:: Publications ::
-
(Accepted)Das, Saikat, Sajal Saha, Annita Priyoti, Etee Kawna Roy, A. Haque, Frederick Sheldon, and Sajjan Shiva (2021, December)
Network Intrusion Detection and Comparative Analysis using Ensemble Machine Learning and Feature Selection.
In IEEE Transactions on Network and Service Management. IEEE, 2021.
-
Das, Saikat, and Sajjan Shiva (2021, December)
Machine Learning Application Lifecycle Augmented With Explanation and Security.
In 12th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON). IEEE, 2021.
-
Das, Saikat, Namita Agarwal, and Sajjan Shiva (2021, October)
DDoS Explainer using Interpretable Machine Learning.
In 12th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON). IEEE, 2021.
-
Murthy, Bhargavi Krishna and Sajjan Shiva (2021, October)
Double-State-Temporal Difference Learning for Resource Provisioning in Uncertain Fog Computing Environment.
In 12th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON). IEEE, 2021
-
Ashrafuzzaman, Mohammad, Saikat Das, Sajjan Shiva, and Frederick T. Sheldon (2021, March)
Supervised Learning for Detecting Stealthy False Data Injection Attacks in the Smart Grid.
In Advances in Security, Networks, and Internet of Things, pp. 291-305. Springer, Cham, 2021
-
Das, Saikat, Mohammad Ashrafuzzaman, Frederick T. Sheldon, and Sajjan Shiva (2020, December)
Network Intrusion Detection using Natural Language Processing and Ensemble Machine Learning.
In 2020 IEEE Symposium Series on Computational Intelligence (SSCI) (pp. 829-835). IEEE
-
Das, Saikat, Namita Agarwal, Deepak Venugopal, Frederick T. Sheldon and Sajjan Shiva. (2020, December)
Taxonomy and Survey of Interpretable Machine Learning Method.
In 2020 IEEE Symposium Series on Computational Intelligence (SSCI) (pp. 670-677). IEEE
-
Agarwal, Namita and Saikat Das. (2020, December)
Interpretable Machine Learning Tools: A Survey.
In 2020 IEEE Symposium Series on Computational Intelligence (SSCI) (pp. 1528-1534). IEEE.
-
Al-Rousan,Suhaib, Abdullah Abuhussein, Faisal Alsubaei, and Sajjan Shiva. (2020, December)
Ads-Guard: Detecting Scammers in Online Classified Ads.
2020 IEEE Symposium Series on Computational Intelligence. SSCI, 2020
-
Ashrafuzzaman, Mohammad, Saikat Das, Yacine Chakhchoukh, and Frederick T. Sheldon. (2020, December)
Elliptic Envelope Based Detection of Stealthy False Data Injection Attacks in Smart Grid Control Systems.
In 2020 IEEE Symposium Series on Computational Intelligence (SSCI) (pp. 1131-1137). IEEE
- Mahfouz, Ahmed, Abdullah Abuhussein, Deepak Venugopal, and Sajjan Shiva. (2020, October)
Ensemble Classifiers for Network Intrusion Detection Using a Novel Network Attack Dataset
Future Internet 12, no. 11 (2020): 180.
- Al-Rousan, Suhaib, Abdullah Abuhussein, Faisal Alsubaei, Ozkan Kahveci, Hazem Farra, and Sajjan Shiva.
Social-Guard: Detecting Scammers in Online Dating
In 2020 IEEE International Conference on Electro Information Technology (EIT), pp. 416-422. IEEE, 2020.
- Mahfouz, A. M., Abuhussein, A., Venugopal, D., & Shiva, S. G. (2020)
Network Intrusion Detection Model Using One-Class Support Vector Machine
In Advances in Machine Learning and Computational Intelligence (pp. 79-86). Springer, Singapore.
-
Ashrafuzzaman, M., Das, Saikat, Chakhchoukh, Y., Sheldon, F.T., and Shiva, S.
Detecting Stealthy False Data Injection Attacks in the Smart Grid using Ensemble-based Machine Learning
Elsevier Journal of Computers & Security 97 (2020): 101994.
-
Das, Saikat, Deepak Venugopal, Sajjan Shiva, and Frederick T. Sheldon.
