:: Publications ::

  1. (Accepted)Das, Saikat, Sajal Saha, Annita Priyoti, Etee Kawna Roy, A. Haque, Frederick Sheldon, and Sajjan Shiva (2021, December)
         Network Intrusion Detection and Comparative Analysis using Ensemble Machine Learning and Feature Selection.
          In IEEE Transactions on Network and Service Management. IEEE, 2021.
  2. Das, Saikat, and Sajjan Shiva (2021, December)
         Machine Learning Application Lifecycle Augmented With Explanation and Security.
          In 12th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON). IEEE, 2021.
  3. Das, Saikat, Namita Agarwal, and Sajjan Shiva (2021, October)
         DDoS Explainer using Interpretable Machine Learning.
          In 12th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON). IEEE, 2021.
  4. Murthy, Bhargavi Krishna and Sajjan Shiva (2021, October)
         Double-State-Temporal Difference Learning for Resource Provisioning in Uncertain Fog Computing Environment.
          In 12th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON). IEEE, 2021
  5. Ashrafuzzaman, Mohammad, Saikat Das, Sajjan Shiva, and Frederick T. Sheldon (2021, March)
         Supervised Learning for Detecting Stealthy False Data Injection Attacks in the Smart Grid.
          In Advances in Security, Networks, and Internet of Things, pp. 291-305. Springer, Cham, 2021
  6. Das, Saikat, Mohammad Ashrafuzzaman, Frederick T. Sheldon, and Sajjan Shiva (2020, December)
         Network Intrusion Detection using Natural Language Processing and Ensemble Machine Learning.
          In 2020 IEEE Symposium Series on Computational Intelligence (SSCI) (pp. 829-835). IEEE
  7. Das, Saikat, Namita Agarwal, Deepak Venugopal, Frederick T. Sheldon and Sajjan Shiva. (2020, December)
         Taxonomy and Survey of Interpretable Machine Learning Method.
          In 2020 IEEE Symposium Series on Computational Intelligence (SSCI) (pp. 670-677). IEEE
  8. Agarwal, Namita and Saikat Das. (2020, December)
         Interpretable Machine Learning Tools: A Survey.
          In 2020 IEEE Symposium Series on Computational Intelligence (SSCI) (pp. 1528-1534). IEEE.
  9. Al-Rousan,Suhaib, Abdullah Abuhussein, Faisal Alsubaei, and Sajjan Shiva. (2020, December)
         Ads-Guard: Detecting Scammers in Online Classified Ads.
          2020 IEEE Symposium Series on Computational Intelligence. SSCI, 2020
  10. Ashrafuzzaman, Mohammad, Saikat Das, Yacine Chakhchoukh, and Frederick T. Sheldon. (2020, December)
         Elliptic Envelope Based Detection of Stealthy False Data Injection Attacks in Smart Grid Control Systems.
          In 2020 IEEE Symposium Series on Computational Intelligence (SSCI) (pp. 1131-1137). IEEE
  11. Mahfouz, Ahmed, Abdullah Abuhussein, Deepak Venugopal, and Sajjan Shiva. (2020, October)
         Ensemble Classifiers for Network Intrusion Detection Using a Novel Network Attack Dataset
          Future Internet 12, no. 11 (2020): 180.
  12. Al-Rousan, Suhaib, Abdullah Abuhussein, Faisal Alsubaei, Ozkan Kahveci, Hazem Farra, and Sajjan Shiva.
         Social-Guard: Detecting Scammers in Online Dating
          In 2020 IEEE International Conference on Electro Information Technology (EIT), pp. 416-422. IEEE, 2020.
  13. Mahfouz, A. M., Abuhussein, A., Venugopal, D., & Shiva, S. G. (2020)
         Network Intrusion Detection Model Using One-Class Support Vector Machine
          In Advances in Machine Learning and Computational Intelligence (pp. 79-86). Springer, Singapore.
  14. Ashrafuzzaman, M., Das, Saikat, Chakhchoukh, Y., Sheldon, F.T., and Shiva, S.
         Detecting Stealthy False Data Injection Attacks in the Smart Grid using Ensemble-based Machine Learning
          Elsevier Journal of Computers & Security 97 (2020): 101994.
