Sudip Mittal
Mississippi State University
H-index: 26
North America-United States
Top articles of Sudip Mittal
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
Explainable Predictive Maintenance: A Survey of Current Methods, Challenges and Opportunities | Logan Cummins Alex Sommers Somayeh Bakhtiari Ramezani Sudip Mittal Joseph Jabour | 2024/1/15 | |
Security Considerations in AI-Robotics: A Survey of Current Methods, Challenges, and Opportunities | Subash Neupane Shaswata Mitra Ivan A Fernandez Swayamjit Saha Sudip Mittal | 2024/2/7 | |
AI Ethics: A Bibliometric Analysis, Critical Issues, and Key Gaps | International Journal of Business Analytics (IJBAN) | Di Kevin Gao Andrew Haverly Sudip Mittal Jiming Wu Jingdao Chen | 2024/2 |
Utilizing Large Language Models to Translate RFC Protocol Specifications to CPSA Definitions | Hot Topics in the Science of Security (HoTSoS 2024) | Martin Duclos Ivan A Fernandez Kaneesha Moore Sudip Mittal Edward Zieglar | 2024/1/30 |
MedInsight: A Multi-Source Context Augmentation Framework for Generating Patient-Centric Medical Responses using Large Language Models | arXiv preprint arXiv:2403.08607 | Subash Neupane Shaswata Mitra Sudip Mittal Noorbakhsh Amiri Golilarz Shahram Rahimi | 2024/3/13 |
Eclectic Rule Extraction for Explainability of Deep Neural Network based Intrusion Detection Systems | arXiv preprint arXiv:2401.10207 | Jesse Ables Nathaniel Childers William Anderson Sudip Mittal Shahram Rahimi | 2024/1/18 |
An Analysis of Prerequisites for Artificial Intelligence / Machine Learning-Assisted Malware Analysis Learning Modules | Journal of The Colloquium for Information Systems Security Education | Portia Pusey Maanak Gupta Sudip Mittal Mahmoud Abdelsalam | 2024/2/27 |
LOCALINTEL: Generating Organizational Threat Intelligence from Global and Local Cyber Knowledge | arXiv preprint arXiv:2401.10036 | Shaswata Mitra Subash Neupane Trisha Chakraborty Sudip Mittal Aritran Piplai | 2024/1/18 |
Patient-Centric Knowledge Graphs: A Survey of Current Methods, Challenges, and Applications | Hassan S Al Khatib Subash Neupane Harish Kumar Manchukonda Noorbakhsh Amiri Golilarz Sudip Mittal | 2024/2/20 | |
Explainable intrusion detection systems using competitive learning techniques | arXiv preprint arXiv:2303.17387 | Jesse Ables Thomas Kirby Sudip Mittal Ioana Banicescu Shahram Rahimi | 2023/3/30 |
Impacts and risk of generative ai technology on cyber defense | arXiv preprint arXiv:2306.13033 | Subash Neupane Ivan A Fernandez Sudip Mittal Shahram Rahimi | 2023/6/22 |
A Bibliometric View of AI Ethics Development | Di Kevin Gao Andrew Haverly Sudip Mittal Jingdao Chen | 2023/12/4 | |
AI Security Threats against Pervasive Robotic Systems: A Course for Next Generation Cybersecurity Workforce | Sudip Mittal Jingdao Chen | 2023/2 | |
Systemic Risk and Vulnerability Analysis of Multi-cloud Environments | arXiv preprint arXiv:2306.01862 | Morgan Reece Theodore Edward Lander Jr Matthew Stoffolano Andy Sampson Josiah Dykstra | 2023/6/2 |
Emergent (In) Security of Multi-Cloud Environments | Morgan Reece Theodore Lander Jr Sudip Mittal Nidhi Rastogi Josiah Dykstra | 2023/11/2 | |
TwinExplainer: Explaining Predictions of an Automotive Digital Twin | arXiv preprint arXiv:2302.00152 | Subash Neupane Ivan A Fernandez Wilson Patterson Sudip Mittal Milan Parmar | 2023/2/1 |
REGARD: Rules of EngaGement for Automated cybeR Defense to aid in Intrusion Response | arXiv preprint arXiv:2305.13967 | Damodar Panigrahi William Anderson Joshua Whitman Sudip Mittal Benjamin A Blakely | 2023/5/23 |
Knowledge-enhanced neurosymbolic artificial intelligence for cybersecurity and privacy | IEEE Internet Computing | Aritran Piplai Anantaa Kotal Seyedreza Mohseni Manas Gaur Sudip Mittal | 2023/9/28 |
CAPoW: Context-Aware AI-Assisted Proof of Work based DDoS Defense | Trisha Chakraborty Shaswata Mitra Sudip Mittal | 2023/1 | |
Survey of Malware Analysis through Control Flow Graph using Machine Learning | Shaswata Mitra Stephen A Torri Sudip Mittal | 2023/5/15 |