Diksha Goel

Publications

For an updated list of publications, visit my Google Scholar profile.

2025
  • Minjune Kim, Jeff Wang, Kristen Moore, Diksha Goel, et al. "CyberAlly: Leveraging LLMs and Knowledge Graphs to Empower Cyber Defenders." ACM Web Conference 2025 (WWW'25) (CORE A*). To Appear.
  • Derui Wang, Kristen Moore, Diksha Goel, et al. "CAMP in the Odyssey: Provably Robust Reinforcement Learning with Certified Radius Maximization." USENIX Security 2025 (CORE A*). Link
  • Majid Abdulsatar, Hussain Ahmad, Diksha Goel, Faheem Ullah. "Towards Deep Learning Enabled Cybersecurity Risk Assessment for Microservice Architectures." Cluster Computing, To Appear (Impact Factor: 3.6). Link
2024
  • Diksha Goel, Kristen Moore, Mingyu Guo, et al. "Optimizing Cyber Defense in Dynamic Active Directories through Reinforcement Learning." ESORICS 2024 (CORE A). Link
  • Diksha Goel, Hong Shen, Hui Tian, Mingyu Guo. "Effective Graph-Neural-Network based Models for Discovering Structural Hole Spanners in Large-Scale and Diverse Networks." Expert Systems with Applications, 2024 (Impact Factor: 8.5). Link
  • Ankit Kumar Jain, Hariom Shukla, Diksha Goel. "A Comprehensive Survey on DDoS Detection, Mitigation, and Defense Strategies in Software-Defined Networks." Cluster Computing, 2024 (Impact Factor: 4.4). Link
  • Mingyu Guo, Diksha Goel, Guanhua Wang, et al. "Mechanism Design for Public Projects via Three Machine Learning Based Approaches." Autonomous Agents and Multi-Agent Systems, 2024 (Impact Factor: 2.5, CORE A). Link
  • Diksha Goel, Max Ward, Aneta Neumann, et al. "Hardening Active Directory Graphs via Evolutionary Diversity Optimization based Policies." ACM Transactions on Evolutionary Learning and Optimization, 2024. Link
  • Raveen Kanishka Jayalath, Hussain Ahmad, Diksha Goel, et al. "Microservice Vulnerability Analysis: A Literature Review with Empirical Insights." IEEE Access, 2024 (Impact Factor: 3.4). Link
  • Ankit Kumar Jain, Hariom Shukla, Diksha Goel. "S-Defender: A Smishing Detection Approach in Mobile Environment." International Conference on Cyber Warfare, Security and Space Computing, Pages 68-78. Link
2023
  • Diksha Goel, Aneta Neumann, Frank Neumann, et al. "Evolving Reinforcement Learning Environment to Minimize Learner’s Achievable Reward: An Application on Hardening Active Directory Systems." GECCO 2023 (CORE A). Link
2022
  • Diksha Goel, Max Hector Ward-Graham, Aneta Neumann, et al. "Defending Active Directory by Combining Neural Network Based Dynamic Program and Evolutionary Diversity Optimisation." GECCO 2022, Boston, MA, USA (CORE A). Link
  • Diksha Goel, Hong Shen, Hui Tian, Mingyu Guo. "Discovering Structural Hole Spanners in Dynamic Networks via Graph Neural Networks." WI-IAT 2022, Niagara Falls, Canada (CORE B). Link
2021
  • Diksha Goel, Hong Shen, Hui Tian, Mingyu Guo. "Maintenance of Structural Hole Spanners in Dynamic Networks." LCN 2021, Edmonton, AB, Canada (CORE A). Link
  • Deepa Joshi, Vidyanand Mishra, Honey Srivastav, Diksha Goel. "Progressive Transfer Learning Approach for Identifying the Leaf Type by Optimising Network Parameters." Neural Processing Letters, Volume 53, Issue 5, Pages 3653-3676, 2021 (Impact Factor: 2.5). Link
2020
  • Ankit Kumar Jain, Diksha Goel, Sanjli Agarwal, et al. "Predicting spam messages using back propagation neural network." Wireless Personal Communications, Volume 110, Issue 1, Pages 403-422, 2020 (Impact Factor: 2.01). Link
2019
  • Diksha Goel, Megha Quamara. "Role-Based Authorization and Authentication Framework for Remote Service Access by In-Vehicle Users." ICDSMLA 2019, Springer, Singapore. Link
2018
  • Diksha Goel, Ankit Kumar Jain. "Mobile phishing attacks and defence mechanisms: State of art and open research challenges." Computers & Security, Volume 73, Pages 519-544, 2018 (Impact Factor: 5.1, CORE B). Link
  • Diksha Goel, Ankit Kumar Jain. "Smishing-classifier: a novel framework for detection of smishing attack in mobile environment." NGCT 2018, Springer, Singapore. Link
  • Diksha Goel, Ankit Kumar Jain. "Overview of smartphone security: Attack and defence techniques." Computer and Cyber Security, Volume 4, Pages 249-281, 2018. Link