Search Results - "Gupta, Maanak"

Refine Results
  1. 1

    Security and Privacy in Smart Farming: Challenges and Opportunities by Gupta, Maanak, Abdelsalam, Mahmoud, Khorsandroo, Sajad, Mittal, Sudip

    Published in IEEE access (2020)
    “…Internet of Things (IoT) and smart computing technologies have revolutionized every sphere of 21 st century humans. IoT technologies and the data driven…”
    Get full text
    Journal Article
  2. 2

    From ChatGPT to ThreatGPT: Impact of Generative AI in Cybersecurity and Privacy by Gupta, Maanak, Akiri, CharanKumar, Aryal, Kshitiz, Parker, Eli, Praharaj, Lopamudra

    Published in IEEE access (01-01-2023)
    “…Undoubtedly, the evolution of Generative AI (GenAI) models has been the highlight of digital transformation in the year 2022. As the different GenAI models…”
    Get full text
    Journal Article
  3. 3

    Attribute-Based Access Control for AWS Internet of Things and Secure Industries of the Future by Bhatt, Smriti, Pham, Thanh Kim, Gupta, Maanak, Benson, James, Park, Jaehong, Sandhu, Ravi

    Published in IEEE access (2021)
    “…Internet of Things (IoT) is revolutionizing and enhancing the quality of human lives in every aspect. With a disruption of IoT devices and applications,…”
    Get full text
    Journal Article
  4. 4

    Ontologies and Artificial Intelligence Systems for the Cooperative Smart Farming Ecosystem by Chukkapalli, Sai Sree Laya, Mittal, Sudip, Gupta, Maanak, Abdelsalam, Mahmoud, Joshi, Anupam, Sandhu, Ravi, Joshi, Karuna

    Published in IEEE access (2020)
    “…Cyber-Physical Systems (CPS) and Internet of Thing (IoT) generate large amounts of data spurring the rise of Artificial Intelligence (AI) based smart…”
    Get full text
    Journal Article
  5. 5

    Security in 5G Network Slices: Concerns and Opportunities by Singh, Virendra Pratap, Singh, Mahendra Pratap, Hegde, Saumya, Gupta, Maanak

    Published in IEEE access (01-01-2024)
    “…Network slicing has emerged as a cornerstone technology within the 5G ecosystem, enabling efficient resource allocation, service customization, and support for…”
    Get full text
    Journal Article
  6. 6

    Activity Control Design Principles: Next Generation Access Control for Smart and Collaborative Systems by Park, Jaehong, Sandhu, Ravi, Gupta, Maanak, Bhatt, Smriti

    Published in IEEE access (2021)
    “…Traditionally, access control solutions have focused on how to utilize a specific type of decision parameter for access control decisions. While these…”
    Get full text
    Journal Article
  7. 7

    Analyzing and Explaining Black-Box Models for Online Malware Detection by Manthena, Harikha, Kimmel, Jeffrey C., Abdelsalam, Mahmoud, Gupta, Maanak

    Published in IEEE access (2023)
    “…In recent years, a significant amount of research has focused on analyzing the effectiveness of machine learning (ML) models for malware detection. These…”
    Get full text
    Journal Article
  8. 8

    A Systematic Survey of Multi-Factor Authentication for Cloud Infrastructure by Otta, Soumya Prakash, Panda, Subhrakanta, Gupta, Maanak, Hota, Chittaranjan

    Published in Future internet (01-04-2023)
    “…The unauthorized usage of various services and resources in cloud computing is something that must be protected against. Authentication and access control are…”
    Get full text
    Journal Article
  9. 9

    Recurrent Neural Networks Based Online Behavioural Malware Detection Techniques for Cloud Infrastructure by Kimmel, Jeffrey C., Mcdole, Andrew D., Abdelsalam, Mahmoud, Gupta, Maanak, Sandhu, Ravi

    Published in IEEE access (2021)
    “…Several organizations are utilizing cloud technologies and resources to run a range of applications. These services help businesses save on hardware…”
    Get full text
    Journal Article
  10. 10

    Image Watermarking Approach Using a Hybrid Domain Based on Performance Parameter Analysis by Srivastava, Rohit, Tomar, Ravi, Gupta, Maanak, Yadav, Anuj Kumar, Park, Jaehong

    Published in Information (Basel) (01-08-2021)
    “…In today’s scenario, image watermarking has been an integral part in various multimedia applications. Watermarking is the approach for adding additional…”
    Get full text
    Journal Article
  11. 11

    Leveraging Aviation Risk Models to Combat Cybersecurity Threats in Vehicular Networks by Ebert, Jonathan, Newton, Ohad, O’Rear, Jeffery, Riley, Scott, Park, Jaehong, Gupta, Maanak

    Published in Information (Basel) (01-10-2021)
    “…The rapidly developing technology and lack of standards in the transportation industry for the proposed Vehicle-to-Vehicle (V2V), Vehicle-to-Infrastructure…”
    Get full text
    Journal Article
  12. 12
  13. 13

    Secure V2V and V2I Communication in Intelligent Transportation Using Cloudlets by Gupta, Maanak, Benson, James, Patwa, Farhan, Sandhu, Ravi

    Published in IEEE transactions on services computing (01-07-2022)
    “…Intelligent Transportation System (ITS) is a vision which offers safe, secure and smart travel experience to drivers. This futuristic plan aims to enable…”
    Get full text
    Journal Article
  14. 14

    An Attribute-Based Access Control for Cloud Enabled Industrial Smart Vehicles by Gupta, Maanak, Awaysheh, Feras M., Benson, James, Alazab, Mamoun, Patwa, Farhan, Sandhu, Ravi

    “…Smart cities' vision will encompass connected industrial vehicles, which will offer data-driven and intelligent services to the user. Such interaction within…”
    Get full text
    Journal Article
  15. 15

    Future Smart Connected Communities to Fight COVID-19 Outbreak by Gupta, Deepti, Bhatt, Smriti, Gupta, Maanak, Tosun, Ali Saman

    Published in Internet of things (Amsterdam. Online) (01-03-2021)
    “…Internet of Things (IoT) has grown rapidly in the last decade and continues to develop in terms of dimension and complexity, offering a wide range of devices…”
    Get full text
    Journal Article
  16. 16

    MLS-ABAC: Efficient Multi-Level Security Attribute-Based Access Control scheme by Aghili, Seyed Farhad, Sedaghat, Mahdi, Singelée, Dave, Gupta, Maanak

    Published in Future generation computer systems (01-06-2022)
    “…Realizing access control to sensitive data offloaded to a Cloud is challenging in the Internet of Things, where various devices with low computational power…”
    Get full text
    Journal Article
  17. 17

    Reachability Analysis for Attributes in ABAC With Group Hierarchy by Gupta, Maanak, Sandhu, Ravi, Mawla, Tanjila, Benson, James

    “…Attribute-based access control (ABAC) models are widely used to provide fine-grained and adaptable authorization based on the attributes of users, resources,…”
    Get full text
    Journal Article
  18. 18

    Explainability-Informed Targeted Malware Misclassification by Card, Quincy, Aryal, Kshitiz, Gupta, Maanak

    “…In recent years, there has been a surge in malware attacks across critical infrastructures, requiring further research and development of appropriate response…”
    Get full text
    Conference Proceeding
  19. 19

    Next-generation big data federation access control: A reference model by Awaysheh, Feras M., Alazab, Mamoun, Gupta, Maanak, Pena, Tomás F., Cabaleiro, José C.

    Published in Future generation computer systems (01-07-2020)
    “…This paper discusses one of the most significant challenges of next-generation big data (BD) federation platforms, namely, Hadoop access control. Privacy and…”
    Get full text
    Journal Article
  20. 20