Sajjan Shiva
Sajjan Shiva
Professor of Computer Science, University of Memphis
Verified email at - Homepage
Cited by
Cited by
A survey of game theory as applied to network security
S Roy, C Ellis, S Shiva, D Dasgupta, V Shandilya, Q Wu
2010 43rd Hawaii International Conference on System Sciences, 1-10, 2010
Comparative analysis of decision tree classification algorithms
A Priyam, GR Abhijeeta, A Rathee, S Srivastava
International Journal of current engineering and technology 3 (2), 334-337, 2013
AVOIDIT: A cyber attack taxonomy
C Simmons, C Ellis, S Shiva, D Dasgupta, Q Wu
University of Memphis, Technical Report CS-09-003, 2009
Security and privacy in the internet of medical things: taxonomy and risk assessment
F Alsubaei, A Abuhussein, S Shiva
2017 IEEE 42nd conference on local computer networks workshops (LCN …, 2017
Computer organization, design, and architecture
SG Shiva
CRC Press, 2007
Game theory for cyber security
S Shiva, S Roy, D Dasgupta
Proceedings of the Sixth Annual Workshop on Cyber Security and Information …, 2010
IoMT-SAF: Internet of medical things security assessment framework
F Alsubaei, A Abuhussein, V Shandilya, S Shiva
Internet of Things 8, 100123, 2019
Use of attack graphs in security systems
V Shandilya, CB Simmons, S Shiva
Journal of Computer Networks and Communications 2014, 2014
On modeling and simulation of game theory-based defense mechanisms against DoS and DDoS attacks
Q Wu, S Shiva, S Roy, C Ellis, V Datla
Proceedings of the 2010 spring simulation multiconference, 1-8, 2010
Software reuse: Research and practice
SG Shiva, L Abou Shala
Fourth International Conference on Information Technology (ITNG'07), 603-609, 2007
Game theory-based defense mechanisms against DDoS attacks on TCP/TCP-friendly flows
HS Bedi, S Roy, S Shiva
2011 IEEE symposium on computational intelligence in cyber security (CICS …, 2011
Securing cloud infrastructure against co-resident DoS attacks using game theoretic defense mechanisms
HS Bedi, S Shiva
Proceedings of the international conference on advances in computing …, 2012
DDoS intrusion detection through machine learning ensemble
S Das, AM Mahfouz, D Venugopal, S Shiva
2019 IEEE 19th international conference on software Quality, Reliability and …, 2019
Evaluating security and privacy in cloud computing services: A Stakeholder's perspective
A Abuhussein, H Bedi, S Shiva
2012 international conference for internet technology and secured …, 2012
Introduction to logic design
SG Shiva
CRC Press, 2018
Automatic hardware synthesis
SG Shiva
Proceedings of the IEEE 71 (1), 76-87, 1983
Computer hardware description languages—A tutorial
SG Shiva
Proceedings of the IEEE 67 (12), 1605-1615, 1979
Pipelined and Parallel Computer Architecture
SG Shiva
Addison-Wesley Longman Publishing Co., Inc., 1997
Towards an effective crowdsourcing recommendation system: A survey of the state-of-the-art
E Aldhahri, V Shandilya, S Shiva
2015 IEEE Symposium on Service-Oriented System Engineering, 372-377, 2015
Detecting stealthy false data injection attacks in the smart grid using ensemble-based machine learning
M Ashrafuzzaman, S Das, Y Chakhchoukh, S Shiva, FT Sheldon
Computers & Security 97, 101994, 2020
The system can't perform the operation now. Try again later.
Articles 1–20