Sathya Chandran Sundaramurthy
Sathya Chandran Sundaramurthy
Bestätigte E-Mail-Adresse bei - Startseite
Zitiert von
Zitiert von
A human capital model for mitigating security analyst burnout
SC Sundaramurthy, AG Bardas, J Case, X Ou, M Wesch, J McHugh, ...
Eleventh symposium on usable privacy and security (SOUPS 2015), 347-359, 2015
Experimental study of fuzzy hashing in malware clustering analysis
Y Li, SC Sundaramurthy, AG Bardas, X Ou, D Caragea, X Hu, J Jang
8th workshop on cyber security experimentation and test (cset 15), 2015
Turning contradictions into innovations or: How we learned to stop whining and improve security operations
SC Sundaramurthy, J McHugh, X Ou, M Wesch, AG Bardas, ...
Twelfth Symposium on Usable Privacy and Security (SOUPS 2016), 237-251, 2016
Prioritizing intrusion analysis using Dempster-Shafer theory
L Zomlot, SC Sundaramurthy, K Luo, X Ou, SR Rajagopalan
Proceedings of the 4th ACM workshop on Security and artificial intelligence …, 2011
A tale of three security operation centers
SC Sundaramurthy, J Case, T Truong, L Zomlot, M Hoffmann
Proceedings of the 2014 ACM workshop on security information workers, 43-50, 2014
An anthropological approach to studying CSIRTs
SC Sundaramurthy, J McHugh, XS Ou, SR Rajagopalan, M Wesch
IEEE Security & Privacy 12 (5), 52-60, 2014
MTD CBITS: Moving target defense for cloud-based IT systems
AG Bardas, SC Sundaramurthy, X Ou, SA DeLoach
Computer Security–ESORICS 2017: 22nd European Symposium on Research in …, 2017
Aiding intrusion analysis using machine learning
L Zomlot, S Chandran, D Caragea, X Ou
2013 12th International Conference on Machine Learning and Applications 2, 40-47, 2013
Practical IDS alert correlation in the face of dynamic threats
SC Sundaramurthy, L Zomlot, X Ou
Proceedings of the International Conference on Security and Management (SAM), 1, 2011
Humans are dynamic-our tools should be too
SC Sundaramurthy, M Wesch, X Ou, J McHugh, SR Rajagopalan, ...
IEEE Internet Computing 21 (3), 40-46, 2017
Classification of UDP Traffic for DDoS Detection.
AG Bardas, L Zomlot, SC Sundaramurthy, X Ou, SR Rajagopalan, ...
LEET, 2012
Deploying android security updates: an extensive study involving manufacturers, carriers, and end users
KR Jones, TF Yen, SC Sundaramurthy, AG Bardas
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
Humans are dynamic. Our tools should be too. Innovations from the Anthropological Study of Security Operations Centers
SC Sundaramurthy, M Wesch, X Ou, J McHugh, SR Rajagopalan, ...
IEEE Internet Computing, 2017
Examining intrusion prevention system events from worldwide networks
SC Sundaramurthy, S Bhatt, MR Eisenbarth
Proceedings of the 2012 ACM workshop on building analysis datasets and …, 2012
An anthropological study of security operations centers to improve operational efficiency
SC Sundaramurthy
University of South Florida, 2017
An empirical study on current models for reasoning about digital evidence
S Nagy, I Palmer, SC Sundaramurthy, X Ou, R Campbell
10th International Conference on Systematic Approaches to Digital Forensic …, 2015
Examining Intrusion Prevention System Events from Worldwide Networks
SS Chandran, B Sandeep, RM Eisenbarth
BADGERS’12, 2012
Designing forensic analysis techniques through anthropology
SC Sundaramurthy
Proceedings of the 2013 New Security Paradigms Workshop, 119-120, 2013
The role of processes in security operations centers
S Bhatt, W Horne, S Sundaramurthy, L Zomlot
Psychosocial dynamics of cyber security, 86-103, 2016
Investigative response modeling and predictive data collection
D Moor, SR Rajagopalan, SC Sundaramurthy, X Ou
2012 eCrime Researchers Summit, 1-6, 2012
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20