default search action
Deepak K. Tosh
Person information
- affiliation: University of Texas at El Paso, Department of Computer Science, TX, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j16]Fabrice Mvah, Vianney Kengne Tchendji, Clémentin Tayou Djamégni, Ahmed H. Anwar, Deepak K. Tosh, Charles A. Kamhoua:
Countering ARP spoofing attacks in software-defined networks using a game-theoretic approach. Comput. Secur. 139: 103696 (2024) - [j15]Fabrice Mvah, Vianney Kengne Tchendji, Clémentin Tayou Djamégni, Ahmed H. Anwar, Deepak K. Tosh, Charles A. Kamhoua:
GaTeBaSep: game theory-based security protocol against ARP spoofing attacks in software-defined networks. Int. J. Inf. Sec. 23(1): 373-387 (2024) - [c51]Fabrice Mvah, Vianney Kengne Tchendji, Clémentin Tayou Djamégni, Ahmed H. Anwar, Deepak K. Tosh, Charles A. Kamhoua:
Deception-Based IDS Against ARP Spoofing Attacks in Software-Defined Networks. ICNC 2024: 188-192 - [c50]William Marfo, Deepak K. Tosh, Shirley V. Moore:
Enhancing Network Anomaly Detection Using Graph Neural Networks. MedComNet 2024: 1-10 - [c49]Adeel A. Malik, Deepak K. Tosh:
Towards Developing a Scalable Cyber Risk Assessment and Mitigation Framework. SysCon 2024: 1-8 - [i4]William Marfo, Pablo Moriano, Deepak K. Tosh, Shirley V. Moore:
Detecting Masquerade Attacks in Controller Area Networks Using Graph Machine Learning. CoRR abs/2408.05427 (2024) - 2023
- [c48]Fabrice Mvah, Vianney Kengne Tchendji, Clémentin Tayou Djamégni, Ahmed H. Anwar, Deepak K. Tosh, Charles A. Kamhoua:
FlipPath Game to Counter Stealthy Attacks in SDN-Based Tactical Networks. GameSec 2023: 294-308 - [c47]Achile Leonel Nguemkam, Ahmed H. Anwar, Vianney Kengne Tchendji, Deepak K. Tosh, Charles A. Kamhoua:
Optimal Honeypot Allocation using Core Attack Graph in Cyber Deception Games. PIMRC 2023: 1-6 - [c46]Jared M. Aguayo, Abel O. Gomez Rivera, Deepak K. Tosh:
Integrating 5G Technology for Improved Process Monitoring and Network Slicing in ICS. SmartGridComm 2023: 1-7 - [c45]Adeel A. Malik, Deepak K. Tosh:
Dynamic Vulnerability Classification for Enhanced Cyber Situational Awareness. SysCon 2023: 1-8 - [i3]William Marfo, Deepak K. Tosh, Shirley V. Moore:
Condition monitoring and anomaly detection in cyber-physical systems. CoRR abs/2301.09030 (2023) - [i2]William Marfo, Deepak K. Tosh, Shirley V. Moore:
Network Anomaly Detection Using Federated Learning. CoRR abs/2303.07452 (2023) - [i1]Md Abu Sayed, Moqsadur Rahman, Mohammad Ariful Islam Khan, Deepak K. Tosh:
A Survey of Network Requirements for Enabling Effective Cyber Deception. CoRR abs/2309.00184 (2023) - 2022
- [j14]Abel O. Gomez Rivera, Deepak K. Tosh, Uttam Ghosh:
Resilient sensor authentication in SCADA by integrating physical unclonable function and blockchain. Clust. Comput. 25(3): 1869-1883 (2022) - [j13]Uttam Ghosh, Deepak K. Tosh, Nawab Muhammad Faseeh Qureshi, Ali Kashif Bashir, Al-Sakib Khan Pathan, Zhaolong Ning:
Cyber-Physical Systems: Prospects, Challenges and Role in Software-Defined Networking and Blockchains. Future Internet 14(12): 382 (2022) - [j12]Prasad Ramesh Desai, S. Mini, Deepak K. Tosh:
Edge-Based Optimal Routing in SDN-Enabled Industrial Internet of Things. IEEE Internet Things J. 9(19): 18898-18907 (2022) - [j11]Adeel A. Malik, Deepak K. Tosh:
Dynamic Risk Assessment and Analysis Framework for Large-Scale Cyber-Physical Systems. EAI Endorsed Trans. Security Safety 8(30): 1 (2022) - [c44]Abel O. Gomez Rivera, Evan M. White, Jaime C. Acosta, Deepak K. Tosh:
Enabling Device Trustworthiness for SDN-Enabled Internet -of- Battlefield Things. DSC 2022: 1-7 - [c43]Anthony Castañares, Deepak K. Tosh:
Tactical Topology Optimization Methodology for Slice Aware and Reconfigurable Battlefield Networks. MILCOM 2022: 273-278 - [c42]William Marfo, Deepak K. Tosh, Shirley V. Moore:
Network Anomaly Detection Using Federated Learning. MILCOM 2022: 484-489 - [c41]Abel O. Gomez Rivera, Deepak K. Tosh:
Achieving Self-Configurable Runtime State Verification in Critical Cyber-Physical Systems. SmartGridComm 2022: 340-346 - [c40]William Marfo, Deepak K. Tosh, Shirley V. Moore:
Condition monitoring and anomaly detection in cyber-physical systems. SoSE 2022: 106-111 - 2021
- [j10]Md Ali Reza Al Amin, Sachin Shetty, Laurent Njilla, Deepak K. Tosh, Charles A. Kamhoua:
Hidden Markov Model and Cyber Deception for the Prevention of Adversarial Lateral Movement. IEEE Access 9: 49662-49682 (2021) - [j9]Eranga Bandara, Sachin Shetty, Deepak K. Tosh, Xueping Liang:
Vind: A Blockchain-Enabled Supply Chain Provenance Framework for Energy Delivery Systems. Frontiers Blockchain 4: 607320 (2021) - [j8]Eranga Bandara, Deepak K. Tosh, Peter Foytik, Sachin Shetty, Nalin Ranasinghe, Kasun De Zoysa:
Tikiri - Towards a lightweight blockchain for IoT. Future Gener. Comput. Syst. 119: 154-165 (2021) - [j7]Xueping Liang, Sachin Shetty, Deepak K. Tosh, Peter Foytik, Lingchen Zhang:
Leveraging Intel SGX to enable trusted and privacy preserving membership service in distributed ledgers. Int. J. Inf. Comput. Secur. 16(1/2): 63-83 (2021) - [j6]Kim-Kwang Raymond Choo, Uttam Ghosh, Deepak K. Tosh, Reza M. Parizi, Ali Dehghantanha:
Introduction to the Special Issue on Decentralized Blockchain Applications and Infrastructures for Next Generation Cyber-Physical Systems. ACM Trans. Internet Techn. 21(2): 38e:1-38e:3 (2021) - [c39]Eranga Bandara, Deepak K. Tosh, Sachin Shetty, Bheshaj Krishnappa:
CySCPro - Cyber Supply Chain Provenance Framework for Risk Management of Energy Delivery Systems. Blockchain 2021: 65-72 - [c38]Abel O. Gomez Rivera, Evan M. White, Deepak K. Tosh:
Robust Authentication and Data Flow Integrity for P2P SCADA Infrastructures. LCN 2021: 557-564 - [c37]Adeel A. Malik, Deepak K. Tosh:
Robust Cyber-threat and Vulnerability Information Analyzer for Dynamic Risk Assessment. MeditCom 2021: 168-173 - [c36]Anthony Castañares, Deepak K. Tosh, Charles A. Kamhoua:
Slice Aware Framework for Intelligent and Reconfigurable Battlefield Networks. MILCOM 2021: 489-494 - [c35]Abel O. Gomez Rivera, Deepak K. Tosh, Sachin Shetty:
Achieving Runtime State Verification Assurance in Critical Cyber-Physical Infrastructures. SmartGridComm 2021: 245-251 - 2020
- [c34]Vineet Naique Dhaimodker, Rahul Desai, S. Mini, Deepak K. Tosh:
Quality-driven Energy Optimization in Internet of Things. ICCCN 2020: 1-8 - [c33]Adeel A. Malik, Deepak K. Tosh:
Quantitative Risk Modeling and Analysis for Large-Scale Cyber-Physical Systems. ICCCN 2020: 1-6 - [c32]Iman Vakilinia, Mohammad Jafari, Deepak K. Tosh, Shahin Vakilinia:
Privacy Preserving Path Planning in an Adversarial Zone. ISNCC 2020: 1-6 - [c31]Abel O. Gomez Rivera, Deepak K. Tosh, Jaime C. Acosta, Laurent Njilla:
Achieving Sensor Identification and Data Flow Integrity in Critical Cyber-Physical Infrastructures. SmartGridComm 2020: 1-6 - [c30]Peter Foytik, Sachin Shetty, Sarada Prasad Gochhayat, Eranga Herath, Deepak K. Tosh, Laurent Njilla:
A Blockchain Simulator for Evaluating Consensus Algorithms in Diverse Networking Environments. SpringSim 2020: 1-12 - [c29]Xueping Liang, Sachin Shetty, Peter Foytik, Deepak K. Tosh:
Enforcing Security and Privacy in Distributed Ledgers by Intel SGX. SpringSim 2020: 1-12 - [c28]Deepak K. Tosh, Oscar Galindo, Vladik Kreinovich, Olga Kosheleva:
Towards Security of Cyber-Physical Systems using Quantum Computing Algorithms. SoSE 2020: 313-320
2010 – 2019
- 2019
- [j5]Deepak K. Tosh, Sachin Shetty, Xueping Liang, Charles A. Kamhoua, Laurent L. Njilla:
Data Provenance in the Cloud: A Blockchain-Based Approach. IEEE Consumer Electron. Mag. 8(4): 38-44 (2019) - [j4]Md Ali Reza Al Amin, Sachin Shetty, Laurent Njilla, Deepak K. Tosh, Charles Kamouha:
Attacker Capability based Dynamic Deception Model for Large-Scale Networks. EAI Endorsed Trans. Security Safety 6(21): e2 (2019) - [c27]Abel O. Gomez Rivera, Deepak K. Tosh, Laurent Njilla:
Scalable Blockchain Implementation for Edge-based Internet of Things Platform. MILCOM 2019: 1-6 - [c26]Erick D. Buenrostro, Abel O. Gomez Rivera, Deepak K. Tosh, Jaime C. Acosta, Laurent Njilla:
Evaluating Usability of Permissioned Blockchain for Internet-of-Battlefield Things Security. MILCOM 2019: 841-846 - [c25]Adeel A. Malik, Deepak K. Tosh, Uttam Ghosh:
Non-Intrusive Deployment of Blockchain in Establishing Cyber-Infrastructure for Smart City. SECON 2019: 1-6 - [c24]Madhan E. S., Uttam Ghosh, Deepak K. Tosh, Mandal K., E. Murali, Soumalya Ghosh:
An Improved Communications in Cyber Physical System Architecture, Protocols and Applications. SECON 2019: 1-6 - [c23]Md Ali Reza Al Amin, Sachin Shetty, Laurent Njilla, Deepak K. Tosh, Charles A. Kamhoua:
Online Cyber Deception System Using Partially Observable Monte-Carlo Planning Framework. SecureComm (2) 2019: 205-223 - 2018
- [j3]Xueping Liang, Sachin Shetty, Deepak K. Tosh, Juan Zhao, Danyi Li, Jihong Liu:
A Reliable Data Provenance and Privacy Preservation Architecture for Business-Driven Cyber-Physical Systems Using Blockchain. Int. J. Inf. Secur. Priv. 12(4): 68-81 (2018) - [j2]Deepak K. Tosh, Shamik Sengupta, Charles A. Kamhoua, Kevin A. Kwiat:
Establishing evolutionary game models for CYBer security information EXchange (CYBEX). J. Comput. Syst. Sci. 98: 27-52 (2018) - [j1]Xueping Liang, Sachin Shetty, Deepak K. Tosh, Daniel Bowden, Laurent Njilla, Charles A. Kamhoua:
Towards Blockchain Empowered Trusted and Accountable Data Sharing and Collaboration in Mobile Healthcare Applications. EAI Endorsed Trans. Pervasive Health Technol. 4(15): e3 (2018) - [c22]Deepak K. Tosh, Sachin Shetty, Peter Foytik, Charles A. Kamhoua, Laurent Njilla:
CloudPoS: A Proof-of-Stake Consensus Design for Blockchain Integrated Cloud. IEEE CLOUD 2018: 302-309 - [c21]Xueping Liang, Sachin Shetty, Deepak K. Tosh:
Exploring the Attack Surfaces in Blockchain Enabled Smart Cities. ISC2 2018: 1-8 - [c20]Deepak K. Tosh, Sachin Shetty, Peter Foytik, Laurent Njilla, Charles A. Kamhoua:
Blockchain-Empowered Secure Internet -of- Battlefield Things (IoBT) Architecture. MILCOM 2018: 593-598 - [c19]Xueping Liang, Sachin Shetty, Deepak K. Tosh, Yafei Ji, Danyi Li:
Towards a Reliable and Accountable Cyber Supply Chain in Energy Delivery System Using Blockchain. SecureComm (2) 2018: 43-62 - [c18]Kamrul Hasan, Sachin Shetty, John Sokolowski, Deepak K. Tosh:
