Follow
Sudip Mittal
Title
Cited by
Cited by
Year
Security and privacy in smart farming: Challenges and opportunities
M Gupta, M Abdelsalam, S Khorsandroo, S Mittal
IEEE Access 8, 34564-34584, 2020
2292020
Cybertwitter: Using twitter to generate alerts for cybersecurity threats and vulnerabilities
S Mittal, PK Das, V Mulwad, A Joshi, T Finin
2016 IEEE/ACM International Conference on Advances in Social Networks …, 2016
1822016
Enabling and enforcing social distancing measures using smart city and its infrastructures: a COVID-19 Use case
M Gupta, M Abdelsalam, S Mittal
arXiv preprint arXiv:2004.09246, 2020
1012020
OBD_SecureAlert: An anomaly detection system for vehicles
SN Narayanan, S Mittal, A Joshi
2016 IEEE International Conference on Smart Computing (SMARTCOMP), 1-6, 2016
892016
Generating digital twin models using knowledge graphs for industrial production lines
A Banerjee, R Dalal, S Mittal, KP Joshi
9th International ACM Web Science Conference 2017 - Industrial Knowledge Graphs, 2017
752017
RelExt: Relation Extraction using Deep Learning approaches for Cybersecurity Knowledge Graph Improvement
A Pingle, A Piplai, S Mittal, A Joshi, J Holt, R Zak
International Conference on Advances in Social Networks Analysis and Mining …, 2019
622019
Anomaly detection models for smart home security
S Ramapatruni, SN Narayanan, S Mittal, A Joshi, K Joshi
2019 IEEE 5th Intl Conference on Big Data Security on Cloud (BigDataSecurity …, 2019
542019
Using data analytics to detect anomalous states in vehicles
SN Narayanan, S Mittal, A Joshi
arXiv preprint arXiv:1512.08048, 2015
492015
Cyber attacks on smart farming infrastructure
S Sontowski, M Gupta, SSL Chukkapalli, M Abdelsalam, S Mittal, A Joshi, ...
6th IEEE International Conference on Collaboration and Internet Computing …, 2020
442020
Ontologies and artificial intelligence systems for the cooperative smart farming ecosystem
SSL Chukkapalli, S Mittal, M Gupta, M Abdelsalam, A Joshi, R Sandhu, ...
Ieee Access 8, 164045-164064, 2020
442020
Creating cybersecurity knowledge graphs from malware after action reports
A Piplai, S Mittal, A Joshi, T Finin, J Holt, R Zak
IEEE Access 2020, 2020
432020
Thinking, fast and slow: Combining vector spaces and knowledge graphs
S Mittal, A Joshi, T Finin
arXiv preprint arXiv:1708.03310, 2017
422017
The pin-bang theory: Discovering the pinterest world
S Mittal, N Gupta, P Dewan, P Kumaraguru
arXiv preprint arXiv:1307.4952, 2013
422013
Cyber-all-intel: An ai for security related threat intelligence
S Mittal, A Joshi, T Finin
arXiv preprint arXiv:1905.02895, 2019
392019
Semantic approach to automating management of big data privacy policies
KP Joshi, A Gupta, S Mittal, C Pearce, A Joshi, T Finin
2016 IEEE International Conference on Big Data (Big Data), 482-491, 2016
362016
Automatic extraction of metrics from slas for cloud service management
S Mittal, KP Joshi, C Pearce, A Joshi
2016 IEEE International Conference on Cloud Engineering (IC2E), 139-142, 2016
362016
Preventing poisoning attacks on AI based threat intelligence systems
N Khurana, S Mittal, A Piplai, A Joshi
2019 IEEE 29th Machine Learning for Signal Processing (MLSP), 1-6, 2019
322019
Analyzing CNN Based Behavioural Malware Detection Techniques on Cloud IaaS
A McDole, M Abdelsalam, M Gupta, S Mittal
CLOUD 2020, 2020
312020
Mining Threat Intelligence about Open-Source Projects and Libraries from Code Repository Issues and Bug Reports
L Neil, S Mittal, A Joshi
IEEE Intelligence and Security Informatics (IEEE ISI) 2018, 2018
242018
Deep Learning Techniques for Behavioural Malware Analysis in Cloud IaaS
A McDole, M Gupta, M Abdelsalam, S Mittal, M Alazab
Malware Analysis using Artificial Intelligence and Deep Learning, 2021
232021
The system can't perform the operation now. Try again later.
Articles 1–20