Empirical Evaluation of the Ensemble Framework for Feature Selection in DDoS Attack
In 2020 7th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/2020 6th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom), pp. 56-61. IEEE, 2020
-
Ashrafuzzaman, M., Das, Saikat, Chakhchoukh, Y., Sheldon, F.T., and Shiva, S. (2020, July)
Supervised Ensemble Learning for Detecting Stealthy False Data Injection Attacks in the Smart Grid
In Proceedings of the International Conference on Security and Management (SAM). The Steering Committee of The World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp).
-
Das, Saikat, Venugopal, D., & Shiva, S. (2020, March).
A Holistic Approach for Detecting DDoS Attacks by Using Ensemble Unsupervised Machine Learning.
In Future of Information and Communication Conference (pp. 721-738). Springer, Cham.
-
Mahfouz, A.M, Venugopal, D., and Shiva, S.
Comparative Analysis of ML Classifiers for Network Intrusion Detection
in Fourth International Congress on Information and Communication Technology, pp. 193-207. Springer, Singapore, 2020.
-
S. Putta, A. Abuhussein, F. Alsubaei, and S. Shiva
Security Benchmarks for Wearable Medical Things: Stakeholders-Centric Approach
in Fourth International Congress on Information and Communication Technology, pp. 405-418. Springer, Singapore, 2020.
-
A. Abdullah, F. Alsubaei, and S. Shiva
Towards an Effective Requirement Engineering Approach for Cloud Applications
in Software Engineering in the Era of Cloud Computing, pp. 29-50. Springer, Cham, 2020.
-
F. Alsubaei, A. Abuhussein, V. Shandilya, and S. Shiva
IoMT-SAF: Internet of Medical Things Security Assessment Framework
in Internet of Things (2019): 100123.
-
Das, Saikat, Mahfouz, A. M., & Shiva, S. (2019, October).
A Stealth Migration Approach to Moving Target Defense in Cloud Computing.
In Proceedings of the Future Technologies Conference (pp. 394-410). Springer, Cham.
-
Das, Saikat, Mahfouz, A. M., Venugopal, D., & Shiva, S. (2019, July).
DDoS intrusion detection through machine learning ensemble.
In 2019 IEEE 19th International Conference on Software Quality, Reliability and Security Companion (QRS-C) (pp. 471-477). IEEE.
-
F. Alsubaei, A. Abuhussein, and S. Shiva
Ontology-Based Security Recommendation for the Internet of Medical Things
in IEEE Access, vol. 7, no. 1, pp. 48948–48960, 2019.
-
Das, Saikat, & Shiva, S. (2018, December).
CoRuM: collaborative runtime monitor framework for application security.
In 2018 IEEE/ACM International Conference on Utility and Cloud Computing Companion (UCC Companion) (pp. 201-206). IEEE.
-
F. Alsubaei, A. Abuhussein, and S. Shiva
Quantifying Security and Privacy in Internet of Things Solutions
in NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium, 2018, pp. 1–6.
-
F. Alsubaei, A. Abuhussein, and S. Shiva
An Overview of Enabling Technologies for the Internet of Things
in Internet of Things A to Z, Wiley-Blackwell, 2018, pp. 77–112..
-
F. Alsubaei, A. Abuhussein, and S. Shiva
A Framework for Ranking IoMT Solutions Based on Measuring Security and Privacy
in Proceedings of the Future Technologies Conference (FTC) 2018, vol. 880, K. Arai, R. Bhatia, and S. Kapoor, Eds. Cham: Springer International Publishing, 2019, pp. 205–224.
-
E. Aldhahri, V. Shandilya, S. Shiva
Crowdsourcing Multi-Objective Recommendation System
The Web Conference 2018, Lyon, France, 23-27 April 2018.
-
Parves Kamal, A. Abuhussein and S. Shiva
Identifying and Scoring Vulnerability in SCADA Environments
IEEE Future Technologies Conference (FTC) 2017, Vancouver, BC, Canada, 29-30 November 2017.
