Follow
Shridatt Sugrim
Title
Cited by
Cited by
Year
User-generated free-form gestures for authentication: Security and memorability
M Sherman, G Clark, Y Yang, S Sugrim, A Modig, J Lindqvist, A Oulasvirta, ...
Proceedings of the 12th annual international conference on Mobile systems …, 2014
1422014
Elastic pathing: Your speed is enough to track you
X Gao, B Firner, S Sugrim, V Kaiser-Pendergrast, Y Yang, J Lindqvist
Proceedings of the 2014 ACM International Joint Conference on Pervasive and …, 2014
1002014
Cyber deception: Virtual networks to defend insider reconnaissance
S Achleitner, T La Porta, P McDaniel, S Sugrim, SV Krishnamurthy, ...
Proceedings of the 8th ACM CCS international workshop on managing insider …, 2016
952016
Deceiving network reconnaissance using SDN-based virtual topologies
S Achleitner, TF La Porta, P McDaniel, S Sugrim, SV Krishnamurthy, ...
IEEE Transactions on Network and Service Management 14 (4), 1098-1112, 2017
812017
Simulations in cyber-security: a review of cognitive modeling of network attackers, defenders, and users
VD Veksler, N Buchler, BE Hoffman, DN Cassenti, C Sample, S Sugrim
Frontiers in psychology 9, 324295, 2018
602018
Cybervan: A cyber security virtual assured network testbed
R Chadha, T Bowen, CYJ Chiang, YM Gottlieb, A Poylisher, A Sapello, ...
MILCOM 2016-2016 IEEE Military Communications Conference, 1125-1130, 2016
582016
ACyDS: An adaptive cyber deception system
CYJ Chiang, YM Gottlieb, SJ Sugrim, R Chadha, C Serban, A Poylisher, ...
MILCOM 2016-2016 IEEE Military Communications Conference, 800-805, 2016
502016
Robust performance metrics for authentication systems
S Sugrim, C Liu, M McLean, J Lindqvist
Network and Distributed Systems Security (NDSS) Symposium 2019, 2019
392019
On defensive cyber deception: A case study using SDN
CYJ Chiang, S Venkatesan, S Sugrim, JA Youzwak, R Chadha, EI Colbert, ...
MILCOM 2018-2018 IEEE Military Communications Conference (MILCOM), 110-115, 2018
202018
Measuring the effectiveness of network deception
S Sugrim, S Venkatesan, JA Youzwak, CYJ Chiang, R Chadha, ...
2018 IEEE international conference on Intelligence and Security Informatics …, 2018
162018
Enablers of adversarial attacks in machine learning
R Izmailov, S Sugrim, R Chadha, P McDaniel, A Swami
MILCOM 2018-2018 IEEE Military Communications Conference (MILCOM), 425-430, 2018
132018
On detecting manifestation of adversary characteristics
S Venkatesan, S Sugrim, R Izmailov, CYJ Chiang, R Chadha, B Doshi, ...
MILCOM 2018-2018 IEEE military communications conference (MILCOM), 431-437, 2018
132018
Recruit until it fails: Exploring performance limits for identification systems
S Sugrim, C Liu, J Lindqvist
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous …, 2019
112019
AutoGAN: Robust classifier against adversarial attacks
B Lindqvist, S Sugrim, R Izmailov
arXiv preprint arXiv:1812.03405, 2018
62018
Noise power and SNR estimation based on the preamble in tri-sectored OFDM systems
HS Park, S Sugrim, P Spasojevic, YO Park
2011 IEEE 73rd Vehicular Technology Conference (VTC Spring), 1-5, 2011
52011
Combinatorial boosting of classifiers for moving target defense against adversarial evasion attacks
R Izmailov, P Lin, S Venkatesan, S Sugrim
Proceedings of the 8th ACM Workshop on Moving Target Defense, 13-21, 2021
42021
Vulnervan: A vulnerable network generation tool
S Venkatesan, JA Youzwak, S Sugrim, CYJ Chiang, A Poylisher, ...
MILCOM 2019-2019 IEEE Military Communications Conference (MILCOM), 1-6, 2019
42019
Elastic pathing: Your speed is enough to track you
B Firner, S Sugrim, Y Yang, J Lindqvist
arXiv preprint arXiv:1401.0052, 2013
42013
Transforming Speed Sequences into Road Rays on the Map with Elastic Pathing
X Gao, B Firner, S Sugrim, V Kaiser-Pendergrast, Y Yang, J Lindqvist
arXiv preprint arXiv:1710.06932, 2017
22017
VulnerVAN: Automating the Generation of Vulnerable Network Scenarios for Cybersecurity Events and Training Exercises
S Venkatesan, JA Youzwak, CYJ Chiang, S Sugrim, A Poylisher, ...
Section: Technical Reports, 2021
12021
The system can't perform the operation now. Try again later.
Articles 1–20