Sajal Bhatia
Citée par
Citée par
Parametric Differences Between a Real-world Distributed Denial-of-service Attack and a Flash Event
S Bhatia, G Mohay, A Tickle, E Ahmed
Availability, Reliability and Security (ARES), 2011 Sixth International …, 2011
A framework for generating realistic traffic for Distributed Denial-of-Service attacks and Flash Events
S Bhatia, D Schmidt, G Mohay, A Tickle
computers & security 40, 95-107, 2014
Practical modbus flooding attack and detection
S Bhatia, NS Kush, C Djamaludin, AJ Akande, E Foo
Proceedings of the Twelfth Australasian Information Security Conference …, 2014
Towards a systematic threat modeling approach for cyber-physical systems
G Martins, S Bhatia, X Koutsoukos, K Stouffer, CY Tang, R Candell
2015 Resilience Week (RWS), 1-6, 2015
Use of IP Addresses for High Rate Flooding Attack Detection
E Ahmed, G Mohay, A Tickle, S Bhatia
Security and Privacy–Silver Linings in the Cloud, 124-135, 2010
Distributed denial of service attacks and defense mechanisms: current landscape and future directions
S Bhatia, S Behal, I Ahmed
Versatile Cybersecurity, 55-97, 2018
Ensemble-based model for DDoS attack detection and flash event separation
S Bhatia
2016 Future Technologies Conference (FTC), 958-967, 2016
Ensemble-based DDoS Detection and Mitigation Model
S Bhatia, D Schmidt, G Mohay
Proceedings of the Fifth International Conference on Security of Information …, 2012
Modelling Web-server Flash Events
S Bhatia, G Mohay, D Schmidt, A Tickle
Network Computing and Applications (NCA), 2012 11th IEEE International …, 2012
Detection of DDoS attacks using machine learning algorithms
PS Saini, S Behal, S Bhatia
2020 7th International Conference on Computing for Sustainable Global …, 2020
Fooling the master: Exploiting weaknesses in the Modbus protocol
C Parian, T Guldimann, S Bhatia
Procedia Computer Science 171, 2453-2458, 2020
Assessing and exploiting security vulnerabilities of unmanned aerial vehicles
F Lakew Yihunie, AK Singh, S Bhatia
Smart systems and IoT: innovations in computing, 701-710, 2020
Securing the human: a review of literature on broadening diversity in cybersecurity education
X Mountrouidou, D Vosen, C Kari, MQ Azhar, S Bhatia, G Gagne, ...
Proceedings of the Working Group Reports on Innovation and Technology in …, 2019
Detection and Mitigation of High-rate Flooding Attacks
G Mohay, E Ahmed, S Bhatia, A Nadarajan, B Ravindran, AB Tickle, ...
An Investigation into the Detection and Mitigation of Denial of Service (DoS …, 2011
Detecting distributed Denial-of-Service attacks and Flash Events
S Bhatia
Queensland University of Technology, 2013
Performance evaluation of secure industrial control system design: A railway control system case study
X Koutsoukos, H Neema, G Martins, S Bhatia, J Sztipanovits, K Stouffer, ...
2016 Resilience Week (RWS), 101-108, 2016
I Am'Totally'Human: Bypassing the reCaptcha
SS Brown, N DiBari, S Bhatia
2017 13th International Conference on Signal-Image Technology & Internet …, 2017
Higher education social engineering attack scenario, awareness & training model
T Nguyen, S Bhatia
Journal of The Colloquium for Information Systems Security Education 8 (1), 8-8, 2020
Securing the human: Broadening diversity in cybersecurity
M Azhar, S Bhatia, G Gagne, C Kari, J Maguire, X Mountrouidou, L Tudor, ...
Proceedings of the 2019 ACM Conference on Innovation and Technology in …, 2019
An efficient and reliable lightweight PUF for IoT-based applications
F Amsaad, A Razaque, M Baza, S Kose, S Bhatia, G Srivastava
2021 IEEE international conference on communications workshops (ICC …, 2021
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20