Santosh Aditham
Santosh Aditham
Macys
Verified email at mail.usf.edu - Homepage
Title
Cited by
Cited by
Year
A system architecture for the detection of insider attacks in big data systems
S Aditham, N Ranganathan
IEEE Transactions on Dependable and Secure Computing 15 (6), 974-987, 2017
182017
A novel framework for mitigating insider attacks in big data systems
S Aditham, N Ranganathan
2015 IEEE International Conference on Big Data (Big Data), 1876-1885, 2015
132015
LSTM-based memory profiling for predicting data attacks in distributed big data systems
S Aditham, N Ranganathan, S Katkoori
2017 IEEE International Parallel and Distributed Processing Symposium …, 2017
92017
Applications of Sequence to Sequence Models for Technical Support Automation
G Aalipour, P Kumar, S Aditham, T Nguyen, A Sood
2018 IEEE International Conference on Big Data (Big Data), 4861 - 4869, 2018
52018
Systems and methods for detecting attacks in big data systems
SK ADITHAM, N Ranganathan
WO Patent App. PCT/US2017/033,769, 2017
42017
Detecting threats in big data platforms based on call trace and memory access patterns
SK Aditham, N Ranganathan
US Patent 10,678,907, 2020
32020
Memory access pattern based insider threat detection in big data systems
S Aditham, N Ranganathan, S Katkoori
2016 IEEE International Conference on Big Data (Big Data), 3625 - 3628, 2016
32016
A Novel Control-flow based Intrusion Detection Technique for Big Data Systems
S Aditham, N Ranganathan
The 3rd International Conference on Advances in Big Data Analytics (ABDA), 45-51, 2016
32016
Call trace and memory access pattern based runtime insider threat detection for big data platforms
S Aditham, N Ranganathan, S Katkoori
arXiv preprint arXiv:1611.07392, 2016
22016
Mitigation of Insider Attacks for Data Security in Distributed Computing Environments
S Aditham
2017
An energy-aware scheduling heuristic for distributed systems using non-cooperative games
S Aditham, N Ranganathan
2015 Sixth International Green and Sustainable Computing Conference (IGSC), 1-6, 2015
2015
2018 Index IEEE Transactions on Dependable and Secure Computing Vol. 15
A Abbas, S Aditham, G Ahn, NZ Aitzhan, M Al-Qurishi, A Alamri, ...
The system can't perform the operation now. Try again later.
Articles 1–12