What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Anoop Singhal
Google Scholar
17
publications in security and cryptology related venues
Year
Venue
Title
2023
conf/iciss
The Design and Application of a Unified Ontology for Cyber Security.
Khandakar Ashrafi Akbar
Fariha Ishrat Rahman
Anoop Singhal
Latifur Khan
Bhavani Thuraisingham
2023
conf/cns
Security Analysis of Trust on the Controller in the Matter Protocol Specification.
Shashwat Kumar
Francis Hahn
Xinming Ou
Anoop Singhal
2022
conf/iciss
Attacks on ML Systems: From Security Analysis to Attack Mitigation.
Qingtian Zou
Lan Zhang
Anoop Singhal
Xiaoyan Sun
Peng Liu
2021
conf/iciss
Identifying Tactics of Advanced Persistent Threats with Limited Attack Traces.
Khandakar Ashrafi Akbar
Yigong Wang
Md Shihabul Islam
Anoop Singhal
Latifur Khan
Bhavani Thuraisingham
2020
conf/cns
Evolving Advanced Persistent Threat Detection using Provenance Graph and Metric Learning.
Gbadebo Ayoade
Khandakar Ashrafi Akbar
Pracheta Sahoo
Yang Gao
Anmol Agarwal
Kangkook Jee
Latifur Khan
Anoop Singhal
2018
journals/tifs
Using Bayesian Networks for Probabilistic Identification of Zero-Day Attack Paths.
Xiaoyan Sun
Jun Dai
Peng Liu
Anoop Singhal
John Yen
2017
conf/ccs
SafeConfig'17: Applying the Scientific Method to Active Cyber Defense Research.
Nicholas J. Multari
Anoop Singhal
Erin Miller
2017
conf/cns
A layered graphical model for mission attack impact analysis.
Changwei Liu
Anoop Singhal
Duminda Wijesekera
2016
journals/tifs
Network Diversity: A Security Metric for Evaluating the Resilience of Networks Against Zero-Day Attacks.
Mengyuan Zhang
Lingyu Wang
Sushil Jajodia
Anoop Singhal
Massimiliano Albanese
2016
conf/ccs
SafeConfig'16: Testing and Evaluation for Active and Resilient Cyber Systems.
Nicholas J. Multari
Anoop Singhal
David O. Manz
2016
conf/cns
Towards probabilistic identification of zero-day attack paths.
Xiaoyan Sun
Jun Dai
Peng Liu
Anoop Singhal
John Yen
2015
conf/ccs
POSTER: A Logic Based Network Forensics Model for Evidence Analysis.
Anoop Singhal
Changwei Liu
Duminda Wijesekera
2014
conf/esorics
Modeling Network Diversity for Evaluating the Robustness of Networks against Zero-Day Attacks.
Lingyu Wang
Mengyuan Zhang
Sushil Jajodia
Anoop Singhal
Massimiliano Albanese
2010
conf/uss
Fine-grained Sharing of Health Records using XSPA Profile for XACML - An Extended Abstract.
Ahmed A. L. Faresi
Bo Yu
Khalid Moidu
Angelos Stavrou
Duminda Wijesekera
Anoop Singhal
2010
conf/esorics
-Zero Day Safety: Measuring the Security Risk of Networks against Unknown Attacks.
Lingyu Wang
Sushil Jajodia
Anoop Singhal
Steven Noel
2008
conf/ccs
Measuring network security using dynamic bayesian network.
Marcel Frigault
Lingyu Wang
Anoop Singhal
Sushil Jajodia
2007
conf/ccs
Toward measuring network security using attack graphs.
Lingyu Wang
Anoop Singhal
Sushil Jajodia
Coauthors
Ahmed A. L. Faresi
(1)
Angelos Stavrou
(1)
Anmol Agarwal
(1)
Anoop Singhal
(17)
Bhavani Thuraisingham
(2)
Bo Yu
(1)
Changwei Liu
(2)
David O. Manz
(1)
Duminda Wijesekera
(3)
Erin Miller
(1)
Fariha Ishrat Rahman
(1)
Francis Hahn
(1)
Gbadebo Ayoade
(1)
John Yen
(2)
Jun Dai
(2)
Kangkook Jee
(1)
Khalid Moidu
(1)
Khandakar Ashrafi Akbar
(3)
Lan Zhang
(1)
Latifur Khan
(3)
Lingyu Wang
(5)
Marcel Frigault
(1)
Massimiliano Albanese
(2)
Md Shihabul Islam
(1)
Mengyuan Zhang
(2)
Nicholas J. Multari
(2)
Peng Liu
(3)
Pracheta Sahoo
(1)
Qingtian Zou
(1)
Shashwat Kumar
(1)
Steven Noel
(1)
Sushil Jajodia
(5)
Xiaoyan Sun
(3)
Xinming Ou
(1)
Yang Gao
(1)
Yigong Wang
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to