  15. Das, Saikat, Deepak Venugopal, Sajjan Shiva, and Frederick T. Sheldon.
         Empirical Evaluation of the Ensemble Framework for Feature Selection in DDoS Attack
          In 2020 7th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/2020 6th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom), pp. 56-61. IEEE, 2020
  16. Ashrafuzzaman, M., Das, Saikat, Chakhchoukh, Y., Sheldon, F.T., and Shiva, S. (2020, July)
         Supervised Ensemble Learning for Detecting Stealthy False Data Injection Attacks in the Smart Grid
          In Proceedings of the International Conference on Security and Management (SAM). The Steering Committee of The World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp).
  17. Das, Saikat, Venugopal, D., & Shiva, S. (2020, March).
          A Holistic Approach for Detecting DDoS Attacks by Using Ensemble Unsupervised Machine Learning.
          In Future of Information and Communication Conference (pp. 721-738). Springer, Cham.
  18. Mahfouz, A.M, Venugopal, D., and Shiva, S.
          Comparative Analysis of ML Classifiers for Network Intrusion Detection
          in Fourth International Congress on Information and Communication Technology, pp. 193-207. Springer, Singapore, 2020.
  19. S. Putta, A. Abuhussein, F. Alsubaei, and S. Shiva
         Security Benchmarks for Wearable Medical Things: Stakeholders-Centric Approach
          in Fourth International Congress on Information and Communication Technology, pp. 405-418. Springer, Singapore, 2020.
  20. A. Abdullah, F. Alsubaei, and S. Shiva
         Towards an Effective Requirement Engineering Approach for Cloud Applications
          in Software Engineering in the Era of Cloud Computing, pp. 29-50. Springer, Cham, 2020.
  21. F. Alsubaei, A. Abuhussein, V. Shandilya, and S. Shiva
         IoMT-SAF: Internet of Medical Things Security Assessment Framework
          in Internet of Things (2019): 100123.
  22. Das, Saikat, Mahfouz, A. M., & Shiva, S. (2019, October).
         A Stealth Migration Approach to Moving Target Defense in Cloud Computing.
          In Proceedings of the Future Technologies Conference (pp. 394-410). Springer, Cham.
  23. Das, Saikat, Mahfouz, A. M., Venugopal, D., & Shiva, S. (2019, July).
         DDoS intrusion detection through machine learning ensemble.
          In 2019 IEEE 19th International Conference on Software Quality, Reliability and Security Companion (QRS-C) (pp. 471-477). IEEE.
  24. F. Alsubaei, A. Abuhussein, and S. Shiva
         Ontology-Based Security Recommendation for the Internet of Medical Things
          in IEEE Access, vol. 7, no. 1, pp. 48948–48960, 2019.
  25. Das, Saikat, & Shiva, S. (2018, December).
         CoRuM: collaborative runtime monitor framework for application security.
         In 2018 IEEE/ACM International Conference on Utility and Cloud Computing Companion (UCC Companion) (pp. 201-206). IEEE.
  26. F. Alsubaei, A. Abuhussein, and S. Shiva
         Quantifying Security and Privacy in Internet of Things Solutions
          in NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium, 2018, pp. 1–6.
  27. F. Alsubaei, A. Abuhussein, and S. Shiva
         An Overview of Enabling Technologies for the Internet of Things
          in Internet of Things A to Z, Wiley-Blackwell, 2018, pp. 77–112..
  28. F. Alsubaei, A. Abuhussein, and S. Shiva
         A Framework for Ranking IoMT Solutions Based on Measuring Security and Privacy
          in Proceedings of the Future Technologies Conference (FTC) 2018, vol. 880, K. Arai, R. Bhatia, and S. Kapoor, Eds. Cham: Springer International Publishing, 2019, pp. 205–224.
  29. E. Aldhahri, V. Shandilya, S. Shiva
          Crowdsourcing Multi-Objective Recommendation System
          The Web Conference 2018, Lyon, France, 23-27 April 2018.
  30. Parves Kamal, A. Abuhussein and S. Shiva
          Identifying and Scoring Vulnerability in SCADA Environments
          IEEE Future Technologies Conference (FTC) 2017, Vancouver, BC, Canada, 29-30 November 2017.
  31. F. Alsubaei, A. Abuhussein, and S.Shiva,
          Security and Privacy in the Internet of Medical Things: Taxonomy and Risk Assessment
          in 2017 IEEE 42nd Conference on Local Computer Networks, 2017, pp. 112-120
  32. F. Polash and S. Shiva
          Automated Live Migration in OpenStack : A Moving Target Defense Solution
          Journal of Computer Science Applications and Information Technology, August, 2017.
