default search action
Pratik Satam
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i6]Murad Mehrab Abrar, Raian Islam, Shalaka Satam, Sicong Shao, Salim Hariri, Pratik Satam:
GPS-IDS: An Anomaly-based GPS Spoofing Attack Detection Framework for Autonomous Vehicles. CoRR abs/2405.08359 (2024) - [i5]Ahmed Alhamadah, Muntasir Mamun, Henry Harms, Mathew Redondo, Yu-Zheng Lin, Jesus Pacheco, Soheil Salehi, Pratik Satam:
Photogrammetry for Digital Twinning Industry 4.0 (I4) Systems. CoRR abs/2407.18951 (2024) - 2023
- [c18]Mohammad Wali Ur Rahman, Murad Mehrab Abrar, Hunter Gibbons Copening, Salim Hariri, Sicong Shao, Pratik Satam, Soheil Salehi:
Quantized Transformer Language Model Implementations on Edge Devices. ICMLA 2023: 709-716 - [c17]Yu-Zheng Lin, Sicong Shao, Md Habibor Rahman, Mohammed Shafae, Pratik Satam:
DT4I4-Secure: Digital Twin Framework for Industry 4.0 Systems Security. UEMCON 2023: 200-209 - [i4]Mohammad Wali Ur Rahman, Murad Mehrab Abrar, Hunter Gibbons Copening, Salim Hariri, Sicong Shao, Pratik Satam, Soheil Salehi:
Quantized Transformer Language Model Implementations on Edge Devices. CoRR abs/2310.03971 (2023) - [i3]Yu-Zheng Lin, Muntasir Mamun, Muhtasim Alam Chowdhury, Shuyu Cai, Mingyu Zhu, Banafsheh Saber Latibari, Kevin Immanuel Gubbi, Najmeh Nazari Bavarsad, Arjun Caputo, Avesta Sasan, Houman Homayoun, Setareh Rafatirad, Pratik Satam, Soheil Salehi:
HW-V2W-Map: Hardware Vulnerability to Weakness Mapping Framework for Root Cause Analysis with GPT-assisted Mitigation Suggestion. CoRR abs/2312.13530 (2023) - 2022
- [j10]Chongke Wu, Sicong Shao, Cihan Tunc, Pratik Satam, Salim Hariri:
An explainable and efficient deep learning framework for video anomaly detection. Clust. Comput. 25(4): 2715-2737 (2022) - [j9]Shalaka Satam, Pratik Satam, Jesus Pacheco, Salim Hariri:
Security framework for smart cyber infrastructure. Clust. Comput. 25(4): 2767-2778 (2022) - [j8]Xin Gao, Sundaresh Ram, Rohit C. Philip, Jeffrey J. Rodríguez, Jeno Szep, Sicong Shao, Pratik Satam, Jesús Pacheco, Salim Hariri:
Selecting Post-Processing Schemes for Accurate Detection of Small Objects in Low-Resolution Wide-Area Aerial Imagery. Remote. Sens. 14(2): 255 (2022) - [c16]Mohammad Wali Ur Rahman, Sicong Shao, Pratik Satam, Salim Hariri, Chris Padilla, Zoe Taylor, Carlos Nevarez:
A BERT-based Deep Learning Approach for Reputation Analysis in Social Media. AICCSA 2022: 1-8 - [c15]Sicong Shao, Saleem Alharir, Salim Hariri, Pratik Satam, Sonia Shiri, Abdessamad Mbarki:
AI-based Arabic Language and Speech Tutor. AICCSA 2022: 1-8 - [i2]Sicong Shao, Saleem Alharir, Salim Hariri, Pratik Satam, Sonia Shiri, Abdessamad Mbarki:
AI-based Arabic Language and Speech Tutor. CoRR abs/2210.12346 (2022) - [i1]Mohammad Wali Ur Rahman, Sicong Shao, Pratik Satam, Salim Hariri, Chris Padilla, Zoe Taylor, Carlos Nevarez:
A BERT-based Deep Learning Approach for Reputation Analysis in Social Media. CoRR abs/2211.01954 (2022) - 2021
- [j7]Pratik Satam, Salim Hariri:
WIDS: An Anomaly Based Intrusion Detection System for Wi-Fi (IEEE 802.11) Protocol. IEEE Trans. Netw. Serv. Manag. 18(1): 1077-1091 (2021) - [c14]Sicong Shao, Pratik Satam, Shalaka Satam, Khalid Al-Awady, Gregory Ditzler, Salim Hariri, Cihan Tunc:
Multi-Layer Mapping of Cyberspace for Intrusion Detection. AICCSA 2021: 1-8 - 2020
