Search filters

Authors whose works are in public domain in at least one jurisdiction

List of works by Sachin Shetty

A Hidden Markov Model based approach to detect Rogue Access Points

A Markov Game Theoritic Approach for Power Grid Security

A Reliable Data Provenance and Privacy Preservation Architecture for Business-Driven Cyber-Physical Systems Using Blockchain

journal article from 'International Journal of Information Security and Privacy (IJISP)' published in 2018

A Reputation-Based Coalition Game to Prevent Smart Insider Jamming Attacks in MANETs

A Security Framework for SDN-Enabled Smart Power Grids

article published in 2017

A Testbed Using USRP(TM) and LabView(R) for Dynamic Spectrum Access in Cognitive Radio Networks

article published in 2015

A testbed for modeling and detecting attacks on NFC enabled mobile devices

Accumulative feedback adaptation transmission rate in mobile ad-hoc networks

article

Achievable Rate and Outage Probability of Cognitive Radio with Finite-Alphabet Inputs under Imperfect Spectrum Sensing

Achievable rates and outage probability of cognitive radio with dynamic frequency hopping under imperfect spectrum sensing

An Overview of Cognitive Radio Networks

An SDN Based Framework for Guaranteeing Security and Performance in Information-Centric Cloud Networks

An integrated machine learning and control theoretic model for mining concept-drifting data streams

scholarly article published November 2011

Analysis of Stepping Stone Attacks in Dynamic Vulnerability Graphs

Assessing network path vulnerabilities for secure cloud computing

scholarly article published June 2012

Attack Surface Expansion Using Decoys to Protect Virtualized Infrastructure

Auditing and Analysis of Network Traffic in Cloud Environment

Auditing and analysis of network traffic in cloud environment

Cloud Computing Based Cognitive Radio Networking

scholarly article

Cloud-Integrated Geolocation-Aware Dynamic Spectrum Access

Cloud-assisted GPS-driven dynamic spectrum access in cognitive radio vehicular networks for transportation cyber physical systems

Cloud-assisted dynamic spectrum access for VANET in transportation cyber-physical systems

Coexistence of IEEE 802.11b and Bluetooth: An Integrated Performance Analysis

Cognitive Radio: Primary User Emulation Attacks and Remedies

Colluding Jamming Attack on a Grand Coalition by Aggrieved Nodes

Consensus protocols for blockchain-based data provenance: Challenges and opportunities

Cross layer attacks on GSM mobile networks using software defined radios

scholarly article published January 2017

Cross-Layered Security Approach with Compromised Nodes Detection in Cooperative Sensor Networks

Data Mining of Bayesian Network Structure Using a Semantic Genetic Algorithm-Based Approach

Data Mining of Bayesian Network Structure Using a Semantic Genetic Algorithm-Based Approach

Data Mining of Bayesian Network Structure Using a Semantic Genetic Algorithm-Based Approach

Data provenance assurance in the cloud using blockchain

Design and Performance Evaluation of a Biometric Iris Verification System

Detecting Compromised Nodes in Wireless Sensor Networks

Detecting and Mitigating Smart Insider Jamming Attacks in MANETs Using Reputation-Based Coalition Game

Development of an integrated network visualisation and graph analysis tool for biological networks.

scientific article published on 31 July 2012

Development of information fusion model for layered sensing systems using computing with words

article

Diversity Modeling to Evaluate Security of Multiple SDN Controllers

scholarly article published March 2018

Dynamic Spectrum Access for Wireless Networks

Empowering students with engineering literacy and problem-solving through interactive virtual reality games

Enabling security-aware virtual machine placement in IaaS clouds

Enhanced learning classifier to locate data in cloud data centres

Enhanced learning classifier to locate data in cloud datacenters

Enhancing connectivity for spectrum-agile Vehicular Ad hoc NETworks in fading channels

article published in 2014

Enhancing the classification accuracy of IP geolocation

Fair and Smooth Scheduling for Virtual Output Queuing Switches Achieving 100% Throughput

Feature-based transfer learning for network security

Game Theoretic Cloud-Assisted Opportunistic Spectrum Access in Cognitive Radio Networks

Game Theoretic Dynamic Spectrum Access in Cloud-Based Cognitive Radio Networks

Game theoretic approach to dynamic spectrum access with multi-radio and QoS requirements

Generalized stochastic Petri Net model based security risk assessment of software defined networks

Generation of Labelled Datasets to Quantify the Impact of Security Threats to Cloud Data Centers

Geolocation-aware resource management in cloud computing-based cognitive radio networks

scholarly article published 2014

Hierarchical Random Graph Based Network Diversity Modeling for the Cloud

Hoeffding Tree Algorithms for Anomaly Detection in Streaming Datasets: A Survey

Integrating blockchain for data sharing and collaboration in mobile healthcare applications

journal article published in 2017

LDAKM-EIoT: Lightweight Device Authentication and Key Management Mechanism for Edge-Based IoT Deployment

scientific article published on 14 December 2019

Man in the Cloud (MITC) Defender: SGX-Based User Credential Protection for Synchronization Applications in Cloud Computing Platform

scholarly article published June 2017

Mining Concept Drifting Network Traffic in Cloud Computing Environments

scholarly article published May 2012

Model-based resilient control for a multi-agent system against Denial of Service attacks

Modeling Cost of Countermeasures in Software Defined Networking-enabled Energy Delivery Systems

Modeling decision uncertainties in total situation awareness using cloud computation theory

article published in 2011

Moving Target Defense for Distributed Systems

Moving Target Defense in Distributed Systems

Network Aware VM Migration in Cloud Data Centers

On Secrecy Rate and Optimal Power Allocation of the Full-Duplex Amplify-and-Forward Relay Wire-Tap Channel

Optimizing Network-Aware Resource Allocation in Cloud Data Centers

PLL Based Time Synchronization in Wireless Sensor Networks

POSTER: Toward Energy-Wasting Misbehavior Detection Platform with Privacy Preservation in Building Energy Use

Physical layer security in wireless cooperative relay networks: state of the art and beyond

article

Planning and Assessment of a Workshop on Undergraduate Education in Biometric Systems

Polarized beamforming for enhanced countermeasure of wireless jamming attacks

Polarized beamforming for near-field wireless jamming attacks mitigation

ProvChain: A Blockchain-Based Data Provenance Architecture in Cloud Environment with Enhanced Privacy and Availability

scholarly article published May 2017

Reducing Informational Disadvantages to Improve Cyber Risk Management†

Resource Allocation for Cognitive Radio Enabled Vehicular Network Users

Resource Allocation in Spectrum Overlay Cognitive Radio Networks

Resource Allocation in Spectrum Underlay Cognitive Radio Networks

Risk Management Using Cyber-Threat Information Sharing and Cyber-Insurance

Robust beamforming for cognitive radio based vehicular communication

scholarly article published December 2013

Robust cooperative beamforming against steering vector uncertainty in cognitive radio networks

Robust transmit beamforming against steering vector uncertainty in cognitive radio networks

Rogue Access Point Detection by Analyzing Network Traffic Characteristics

RootkitDet: Practical End-to-End Defense against Kernel Rootkits in a Cloud Environment

SCREDENT: Scalable Real-time Anomalies Detection and Notification of Targeted Malware in Mobile Devices

Scalable Network Diversity Modeling For Assessing Threats in Cloud Networks

Scalable detection of web malware on smartphones

Secrecy Rates and Optimal Power Allocation for Full-Duplex Decode-and-Forward Relay Wire-Tap Channels

Secure Radio Resource Management in Cloud Computing Based Cognitive Radio Networks

scholarly article published September 2012

Secured formation control for multi-agent systems under DoS attacks

Security Implications of Blockchain Cloud with Analysis of Block Withholding Attack

Security-Aware Virtual Machine Placement in Cloud Data Center

Software Defined Networking enabled resilience for IEC 61850-based substation communication systems

scholarly article published January 2017

Special issue on information dissemination and new services in P2P systems

Stackelberg-Game-Based Dynamic Spectrum Access in Heterogeneous Wireless Systems

Strong Security Approach with Compromised Nodes Detection in Cognitive Radio Sensor Networks

Survey Toward a Smart Campus Using the Internet of Things

SustainCity - An interactive virtual reality game system

TCP Venoplus — A cross-layer approach to improve TCP performance in wired-cum-wireless networks using signal strength

article

The impact of antenna orientation on wireless sensor network performance

Three Layer Game Theoretic Decision Framework for Cyber-Investment and Cyber-Insurance

Toward a Real-Time Cloud Auditing Paradigm

article

Towards Decentralized Accountability and Self-sovereignty in Healthcare Systems

article

Towards Modeling Attacker’s Opportunity for Improving Cyber Resilience in Energy Delivery Systems

Towards Network-Topology Aware Virtual Machine Placement in Cloud Datacenters

Towards a Network-Aware VM Migration: Evaluating the Cost of VM Migration in Cloud Data Centers

Towards a Trusted and Privacy Preserving Membership Service in Distributed Ledger Using Intel Software Guard Extensions

article by Xueping Liang et al published 2018 in Lecture Notes in Computer Science

Towards a network aware VM migration: Evaluating the cost of VM migration in cloud data centers

Towards data assurance and resilience in IoT using blockchain

journal article published in 2017

Using Hidden Markov Model to detect rogue access points

Virtual sensor tracking using byzantine fault tolerance and predictive outlier model for complex tasks recognition

article

Virtual wired transmission scheme using directional antennas to improve energy efficiency in wireless mobile ad-hoc networks

article

Waiting Probability Analysis for Dynamic Spectrum Access in Cognitive Radio Networks

Waiting probability analysis for opportunistic spectrum access

article published in 2014