Author(s) |
Title of Paper |
Title of the Proceedings |
Page numbers |
Conference Theme |
Venue |
Year |
doi |
Nilin Prabhaker, Rahul Maurya, Ghanshyam S Bopche, Michael Arock |
Generation of Believable Fake Integral Equations for Cyber Deception |
3rd International Conference on Security and Privacy |
79 - 93 |
Security and Privacy |
NIT Jamshedpur, India |
2024 |
https://doi.org/10.1007/978-3-031-90587-2_6 |
Prabhaker, Nilin, Ghanshyam S. Bopche, Abhijit Mishra, and Michael Arock |
Generation of believable fake logic circuits for cyber deception |
16th International Conference on COMmunication Systems & NETworkS (COMSNETS), IEEE |
13 - 18 |
Computer Networks and Cyber Security |
Chancery Pavilion Hotel, Bangalore, India |
2024 |
https://doi.org/10.1109/COMSNETS59351.2024.10426938 |
Nilin Prabhaker, Ghanshyam S Bopche, Dvarkesh Gupta, Michael Arock |
Generation of Honeytokens for Relational Database Using Conditional Tabular Generative Adversarial Network (CTGAN) |
23rd International Conference on Hybrid Intelligent Systems, Springer |
119 - 129 |
Networks and Systems |
Kochi, India |
2023 |
https://doi.org/10.1007/978-3-031-78928-1_13 |
Bopche, Ghanshyam S., Saloni Pawar, and Nilin Prabhaker |
Classification of Images Extracted from Scientific Documents for Cyber Deception |
6th International Conference on Recent Trends in Image Processing and Pattern Recognition, IEEE |
325 - 340 |
Image Processing and Pattern Recognition |
University in Derby, England (UK) |
2023 |
https://doi.org/10.1007/978-3-031-53085-2_26 |
Bopche, Ghanshyam S., Deepnarayan Tiwari, and Gopal N. Rai |
Boolean Similarity Measure for Assessing Temporal Variation in the Network Attack Surface |
15th International Conference on COMmunication Systems & NETworkS (COMSNETS), IEEE |
31 - 36 |
Computer Networks and Cyber Security |
Chancery Pavilion Hotel, Bangalore, India |
2023 |
https://doi.org/10.1109/COMSNETS56262.2023.10041303 |
Bopche, Ghanshyam S., Gopal N. Rai, and Deepnarayan Tiwari |
RcAMA-an recursive composition algebra-based framework for detection of multistage attacks |
15th International Conference on COMmunication Systems & NETworkS (COMSNETS), IEEE |
48 - 53 |
Computer Networks and Cyber Security |
Chancery Pavilion Hotel, Bangalore, India |
2023 |
https://doi.org/10.1109/COMSNETS56262.2023.10041418 |
Ghanshyam S. Bopche, Gopal N. Rai, B. Ramachandra Reddy, Babu M. Mehtre |
Differential Attack Graph-Based Approach for Assessing Change in the Network Attack Surface |
15th International Conference on Information Systems Security (ICISS’2019), Lecture Notes in Computer Science, Springer, Cham, 2019 |
324 - 344 |
Information Security |
IDRBT Hyderabad, India |
2019 |
https://doi.org/10.1007/978-3-030-36945-3_18 |
Ghanshyam S. Bopche, Gopal N. Rai, D. R. Denslin Brabin, Babu M. Mehtre |
A Proximity-Based Measure for Quantifying the Risk of Vulnerabilities |
7th International Symposium on Security in Computing and Communications (SSCC’2019), Springer, Singapore |
41-59 |
Security in Computing and Communications |
Indian Institute of Information Technology and Management-Kerala (IIITM-K), Trivandrum, Kerala, India |
2019 |
https://doi.org/10.1007/978-981-15-4825-3_4 |
Ghanshyam S. Bopche, Gopal N. Rai, Babu M. Mehtre, G. R. Gangadharan: |
Modeling and Analyzing Multistage Attacks Using Recursive Composition Algebra |
14th International Conference on Information Systems Security (ICISS’2018), Lecture Notes in Computer Science, vol 11281. Springer, Cham. |
67-87 |
Information Security |
IISc Bengaluru, India |
2018 |
https://doi.org/10.1007/978-3-030-05171-6_4 |
Ghanshyam S. Bopche, Gopal N. Rai, Babu M. Mehtre |
Inter-path Diversity Metrics for Increasing Networks Robustness Against Zero-Day Attacks |
6th International Symposium on Security in Computing and Communications (SSCC’2018), Springer, Singapore |
53-66 |
Security in Computing and Communications |
PES Institute of Technology (South Campus), Bangalore, India |
2018 |
https://doi.org/10.1007/978-981-13-5826-5_4 |
M. A. Jabbar, Ghanshyam S. Bopche, Bulusu Lakshmana Deekshatulu, Babu M. Mehtre |
Diversity-aware, Cost-effective Network Security Hardening Using Attack Graph |
5th International Symposium on Security in Computing and Communications, SSCC’2017, Springer, Singapore. |
1-15 |
Security in Computing and Communications |
Manipal Institute of Technology (MIT), Manipal University, Manipal, Karnataka, India |
2017 |
https://doi.org/10.1007/978-981-10-6898-0_1 |
Ghanshyam S Bopche, Babu M Mehtre |
Extending attack graph-based metrics for enterprise network security management |
3rd International Conference on Advanced Computing, Networking and Informatics, ICACNI - 2016, Volume 44 of Smart Innovation, Systems and Technologies, Springer, New Delhi. |
315 - 325 |
Smart Innovation, Systems and Technologies |
KIIT, Orissa, India |
2015 |
https://doi.org/10.1007/978-81-322-2529-4_33 |
Ghanshyam S. Bopche, Babu M. Mehtre |
Change-Point Detection in Enterprise Attack Surface for Network Hardening |
3rd International Conference on Advanced Computing, Networking, and Informatics, ICACNI - 2016, Volume 43 of Smart Innovation, Systems and Technologies, 2016, Springer, New Delhi |
475 - 485 |
Smart Innovation, Systems and Technologies |
KIIT, Orissa, India |
2015 |
https://doi.org/10.1007/978-81-322-2538-6_49 |
Ghanshyam S. Bopche, Babu M. Mehtre |
Exploiting curse of diversity for improved network security |
4th International Conference on Advances in Computing, Communications, and Informatics, ICACCI - 2015 |
1975-1981 |
Advances in Computing, Communications and Informatics |
SCMS, Aluva, Kochi, India |
2015 |
10.1109/ICACCI.2015.7275907 |
Ghanshyam S. Bopche, Babu M. Mehtre: |
Exploiting Domination in Attack Graph for Enterprise Network Hardening |
3rd International Symposium on Security in Computing and Communications, SSCC’2015, Volume 536 of Communications in Computer and Information Science 2015. |
342-353 |
Security in Computing and Communications |
SCMS, Aluva, Kochi, India |
2015 |
https://doi.org/10.1007/978-3-319-22915-7_32 |
Ghanshyam S. Bopche, Babu M. Mehtre |
Attack Graph Generation, Visualization and Analysis: Issues and Challenges |
2nd International Symposium on Security in Computing and Communications, SSCC’2014, Volume 467 of Communications in Computer and Information Science 2014. |
379-390 |
Security in Computing and Communications |
GCET, Greater Noida, Delhi, India |
2014 |
https://doi.org/10.1007/978-3-662-44966-0_37 |