  33. A.Mahfouz, Md.Rahman, and S.Shiva
          Secure Live Virtual Machine Migration through Runtime Monitors
          IEEE Tenth International Conference on Contemporary Computing. IC3-2017, Noida, India, August 10-12, 2017
  34. V. Shandilya, and S. Shiva
          On a Generic Security Game Model
          International Journal of Communications, Network and System Sciences 10(07):142-172, July 2017
  35. Rodrigo Silva-Lugo and Sajjan Shiva
          Software Test Case Selection Optimization Using Generic Algorithm
         10th International Research Workshop on Advances and Innovations in Software Testing, May 2017
  36. A. Abuhussein and S. Shiva
          A Framework for Cloud Security Assessment: A Scenario-based, Stakeholder-Oriented Approach
          Ist Annual Research Workshop on Advances & Innovations in Cyber Security, The University of Memphis, Memphis, TN,        USA, June 9, 2016.
  37. A. Abuhussein, S. Shiva, F. Sheldon
          CSSR: Cloud Services Security Recommender
          IEEE 11th World Congress on Services (SERVICES) - Emerging Technology Track: Dependable and Secure Services (DSS 2016), San Francisco, California, June 26- July 3, 2016.
  38. A. Abuhussein, F. Alsubaei, S. Shiva, F. Sheldon
          Evaluating Security and Privacy in Cloud Services
          In the 2016 IEEE NATA-COMPSAC Symposium on Novel Applications and Technology Advances in Computing, the 40th       Annual Computer Software and Applications Conference (COMPSAC), Atlanta, Georgia, June 10-14, 2016
  39. E. Aldhahri, A. Abuhussein, S. Shiva
          Leveraging Crowdsourcing In Cloud Application Development
         Proceedings of the 2015 IASTED International Software Engineering and Applications, October 26 - 27, 2015 Marina del Rey,      USA (SEA 2015)
  40. F. Polash, and S. Shiva
          Building Trust in Cloud: Service Certification Challenges and Approaches
          In IEEE Ninth International Complex, Intelligent, and Software Intensive Systems Conference(CISIS), pp. 187-191.       Blumenau, Brazil, July 2015.
  41. E. Aldhahri, V. Shandilya, S. Shiva
          Towards an Effective Crowdsourcing Recommendation System: A Survey of the State-of-the-Art
          ISSC 2015 : IEEE International Symposium on Software Crowdsourcing, , Redwood City, USA, Mar 30 - Apr 3, 2015
  42. V. Shandilya, S. Shiva
          A Network Security Game Model
          ACM-CODASPY 2015 , San antonio Texas, March 2-4, 2015
  43. F. Polash, A. Abuhussein, S. Shiva
          A Survey of Cloud Computing Taxonomies: Rationale and Overview
          In Internet Technology And Secured Transactions Internet Technology And Secured Transactions, 2014 International       Conference, ICITST 2014. - London, UK 2014.
  44. H. Bedi, S. Roy, S. Shiva
          Mitigating congestion based DoS attacks with an enhanced AQM technique
          in Elsevier Journal of Computer Communications., February 2015. Vol. 56, p60 - 73.
  45. Vivek Shandilya, Chris B. Simmons, S. Shiva.
          Use of Attack Graphs in Security Systems.
          in Journal of Computer Networks and Communications 2014.
  46. Vivek Shandilya, Fahad. Polash, S. Shiva
          A Multi-Layer Architecture for Spam Detection.
          International Journal of Computer Science & Information Technology;2014, Vol. 6 Issue 4, p193-200.
  47. A. Abuhussein, H. Bedi, S. Shiva
          Exploring Security and Privacy Risks of SoA Solutions Deployed on the Cloud
          GCA 2014, Las Vegas, Nevada, USA - July 2014 2013
  48. C. Simmons, S. Shiva, L. Simmons
          ADAPT: A Qualitative Analysis of An Ontology Based Issue Resolution System for Cyber Attack Management
          In Cyber Technology in Automation, Control and Intelligent Systems (CYBER), 2014 IEEE 4rd Annual International       Conference, Hong Kong, China, June 2014.
