Detecting phishing websites through deep reinforcement learning

M Chatterjee, AS Namin - 2019 IEEE 43rd annual computer …, 2019 - ieeexplore.ieee.org
Phishing is the simplest form of cybercrime with the objective of baiting people into giving
away delicate information such as individually recognizable data, banking and credit card …

RADAR: Data protection in cloud-based computer systems at run time

ZÁ Mann, F Kunz, J Laufer, J Bellendorf… - IEEE …, 2021 - ieeexplore.ieee.org
The protection of confidential data (eg, personal data) is a concern of increasing importance.
Data processing applications are often deployed in cloud or fog/edge computing systems …

Deep reinforcement learning for detecting malicious websites

M Chatterjee, AS Namin - arXiv preprint arXiv:1905.09207, 2019 - arxiv.org
Phishing is the simplest form of cybercrime with the objective of baiting people into giving
away delicate information such as individually recognizable data, banking and credit card …

Compliance Requirements Checking in Variable Environments

S Sartoli, S Ghanavati, AS Namin - 2020 IEEE 44th Annual …, 2020 - ieeexplore.ieee.org
Ensuring compliance with complex privacy related regulations is more challenging in the
presence of changing operating environments, such as cloud based services. This motivates …

Detecting web spams using evidence theory

M Chatterjee, AS Namin - 2018 IEEE 42nd Annual Computer …, 2018 - ieeexplore.ieee.org
Search engines are the major instruments on the Web. The determination of the liability of
the results returned by a typical search engine is a daunting challenge mainly due to the …

Enforcing optimal moving target defense policies

J Zheng, AS Namin - … IEEE 43rd Annual Computer Software and …, 2019 - ieeexplore.ieee.org
This paper introduces an approach based on control theory to model, analyze and select
optimal security policies for Moving Target Defense (MTD) deployment strategies. A Markov …

Modeling adaptive access control policies using answer set programming

S Sartoli, AS Namin - Journal of information security and applications, 2019 - Elsevier
Many of the existing management platforms such as pervasive computing systems
implement policies that depend on dynamic operational environment changes. Existing …

Markov decision process to enforce moving target defence policies

J Zheng, AS Namin - arXiv preprint arXiv:1905.09222, 2019 - arxiv.org
Moving Target Defense (MTD) is an emerging game-changing defense strategy in
cybersecurity with the goal of strengthening defenders and conversely puzzling adversaries …

Cloud: A Platform to Launch Stealth Attacks

M Chatterjee, P Datta, F Abri… - 2020 IEEE 44th …, 2020 - ieeexplore.ieee.org
Cloud computing offers users scalable platforms and low resource cost. At the same time,
the off-site location of the resources of this service model makes it more vulnerable to certain …

[PDF][PDF] RADAR: Data protection in cloud-based computer systems at run time

Z ÁDÁM, F KUNZ, JAN LAUFER, J BELLENDORF… - scholar.archive.org
The protection of confidential data (eg, personal data) is a concern of increasing importance.
Data processing applications are often deployed in cloud or fog/edge computing systems …