2008 |
9 | EE | Duc T. Ha,
Hung Q. Ngo,
Madhusudhanan Chandrasekaran:
CRESTBOT: A New Family of Resilient Botnets.
GLOBECOM 2008: 2148-2153 |
8 | EE | Madhusudhanan Chandrasekaran,
Vidyaraman Sankaranarayanan,
Shambhu J. Upadhyaya:
Inferring Sources of Leaks in Document Management Systems.
IFIP Int. Conf. Digital Forensics 2008: 291-306 |
7 | EE | Mohammad Iftekhar Husain,
Shambhu J. Upadhyaya,
Madhusudhanan Chandrasekaran:
A Novel Approach for Security and Robustness in Wireless Embedded Systems.
SEUS 2008: 323-335 |
2007 |
6 | EE | Madhusudhanan Chandrasekaran,
Mukarram Baig,
Shambhu J. Upadhyaya:
AEGIS: A Proactive Methodology to Shield against Zero-Day Exploits.
AINA Workshops (2) 2007: 556-563 |
5 | EE | Vidyaraman Sankaranarayanan,
Madhusudhanan Chandrasekaran,
Shambhu J. Upadhyaya:
Towards Modeling Trust Based Decisions: A Game Theoretic Approach.
ESORICS 2007: 485-500 |
4 | EE | Madhusudhanan Chandrasekaran,
Vidyaraman Vidyaraman,
Shambhu J. Upadhyaya:
SpyCon: Emulating User Activities to Detect Evasive Spyware.
IPCCC 2007: 502-509 |
2006 |
3 | EE | Madhusudhanan Chandrasekaran,
Mukarram Baig,
Shambhu J. Upadhyaya:
AVARE: aggregated vulnerability assessment and response against zero-day exploits.
IPCCC 2006 |
2 | EE | Madhusudhanan Chandrasekaran,
Ramkumar Chinchani,
Shambhu J. Upadhyaya:
PHONEY: Mimicking User Response to Detect Phishing Attacks.
WOWMOM 2006: 668-672 |
2004 |
1 | EE | Ramkumar Chinchani,
Aarthie Muthukrishnan,
Madhusudhanan Chandrasekaran,
Shambhu J. Upadhyaya:
RACOON: Rapidly Generating User Command Data For Anomaly Detection From Customizable Templates.
ACSAC 2004: 189-204 |