  49. R. Dharam,S. Shiva
          Runtime Monitoring Framework for SQL Injection Attacks
    International Journal of Engineering and Technology, vol. 6, no. 5, pp. 392-401, 2014.
  50. R. Dharam,S. Shiva
          Testing Web Applications for Tautology based SQL Injection Attacks using Runtime Monitors
          International Research Workshop on Advances and Innovations in Software Testing, Memphis, TN, USA, October 2013
  51. V. Shandilya, S. Shiva
          Security in the Cloud Based Systems: Structure and Breaches
          Internet Technology And Secured Transactions, 2013 International Conference For IEEE., ICITST 2013. - London, UK 2013.
  52. S. Shiva, S. Ramesh, R. Dharam
          A Survey of Testing Methodologies for Cloud-based Applications
          System Testing Excellence Program (STEP) Conference, Memphis, TN, USA, Oct 2013.
  53. C. Simmons, S. Shiva, H. Bedi , V. Shandilya
          ADAPT: A Game Inspired Attack-Defense and Performance Metric Taxonomy
          In Security and Privacy Protection in Information Processing Systems, pp. 344-365. Springer Berlin Heidelberg, 2013.
  54. H. Bedi, S. Shiva
          Mitigating Congestion-Based Denial of Service Attacks with Active Queue Management
          GLOBECOM 2013, Atlanta, GA, USA- Dec 2013 .
  55. R. Dharam,S. Shiva
          Essential Cloud Security Features in Windows Azure
          GCA 2013, Las Vegas, Nevada, USA - July 2013 .
  56. A. Abuhussein, H. Bedi, S. Shiva
          Towards a Taxonomical Approach for Secure Cloud Computing
          IEEE 6th International Conference on Cloud Computing, Santa Clara, CA, USA - July 2013 .
  57. R. Dharam, S. Shiva
          Runtime Monitors to Detect and Prevent Union Query based SQL Injection Attacks
          ITNG 2013, Las Vegas, Nevada, USA. April 2013
  58. R. Dharam, S. Shiva
          Runtime Monitoring Technique to handle Tautology based SQL Injection Attack.
          International Journal of Cyber-Security and Digital Forensics, Vol. 1, No. 3, Nov 2012
  59. A. Abuhussein, H. Bedi, S. Shiva
          Evaluating security and privacy in cloud computing services: A Stakeholder's perspective
          Internet Technology And Secured Transactions, 2012 International Conference For IEEE., ICITST 2012. - London,UK 2012.
  60. R. Dharam, S. Shiva
          Runtime Monitoring - A Post-deployment Security Testing Technique
          International Research Workshop on Advances and Innovations in Software Testing, Memphis, TN, USA, July 2012.
  61. R. Dharam, S. Shiva
          Runtime Monitors for Tautology based SQL Injection Attacks
          International Conference on Cyber Security, Cyber Warfare and Digital Forensics, Kaula Lumpur, Malaysia, June 2012.
  62. R. Dharam, S. Shiva
          A Framework for Development of Runtime Monitors
          International Conference on Computer and Information Sciences, Kaula Lumpur, Malaysia, June 2012.
  63. R. Dharam, S. Shiva
          Analysis of Monitoring Tools for Java Applications
          International Conference on Software and Computer Applications, Singapore, June 2012.
  64. H. Bedi, S. Shiva
          Securing Cloud Infrastructure Against Co-Resident DoS Attacks Using Game Theoretic Defense Mechanisms
          Intl. Workshop on Service-Oriented Architecture and Cloud Computing (SOAC), part of ICACCI 2012, Chennai, India.       August 2012.
  65. C. Simmons, S. Shiva, V. Phan, V. Shandilya, L. Simmons
          IRS: An Issue Resolution system for Cyber Attack Classification and Management
          International Conference on Security and Management (SAM), Las Vegas. July 2012.
  66. V. Shandilya, S. Shiva
         Security in the Cloud: A stake holder's perspective
          International Conference on Security and Management (SAM), Las Vegas. July 2012.
  67. S. Shiva
         Security Testing : Status Report
          Sixth International Research Workshop on Advances and Innovations in Software Testing, July 2012, Memphis, TN.
  68. S. Shiva
         Security Testing : Are We There Yet?
          Fifth International Research Workshop on Advances and Innovations in Software Testing, May 2011, Memphis, TN.
  69. C. Simmons, D. Jones, L. Simmons
         A Framework and Demo for Preventing Anti-Computer Forensics
          51st Annual IACIS Conference, Mobile,AL, Oct. 2011.
  70. S. Shiva, R. Dharam and V. Shandilya
         Runtime Monitors as Sensors of Security Systems
          23rd IASTED conference on Parallel and Distributed Computing and Systems, Dallas, December 2011.
  71. H. Bedi, S. Roy, S. Shiva.
         Game Theory-based Defense Mechanisms against DDoS Attacks on TCP/TCP-friendly Flows
         IEEE Symposium on Computational Intelligence in Cyber Security (CICS), part of (SSCI). Paris, France. April 2011.
  72. S. Shiva, H. Bedi, C. Simmons, M. Fisher, R. Dharam.
         Holistic Game Inspired Defense Architecture
         International Conference on Data Engineering and Internet Technology, March, 2011.
         In Recent Progress in Data Engineering and Internet Technology, pp. 471-476. Springer Berlin Heidelberg, 2012.
  73. R. Dharam, S. Roy, S. Shiva.
         On Self Checking Software Components
         Myrtle Beach Computer Security Conference, Myrtle Beach, S.C., April 2010.
  74. S. Shiva, S. Roy, and D. Dasgupta
         Game Theory for Cyber Security
         In Sixth Cyber Security and Information Intelligence Research Workshop. Oak Ridge , April, 2010.
  75. S. Shiva, S. Roy, C. Ellis, V. Datla, and Q. Wu.
         On Modeling & Simulation of Game Theory-based Defense Mechanisms against DoS & DDoS Attacks
         Spring Simulation Multi-Conference (SpringSim), 2010.
          Awards : 43rd Annual Simulation Symposium (ANSS) - Best Paper
                         University of Memphis - Student Research Forum - 1st Place
  76. S. Shiva, S. Roy, H. Bedi, D. Dasgupta, and Q. Wu.
         A Stochastic Game with Imperfect Information for Cyber Security
         5th International Conference on i-Warfare & Security (ICIW), 2010.
  77. S. Roy, C. Ellis, S. Shiva, D. Dasgupta, V. Shandilya, and Q. Wu.
         A survey of game theory as applied to network security.
         The 43rd Hawaii International Conference on System Sciences, 2010.
  78. S. Shiva, D. Dasgupta, Q. Wu and S. Roy
         Game Theoretic Approaches to protect Cyber Space.
         Final technical report, Office Of Naval Research Grant N00014-09-1-0752, CS Tech Report CS-10-001, April 30, 2010.
  79. S. Shiva, C. Simmons, C. Ellis, D. Dasgupta, and Q. Wu.
         AVOIDIT: A cyber attack taxonomy.
         Technical Report: CS-09-003, University of Memphis, August 2009.

:: Presentations ::

  1. Mohd Hasan Ali and Sajjan Shiva
           Cyber-Security Testing for Hybrid Energy Storage System Located in Smart Grid
          37th International Test and Evaluation Symposium, September 2020.
  2. Sajjan Shiva and Deepak Venugopal
           Testing Machine Learning Methods on Explanation Consistency
          37th International Test and Evaluation Symposium, September 2020.
  3. Sajjan Shiva
          keynote address "Building Intelligent Systems – Opportunities and Challenges"
          at the 107th Indian Science Congress (ISC), Bengaluru, India, Jan. 3–7. 2020, Inaugurated by Prime Minister Narendra Modi,       ISC is the premier Indian science conference and is attended by about 12,000 scientists. Six U.S. scientists (including Shiva)       and two Nobel laureates (from Germany and Israel) were invited to participate.
  4. Sajjan Shiva
          invited talk on "Artificial Intelligence Today: Rewards and Risks"
          at the Siddaganga Institute of Technology, India, January 2020.
  5. Sajjan Shiva
          invited talk on "Knowledge Engineering"
          at the Medical Sciences Institute of Adichunchanagiri University, India, January 2020.
  6. Sajjan Shiva
          Cyber Security: Challenges and Research Opportunities
          Siddaganga Institute of Technology, Tumkur, India, January 3, 2018
  7. Sajjan Shiva
         keynote talk titled "Cloud Computing:Security and Privacy"
          IEEE International Conference on Computational Systems and Information Technology for Sustainable Solutions, Bangalore,       India, December 21 - 23, 2017