-
F. Alsubaei, A. Abuhussein, and S.Shiva,
Security and Privacy in the Internet of Medical Things: Taxonomy and Risk Assessment
in 2017 IEEE 42nd Conference on Local Computer Networks, 2017, pp. 112-120
-
F. Polash and S. Shiva
Automated Live Migration in OpenStack : A Moving Target Defense Solution
Journal of Computer Science Applications and Information Technology, August, 2017.
-
A.Mahfouz, Md.Rahman, and S.Shiva
Secure Live Virtual Machine Migration through Runtime Monitors
IEEE Tenth International Conference on Contemporary Computing. IC3-2017, Noida, India, August 10-12, 2017
-
V. Shandilya, and S. Shiva
On a Generic Security Game Model
International Journal of Communications, Network and System Sciences 10(07):142-172, July 2017
-
Rodrigo Silva-Lugo and Sajjan Shiva
Software Test Case Selection Optimization Using Generic Algorithm
10th International Research Workshop on Advances and Innovations in Software Testing, May 2017
-
A. Abuhussein and S. Shiva
A Framework for Cloud Security Assessment: A Scenario-based, Stakeholder-Oriented Approach
Ist Annual Research Workshop on Advances & Innovations in Cyber Security, The University of Memphis, Memphis, TN, USA, June 9, 2016.
-
A. Abuhussein, S. Shiva, F. Sheldon
CSSR: Cloud Services Security Recommender
IEEE 11th World Congress on Services (SERVICES) - Emerging Technology Track: Dependable and Secure Services (DSS 2016), San Francisco, California, June 26- July 3, 2016.
-
A. Abuhussein, F. Alsubaei, S. Shiva, F. Sheldon
Evaluating Security and Privacy in Cloud Services
In the 2016 IEEE NATA-COMPSAC Symposium on Novel Applications and Technology Advances in Computing, the 40th Annual Computer Software and Applications Conference (COMPSAC), Atlanta, Georgia, June 10-14, 2016
-
E. Aldhahri, A. Abuhussein, S. Shiva
Leveraging Crowdsourcing In Cloud Application Development
Proceedings of the 2015 IASTED International Software Engineering and Applications, October 26 - 27, 2015 Marina del Rey, USA (SEA 2015)
-
F. Polash, and S. Shiva
Building Trust in Cloud: Service Certification Challenges and Approaches
In IEEE Ninth International Complex, Intelligent, and Software Intensive Systems Conference(CISIS), pp. 187-191. Blumenau, Brazil, July 2015.
-
E. Aldhahri, V. Shandilya, S. Shiva
Towards an Effective Crowdsourcing Recommendation System: A Survey of the State-of-the-Art
ISSC 2015 : IEEE International Symposium on Software Crowdsourcing, , Redwood City, USA, Mar 30 - Apr 3, 2015
-
V. Shandilya, S. Shiva
A Network Security Game Model
ACM-CODASPY 2015 , San antonio Texas, March 2-4, 2015
-
F. Polash, A. Abuhussein, S. Shiva
A Survey of Cloud Computing Taxonomies: Rationale and Overview
In Internet Technology And Secured Transactions Internet Technology And Secured Transactions, 2014 International Conference, ICITST 2014. - London, UK 2014.
-
H. Bedi, S. Roy, S. Shiva
Mitigating congestion based DoS attacks with an enhanced AQM technique
in Elsevier Journal of Computer Communications., February 2015. Vol. 56, p60 - 73.
- Vivek Shandilya, Chris B. Simmons, S. Shiva.
Use of Attack Graphs in Security Systems.
in Journal of Computer Networks and Communications 2014. -
Vivek Shandilya, Fahad. Polash, S. Shiva
A Multi-Layer Architecture for Spam Detection.
International Journal of Computer Science & Information Technology;2014, Vol. 6 Issue 4, p193-200.
-
A. Abuhussein, H. Bedi, S. Shiva
Exploring Security and Privacy Risks of SoA Solutions Deployed on the Cloud
GCA 2014, Las Vegas, Nevada, USA - July 2014 2013
- C. Simmons, S. Shiva, L. Simmons
ADAPT: A Qualitative Analysis of An Ontology Based Issue Resolution System for Cyber Attack Management
In Cyber Technology in Automation, Control and Intelligent Systems (CYBER), 2014 IEEE 4rd Annual International Conference, Hong Kong, China, June 2014. - R. Dharam,S. Shiva
Runtime Monitoring Framework for SQL Injection Attacks
International Journal of Engineering and Technology, vol. 6, no. 5, pp. 392-401, 2014. -
R. Dharam,S. Shiva
Testing Web Applications for Tautology based SQL Injection Attacks using Runtime Monitors
International Research Workshop on Advances and Innovations in Software Testing, Memphis, TN, USA, October 2013
-
V. Shandilya, S. Shiva
Security in the Cloud Based Systems: Structure and Breaches
Internet Technology And Secured Transactions, 2013 International Conference For IEEE., ICITST 2013. - London, UK 2013.
-
S. Shiva, S. Ramesh, R. Dharam
A Survey of Testing Methodologies for Cloud-based Applications
System Testing Excellence Program (STEP) Conference, Memphis, TN, USA, Oct 2013.
-
C. Simmons, S. Shiva, H. Bedi , V. Shandilya
ADAPT: A Game Inspired Attack-Defense and Performance Metric Taxonomy
In Security and Privacy Protection in Information Processing Systems, pp. 344-365. Springer Berlin Heidelberg, 2013.
-
H. Bedi, S. Shiva
Mitigating Congestion-Based Denial of Service Attacks with Active Queue Management
GLOBECOM 2013, Atlanta, GA, USA- Dec 2013 .
-
R. Dharam,S. Shiva
Essential Cloud Security Features in Windows Azure
GCA 2013, Las Vegas, Nevada, USA - July 2013 .
-
A. Abuhussein, H. Bedi, S. Shiva
Towards a Taxonomical Approach for Secure Cloud Computing
IEEE 6th International Conference on Cloud Computing, Santa Clara, CA, USA - July 2013 .
-
R. Dharam, S. Shiva
Runtime Monitors to Detect and Prevent Union Query based SQL Injection Attacks
ITNG 2013, Las Vegas, Nevada, USA. April 2013
-
R. Dharam, S. Shiva
Runtime Monitoring Technique to handle Tautology based SQL Injection Attack.
International Journal of Cyber-Security and Digital Forensics, Vol. 1, No. 3, Nov 2012
-
A. Abuhussein, H. Bedi, S. Shiva
Evaluating security and privacy in cloud computing services: A Stakeholder's perspective
Internet Technology And Secured Transactions, 2012 International Conference For IEEE., ICITST 2012. - London,UK 2012.
-
R. Dharam, S. Shiva
Runtime Monitoring - A Post-deployment Security Testing Technique
International Research Workshop on Advances and Innovations in Software Testing, Memphis, TN, USA, July 2012.
-
R. Dharam, S. Shiva
Runtime Monitors for Tautology based SQL Injection Attacks
International Conference on Cyber Security, Cyber Warfare and Digital Forensics, Kaula Lumpur, Malaysia, June 2012.
-
R. Dharam, S. Shiva
A Framework for Development of Runtime Monitors
International Conference on Computer and Information Sciences, Kaula Lumpur, Malaysia, June 2012.
-
R. Dharam, S. Shiva
Analysis of Monitoring Tools for Java Applications
International Conference on Software and Computer Applications, Singapore, June 2012.
-
H. Bedi, S. Shiva
Securing Cloud Infrastructure Against Co-Resident DoS Attacks Using Game Theoretic Defense Mechanisms
Intl. Workshop on Service-Oriented Architecture and Cloud Computing (SOAC), part of ICACCI 2012, Chennai, India. August 2012.
-
C. Simmons, S. Shiva, V. Phan, V. Shandilya, L. Simmons
IRS: An Issue Resolution system for Cyber Attack Classification and Management
International Conference on Security and Management (SAM), Las Vegas. July 2012.
-
V. Shandilya, S. Shiva
Security in the Cloud: A stake holder's perspective
International Conference on Security and Management (SAM), Las Vegas. July 2012.
-
S. Shiva
Security Testing : Status Report
Sixth International Research Workshop on Advances and Innovations in Software Testing, July 2012, Memphis, TN.
-
S. Shiva
Security Testing : Are We There Yet?
Fifth International Research Workshop on Advances and Innovations in Software Testing, May 2011, Memphis, TN.
