


default search action
Hasan Çam
Publications
- 2024
- [j38]Devkishen Sisodia
, Jun Li
, Samuel Mergendahl
, Hasan Cam
:
A Two-Mode, Adaptive Security Framework for Smart Home Security Applications. ACM Trans. Internet Things 5(2): 8:1-8:31 (2024) - 2023
- [j37]Ankit Shah
, Rajesh Ganesan
, Sushil Jajodia
, Hasan Cam, Steve E. Hutchinson:
A Novel Team Formation Framework Based on Performance in a Cybersecurity Operations Center. IEEE Trans. Serv. Comput. 16(4): 2359-2371 (2023) - 2022
- [j36]Ankit Shah, Rajesh Ganesan
, Sushil Jajodia
, Hasan Cam:
Maintaining the level of operational effectiveness of a CSOC under adverse conditions. Int. J. Inf. Sec. 21(3): 637-651 (2022) - [j35]Huashan Chen, Hasan Cam, Shouhuai Xu
:
Quantifying Cybersecurity Effectiveness of Dynamic Network Diversity. IEEE Trans. Dependable Secur. Comput. 19(6): 3804-3821 (2022) - 2021
- [i4]Huashan Chen, Hasan Cam, Shouhuai Xu:
Quantifying Cybersecurity Effectiveness of Dynamic Network Diversity. CoRR abs/2112.07826 (2021) - 2020
- [j34]Ankit Shah, Arunesh Sinha
, Rajesh Ganesan
, Sushil Jajodia
, Hasan Cam:
Two Can Play That Game: An Adversarial Evaluation of a Cyber-Alert Inspection System. ACM Trans. Intell. Syst. Technol. 11(3): 32:1-32:20 (2020) - [j33]Ankit Shah
, Rajesh Ganesan
, Sushil Jajodia
, Pierangela Samarati
, Hasan Cam:
Adaptive Alert Management for Balancing Optimal Performance among Distributed CSOCs using Reinforcement Learning. IEEE Trans. Parallel Distributed Syst. 31(1): 16-33 (2020) - [j32]Ankit Shah, Rajesh Ganesan, Sushil Jajodia, Hasan Cam:
An Outsourcing Model for Alert Analysis in a Cybersecurity Operations Center. ACM Trans. Web 14(1): 2:1-2:22 (2020) - 2019
- [j31]Ankit Shah
, Rajesh Ganesan
, Sushil Jajodia
, Hasan Cam
:
Optimal Assignment of Sensors to Analysts in a Cybersecurity Operations Center. IEEE Syst. J. 13(1): 1060-1071 (2019) - [j30]Ankit Shah
, Rajesh Ganesan
, Sushil Jajodia
, Hasan Cam
:
Understanding Tradeoffs Between Throughput, Quality, and Cost of Alert Analysis in a CSOC. IEEE Trans. Inf. Forensics Secur. 14(5): 1155-1170 (2019) - [j29]Ankit Shah
, Rajesh Ganesan
, Sushil Jajodia
, Hasan Cam:
A Two-Step Approach to Optimal Selection of Alerts for Investigation in a CSOC. IEEE Trans. Inf. Forensics Secur. 14(7): 1857-1870 (2019) - [p4]Rajesh Ganesan, Ankit Shah, Sushil Jajodia, Hasan Cam:
Optimizing Alert Data Management Processes at a Cyber Security Operations Center. Adversarial and Uncertain Reasoning for Adaptive Cyber Defense 2019: 206-231 - 2018
- [j28]Qinchen Gu, David Formby, Shouling Ji, Hasan Cam, Raheem A. Beyah
:
Fingerprinting for Cyber-Physical System Security: Device Physics Matters Too. IEEE Secur. Priv. 16(5): 49-59 (2018) - [j27]Ankit Shah, Rajesh Ganesan, Sushil Jajodia
, Hasan Cam:
A methodology to measure and monitor level of operational effectiveness of a CSOC. Int. J. Inf. Sec. 17(2): 121-134 (2018) - [j26]Ankit Shah, Rajesh Ganesan, Sushil Jajodia
, Hasan Cam:
Adaptive reallocation of cybersecurity analysts to sensors for balancing risk between sensors. Serv. Oriented Comput. Appl. 12(2): 123-135 (2018) - [j25]Ankit Shah, Rajesh Ganesan, Sushil Jajodia
, Hasan Cam:
Dynamic Optimization of the Level of Operational Effectiveness of a CSOC Under Adverse Conditions. ACM Trans. Intell. Syst. Technol. 9(5): 51:1-51:20 (2018) - [c47]Samuel Mergendahl, Devkishen Sisodia, Jun Li, Hasan Cam:
FR-WARD: Fast Retransmit as a Wary but Ample Response to Distributed Denial-of-Service Attacks from the Internet of Things. ICCCN 2018: 1-9 - [c46]Shridatt Sugrim, Sridhar Venkatesan, Jason A. Youzwak, Cho-Yu Jason Chiang, Ritu Chadha, Massimiliano Albanese
, Hasan Cam:
Measuring the Effectiveness of Network Deception. ISI 2018: 142-147 - [c45]Xiaoyun Wang, Chun-Ming Lai
, Yu-Cheng Lin, Cho-Jui Hsieh, Shyhtsun Felix Wu, Hasan Cam:
Multiple Accounts Detection on Facebook Using Semi-Supervised Learning on Graphs. MILCOM 2018: 1-9 - [c44]Cho-Yu Jason Chiang, Sridhar Venkatesan, Shridatt Sugrim, Jason A. Youzwak, Ritu Chadha, Edward I. Colbert, Hasan Cam, Massimiliano Albanese
:
On Defensive Cyber Deception: A Case Study Using SDN. MILCOM 2018: 110-115 - [c43]Devkishen Sisodia, Samuel Mergendahl, Jun Li, Hasan Cam:
Securing the Smart Home via a Two-Mode Security Framework. SecureComm (1) 2018: 22-42 - [i3]Chun-Ming Lai, Xiaoyun Wang, Yunfeng Hong, Yu-Cheng Lin, Shyhtsun Felix Wu, Patrick D. McDaniel, Hasan Cam:
Attacking Strategies and Temporal Analysis Involving Facebook Discussion Groups. CoRR abs/1802.04500 (2018) - [i2]Ankit Shah, Arunesh Sinha, Rajesh Ganesan, Sushil Jajodia, Hasan Cam:
Two Can Play That Game: An Adversarial Evaluation of a Cyber-alert Inspection System. CoRR abs/1810.05921 (2018) - [i1]Chun-Ming Lai, Xiaoyun Wang, Jon William Chapman, Yu-Cheng Lin, Yu-Chang Ho, Shyhtsun Felix Wu, Patrick D. McDaniel, Hasan Cam:
More or Less? Predict the Social Influence of Malicious URLs on Social Media. CoRR abs/1812.02978 (2018) - 2017
- [j24]Rajesh Ganesan, Sushil Jajodia
, Hasan Cam:
Optimal Scheduling of Cybersecurity Analysts for Minimizing Risk. ACM Trans. Intell. Syst. Technol. 8(4): 52:1-52:32 (2017) - [c42]Samuel Mergendahl, Devkishen Sisodia, Jun Li, Hasan Cam:
Source-End DDoS Defense in IoT Environments. IoT S&P@CCS 2017: 63-64 - [c41]Chun-Ming Lai
, Xiaoyun Wang, Yunfeng Hong, Yu-Cheng Lin, Shyhtsun Felix Wu, Patrick D. McDaniel, Hasan Cam:
Attacking strategies and temporal analysis involving Facebook discussion groups. CNSM 2017: 1-9 - [c39]Yunfeng Hong, Yongjian Hu, Chun-Ming Lai
, Shyhtsun Felix Wu, Iulian Neamtiu, Patrick D. McDaniel, Paul L. Yu, Hasan Cam, Gail-Joon Ahn
:
Defining and Detecting Environment Discrimination in Android Apps. SecureComm 2017: 510-529 - 2016
- [j23]Zhijiang Chen, Linqiang Ge, Guobin Xu, Wei Yu
, Robert F. Erbacher, Hasan Cam, Nnanna Ekedebe:
A threat monitoring system in enterprise networks with smart mobiles. Int. J. Secur. Networks 11(1/2): 66-81 (2016) - [j22]Rajesh Ganesan
, Sushil Jajodia
, Ankit Shah, Hasan Cam:
Dynamic Scheduling of Cybersecurity Analysts for Minimizing Risk Using Reinforcement Learning. ACM Trans. Intell. Syst. Technol. 8(1): 4:1-4:21 (2016) - [c37]Jin-Hee Cho, Hasan Cam, Alessandro Oltramari:
Effect of personality traits on trust and risk to phishing vulnerability: Modeling and analysis. CogSIMA 2016: 7-13 - 2015
- [c34]Jonathan Kuck, Honglei Zhuang, Xifeng Yan, Hasan Cam, Jiawei Han:
Query-Based Outlier Detection in Heterogeneous Information Networks. EDBT 2015: 325-336 - [c33]Sulabh Bhattarai, Sixiao Wei, Stephen Rook, Wei Yu
, Robert F. Erbacher, Hasan Cam:
On simulation studies of jamming threats against LTE networks. ICNC 2015: 99-103 - 2014
- [c29]Chen Zhong
, Deepak Samuel, John Yen, Peng Liu, Robert F. Erbacher, Steve E. Hutchinson, Renee Etoty, Hasan Cam, William Glodek:
RankAOH: Context-driven similarity-based retrieval of experiences in cyber analysis. CogSIMA 2014: 230-236 - [c27]Manish Gupta, Jing Gao, Xifeng Yan, Hasan Cam, Jiawei Han:
Top-K interesting subgraph discovery in information networks. ICDE 2014: 820-831 - [c26]Honglei Zhuang, Jing Zhang, George Brova, Jie Tang, Hasan Çam, Xifeng Yan, Jiawei Han:
Mining Query-Based Subnetwork Outliers in Heterogeneous Information Networks. ICDM 2014: 1127-1132 - [c25]Bo Zong, Yinghui Wu, Jie Song, Ambuj K. Singh, Hasan Çam, Jiawei Han, Xifeng Yan:
Towards scalable critical alert mining. KDD 2014: 1057-1066 - [p2]Massimiliano Albanese
, Hasan Çam, Sushil Jajodia
:
Automated Cyber Situation Awareness Tools and Models for Improving Analyst Performance. Cybersecurity Systems for Human Cognition Augmentation 2014: 47-60 - 2013
- [c24]Manish Gupta, Jing Gao, Xifeng Yan, Hasan Cam, Jiawei Han:
On detecting association-based clique outliers in heterogeneous information networks. ASONAM 2013: 108-115 - [c22]Venkatachalam Subramanian, A. Selcuk Uluagac, Hasan Cam, Raheem A. Beyah
:
Examining the characteristics and implications of sensor side channels. ICC 2013: 2205-2210 - [c21]Chen Zhong
, Deepak S. Kirubakaran, John Yen, Peng Liu, Steve E. Hutchinson, Hasan Cam:
How to use experience in cyber analysis: An analytical reasoning support system. ISI 2013: 263-265

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
[+][–] Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
[+][–] Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-07-02 18:50 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint
