default search action
Ankit Shah 0002
Person information
- affiliation: George Mason University, Center for Secure Information Systems, Fairfax, VA, USA
Other persons with the same name
- Ankit Shah — disambiguation page
- Ankit Shah 0001 — Carnegie Mellon University, Language Technologies Institute, Pittsburgh, USA
- Ankit Shah 0003 (aka: Ankit J. Shah) — Massachusetts Institute of Technology, Cambridge, MA, USA
- Ankit Shah 0004 — Shankersinh Vaghela Bapu Institute of Technology, Gandhinagar, India
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j21]Soumyadeep Hore, Jalal Ghadermazi, Ankit Shah, Nathaniel D. Bastian:
A sequential deep learning framework for a robust and resilient network intrusion detection system. Comput. Secur. 144: 103928 (2024) - 2023
- [j20]Mohammad Noroozi, Jalal Ghadermazi, Ankit Shah, José L. Zayas-Castro:
Toward Optimal Defect Detection in Assembled Printed Circuit Boards Under Adverse Conditions. IEEE Access 11: 127119-127131 (2023) - [j19]Mohammad Noroozi, Ankit Shah:
Towards optimal foreign object debris detection in an airport environment. Expert Syst. Appl. 213(Part): 118829 (2023) - [j18]Soumyadeep Hore, Ankit Shah, Nathaniel D. Bastian:
Deep VULMAN: A deep reinforcement learning-enabled cyber vulnerability management framework. Expert Syst. Appl. 221: 119734 (2023) - [j17]Soumyadeep Hore, Fariha Moomtaheen, Ankit Shah, Xinming Ou:
Towards Optimal Triage and Mitigation of Context-Sensitive Cyber Vulnerabilities. IEEE Trans. Dependable Secur. Comput. 20(2): 1270-1285 (2023) - [j16]Mohammad Noroozi, Hanieh Rastegar Moghaddam, Ankit Shah, Hadi Charkhgard, Sudeep Sarkar, Tapas K. Das, Timothy Pohland:
An AI-Assisted Systematic Literature Review of the Impact of Vehicle Automation on Energy Consumption. IEEE Trans. Intell. Veh. 8(6): 3572-3592 (2023) - [j15]Ankit Shah, Rajesh Ganesan, Sushil Jajodia, Hasan Cam, Steve E. Hutchinson:
A Novel Team Formation Framework Based on Performance in a Cybersecurity Operations Center. IEEE Trans. Serv. Comput. 16(4): 2359-2371 (2023) - [c4]Soumyadeep Hore, Quoc H. Nguyen, Yulun Xu, Ankit Shah, Nathaniel D. Bastian, Trung Le:
Empirical Evaluation of Autoencoder Models for Anomaly Detection in Packet-based NIDS. DSC 2023: 1-8 - [i5]Soumyadeep Hore, Jalal Ghadermazi, Diwas Paudel, Ankit Shah, Tapas K. Das, Nathaniel D. Bastian:
Deep PackGen: A Deep Reinforcement Learning Framework for Adversarial Network Packet Generation. CoRR abs/2305.11039 (2023) - [i4]Dinesh Sharma, Ankit Shah, Chaitra Gopalappa:
A Multi-Agent Reinforcement Learning Framework for Evaluating the U.S. Ending the HIV Epidemic Plan. CoRR abs/2311.00855 (2023) - 2022
- [j14]Ankit Shah, Rajesh Ganesan, Sushil Jajodia, Hasan Cam:
Maintaining the level of operational effectiveness of a CSOC under adverse conditions. Int. J. Inf. Sec. 21(3): 637-651 (2022) - [j13]Aigerim Bogyrbayeva, Sungwook Jang, Ankit Shah, Young Jae Jang, Changhyun Kwon:
A Reinforcement Learning Approach for Rebalancing Electric Vehicle Sharing Systems. IEEE Trans. Intell. Transp. Syst. 23(7): 8704-8714 (2022) - [i3]Soumyadeep Hore, Ankit Shah, Nathaniel D. Bastian:
Deep VULMAN: A Deep Reinforcement Learning-Enabled Cyber Vulnerability Management Framework. CoRR abs/2208.02369 (2022) - 2021
- [c3]Jalal Ghadermazi, Soumyadeep Hore, Dinesh Sharma, Ankit Shah:
Adversarial Deep Reinforcement Learning Enabled Threat Analytics Framework for Constrained Spatio-Temporal Movement Intelligence Data. ISI 2021: 1-6 - 2020
- [j12]Ankit Shah, Arunesh Sinha, Rajesh Ganesan, Sushil Jajodia, Hasan Cam:
Two Can Play That Game: An Adversarial Evaluation of a Cyber-Alert Inspection System. ACM Trans. Intell. Syst. Technol. 11(3): 32:1-32:20 (2020) - [j11]Ankit Shah, Rajesh Ganesan, Sushil Jajodia, Pierangela Samarati, Hasan Cam:
Adaptive Alert Management for Balancing Optimal Performance among Distributed CSOCs using Reinforcement Learning. IEEE Trans. Parallel Distributed Syst. 31(1): 16-33 (2020) - [j10]Ankit Shah, Rajesh Ganesan, Sushil Jajodia, Hasan Cam:
An Outsourcing Model for Alert Analysis in a Cybersecurity Operations Center. ACM Trans. Web 14(1): 2:1-2:22 (2020) - [i2]Aigerim Bogyrbayeva, Sungwook Jang, Ankit Shah, Young Jae Jang, Changhyun Kwon:
A Reinforcement Learning Approach for Rebalancing Electric Vehicle Sharing Systems. CoRR abs/2010.02369 (2020)
2010 – 2019
- 2019
- [j9]Ankit Shah, Rajesh Ganesan, Sushil Jajodia:
A methodology for ensuring fair allocation of CSOC effort for alert investigation. Int. J. Inf. Sec. 18(2): 199-218 (2019) - [j8]Ankit Shah, Rajesh Ganesan, Sushil Jajodia, Hasan Cam:
Optimal Assignment of Sensors to Analysts in a Cybersecurity Operations Center. IEEE Syst. J. 13(1): 1060-1071 (2019) - [j7]Ankit Shah, Rajesh Ganesan, Sushil Jajodia, Hasan Cam:
Understanding Tradeoffs Between Throughput, Quality, and Cost of Alert Analysis in a CSOC. IEEE Trans. Inf. Forensics Secur. 14(5): 1155-1170 (2019) - [j6]Ankit Shah, Rajesh Ganesan, Sushil Jajodia, Hasan Cam:
A Two-Step Approach to Optimal Selection of Alerts for Investigation in a CSOC. IEEE Trans. Inf. Forensics Secur. 14(7): 1857-1870 (2019) - [p1]Rajesh Ganesan, Ankit Shah, Sushil Jajodia, Hasan Cam:
Optimizing Alert Data Management Processes at a Cyber Security Operations Center. Adversarial and Uncertain Reasoning for Adaptive Cyber Defense 2019: 206-231 - 2018
- [j5]Ankit Shah, Rajesh Ganesan, Sushil Jajodia, Hasan Cam:
A methodology to measure and monitor level of operational effectiveness of a CSOC. Int. J. Inf. Sec. 17(2): 121-134 (2018) - [j4]Ankit Shah, Rajesh Ganesan, Sushil Jajodia, Hasan Cam:
Adaptive reallocation of cybersecurity analysts to sensors for balancing risk between sensors. Serv. Oriented Comput. Appl. 12(2): 123-135 (2018) - [j3]Katheryn A. Farris, Ankit Shah, George Cybenko, Rajesh Ganesan, Sushil Jajodia:
VULCON: A System for Vulnerability Prioritization, Mitigation, and Management. ACM Trans. Priv. Secur. 21(4): 16:1-16:28 (2018) - [j2]Ankit Shah, Rajesh Ganesan, Sushil Jajodia, Hasan Cam:
Dynamic Optimization of the Level of Operational Effectiveness of a CSOC Under Adverse Conditions. ACM Trans. Intell. Syst. Technol. 9(5): 51:1-51:20 (2018) - [c2]Rajesh Ganesan, Ankit Shah:
A Strategy for Effective Alert Analysis at a Cyber Security Operations Center. From Database to Cyber Security 2018: 206-226 - [i1]Ankit Shah, Arunesh Sinha, Rajesh Ganesan, Sushil Jajodia, Hasan Cam:
Two Can Play That Game: An Adversarial Evaluation of a Cyber-alert Inspection System. CoRR abs/1810.05921 (2018) - 2017
- [c1]Sridhar Venkatesan, Massimiliano Albanese, Ankit Shah, Rajesh Ganesan, Sushil Jajodia:
Detecting Stealthy Botnets in a Resource-Constrained Environment using Reinforcement Learning. MTD@CCS 2017: 75-85 - 2016
- [j1]Rajesh Ganesan, Sushil Jajodia, Ankit Shah, Hasan Cam:
Dynamic Scheduling of Cybersecurity Analysts for Minimizing Risk Using Reinforcement Learning. ACM Trans. Intell. Syst. Technol. 8(1): 4:1-4:21 (2016)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-14 00:51 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint