If you made any changes in Pure, your changes will be visible here soon.

Fingerprint Fingerprint is based on mining the text of the experts' scientific documents to create an index of weighted terms, which defines the key subjects of each individual researcher.

Communication Engineering & Materials Science
Binary trees Engineering & Materials Science
Data storage equipment Engineering & Materials Science
VLSI Layout Mathematics
Networks (circuits) Engineering & Materials Science
Randomized Algorithms Mathematics
Message Passing Mathematics
Scheduling Engineering & Materials Science

Research Output 1982 2014

29 Citations (Scopus)

The operational role of security information and event management systems

Bhatt, S., Manadhata, P. K. & Zomlot, L., Jan 1 2014, In : IEEE Security and Privacy. 12, 5, p. 35-41 7 p., 6924640.

Research output: Contribution to journalArticle

event
management
Security of data
Industry
incident
2 Citations (Scopus)

Examining Intrusion Prevention System events from worldwide networks

Sundaramurthy, S. C., Bhatt, S. & Eisenbarth, M. R., Nov 26 2012, BADGERS'12 - Proceedings of the Workshop on Building Analysis Datasets and Gathering Experience Returns for Security. p. 5-12 8 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Stevens Institute of Technology

Research output: Chapter in Book/Report/Conference proceedingConference contribution

On computing enterprise IT risk metrics

Bhatt, S., Horne, W. & Rao, P., Feb 28 2011, In : HP Laboratories Technical Report. 26

Research output: Contribution to journalArticle

Industry
Monitoring
Decision making
2 Citations (Scopus)

On computing enterprise IT risk metrics

Bhatt, S., Horne, W. & Rao, P., Aug 2 2011, Future Challenges in Security and Privacy for Academia and Industry - 26th IFIP TC 11 International Information Security Conference, SEC 2011, Proceedings. p. 271-280 10 p. (IFIP Advances in Information and Communication Technology; vol. 354 AICT).

Stevens Institute of Technology

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Industry
Monitoring
Decision making
Vulnerability
An enterprise
4 Citations (Scopus)

Analyzing end-to-end network reachability

Bandhakavi, S., Bhatt, S., Okita, C. & Rao, P., Nov 17 2009, 2009 IFIP/IEEE International Symposium on Integrated Network Management, IM 2009. p. 585-590 6 p. 5188865. (2009 IFIP/IEEE International Symposium on Integrated Network Management, IM 2009).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Network security
Routers
Switches
Engineers
Testing