User-generated free-form gestures for authentication: Security and memorability M Sherman, G Clark, Y Yang, S Sugrim, A Modig, J Lindqvist, A Oulasvirta, ... Proceedings of the 12th annual international conference on Mobile systems …, 2014 | 145 | 2014 |
Elastic pathing: Your speed is enough to track you X Gao, B Firner, S Sugrim, V Kaiser-Pendergrast, Y Yang, J Lindqvist Proceedings of the 2014 ACM international joint conference on pervasive and …, 2014 | 104 | 2014 |
Cyber deception: Virtual networks to defend insider reconnaissance S Achleitner, T La Porta, P McDaniel, S Sugrim, SV Krishnamurthy, ... Proceedings of the 8th ACM CCS international workshop on managing insider …, 2016 | 99 | 2016 |
Deceiving network reconnaissance using SDN-based virtual topologies S Achleitner, TF La Porta, P McDaniel, S Sugrim, SV Krishnamurthy, ... IEEE Transactions on Network and Service Management 14 (4), 1098-1112, 2017 | 88 | 2017 |
Simulations in cyber-security: a review of cognitive modeling of network attackers, defenders, and users VD Veksler, N Buchler, BE Hoffman, DN Cassenti, C Sample, S Sugrim Frontiers in psychology 9, 691, 2018 | 66 | 2018 |
Cybervan: A cyber security virtual assured network testbed R Chadha, T Bowen, CYJ Chiang, YM Gottlieb, A Poylisher, A Sapello, ... Milcom 2016-2016 ieee military communications conference, 1125-1130, 2016 | 66 | 2016 |
ACyDS: An adaptive cyber deception system CYJ Chiang, YM Gottlieb, SJ Sugrim, R Chadha, C Serban, A Poylisher, ... MILCOM 2016-2016 IEEE Military Communications Conference, 800-805, 2016 | 52 | 2016 |
Robust performance metrics for authentication systems S Sugrim, C Liu, M McLean, J Lindqvist Network and Distributed Systems Security (NDSS) Symposium 2019, 2019 | 43 | 2019 |
On defensive cyber deception: A case study using SDN CYJ Chiang, S Venkatesan, S Sugrim, JA Youzwak, R Chadha, EI Colbert, ... MILCOM 2018-2018 IEEE Military Communications Conference (MILCOM), 110-115, 2018 | 22 | 2018 |
Measuring the effectiveness of network deception S Sugrim, S Venkatesan, JA Youzwak, CYJ Chiang, R Chadha, ... 2018 IEEE international conference on Intelligence and Security Informatics …, 2018 | 18 | 2018 |
On detecting manifestation of adversary characteristics S Venkatesan, S Sugrim, R Izmailov, CYJ Chiang, R Chadha, B Doshi, ... MILCOM 2018-2018 IEEE military communications conference (MILCOM), 431-437, 2018 | 14 | 2018 |
Enablers of adversarial attacks in machine learning R Izmailov, S Sugrim, R Chadha, P McDaniel, A Swami MILCOM 2018-2018 IEEE Military Communications Conference (MILCOM), 425-430, 2018 | 13 | 2018 |
Recruit until it fails: Exploring performance limits for identification systems S Sugrim, C Liu, J Lindqvist Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous …, 2019 | 11 | 2019 |
AutoGAN: Robust classifier against adversarial attacks B Lindqvist, S Sugrim, R Izmailov arXiv preprint arXiv:1812.03405, 2018 | 7 | 2018 |
Vulnervan: A vulnerable network generation tool S Venkatesan, JA Youzwak, S Sugrim, CYJ Chiang, A Poylisher, ... MILCOM 2019-2019 IEEE Military Communications Conference (MILCOM), 1-6, 2019 | 5 | 2019 |
Noise power and SNR estimation based on the preamble in tri-sectored OFDM systems HS Park, S Sugrim, P Spasojevic, YO Park 2011 IEEE 73rd Vehicular Technology Conference (VTC Spring), 1-5, 2011 | 5 | 2011 |
Combinatorial boosting of classifiers for moving target defense against adversarial evasion attacks R Izmailov, P Lin, S Venkatesan, S Sugrim Proceedings of the 8th ACM Workshop on Moving Target Defense, 13-21, 2021 | 4 | 2021 |
Elastic pathing: Your speed is enough to track you B Firner, S Sugrim, Y Yang, J Lindqvist arXiv preprint arXiv:1401.0052, 2013 | 4 | 2013 |
Transforming Speed Sequences into Road Rays on the Map with Elastic Pathing X Gao, B Firner, S Sugrim, V Kaiser-Pendergrast, Y Yang, J Lindqvist arXiv preprint arXiv:1710.06932, 2017 | 2 | 2017 |
VulnerVAN: Automating the Generation of Vulnerable Network Scenarios for Cybersecurity Events and Training Exercises S Venkatesan, JA Youzwak, CYJ Chiang, S Sugrim, A Poylisher, ... Section: Technical Reports, 2021 | 1 | 2021 |