Sudip Mittal
Sudip Mittal
Assistant Professor & Associate Director, Mississippi State University
Verified email at - Homepage
Cited by
Cited by
Security and privacy in smart farming: Challenges and opportunities
M Gupta, M Abdelsalam, S Khorsandroo, S Mittal
IEEE access 8, 34564-34584, 2020
Cybertwitter: Using twitter to generate alerts for cybersecurity threats and vulnerabilities
S Mittal, PK Das, V Mulwad, A Joshi, T Finin
2016 IEEE/ACM International Conference on Advances in Social Networks …, 2016
RelExt: Relation Extraction using Deep Learning approaches for Cybersecurity Knowledge Graph Improvement
A Pingle, A Piplai, S Mittal, A Joshi, J Holt, R Zak
International Conference on Advances in Social Networks Analysis and Mining …, 2019
Generating digital twin models using knowledge graphs for industrial production lines
A Banerjee, R Dalal, S Mittal, KP Joshi
9th International ACM Web Science Conference 2017 - Industrial Knowledge Graphs, 2017
OBD_SecureAlert: An anomaly detection system for vehicles
SN Narayanan, S Mittal, A Joshi
2016 IEEE International Conference on Smart Computing (SMARTCOMP), 1-6, 2016
Enabling and enforcing social distancing measures using smart city and its infrastructures: a COVID-19 Use case
M Gupta, M Abdelsalam, S Mittal
arXiv preprint arXiv:2004.09246, 2020
Cyber attacks on smart farming infrastructure
S Sontowski, M Gupta, SSL Chukkapalli, M Abdelsalam, S Mittal, A Joshi, ...
6th IEEE International Conference on Collaboration and Internet Computing …, 2020
Creating cybersecurity knowledge graphs from malware after action reports
A Piplai, S Mittal, A Joshi, T Finin, J Holt, R Zak
IEEE Access 2020, 2020
Ontologies and artificial intelligence systems for the cooperative smart farming ecosystem
SSL Chukkapalli, S Mittal, M Gupta, M Abdelsalam, A Joshi, R Sandhu, ...
Ieee Access 8, 164045-164064, 2020
Anomaly detection models for smart home security
S Ramapatruni, SN Narayanan, S Mittal, A Joshi, K Joshi
2019 IEEE 5th Intl Conference on Big Data Security on Cloud (BigDataSecurity …, 2019
Using data analytics to detect anomalous states in vehicles
SN Narayanan, S Mittal, A Joshi
arXiv preprint arXiv:1512.08048, 2015
Generating Fake Cyber Threat Intelligence Using Transformer-Based Models
P Ranade, A Piplai, S Mittal, A Joshi, T Finin
International Joint Conference on Neural Networks 2021 (IJCNN 2021), 2021
Cyber-all-intel: An ai for security related threat intelligence
S Mittal, A Joshi, T Finin
arXiv preprint arXiv:1905.02895, 2019
Explainable Intrusion Detection Systems (X-IDS): A Survey of Current Methods, Challenges, and Opportunities
S Neupane, J Ables, W Anderson, S Mittal, S Rahimi, I Banicescu, ...
IEEE Access 2022, 2022
Analyzing CNN Based Behavioural Malware Detection Techniques on Cloud IaaS
A McDole, M Abdelsalam, M Gupta, S Mittal
CLOUD 2020, 2020
AI for Security and Security for AI
E Bertino, M Kantarcioglu, CG Akcora, S Samtani, S Mittal, M Gupta
11th ACM Conference on Data and Application Security and Privacy (ACM …, 2021
Preventing poisoning attacks on AI based threat intelligence systems
N Khurana, S Mittal, A Piplai, A Joshi
2019 IEEE 29th Machine Learning for Signal Processing (MLSP), 1-6, 2019
Thinking, fast and slow: Combining vector spaces and knowledge graphs
S Mittal, A Joshi, T Finin
arXiv preprint arXiv:1708.03310, 2017
The pin-bang theory: Discovering the Pinterest world
S Mittal, N Gupta, P Dewan, P Kumaraguru
arXiv preprint arXiv:1307.4952, 2013
Deep Learning Techniques for Behavioural Malware Analysis in Cloud IaaS
A McDole, M Gupta, M Abdelsalam, S Mittal, M Alazab
Malware Analysis using Artificial Intelligence and Deep Learning, 2021
The system can't perform the operation now. Try again later.
Articles 1–20