Follow
Devkishen Sisodia
Devkishen Sisodia
Verified email at cs.uoregon.edu - Homepage
Title
Cited by
Cited by
Year
Android malware detection via graphlet sampling
T Gao, W Peng, D Sisodia, TK Saha, F Li, M Al Hasan
IEEE Transactions on Mobile Computing 18 (12), 2754-2767, 2018
402018
Source-end DDoS defense in IoT environments
S Mergendahl, D Sisodia, J Li, H Cam
Proceedings of the 2017 workshop on internet of things security and privacy …, 2017
132017
On the State of Internet of Things Security: Vulnerabilities, Attacks, and Recent Countermeasures
D SISODIA
University of Oregon, Eugene, 2020
122020
Poster: Content-agnostic identification of cryptojacking in network traffic
Y Feng, D Sisodia, J Li
Proceedings of the 15th ACM Asia Conference on Computer and Communications …, 2020
102020
Cj-sniffer: Measurement and content-agnostic detection of cryptojacking traffic
Y Feng, J Li, D Sisodia
Proceedings of the 25th International Symposium on Research in Attacks …, 2022
92022
In-network filtering of distributed denial-of-service traffic with near-optimal rule selection
D Sisodia, J Li, L Jiao
Proceedings of the 15th ACM Asia Conference on Computer and Communications …, 2020
72020
On multi-point, in-network filtering of distributed denial-of-service traffic
M Zhang, L Shi, D Sisodia, J Li, P Reiher
2019 IFIP/IEEE Symposium on Integrated Network and Service Management (IM …, 2019
72019
The catch-22 attack
L Shi, D Sisodia, M Zhang, J Li, A Dainotti, P Reiher
Annual Computer Security Applications Conference (ACSAC), 2019
72019
ACTS: extracting android app topological signature through graphlet sampling
W Peng, T Gao, D Sisodia, TK Saha, F Li, M Al Hasan
2016 IEEE Conference on Communications and Network Security (CNS), 37-45, 2016
72016
FR-WARD: Fast retransmit as a wary but ample response to distributed denial-of-service attacks from the Internet of Things
S Mergendahl, D Sisodia, J Li, H Cam
2018 27th International Conference on Computer Communication and Networks …, 2018
62018
Securing the smart home via a two-mode security framework
D Sisodia, S Mergendahl, J Li, H Cam
Security and Privacy in Communication Networks: 14th International …, 2018
52018
Bridging Missing Gaps in Evaluating {DDoS} Research
L Shi, S Mergendahl, D Sisodia, J Li
13th USENIX Workshop on Cyber Security Experimentation and Test (CSET 20), 2020
22020
On Explainable and Adaptable Detection of Distributed Denial-of-Service Traffic
Y Feng, J Li, D Sisodia, P Reiher
IEEE Transactions on Dependable and Secure Computing, 2023
12023
On the detection of smart, self-propagating internet worms
J Li, D Sisodia, S Stafford
IEEE Transactions on Dependable and Secure Computing, 2022
12022
Defending Against IoT-Enabled DDoS Attacks at Critical Vantage Points on the Internet
D Sisodia
University of Oregon, 2022
12022
A Two-Mode, Adaptive Security Framework for Smart Home Security Applications
D Sisodia, J Li, S Mergendahl, H Cam
ACM Transactions on Internet of Things 5 (2), 1-31, 2024
2024
Toward Adaptive DDoS-Filtering Rule Generation
J Li, D Sisodia, Y Feng, L Shi, M Zhang, C Early, P Reiher
2023 IEEE Conference on Communications and Network Security (CNS), 1-9, 2023
2023
Adaptive Distributed Filtering of DDoS Traffic on the Internet
J Li, D Sisodia, Y Feng, L Shi, M Zhang, C Early, P Reiher
arXiv preprint arXiv:2305.13296, 2023
2023
Panel Discussion and Audience Dialogue: Sharing Artifacts and Data for Cybersecurity Experimentation
L Shi, S Mergendahl, D Sisodia, J Li, T Benzel, D Prince, D Hutchison
13th USENIX Workshop on Cyber Security Experimentation and Test (CSET 20), 2020
2020
Playing in the Sandbox: A Step Towards Sound DDoS Research Through High-Fidelity Evaluation
L Shi, S Mergendahl, D Sisodia, J Li
The system can't perform the operation now. Try again later.
Articles 1–20