Monitoring the Full Range of ω-Regular Properties of Stochastic Systems K Gondi, Y Patel, AP Sistla International Workshop on Verification, Model Checking, and Abstract …, 2009 | 26 | 2009 |
Verification, Model Checking, and Abstract Interpretation: 10th International Conference, VMCAI 2009, Savannah, GA, USA, January 18-20, 2009. Proceedings ND Jones Springer Science & Business Media, 2009 | 17 | 2009 |
Swipe: eager erasure of sensitive data in large scale systems software K Gondi, P Bisht, P Venkatachari, AP Sistla, VN Venkatakrishnan Proceedings of the second ACM conference on Data and Application Security …, 2012 | 14 | 2012 |
Web-application attacks: A survey M Khari, P Sangwan 2016 3rd International Conference on Computing for Sustainable Global …, 2016 | 11 | 2016 |
Webapparmor: a framework for robust prevention of attacks on web applications VN Venkatakrishnan, P Bisht, M Ter Louw, M Zhou, K Gondi, KT Ganesh Information Systems Security: 6th International Conference, ICISS 2010 …, 2010 | 11 | 2010 |
Enabling multi-threaded applications on hybrid shared memory manycore architectures T Rawat, A Shrivastava 2015 Design, Automation & Test in Europe Conference & Exhibition (DATE), 742-747, 2015 | 3 | 2015 |
Secure IT Systems: 19th Nordic Conference, NordSec 2014, Tromsø, Norway, October 15-17, 2014, Proceedings K Bernsmed, S Fischer-Hübner Springer, 2014 | 3 | 2014 |
Deics: Data erasure in concurrent software K Gondi, AP Sistla, VN Venkatakrishnan Secure IT Systems: 19th Nordic Conference, NordSec 2014, Tromsø, Norway …, 2014 | 2 | 2014 |
Minimizing Lifetime of Sensitive Data in Concurrent Programs K Gondi, AP Sistla, VN Venkatakrishnan 4th ACM Conference on Data and Application Security and Privacy, 2014 | 2 | 2014 |
Information Systems Security: 6th International Conference, ICISS 2010, Gandhinagar, India, December 17-19, 2010 S Jha, A Mathuria Springer Science & Business Media, 2010 | 1 | 2010 |
Verification, Model Checking, and Abstract Interpretation NDJM Müller-Olm | 1 | 2009 |
Recent Advances in Intrusion Detection EKS Jha, D Balzarotti | 1 | 2009 |
Information Systems Security A Prakash, IS Gupta Springer, 2009 | 1 | 2009 |
Information Systems Security: 10th International Conference, ICISS 2014, Hyderabad, India, December 16-20, 2014. Proceedings A Prakash, R Shyamasundar Springer, 2014 | | 2014 |
Program Transformation Techniques for Erasing Sensitive Data in Sequential and Concurrent Applications K Gondi University of Illinois at Chicago, 2013 | | 2013 |
Evaluation of Swipe P Venkatachari University of Illinois at Chicago, 2010 | | 2010 |
thaNks tO Our summarIzers P Bisht, J Brattin, K Butler, M Carbone, S Clark, I Dacosta, T Deshane, ... | | 2009 |
PMI: Privileged Management Infrastructure K Gondi CMC Magazine, 2006 | | 2006 |
Secure IT Systems K Bernsmed, S Fischer-Hübner | | |
Program Chairs’ Report D Evans, G Vigna | | |