no code implementations • 12 Feb 2024 • Nowfel Mashnoor, Jay Thom, Abdur Rouf, Shamik Sengupta, Batyr Charyyev
Network traffic fingerprinting is a crucial technique for identifying devices and detecting anomalies.
no code implementations • 11 Oct 2023 • Lochana Telugu Rajesh, Tapadhir Das, Raj Mani Shukla, Shamik Sengupta
The rapid growth in Internet of Things (IoT) technology has become an integral part of today's industries forming the Industrial IoT (IIoT) initiative, where industries are leveraging IoT to improve communication and connectivity via emerging solutions like data analytics and cloud computing.
no code implementations • 24 Jul 2023 • Suman Rath, Subham Sahoo, Shamik Sengupta
Cyber-physical microgrids are vulnerable to stealth attacks that can degrade their stability and operability by performing low-magnitude manipulations in a coordinated manner.
no code implementations • 3 Jun 2021 • Farhan Sadique, Ignacio Astaburuaga, Raghav Kaul, Shamik Sengupta, Shahriar Badsha, James Schnebly, Adam Cassell, Jeff Springer, Nancy Latourrette, Sergiu M. Dascalu
We have further developed a universal Threat Data Query Language (TDQL).
no code implementations • 29 Jan 2021 • Abdelrahman Eldosouky, Tapadhir Das, Anuraag Kotra, Shamik Sengupta
In the first level, a game-theoretic model is proposed to enable sharing organizations to optimally select their anonymization levels for k-anonymization under two potential attacks: background-knowledge attack and homogeneity attack.
Computer Science and Game Theory Cryptography and Security
1 code implementation • 10 Jan 2021 • Narayan Bhusal, Raj Mani Shukla, Mukesh Gautam, Mohammed Benidris, Shamik Sengupta
Appropriate PSSE approaches are required to avoid pitfalls of the WLS-based PSSE computations for accurate prediction of operating conditions.