphs from malware after action reports A Piplai, S Mittal, A Joshi, T Finin, J Holt, R Zak IEEE Access 2020, 2020 | 88 | 2020 |
Anomaly detection models for smart home security S Ramapatruni, SN Narayanan, S Mittal, A Joshi, K Joshi 2019 IEEE 5th Intl Conference on Big Data Security on Cloud (BigDataSecurity …, 2019 | 88 | 2019 |
Using data analytics to detect anomalous states in vehicles SN Narayanan, S Mittal, A Joshi arXiv preprint arXiv:1512.08048, 2015 | 68 | 2015 |
Cyber-all-intel: An ai for security related threat intelligence S Mittal, A Joshi, T Finin arXiv preprint arXiv:1905.02895, 2019 | 66 | 2019 |
Generating Fake Cyber Threat Intelligence Using Transformer-Based Models P Ranade, A Piplai, S Mittal, A Joshi, T Finin International Joint Conference on Neural Networks 2021 (IJCNN 2021), 2021 | 65 | 2021 |
Analyzing CNN Based Behavioural Malware Detection Techniques on Cloud IaaS A McDole, M Abdelsalam, M Gupta, S Mittal CLOUD 2020, 2020 | 59 | 2020 |
Preventing poisoning attacks on AI based threat intelligence systems N Khurana, S Mittal, A Piplai, A Joshi 2019 IEEE 29th Machine Learning for Signal Processing (MLSP), 1-6, 2019 | 58 | 2019 |
Explainable Intrusion Detection Systems (X-IDS): A Survey of Current Methods, Challenges, and Opportunities S Neupane, J Ables, W Anderson, S Mittal, S Rahimi, I Banicescu, ... IEEE Access 2022, 2022 | 54 | 2022 |
Thinking, fast and slow: Combining vector spaces and knowledge graphs S Mittal, A Joshi, T Finin arXiv preprint arXiv:1708.03310, 2017 | 52 | 2017 |
AI for Security and Security for AI E Bertino, M Kantarcioglu, CG Akcora, S Samtani, S Mittal, M Gupta 11th ACM Conference on Data and Application Security and Privacy (ACM …, 2021 | 51 | 2021 |
The pin-bang theory: Discovering the pinterest world S Mittal, N Gupta, P Dewan, P Kumaraguru arXiv preprint arXiv:1307.4952, 2013 | 43 | 2013 |
Deep Learning Techniques for Behavioural Malware Analysis in Cloud IaaS A McDole, M Gupta, M Abdelsalam, S Mittal, M Alazab Malware Analysis using Artificial Intelligence and Deep Learning, 2021 | 42 | 2021 |