Follow
Sathya Chandran Sundaramurthy
Sathya Chandran Sundaramurthy
Verified email at netflix.com - Homepage
Title
Cited by
Cited by
Year
A human capital model for mitigating security analyst burnout
SC Sundaramurthy, AG Bardas, J Case, X Ou, M Wesch, J McHugh, ...
Eleventh symposium on usable privacy and security (SOUPS 2015), 347-359, 2015
1222015
Experimental study of fuzzy hashing in malware clustering analysis
Y Li, SC Sundaramurthy, AG Bardas, X Ou, D Caragea, X Hu, J Jang
8th workshop on cyber security experimentation and test (cset 15), 2015
1032015
Turning contradictions into innovations or: How we learned to stop whining and improve security operations
SC Sundaramurthy, J McHugh, X Ou, M Wesch, AG Bardas, ...
Twelfth Symposium on Usable Privacy and Security (SOUPS 2016), 237-251, 2016
902016
A tale of three security operation centers
SC Sundaramurthy, J Case, T Truong, L Zomlot, M Hoffmann
Proceedings of the 2014 ACM workshop on security information workers, 43-50, 2014
722014
Prioritizing intrusion analysis using Dempster-Shafer theory
L Zomlot, SC Sundaramurthy, K Luo, X Ou, SR Rajagopalan
Proceedings of the 4th ACM workshop on Security and artificial intelligence …, 2011
702011
An anthropological approach to studying CSIRTs
SC Sundaramurthy, J McHugh, XS Ou, SR Rajagopalan, M Wesch
IEEE Security & Privacy 12 (5), 52-60, 2014
542014
MTD CBITS: Moving target defense for cloud-based IT systems
AG Bardas, SC Sundaramurthy, X Ou, SA DeLoach
Computer Security–ESORICS 2017: 22nd European Symposium on Research in …, 2017
322017
Aiding intrusion analysis using machine learning
L Zomlot, S Chandran, D Caragea, X Ou
2013 12th International Conference on Machine Learning and Applications 2, 40-47, 2013
292013
Practical IDS alert correlation in the face of dynamic threats
SC Sundaramurthy, L Zomlot, X Ou
Proceedings of the International Conference on Security and Management (SAM), 1, 2011
262011
Humans are dynamic-our tools should be too
SC Sundaramurthy, M Wesch, X Ou, J McHugh, SR Rajagopalan, ...
IEEE Internet Computing 21 (3), 40-46, 2017
212017
Deploying android security updates: an extensive study involving manufacturers, carriers, and end users
KR Jones, TF Yen, SC Sundaramurthy, AG Bardas
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
152020
Classification of UDP Traffic for DDoS Detection.
AG Bardas, L Zomlot, SC Sundaramurthy, X Ou, SR Rajagopalan, ...
LEET, 2012
142012
Humans are dynamic. Our tools should be too. Innovations from the Anthropological Study of Security Operations Centers
SC Sundaramurthy, M Wesch, X Ou, J McHugh, SR Rajagopalan, ...
IEEE Internet Computing, 2017
92017
An anthropological study of security operations centers to improve operational efficiency
SC Sundaramurthy
University of South Florida, 2017
52017
Examining intrusion prevention system events from worldwide networks
SC Sundaramurthy, S Bhatt, MR Eisenbarth
Proceedings of the 2012 ACM workshop on building analysis datasets and …, 2012
52012
An empirical study on current models for reasoning about digital evidence
S Nagy, I Palmer, SC Sundaramurthy, X Ou, R Campbell
10th International Conference on Systematic Approaches to Digital Forensic …, 2015
32015
Designing forensic analysis techniques through anthropology
SC Sundaramurthy
Proceedings of the 2013 New Security Paradigms Workshop, 119-120, 2013
32013
Examining Intrusion Prevention System Events from Worldwide Networks
SS Chandran, B Sandeep, RM Eisenbarth
BADGERS’12, 2012
32012
The role of processes in security operations centers
S Bhatt, W Horne, S Sundaramurthy, L Zomlot
Psychosocial dynamics of cyber security, 86-103, 2016
12016
Investigative response modeling and predictive data collection
D Moor, SR Rajagopalan, SC Sundaramurthy, X Ou
2012 eCrime Researchers Summit, 1-6, 2012
2012
The system can't perform the operation now. Try again later.
Articles 1–20