- [j6]Jesus Pacheco, Victor H. Benitez, Luis Carlos Félix-Herrán, Pratik Satam:
Artificial Neural Networks-Based Intrusion Detection System for Internet of Things Fog Nodes. IEEE Access 8: 73907-73918 (2020) - [j5]Amany M. AlShawi, Pratik Satam, Firas Almoualem, Salim Hariri:
Effective Wireless Communication Architecture for Resisting Jamming Attacks. IEEE Access 8: 176691-176703 (2020) - [j4]Xin Gao, Jeno Szep, Pratik Satam, Salim Hariri, Sundaresh Ram, Jeffrey J. Rodríguez:
Spatio-Temporal Processing for Automatic Vehicle Detection in Wide-Area Aerial Video. IEEE Access 8: 199562-199572 (2020) - [c13]Shalaka Satam, Pratik Satam, Salim Hariri:
Multi-level Bluetooth Intrusion Detection System. AICCSA 2020: 1-8 - [c12]Likai Yao, Cihan Tunc, Pratik Satam, Salim Hariri:
Resilient Machine Learning (rML) Ensemble Against Adversarial Machine Learning Attacks. DDDAS 2020: 274-282
2010 – 2019
- 2019
- [b1]Pratik Satam:
A Methodology to Design Intrusion Detection Systems (IDS) for IoT/Networking Protocols. University of Arizona, Tucson, USA, 2019 - 2018
- [c11]Samuel Hess, Pratik Satam, Gregory Ditzler, Salim Hariri:
Malicious HTML File Prediction: A Detection and Classification Perspective with Noisy Data. AICCSA 2018: 1-7 - [c10]Pratik Satam, Shalaka Satam, Salim Hariri:
Bluetooth Intrusion Detection System (BIDS). AICCSA 2018: 1-7 - 2017
- [c9]Firas Almoualem, Pratik Satam, Jang-Geun Ki, Salim Hariri:
SDR-Based Resilient Wireless Communications. ICCAC 2017: 114-119 - [c8]Pratik Satam, Jesus Pacheco, Salim Hariri, Mohommad Horani:
Autoinfotainment Security Development Framework (ASDF) for Smart Cars. ICCAC 2017: 153-159 - [c7]Sicong Shao, Cihan Tunc, Pratik Satam, Salim Hariri:
Real-Time IRC Threat Detection Framework. FAS*W@SASO/ICCAC 2017: 318-323 - [c6]Pratik Satam:
Anomaly Based Wi-Fi Intrusion Detection System. FAS*W@SASO/ICCAC 2017: 377-378 - 2016
- [j3]Jesus Pacheco, Cihan Tunc, Pratik Satam, Salim Hariri:
Secure and Resilient Cloud Services for Enhanced Living Environments. IEEE Cloud Comput. 3(6): 44-52 (2016) - [c5]Pratik Satam, Douglas Kelly, Salim Hariri:
Anomaly behavior analysis of website vulnerability and security. AICCSA 2016: 1-7 - 2015
- [j2]Pratik Satam, Hamid Reza Alipour, Youssif B. Al-Nashif, Salim Hariri:
Anomaly Behavior Analysis of DNS Protocol. J. Internet Serv. Inf. Secur. 5(4): 85-97 (2015) - [j1]Hamid Reza Alipour, Youssif B. Al-Nashif, Pratik Satam, Salim Hariri:
Wireless Anomaly Detection Based on IEEE 802.11 Behavior Analysis. IEEE Trans. Inf. Forensics Secur. 10(10): 2158-2170 (2015) - [c4]Cihan Tunc, Salim Hariri, Fabian De La Pena Montero, Farah Fargo, Pratik Satam:
CLaaS: Cybersecurity Lab as a Service - Design, Analysis, and Evaluation. ICCAC 2015: 224-227 - [c3]Pratik Satam, Hamid Reza Alipour, Youssif B. Al-Nashif, Salim Hariri:
DNS-IDS: Securing DNS in the Cloud Era. ICCAC 2015: 296-301 - [c2]Cihan Tunc, Salim Hariri, Fabian De La Pena Montero, Farah Fargo, Pratik Satam, Youssif B. Al-Nashif:
Teaching and Training Cybersecurity as a Cloud Service. ICCAC 2015: 302-308 - [c1]Pratik Satam:
Cross Layer Anomaly Based Intrusion Detection System. SASO Workshops 2015: 157-161
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:10 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint