Search Results for author: Shaswata Mitra

Found 8 papers, 2 papers with code

LOCALINTEL: Generating Organizational Threat Intelligence from Global and Local Cyber Knowledge

no code implementations18 Jan 2024 Shaswata Mitra, Subash Neupane, Trisha Chakraborty, Sudip Mittal, Aritran Piplai, Manas Gaur, Shahram Rahimi

In this work, we present LOCALINTEL, a novel automated knowledge contextualization system that, upon prompting, retrieves threat reports from the global threat repositories and uses its local knowledge database to contextualize them for a specific organization.

Retrieval

Use of Graph Neural Networks in Aiding Defensive Cyber Operations

no code implementations11 Jan 2024 Shaswata Mitra, Trisha Chakraborty, Subash Neupane, Aritran Piplai, Sudip Mittal

In an increasingly interconnected world, where information is the lifeblood of modern society, regular cyber-attacks sabotage the confidentiality, integrity, and availability of digital systems and information.

Security Considerations in AI-Robotics: A Survey of Current Methods, Challenges, and Opportunities

no code implementations12 Oct 2023 Subash Neupane, Shaswata Mitra, Ivan A. Fernandez, Swayamjit Saha, Sudip Mittal, Jingdao Chen, Nisha Pillai, Shahram Rahimi

Motivated by the need to address the security concerns in AI-Robotics systems, this paper presents a comprehensive survey and taxonomy across three dimensions: attack surfaces, ethical and legal concerns, and Human-Robot Interaction (HRI) security.

URA*: Uncertainty-aware Path Planning using Image-based Aerial-to-Ground Traversability Estimation for Off-road Environments

1 code implementation15 Sep 2023 Charles Moore, Shaswata Mitra, Nisha Pillai, Marc Moore, Sudip Mittal, Cindy Bethel, Jingdao Chen

Results show that the proposed image segmentation and planning methods outperform conventional planning algorithms in terms of the quality and feasibility of the initial path, as well as the quality of replanned paths.

Autonomous Navigation Image Segmentation +2

Survey of Malware Analysis through Control Flow Graph using Machine Learning

no code implementations15 May 2023 Shaswata Mitra, Stephen A. Torri, Sudip Mittal

Malware is a significant threat to the security of computer systems and networks which requires sophisticated techniques to analyze the behavior and functionality for detection.

Malware Analysis Malware Detection

CAPoW: Context-Aware AI-Assisted Proof of Work based DDoS Defense

no code implementations27 Jan 2023 Trisha Chakraborty, Shaswata Mitra, Sudip Mittal

Critical servers can be secured against distributed denial of service (DDoS) attacks using proof of work (PoW) systems assisted by an Artificial Intelligence (AI) that learns contextual network request patterns.

A Policy Driven AI-Assisted PoW Framework

1 code implementation21 Mar 2022 Trisha Chakraborty, Shaswata Mitra, Sudip Mittal, Maxwell Young

Proof of Work (PoW) based cyberdefense systems require incoming network requests to expend effort solving an arbitrary mathematical puzzle.

Cannot find the paper you are looking for? You can Submit a new open access paper.