Tech in Crisis: Filter Bubbles and Fake News D DiFranzo, K Gloria-Garcia, N Rastogi ACM XRDS 23 (3), 32-35, 2017 | 167* | 2017 |
MalONT: An ontology for malware threat intelligence N Rastogi, S Dutta, MJ Zaki, A Gittens, C Aggarwal SIGKDD Conference on Knowledge Discovery and Data Mining - International …, 2020 | 50 | 2020 |
Security and privacy of performing data analytics in the cloud: a three-way handshake of technology, policy, and management N Rastogi, MJK Gloria, J Hendler Journal of Information Policy 5, 129-154, 2015 | 30 | 2015 |
WhatsApp security and role of metadata in preserving privacy N Rastogi, J Hendler 12th International Conference on Cyber Warfare and Security 6817, 269-275, 2017 | 26 | 2017 |
TINKER: A framework for Open source Cyberthreat Intelligence N Rastogi, S Dutta, A Gittens, M Zaki, C Aggarwal 21st International Conference on Trust, Security and Privacy in Computing …, 2022 | 24* | 2022 |
CyNER: A Python Library for Cybersecurity Named Entity Recognition MT Alam, D Bhusal, Y Park, N Rastogi | 23 | 2022 |
Personal Health Knowledge Graphs for Patients N Rastogi, MJ Zaki The Knowledge Graph Conference- Personal Health Knowledge Graphs, 2020 | 16 | 2020 |
DANTE: Predicting Insider Threat using LSTM on system logs Q Ma, N Rastogi IEEE International Conference on Trust, Security and Privacy in Computing …, 2020 | 13 | 2020 |
Looking beyond IoCs: Automatically extracting attack patterns from external CTI MT Alam, D Bhusal, Y Park, N Rastogi Proceedings of the 26th International Symposium on Research in Attacks …, 2023 | 12 | 2023 |
An Ontology-driven Knowledge Graph for Android Malware R Christian, S Dutta, Y Park, N Rastogi Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021 | 10 | 2021 |
Explaining RADAR features for detecting spoofing attacks in Connected Autonomous Vehicles N Rastogi, S Rampazzi, M Clifford, M Heller, M Bishop, K Levitt AAAI'22 - Explainable Agency in Artificial Intelligence 2022, 2022 | 7 | 2022 |
FoodKG Enabled Q&A Application. S Haussmann, Y Chen, O Seneviratne, N Rastogi, J Codella, CH Chen, ... 2019 International Semantic Web Conference, 273-276, 2019 | 5 | 2019 |
Malware knowledge graph generation S Dutta, N Rastogi, D Yee, C Gu, Q Ma arXiv preprint arXiv:2102.05583, 2021 | 4 | 2021 |
Graph Analytics for anomaly detection in homogeneous wireless networks-A Simulation Approach N Rastogi, J Hendler arXiv preprint arXiv:1701.06823, 2017 | 4 | 2017 |
SoK: Modeling Explainability in Security Analytics for Interpretability, Trustworthiness, and Usability D Bhusal, R Shin, AA Shewale, MKM Veerabhadran, M Clifford, ... Proceedings of the 18th International Conference on Availability …, 2023 | 3* | 2023 |
Systemic Risk and Vulnerability Analysis of Multi-cloud Environments M Reece, TE Lander Jr, M Stoffolano, A Sampson, J Dykstra, S Mittal, ... arXiv preprint arXiv:2306.01862, 2023 | 3 | 2023 |
Applying Learning and Semantics for Personalized Food Recommendations⋆ N Rastogi, O Seneviratne, Y Chen, J Harris, D Li, A Subburathinam, ... International Semantic Web Conference (ISWC 2020) 2721 (http://ceur-ws.org …, 2020 | 2 | 2020 |
A network intrusion detection system (NIDS) based on information centrality to identify systemic cyber attacks in large systems N Rastogi Rensselaer Polytechnic Institute, 2018 | 2 | 2018 |
Secure scheme during vertical handoff in integrated heterogeneous wireless systems N Rastogi, QA Zeng, X Li 2011 Wireless Telecommunications Symposium (WTS), 1-5, 2011 | 2 | 2011 |
Graph-based Approach for Studying Spread of Radical Online Sentiment L Nguyen, N Rastogi WebConf'23 Companion: Companion Proceedings of the ACM Web Conference 2023 …, 2023 | 1 | 2023 |