Security game for cyber physical systems. SpringSim (CNS) 2018: 12:1-12:12 - 2017
- [c17]Uttam Ghosh, Pushpita Chatterjee, Deepak K. Tosh, Sachin Shetty, Kaiqi Xiong, Charles A. Kamhoua:
An SDN Based Framework for Guaranteeing Security and Performance in Information-Centric Cloud Networks. CLOUD 2017: 749-752 - [c16]Deepak K. Tosh, Sachin Shetty, Xueping Liang, Charles A. Kamhoua, Kevin A. Kwiat, Laurent Njilla:
Security Implications of Blockchain Cloud with Analysis of Block Withholding Attack. CCGrid 2017: 458-467 - [c15]Xueping Liang, Sachin Shetty, Deepak K. Tosh, Charles A. Kamhoua, Kevin A. Kwiat, Laurent Njilla:
ProvChain: A Blockchain-based Data Provenance Architecture in Cloud Environment with Enhanced Privacy and Availability. CCGrid 2017: 468-477 - [c14]Deepak K. Tosh, Sachin Shetty, Shamik Sengupta, Jay P. Kesan, Charles A. Kamhoua:
Risk Management Using Cyber-Threat Information Sharing and Cyber-Insurance. GAMENETS 2017: 154-164 - [c13]Deepak K. Tosh, Iman Vakilinia, Sachin Shetty, Shamik Sengupta, Charles A. Kamhoua, Laurent Njilla, Kevin A. Kwiat:
Three Layer Game Theoretic Decision Framework for Cyber-Investment and Cyber-Insurance. GameSec 2017: 519-532 - [c12]Xueping Liang, Sachin Shetty, Deepak K. Tosh, Peter Foytik, Lingchen Zhang:
Towards a Trusted and Privacy Preserving Membership Service in Distributed Ledger Using Intel Software Guard Extensions. ICICS 2017: 304-310 - [c11]Iman Vakilinia, Deepak K. Tosh, Shamik Sengupta:
3-Way game model for privacy-preserving cybersecurity information exchange framework. MILCOM 2017: 829-834 - [c10]Iman Vakilinia, Deepak K. Tosh, Shamik Sengupta:
Attribute based sharing in cybersecurity information exchange framework. SPECTS 2017: 1-6 - [c9]Iman Vakilinia, Deepak K. Tosh, Shamik Sengupta:
Privacy-preserving cybersecurity information exchange mechanism. SPECTS 2017: 1-7 - [c8]Deepak K. Tosh, Sachin Shetty, Xueping Liang, Charles A. Kamhoua, Laurent Njilla:
Consensus protocols for blockchain-based data provenance: Challenges and opportunities. UEMCON 2017: 469-474 - 2015
- [c7]Deepak K. Tosh, Shamik Sengupta, Sankar Mukhopadhyay, Charles A. Kamhoua, Kevin A. Kwiat:
Game Theoretic Modeling to Enforce Security Information Sharing among Firms. CSCloud 2015: 7-12 - [c6]Charles A. Kamhoua, Andrew P. Martin, Deepak K. Tosh, Kevin A. Kwiat, Chad Heitzenrater, Shamik Sengupta:
Cyber-Threats Information Sharing in Cloud Computing: A Game Theoretic Approach. CSCloud 2015: 382-389 - [c5]Deepak K. Tosh, Matthew Molloy, Shamik Sengupta, Charles A. Kamhoua, Kevin A. Kwiat:
Cyber-Investment and Cyber-Information Exchange Decision Modeling. HPCC/CSS/ICESS 2015: 1219-1224 - [c4]Deepak K. Tosh, Shamik Sengupta, Charles A. Kamhoua, Kevin A. Kwiat, Andrew P. Martin:
An evolutionary game-theoretic framework for cyber-threat information sharing. ICC 2015: 7341-7346 - [c3]Deepak K. Tosh, Shamik Sengupta:
Heterogeneous access network(s) selection in multi-interface radio devices. PerCom Workshops 2015: 117-122 - 2013
- [c2]Deepak K. Tosh, Shamik Sengupta:
Self-Coexistence in Cognitive Radio Networks Using Multi-Stage Perception Learning. VTC Fall 2013: 1-5 - 2011
- [c1]Deepak K. Tosh, Siba K. Udgata, Samrat L. Sabat:
Cognitive Radio Parameter Adaptation Using Multi-objective Evolutionary Algorithm. SocProS (1) 2011: 737-748
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 20:32 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint