default search action
Sajjan G. Shiva
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j16]Saikat Das, Mohammad Ashrafuzzaman, Frederick T. Sheldon, Sajjan G. Shiva:
Ensembling Supervised and Unsupervised Machine Learning Algorithms for Detecting Distributed Denial of Service Attacks. Algorithms 17(3): 99 (2024) - [j15]Bhargavi Krishnamurthy, Sajjan G. Shiva:
Integral-Valued Pythagorean Fuzzy-Set-Based Dyna Q+ Framework for Task Scheduling in Cloud Computing. Sensors 24(16): 5272 (2024) - [c57]Saikat Das, Raktim Ranjan Das, Frederick T. Sheldon, Sajjan G. Shiva:
Trusting Classifiers with Interpretable Machine Learning Based Feature Selection Backpropagation. CCWC 2024: 527-533 - [c56]Saikat Das, Bhargavi Krishnamurthy, Raktim Ranjan Das, Sajjan G. Shiva:
State of the art: Security Testing of Machine Learning Development Systems. CCWC 2024: 534-540 - 2023
- [c55]Bhargavi Krishnamurthy, Sajjan G. Shiva, Saikat Das:
Handling Node Discovery Problem in Fog Computing using Categorical51 Algorithm With Explainability. AIIoT 2023: 210-215 - [c54]Saikat Das, Mazharul Hossain, Sajjan G. Shiva:
Requirements Elicitation and Stakeholder Communications for Explainable Machine Learning Systems: State of the Art. ICIT 2023: 561-566 - [c53]Mazharul Hossain, Saikat Das, Bhargavi Krishnamurthy, Sajjan G. Shiva:
Explainability of Artificial Intelligence Systems: A Survey. ISNCC 2023: 1-6 - 2022
- [j14]Saikat Das, Sajal Saha, Annita Tahsin Priyoti, Etee Kawna Roy, Frederick T. Sheldon, Anwar Haque, Sajjan G. Shiva:
Network Intrusion Detection and Comparative Analysis Using Ensemble Machine Learning and Feature Selection. IEEE Trans. Netw. Serv. Manag. 19(4): 4821-4833 (2022) - [c52]Bhargavi Krishnamurthy, Sajjan G. Shiva, Saikat Das:
MVE-based Reinforcement Learning Framework with Explainability for improving Quality of Experience of Application Placement in Fog Computing. AIIoT 2022: 84-90 - [c51]Bhargavi Krishnamurthy, Sajjan G. Shiva:
Man-in-the-Middle attack Explainer for Fog computing using Soft Actor Critic Q-Learning Approach. AIIoT 2022: 100-105 - [c50]Bhargavi Krishnamurthy, Sajjan G. Shiva:
Energy Efficient Double Critic Deep Deterministic Policy Gradient Framework for Fog Computing. AIIoT 2022: 521-527 - [c49]Bhargavi Krishnamurthy, Sajjan G. Shiva:
Scalable Hindsight Experience Replay based Q-learning Framework with Explainability for Big Data Applications in Fog Computing. CCWC 2022: 138-144 - 2021
- [c48]Saikat Das, Sajjan G. Shiva:
Machine Learning application lifecycle augmented with explanation and security. UEMCON 2021: 171-177 - 2020
- [j13]Mohammad Ashrafuzzaman, Saikat Das, Yacine Chakhchoukh, Sajjan G. Shiva, Frederick T. Sheldon:
Detecting stealthy false data injection attacks in the smart grid using ensemble-based machine learning. Comput. Secur. 97: 101994 (2020) - [j12]Ahmed M. Mahfouz, Abdullah Abuhussein, Deepak Venugopal, Sajjan G. Shiva:
Ensemble Classifiers for Network Intrusion Detection Using a Novel Network Attack Dataset. Future Internet 12(11): 180 (2020) - [c47]Saikat Das, Deepak Venugopal, Sajjan G. Shiva, Frederick T. Sheldon:
Empirical Evaluation of the Ensemble Framework for Feature Selection in DDoS Attack. CSCloud/EdgeCom 2020: 56-61 - [c46]Suhaib Al-Rousan, Abdullah Abuhussein, Faisal Alsubaei, Özkan Kahveci, Hazem Farra, Sajjan G. Shiva:
Social-Guard: Detecting Scammers in Online Dating. EIT 2020: 416-422 - [c45]Saikat Das, Namita Agarwal, Deepak Venugopal, Frederick T. Sheldon, Sajjan G. Shiva:
Taxonomy and Survey of Interpretable Machine Learning Method. SSCI 2020: 670-677 - [c44]Saikat Das, Mohammad Ashrafuzzaman, Frederick T. Sheldon, Sajjan G. Shiva:
Network Intrusion Detection using Natural Language Processing and Ensemble Machine Learning. SSCI 2020: 829-835 - [c43]Suhaib Al-Rousan, Abdullah Abuhussein, Faisal Alsubaei, Lynn Collen, Sajjan G. Shiva:
Ads-Guard: Detecting Scammers in Online Classified Ads. SSCI 2020: 1492-1498
2010 – 2019
- 2019
- [j11]Faisal Alsubaei, Abdullah Abuhussein, Sajjan G. Shiva:
Ontology-Based Security Recommendation for the Internet of Medical Things. IEEE Access 7: 48948-48960 (2019) - [j10]Faisal Alsubaei, Abdullah Abuhussein, Vivek Shandilya, Sajjan G. Shiva:
IoMT-SAF: Internet of Medical Things Security Assessment Framework. Internet Things 8 (2019) - [c42]Ahmed M. Mahfouz, Deepak Venugopal, Sajjan G. Shiva:
Comparative Analysis of ML Classifiers for Network Intrusion Detection. ICICT (2) 2019: 193-207 - [c41]Swapnika Reddy Putta, Abdullah Abuhussein, Faisal Alsubaei, Sajjan G. Shiva, Saleh Atiewi:
Security Benchmarks for Wearable Medical Things: Stakeholders-Centric Approach. ICICT (2) 2019: 405-418 - [c40]Saikat Das, Ahmed M. Mahfouz, Deepak Venugopal, Sajjan G. Shiva:
DDoS Intrusion Detection Through Machine Learning Ensemble. QRS Companion 2019: 471-477 - 2018
- [c39]Faisal Alsubaei, Abdullah Abuhussein, Sajjan G. Shiva:
Quantifying security and privacy in Internet of Things solutions. NOMS 2018: 1-6 - [c38]Sajjan G. Shiva, Saikat Das:
CoRuM: Collaborative Runtime Monitor Framework for Application Security. UCC Companion 2018: 201-206 - [c37]Eiman Aldahari, Vivek Shandilya, Sajjan G. Shiva:
Crowdsourcing Multi-Objective Recommendation System. WWW (Companion Volume) 2018: 1371-1379 - [i1]Vivek Shandilya, Sajjan G. Shiva:
On a Generic Security Game Model. CoRR abs/1801.05958 (2018) - 2017
- [c36]Ahmed M. Mahfouz, Md Lutfar Rahman, Sajjan G. Shiva:
Secure live virtual machine migration through runtime monitors. IC3 2017: 1-5 - [c35]Faisal Alsubaei, Abdullah Abuhussein, Sajjan G. Shiva:
Security and Privacy in the Internet of Medical Things: Taxonomy and Risk Assessment. LCN Workshops 2017: 112-120 - 2016
- [c34]Abdullah Abuhussein, Faisal Alsubaei, Sajjan G. Shiva, Frederick T. Sheldon:
Evaluating Security and Privacy in Cloud Services. COMPSAC 2016: 683-686 - [c33]Abdullah Abuhussein, Sajjan G. Shiva, Frederick T. Sheldon:
CSSR: Cloud Services Security Recommender. SERVICES 2016: 48-55 - 2015
- [j9]Harkeerat Singh Bedi, Sankardas Roy, Sajjan G. Shiva:
Mitigating congestion based DoS attacks with an enhanced AQM technique. Comput. Commun. 56: 60-73 (2015) - [c32]Fahad Polash, Sajjan G. Shiva:
Building Trust in Cloud: Service Certification Challenges and Approaches. CISIS 2015: 187-191 - [c31]Vivek Shandilya, Sajjan G. Shiva:
A Network Security Game Model. CODASPY 2015: 159-161 - [c30]Eman Aldhahri, Vivek Shandilya, Sajjan G. Shiva:
Towards an Effective Crowdsourcing Recommendation System: A Survey of the State-of-the-Art. SOSE 2015: 372-377 - 2014
- [j8]Vivek Shandilya, Chris B. Simmons, Sajjan G. Shiva:
Use of Attack Graphs in Security Systems. J. Comput. Networks Commun. 2014: 818957:1-818957:13 (2014) - [j7]Harkeerat Singh Bedi, Sajjan G. Shiva, Sankardas Roy:
A game inspired defense mechanism against distributed denial of service attacks. Secur. Commun. Networks 7(12): 2389-2404 (2014) - [c29]Fahad Polash, Abdullah Abuhussein, Sajjan G. Shiva:
A survey of cloud computing taxonomies: Rationale and overview. ICITST 2014: 459-465 - 2013
- [c28]Abdullah Abuhussein, Harkeerat Singh Bedi, Sajjan G. Shiva:
Towards a Stakeholder-Oriented Taxonomical Approach for Secure Cloud Computing. IEEE CLOUD 2013: 958-959 - [c27]Harkeerat Singh Bedi, Sankardas Roy, Sajjan G. Shiva:
Mitigating congestion-based denial of service attacks with active queue management. GLOBECOM 2013: 1440-1445 - [c26]Vivek Shandilya, Sajjan G. Shiva:
Security in the cloud based systems: Structure and breaches. ICITST 2013: 542-547 - [c25]Ramya Dharam, Sajjan G. Shiva:
Runtime Monitors to Detect and Prevent Union Query Based SQL Injection Attacks. ITNG 2013: 357-362 - [c24]Chris B. Simmons, Sajjan G. Shiva, Harkeerat Singh Bedi, Vivek Shandilya:
ADAPT: A Game Inspired Attack-Defense and Performance Metric Taxonomy. SEC 2013: 344-365 - 2012
- [c23]Ramya Dharam, Sajjan G. Shiva:
Runtime monitors for tautology based SQL injection attacks. CyberSec 2012: 253-258 - [c22]Harkeerat Singh Bedi, Sajjan G. Shiva:
Securing cloud infrastructure against co-resident DoS attacks using game theoretic defense mechanisms. ICACCI 2012: 463-469 - [c21]Abdullah Abuhussein, Harkeerat Singh Bedi, Sajjan G. Shiva:
Evaluating security and privacy in cloud computing services: A Stakeholder's perspective. ICITST 2012: 388-395 - 2011
- [c20]Harkeerat Singh Bedi, Sankardas Roy, Sajjan G. Shiva:
Game theory-based defense mechanisms against DDoS attacks on TCP/TCP-friendly flows. CICS 2011: 129-136 - 2010
- [c19]Sajjan G. Shiva, Sankardas Roy, Dipankar Dasgupta:
Game theory for cyber security. CSIIRW 2010: 34 - [c18]Sankardas Roy, Charles Ellis, Sajjan G. Shiva, Dipankar Dasgupta, Vivek Shandilya, Qishi Wu:
A Survey of Game Theory as Applied to Network Security. HICSS 2010: 1-10 - [c17]Sarah B. Lee, Sajjan G. Shiva:
An Approach to Overcoming Knowledge Sharing Challenges in a Corporate IT Environment. ICGSE 2010: 342-346 - [c16]Sarah B. Lee, Sajjan G. Shiva, K. S. Braunsdorf:
Knowledge Engineering to Visualize Complexity for Legacy Modernization Planning. SEKE 2010: 331-334 - [c15]Qishi Wu, Sajjan G. Shiva, Sankardas Roy, Charles Ellis, Vivek V. Datla:
On modeling and simulation of game theory-based defense mechanisms against DoS and DDoS attacks. SpringSim 2010: 159
2000 – 2009
- 2009
- [j6]Sajjan G. Shiva, Sarah B. Lee, Lubna Abou Shala, Chris B. Simmons:
Knowledge Management in Global Software Development. Int. J. Distributed Sens. Networks 5(1): 6 (2009) - [c14]Sarah B. Lee, Sajjan G. Shiva:
A Novel Approach to Knowledge Sharing in Software Systems Engineering. ICGSE 2009: 376-381 - [c13]Vasile Rus, Xiaofei Nan, Sajjan G. Shiva, Yixin Chen:
Clustering of Defect Reports Using Graph Partitioning Algorithms. SEKE 2009: 442-445 - 2008
- [j5]Sajjan G. Shiva, Lubna Abou Shala:
Using Semantic Wikis to Support Software Reuse. J. Softw. 3(4): 1-8 (2008) - [c12]Vasile Rus, Sameer Mohammed, Sajjan G. Shiva:
Automatic Clustering of Defect Reports. SEKE 2008: 291-296 - 2007
- [c11]Sajjan G. Shiva, Lubna Abou Shala:
Software Reuse: Research and Practice. ITNG 2007: 603-609 - 2005
- [c10]Sarah Bassett Lee, Sajjan G. Shiva:
Comparing Agent Software Development Methodologies Using the Waterfall Model. AMCIS 2005: 285 - [c9]Sarah Bassett Lee, Sajjan G. Shiva:
Comparing Agent Software Development Methodologies using the CMMI Engineering Process Model. AMCIS 2005: 510 - [c8]Linda B. Sherrell, Sajjan G. Shiva:
Will earlier projects plus a disciplined process enforce SE principles throughout the CS curriculum? ICSE 2005: 619-620 - 2004
- [c7]Minoo Shinde, Sajjan G. Shiva:
CMMI Framework in Small Business Environment - A Case Study. Software Engineering Research and Practice 2004: 823-826 - [c6]Derrel Blain, Sajjan G. Shiva:
Software Practices in Academia. Software Engineering Research and Practice 2004: 861-866
1990 – 1999
- 1996
- [j4]M. Douglas Williams, Eddy Gorman, Sajjan G. Shiva:
Design of a Knowledge-Based Simulation Environment. Simul. 67(2): 121-135 (1996) - [c5]Pascal Ledru, Sajjan G. Shiva:
Interpartition Communication with Shared Active Packages. TRI-Ada 1996: 57-62 - 1994
- [j3]Sajjan G. Shiva, Judit U. Jones:
A VHDL Based Expert System for Hardware Synthesis. VLSI Design 1(2): 113-126 (1994) - 1990
- [j2]Robert A. McKosky, Sajjan G. Shiva:
A file integrity checking system to detect and recover from program modification attacks in multi-user computer systems. Comput. Secur. 9(5): 431-446 (1990)
1980 – 1989
- 1989
- [c4]Robert A. McKosky, Sajjan G. Shiva:
An aposteriori computer security system to identify computer viruses. ACM Conference on Computer Science 1989: 403 - 1982
- [c3]Sajjan G. Shiva, J. A. Covington:
Modular description/simulation/synthesis using DDL. DAC 1982: 321-329 - 1981
- [c2]Sajjan G. Shiva:
On the Description of Multiprocessor Architectures. RTSS 1981: 101-110 - 1980
- [c1]Sajjan G. Shiva:
Combinational logic synthesis from an HDL description. DAC 1980: 550-555
1970 – 1979
- 1976
- [j1]Thurman A. Irving Jr., Sajjan G. Shiva, H. Troy Nagle Jr.:
Flip-Flops for Multiple-Valued Logic. IEEE Trans. Computers 25(3): 237-246 (1976)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 13:23 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint