Login / Signup
Ankit Shah
ORCID
Publication Activity (10 Years)
Years Active: 2016-2024
Publications (10 Years): 28
Top Topics
Intrusion Detection
Printed Circuit Boards
Reinforcement Learning
Optimal Assignment
Top Venues
CoRR
Int. J. Inf. Sec.
ACM Trans. Intell. Syst. Technol.
IEEE Trans. Inf. Forensics Secur.
</>
Publications
</>
Soumyadeep Hore
,
Jalal Ghadermazi
,
Ankit Shah
,
Nathaniel D. Bastian
A sequential deep learning framework for a robust and resilient network intrusion detection system.
Comput. Secur.
144 (2024)
Mohammad Noroozi
,
Jalal Ghadermazi
,
Ankit Shah
,
José L. Zayas-Castro
Toward Optimal Defect Detection in Assembled Printed Circuit Boards Under Adverse Conditions.
IEEE Access
11 (2023)
Soumyadeep Hore
,
Jalal Ghadermazi
,
Diwas Paudel
,
Ankit Shah
,
Tapas K. Das
,
Nathaniel D. Bastian
Deep PackGen: A Deep Reinforcement Learning Framework for Adversarial Network Packet Generation.
CoRR
(2023)
Soumyadeep Hore
,
Ankit Shah
,
Nathaniel D. Bastian
Deep VULMAN: A deep reinforcement learning-enabled cyber vulnerability management framework.
Expert Syst. Appl.
221 (2023)
Dinesh Sharma
,
Ankit Shah
,
Chaitra Gopalappa
A Multi-Agent Reinforcement Learning Framework for Evaluating the U.S. Ending the HIV Epidemic Plan.
CoRR
(2023)
Mohammad Noroozi
,
Ankit Shah
Towards optimal foreign object debris detection in an airport environment.
Expert Syst. Appl.
213 (Part) (2023)
Ankit Shah
,
Rajesh Ganesan
,
Sushil Jajodia
,
Hasan Cam
,
Steve E. Hutchinson
A Novel Team Formation Framework Based on Performance in a Cybersecurity Operations Center.
IEEE Trans. Serv. Comput.
16 (4) (2023)
Soumyadeep Hore
,
Fariha Moomtaheen
,
Ankit Shah
,
Xinming Ou
Towards Optimal Triage and Mitigation of Context-Sensitive Cyber Vulnerabilities.
IEEE Trans. Dependable Secur. Comput.
20 (2) (2023)
Soumyadeep Hore
,
Quoc H. Nguyen
,
Yulun Xu
,
Ankit Shah
,
Nathaniel D. Bastian
,
Trung Le
Empirical Evaluation of Autoencoder Models for Anomaly Detection in Packet-based NIDS.
DSC
(2023)
Mohammad Noroozi
,
Hanieh Rastegar Moghaddam
,
Ankit Shah
,
Hadi Charkhgard
,
Sudeep Sarkar
,
Tapas K. Das
,
Timothy Pohland
An AI-Assisted Systematic Literature Review of the Impact of Vehicle Automation on Energy Consumption.
IEEE Trans. Intell. Veh.
8 (6) (2023)
Ankit Shah
,
Rajesh Ganesan
,
Sushil Jajodia
,
Hasan Cam
Maintaining the level of operational effectiveness of a CSOC under adverse conditions.
Int. J. Inf. Sec.
21 (3) (2022)
Soumyadeep Hore
,
Ankit Shah
,
Nathaniel D. Bastian
Deep VULMAN: A Deep Reinforcement Learning-Enabled Cyber Vulnerability Management Framework.
CoRR
(2022)
Aigerim Bogyrbayeva
,
Sungwook Jang
,
Ankit Shah
,
Young Jae Jang
,
Changhyun Kwon
A Reinforcement Learning Approach for Rebalancing Electric Vehicle Sharing Systems.
IEEE Trans. Intell. Transp. Syst.
