Follow
Nidhi Rastogi
Title
Cited by
Cited by
Year
Tech in Crisis: Filter Bubbles and Fake News
D DiFranzo, K Gloria-Garcia, N Rastogi
ACM XRDS 23 (3), 32-35, 2017
164*2017
MalONT: An ontology for malware threat intelligence
N Rastogi, S Dutta, MJ Zaki, A Gittens, C Aggarwal
SIGKDD Conference on Knowledge Discovery and Data Mining - International …, 2020
492020
Security and privacy of performing data analytics in the cloud: a three-way handshake of technology, policy, and management
N Rastogi, MJK Gloria, J Hendler
Journal of Information Policy 5, 129-154, 2015
302015
WhatsApp security and role of metadata in preserving privacy
N Rastogi, J Hendler
12th International Conference on Cyber Warfare and Security 6817, 269-275, 2017
262017
TINKER: A framework for Open source Cyberthreat Intelligence
N Rastogi, S Dutta, A Gittens, M Zaki, C Aggarwal
21st International Conference on Trust, Security and Privacy in Computing …, 2022
22*2022
CyNER: A Python Library for Cybersecurity Named Entity Recognition
MT Alam, D Bhusal, Y Park, N Rastogi
202022
Personal Health Knowledge Graphs for Patients
N Rastogi, MJ Zaki
The Knowledge Graph Conference- Personal Health Knowledge Graphs, 2020
162020
DANTE: Predicting Insider Threat using LSTM on system logs
Q Ma, N Rastogi
IEEE International Conference on Trust, Security and Privacy in Computing …, 2020
122020
Looking beyond IoCs: Automatically extracting attack patterns from external CTI
MT Alam, D Bhusal, Y Park, N Rastogi
Proceedings of the 26th International Symposium on Research in Attacks …, 2023
112023
An Ontology-driven Knowledge Graph for Android Malware
R Christian, S Dutta, Y Park, N Rastogi
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
102021
FoodKG Enabled Q&A Application.
S Haussmann, Y Chen, O Seneviratne, N Rastogi, J Codella, CH Chen, ...
2019 International Semantic Web Conference, 273-276, 2019
52019
Explaining RADAR features for detecting spoofing attacks in Connected Autonomous Vehicles
N Rastogi, S Rampazzi, M Clifford, M Heller, M Bishop, K Levitt
AAAI'22 - Explainable Agency in Artificial Intelligence 2022, 2022
42022
Malware knowledge graph generation
S Dutta, N Rastogi, D Yee, C Gu, Q Ma
arXiv preprint arXiv:2102.05583, 2021
42021
Graph Analytics for anomaly detection in homogeneous wireless networks-A Simulation Approach
N Rastogi, J Hendler
arXiv preprint arXiv:1701.06823, 2017
42017
SoK: Modeling Explainability in Security Analytics for Interpretability, Trustworthiness, and Usability
D Bhusal, R Shin, AA Shewale, MKM Veerabhadran, M Clifford, ...
Proceedings of the 18th International Conference on Availability …, 2023
2*2023
Systemic Risk and Vulnerability Analysis of Multi-cloud Environments
M Reece, TE Lander Jr, M Stoffolano, A Sampson, J Dykstra, S Mittal, ...
arXiv preprint arXiv:2306.01862, 2023
22023
Applying Learning and Semantics for Personalized Food Recommendations⋆
N Rastogi, O Seneviratne, Y Chen, J Harris, D Li, A Subburathinam, ...
International Semantic Web Conference (ISWC 2020) 2721 (http://ceur-ws.org …, 2020
22020
A network intrusion detection system (NIDS) based on information centrality to identify systemic cyber attacks in large systems
N Rastogi
Rensselaer Polytechnic Institute, 2018
22018
Secure scheme during vertical handoff in integrated heterogeneous wireless systems
N Rastogi, QA Zeng, X Li
2011 Wireless Telecommunications Symposium (WTS), 1-5, 2011
22011
Graph-based Approach for Studying Spread of Radical Online Sentiment
L Nguyen, N Rastogi
WWW'23 Companion: Companion Proceedings of the ACM Web Conference 2023, 1373 …, 2023
12023
The system can't perform the operation now. Try again later.
Articles 1–20