Author(s) |
Title of Paper |
Title of the Proceedings |
Page numbers |
Conference Theme |
Venue |
Year |
doi |
Ghanshyam S. Bopche, Gopal N. Rai, B. Ramachandra Reddy, Babu M. Mehtre |
Differential Attack Graph-Based Approach for Assessing Change in the Network Attack Surface |
15th International Conference on Information Systems Security (ICISS’2019), Lecture Notes in Computer Science, Springer, Cham, 2019 |
324 - 344 |
Information Security |
IDRBT Hyderabad, India |
2019 |
https://doi.org/10.1007/978-3-030-36945-3_18 |
Ghanshyam S. Bopche, Gopal N. Rai, D. R. Denslin Brabin, Babu M. Mehtre |
A Proximity-Based Measure for Quantifying the Risk of Vulnerabilities |
7th International Symposium on Security in Computing and Communications (SSCC’2019), Springer, Singapore |
41-59 |
Security in Computing and Communications |
Indian Institute of Information Technology and Management-Kerala (IIITM-K), Trivandrum, Kerala, India |
2019 |
https://doi.org/10.1007/978-981-15-4825-3_4 |
Ghanshyam S. Bopche, Gopal N. Rai, Babu M. Mehtre, G. R. Gangadharan: |
Modeling and Analyzing Multistage Attacks Using Recursive Composition Algebra |
14th International Conference on Information Systems Security (ICISS’2018), Lecture Notes in Computer Science, vol 11281. Springer, Cham. |
67-87 |
Information Security |
IISc Bengaluru, India |
2018 |
https://doi.org/10.1007/978-3-030-05171-6_4 |
Ghanshyam S. Bopche, Gopal N. Rai, Babu M. Mehtre |
Inter-path Diversity Metrics for Increasing Networks Robustness Against Zero-Day Attacks |
6th International Symposium on Security in Computing and Communications (SSCC’2018), Springer, Singapore |
53-66 |
Security in Computing and Communications |
PES Institute of Technology (South Campus), Bangalore, India |
2018 |
https://doi.org/10.1007/978-981-13-5826-5_4 |
M. A. Jabbar, Ghanshyam S. Bopche, Bulusu Lakshmana Deekshatulu, Babu M. Mehtre |
Diversity-aware, Cost-effective Network Security Hardening Using Attack Graph |
5th International Symposium on Security in Computing and Communications, SSCC’2017, Springer, Singapore. |
1-15 |
Security in Computing and Communications |
Manipal Institute of Technology (MIT), Manipal University, Manipal, Karnataka, India |
2017 |
https://doi.org/10.1007/978-981-10-6898-0_1 |
Ghanshyam S Bopche, Babu M Mehtre |
Extending attack graph-based metrics for enterprise network security management |
3rd International Conference on Advanced Computing, Networking and Informatics, ICACNI - 2016, Volume 44 of Smart Innovation, Systems and Technologies, Springer, New Delhi. |
315 - 325 |
Smart Innovation, Systems and Technologies |
KIIT, Orissa, India |
2015 |
https://doi.org/10.1007/978-81-322-2529-4_33 |
Ghanshyam S. Bopche, Babu M. Mehtre |
Change-Point Detection in Enterprise Attack Surface for Network Hardening |
3rd International Conference on Advanced Computing, Networking, and Informatics, ICACNI - 2016, Volume 43 of Smart Innovation, Systems and Technologies, 2016, Springer, New Delhi |
475 - 485 |
Smart Innovation, Systems and Technologies |
KIIT, Orissa, India |
2015 |
https://doi.org/10.1007/978-81-322-2538-6_49 |
Ghanshyam S. Bopche, Babu M. Mehtre |
Exploiting curse of diversity for improved network security |
4th International Conference on Advances in Computing, Communications, and Informatics, ICACCI - 2015 |
1975-1981 |
Advances in Computing, Communications and Informatics |
SCMS, Aluva, Kochi, India |
2015 |
10.1109/ICACCI.2015.7275907 |
Ghanshyam S. Bopche, Babu M. Mehtre: |
Exploiting Domination in Attack Graph for Enterprise Network Hardening |
3rd International Symposium on Security in Computing and Communications, SSCC’2015, Volume 536 of Communications in Computer and Information Science 2015. |
342-353 |
Security in Computing and Communications |
SCMS, Aluva, Kochi, India |
2015 |
https://doi.org/10.1007/978-3-319-22915-7_32 |
Ghanshyam S. Bopche, Babu M. Mehtre |
Attack Graph Generation, Visualization and Analysis: Issues and Challenges |
2nd International Symposium on Security in Computing and Communications, SSCC’2014, Volume 467 of Communications in Computer and Information Science 2014. |
379-390 |
Security in Computing and Communications |
GCET, Greater Noida, Delhi, India |
2014 |
https://doi.org/10.1007/978-3-662-44966-0_37 |