default search action
Rishikesh Sahay
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c5]Rishikesh Sahay, Weizhi Meng, Wenjuan Li:
A Comparative Analysis of Phishing Tools: Features and Countermeasures. ISPEC 2024: 365-382 - 2023
- [j8]Rishikesh Sahay, Daniel A. Sepulveda Estay, Weizhi Meng, Christian Damsgaard Jensen, Michael Bruhn Barfod:
A comparative risk analysis on CyberShip system with STPA-Sec, STRIDE and CORAS. Comput. Secur. 128: 103179 (2023) - 2022
- [i2]Rishikesh Sahay, Daniel A. Sepulveda Estay, Weizhi Meng, Christian Damsgaard Jensen, Michael Bruhn Barfod:
A Comparative Risk Analysis on CyberShip System with STPA-Sec, STRIDE and CORAS. CoRR abs/2212.10830 (2022) - 2021
- [j7]Rishikesh Sahay, Weizhi Meng, Daniel A. Sepulveda Estay, Christian Damsgaard Jensen, Michael Bruhn Barfod:
Corrigendum to "CyberShip-IoT: A Dynamic and Adaptive SDN-Based Security Policy Enforcement Framework for Ships" [Future Gener. Comput. Syst. 100 (2019) 736-750]. Future Gener. Comput. Syst. 118: 492-494 (2021) - 2020
- [j6]Daniel A. Sepulveda Estay, Rishikesh Sahay, Michael Bruhn Barfod, Christian Damsgaard Jensen:
A systematic review of cyber-resilience assessment frameworks. Comput. Secur. 97: 101996 (2020)
2010 – 2019
- 2019
- [j5]Rishikesh Sahay, Weizhi Meng, Daniel A. Sepulveda Estay, Christian Damsgaard Jensen, Michael Bruhn Barfod:
CyberShip-IoT: A dynamic and adaptive SDN-based security policy enforcement framework for ships. Future Gener. Comput. Syst. 100: 736-750 (2019) - [j4]Rishikesh Sahay, Weizhi Meng, Christian Damsgaard Jensen:
The application of Software Defined Networking on securing computer networks: A survey. J. Netw. Comput. Appl. 131: 89-108 (2019) - 2018
- [j3]Jose Rubio-Hernan, Rishikesh Sahay, Luca De Cicco, Joaquín García-Alfaro:
Cyber-physical architecture assisted by programmable networking. Internet Technol. Lett. 1(4) (2018) - [c4]Rishikesh Sahay, D. A. Sepulveda, Weizhi Meng, Christian Damsgaard Jensen, Michael Bruhn Barfod:
CyberShip: An SDN-Based Autonomic Attack Mitigation Framework for Ship Systems. SciSec 2018: 191-198 - [i1]Jose Rubio-Hernan, Rishikesh Sahay, Luca De Cicco, Joaquín García-Alfaro:
Cyber-Physical Architecture Assisted by Programmable Networking. CoRR abs/1802.02360 (2018) - 2017
- [b1]Rishikesh Sahay:
Policy-driven autonomic cyberdefense using software-defined networking. (Cyberdefense autonome pilotée par règles à l'aide d'un réseau défini par logiciel). Telecom & Management SudParis, Évry, Essonne, France, 2017 - [j2]Rishikesh Sahay, Gregory Blanc, Zonghua Zhang, Hervé Debar:
ArOMA: An SDN based autonomic DDoS mitigation framework. Comput. Secur. 70: 482-499 (2017) - [c3]Gregory Blanc, Dawid Machnicki, Rodrigo Diaz-Rodriguez, Adam Kozakiewicz, Youki Kadobayashi, Rishikesh Sahay, Pawel Pawlinski:
NECOMA - Nippon-European Cyberdefense-Oriented Multilayer Analysis. EPS 2017 - [c2]Rishikesh Sahay, Gregory Blanc, Zonghua Zhang, Khalifa Toumi, Hervé Debar:
Adaptive Policy-driven Attack Mitigation in SDN. XDOMO@EuroSys 2017: 4:1-4:6 - 2015
- [j1]Ashok Singh Sairam, Sangita Roy, Rishikesh Sahay:
Coloring networks for attacker identification and response. Secur. Commun. Networks 8(5): 751-768 (2015) - 2011
- [c1]Deepak Kumar, Rishikesh Sahay, Ganesh R. Hegde, Debasish Jena:
A novel simple secure internet voting protocol. ICCCS 2011: 586-589
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-05 22:02 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint