Vulcon: A system for vulnerability prioritization, mitigation, and management KA Farris, A Shah, G Cybenko, R Ganesan, S Jajodia ACM Transactions on Privacy and Security (TOPS) 21 (4), 1-28, 2018 | 81 | 2018 |
Dynamic scheduling of cybersecurity analysts for minimizing risk using reinforcement learning R Ganesan, S Jajodia, A Shah, H Cam ACM Transactions on Intelligent Systems and Technology (TIST) 8 (1), 1-21, 2016 | 61 | 2016 |
A reinforcement learning approach for rebalancing electric vehicle sharing systems A Bogyrbayeva, S Jang, A Shah, YJ Jang, C Kwon IEEE Transactions on Intelligent Transportation Systems 23 (7), 8704-8714, 2021 | 33 | 2021 |
A methodology to measure and monitor level of operational effectiveness of a CSOC A Shah, R Ganesan, S Jajodia, H Cam International Journal of Information Security 17 (2), 121-134, 2018 | 30 | 2018 |
Detecting Stealthy Botnets in a Resource-Constrained Environment Using Reinforcement Learning S Venkatesan, M Albanese, A Shah, R Ganesan, S Jajodia Proceedings of the 4th ACM Workshop on Moving Target Defense, 75-85, 2017 | 30 | 2017 |
Understanding tradeoffs between throughput, quality, and cost of alert analysis in a csoc A Shah, R Ganesan, S Jajodia, H Cam IEEE Transactions on Information Forensics and Security 14 (5), 1155-1170, 2018 | 26 | 2018 |
Towards optimal foreign object debris detection in an airport environment M Noroozi, A Shah Expert Systems with Applications 213, 118829, 2023 | 22 | 2023 |
Vulnerability selection for remediation: An empirical analysis A Shah, KA Farris, R Ganesan, S Jajodia The Journal of Defense Modeling and Simulation 19 (1), 13-22, 2022 | 14 | 2022 |
A methodology for ensuring fair allocation of CSOC effort for alert investigation A Shah, R Ganesan, S Jajodia International Journal of Information Security 18, 199-218, 2019 | 14 | 2019 |
Dynamic optimization of the level of operational effectiveness of a CSOC under adverse conditions A Shah, R Ganesan, S Jajodia, H Cam ACM Transactions on Intelligent Systems and Technology (TIST) 9 (5), 1-20, 2018 | 14 | 2018 |
Optimal assignment of sensors to analysts in a cybersecurity operations center A Shah, R Ganesan, S Jajodia, H Cam IEEE Systems Journal 13 (1), 1060-1071, 2018 | 11 | 2018 |
A two-step approach to optimal selection of alerts for investigation in a CSOC A Shah, R Ganesan, S Jajodia, H Cam IEEE Transactions on Information Forensics and Security 14 (7), 1857-1870, 2018 | 10 | 2018 |
A Novel Team Formation Framework based on Performance in a Cybersecurity Operations Center A Shah, R Ganesan, S Jajodia, H Cam, S Hutchinson IEEE Transactions on Services Computing, 2023 | 9 | 2023 |
A strategy for effective alert analysis at a cyber security operations center R Ganesan, A Shah From Database to Cyber Security: Essays Dedicated to Sushil Jajodia on the …, 2018 | 9 | 2018 |
Deep VULMAN: A deep reinforcement learning-enabled cyber vulnerability management framework S Hore, A Shah, ND Bastian Expert Systems with Applications 221, 119734, 2023 | 8 | 2023 |
An outsourcing model for alert analysis in a cybersecurity operations center A Shah, R Ganesan, S Jajodia, H Cam ACM Transactions on the Web (TWEB) 14 (1), 1-22, 2020 | 8 | 2020 |
Adaptive reallocation of cybersecurity analysts to sensors for balancing risk between sensors A Shah, R Ganesan, S Jajodia, H Cam Service Oriented Computing and Applications 12, 123-135, 2018 | 8 | 2018 |
Towards optimal triage and mitigation of context-sensitive cyber vulnerabilities S Hore, F Moomtaheen, A Shah, X Ou IEEE Transactions on Dependable and Secure Computing 20 (2), 1270-1285, 2022 | 7 | 2022 |
Optimizing alert data management processes at a cyber security operations center R Ganesan, A Shah, S Jajodia, H Cam Adversarial and Uncertain Reasoning for Adaptive Cyber Defense: Control-and …, 2019 | 7 | 2019 |
A novel metric for measuring operational effectiveness of a cybersecurity operations center L Wang, S Jajodia, A Singhal, R Ganesan, A Shah, S Jajodia, H Cam Network Security Metrics, 177-207, 2017 | 7 | 2017 |