-
C. Simmons, D. Jones, L. Simmons
A Framework and Demo for Preventing Anti-Computer Forensics
51st Annual IACIS Conference, Mobile,AL, Oct. 2011.
-
S. Shiva, R. Dharam and V. Shandilya
Runtime Monitors as Sensors of Security Systems
23rd IASTED conference on Parallel and Distributed Computing and Systems, Dallas, December 2011.
-
H. Bedi, S. Roy, S. Shiva.
Game Theory-based Defense Mechanisms against DDoS Attacks on TCP/TCP-friendly Flows
IEEE Symposium on Computational Intelligence in Cyber Security (CICS), part of (SSCI). Paris, France. April 2011.
-
S. Shiva, H. Bedi, C. Simmons, M. Fisher, R. Dharam.
Holistic Game Inspired Defense Architecture
International Conference on Data Engineering and Internet Technology, March, 2011.
In Recent Progress in Data Engineering and Internet Technology, pp. 471-476. Springer Berlin Heidelberg, 2012.
-
R. Dharam, S. Roy, S. Shiva.
On Self Checking Software Components
Myrtle Beach Computer Security Conference, Myrtle Beach, S.C., April 2010.
-
S. Shiva, S. Roy, and D. Dasgupta
Game Theory for Cyber Security
In Sixth Cyber Security and Information Intelligence Research Workshop. Oak Ridge , April, 2010.
-
S. Shiva, S. Roy, C. Ellis, V. Datla, and Q. Wu.
On Modeling & Simulation of Game Theory-based Defense Mechanisms against DoS & DDoS Attacks
Spring Simulation Multi-Conference (SpringSim), 2010.
Awards : 43rd Annual Simulation Symposium (ANSS) - Best Paper
University of Memphis - Student Research Forum - 1st Place
-
S. Shiva, S. Roy, H. Bedi, D. Dasgupta, and Q. Wu.
A Stochastic Game with Imperfect Information for Cyber Security
5th International Conference on i-Warfare & Security (ICIW), 2010.
-
S. Roy, C. Ellis, S. Shiva, D. Dasgupta, V. Shandilya, and Q. Wu.
A survey of game theory as applied to network security.
The 43rd Hawaii International Conference on System Sciences, 2010.
-
S. Shiva, D. Dasgupta, Q. Wu and S. Roy
Game Theoretic Approaches to protect Cyber Space.
Final technical report, Office Of Naval Research Grant N00014-09-1-0752, CS Tech Report CS-10-001, April 30, 2010. -
S. Shiva, C. Simmons, C. Ellis, D. Dasgupta, and Q. Wu.
AVOIDIT: A cyber attack taxonomy.
Technical Report: CS-09-003, University of Memphis, August 2009.
:: Presentations ::
-
Mohd Hasan Ali and Sajjan Shiva
Cyber-Security Testing for Hybrid Energy Storage System Located in Smart Grid
37th International Test and Evaluation Symposium, September 2020.
-
Sajjan Shiva and Deepak Venugopal
Testing Machine Learning Methods on Explanation Consistency
37th International Test and Evaluation Symposium, September 2020.
-
Sajjan Shiva
keynote address "Building Intelligent Systems – Opportunities and Challenges"
at the 107th Indian Science Congress (ISC), Bengaluru, India, Jan. 3–7. 2020, Inaugurated by Prime Minister Narendra Modi, ISC is the premier Indian science conference and is attended by about 12,000 scientists. Six U.S. scientists (including Shiva) and two Nobel laureates (from Germany and Israel) were invited to participate.
-
Sajjan Shiva
invited talk on "Artificial Intelligence Today: Rewards and Risks"
at the Siddaganga Institute of Technology, India, January 2020.
-
Sajjan Shiva
invited talk on "Knowledge Engineering"
at the Medical Sciences Institute of Adichunchanagiri University, India, January 2020.
-
Sajjan Shiva
Cyber Security: Challenges and Research Opportunities
Siddaganga Institute of Technology, Tumkur, India, January 3, 2018
-
Sajjan Shiva
keynote talk titled "Cloud Computing:Security and Privacy"
IEEE International Conference on Computational Systems and Information Technology for Sustainable Solutions, Bangalore, India, December 21 - 23, 2017