23 (7) (2022)
Ankit Shah
,
Rajesh Ganesan
,
Sushil Jajodia
,
Pierangela Samarati
,
Hasan Cam
Adaptive Alert Management for Balancing Optimal Performance among Distributed CSOCs using Reinforcement Learning.
IEEE Trans. Parallel Distributed Syst.
31 (1) (2020)
Ankit Shah
,
Arunesh Sinha
,
Rajesh Ganesan
,
Sushil Jajodia
,
Hasan Cam
Two Can Play That Game: An Adversarial Evaluation of a Cyber-Alert Inspection System.
ACM Trans. Intell. Syst. Technol.
11 (3) (2020)
Ankit Shah
,
Rajesh Ganesan
,
Sushil Jajodia
,
Hasan Cam
An Outsourcing Model for Alert Analysis in a Cybersecurity Operations Center.
ACM Trans. Web
14 (1) (2020)
Ankit Shah
,
Rajesh Ganesan
,
Sushil Jajodia
,
Hasan Cam
Understanding Tradeoffs Between Throughput, Quality, and Cost of Alert Analysis in a CSOC.
IEEE Trans. Inf. Forensics Secur.
14 (5) (2019)
Ankit Shah
,
Rajesh Ganesan
,
Sushil Jajodia
,
Hasan Cam
Optimal Assignment of Sensors to Analysts in a Cybersecurity Operations Center.
IEEE Syst. J.
13 (1) (2019)
Ankit Shah
,
Rajesh Ganesan
,
Sushil Jajodia
,
Hasan Cam
A Two-Step Approach to Optimal Selection of Alerts for Investigation in a CSOC.
IEEE Trans. Inf. Forensics Secur.
14 (7) (2019)
Ankit Shah
,
Rajesh Ganesan
,
Sushil Jajodia
A methodology for ensuring fair allocation of CSOC effort for alert investigation.
Int. J. Inf. Sec.
18 (2) (2019)
Ankit Shah
,
Rajesh Ganesan
,
Sushil Jajodia
,
Hasan Cam
Dynamic Optimization of the Level of Operational Effectiveness of a CSOC Under Adverse Conditions.
ACM Trans. Intell. Syst. Technol.
9 (5) (2018)
Ankit Shah
,
Arunesh Sinha
,
Rajesh Ganesan
,
Sushil Jajodia
,
Hasan Cam
Two Can Play That Game: An Adversarial Evaluation of a Cyber-alert Inspection System.
CoRR
(2018)
Ankit Shah
,
Rajesh Ganesan
,
Sushil Jajodia
,
Hasan Cam
A methodology to measure and monitor level of operational effectiveness of a CSOC.
Int. J. Inf. Sec.
17 (2) (2018)
Katheryn A. Farris
,
Ankit Shah
,
George Cybenko
,
Rajesh Ganesan
,
Sushil Jajodia
VULCON: A System for Vulnerability Prioritization, Mitigation, and Management.
ACM Trans. Priv. Secur.
21 (4) (2018)
Ankit Shah
,
Rajesh Ganesan
,
Sushil Jajodia
,
Hasan Cam
Adaptive reallocation of cybersecurity analysts to sensors for balancing risk between sensors.
Serv. Oriented Comput. Appl.
12 (2) (2018)
Rajesh Ganesan
,
Ankit Shah
A Strategy for Effective Alert Analysis at a Cyber Security Operations Center.
From Database to Cyber Security
(2018)
Sridhar Venkatesan
,
Massimiliano Albanese
,
Ankit Shah
,
Rajesh Ganesan
,
Sushil Jajodia
Detecting Stealthy Botnets in a Resource-Constrained Environment using Reinforcement Learning.
MTD@CCS
(2017)
Rajesh Ganesan
,
Sushil Jajodia
,
Ankit Shah
,
Hasan Cam
Dynamic Scheduling of Cybersecurity Analysts for Minimizing Risk Using Reinforcement Learning.
ACM Trans. Intell. Syst. Technol.
8 (1) (2016)