מאמרים עם הרשאות לגישה ציבורית - Bruhadeshwar Bezawadaלמידע נוסף
לא זמינים באתר כלשהו: 2
A Small World–Privacy Preserving IoT Device-Type Fingerprinting with Small Datasets
M Bar-on, B Bezawada, I Ray, I Ray
International Symposium on Foundations and Practice of Security, 104-122, 2023
הרשאות: US National Science Foundation
Topological ordering based iterative TCAM rule compression using bi-partite graphs
R Li, W Li, B Bezawada, Z Qin
2016 IEEE 24th International Conference on Network Protocols (ICNP), 1-2, 2016
הרשאות: National Natural Science Foundation of China
זמינים באתר כלשהו: 15
Behavioral fingerprinting of iot devices
B Bezawada, M Bachani, J Peterson, H Shirazi, I Ray, I Ray
Proceedings of the 2018 Workshop on Attacks and Solutions in Hardware …, 2018
הרשאות: US National Science Foundation, US Department of Energy, US Department of …
Fast range query processing with strong privacy protection for cloud computing
R Li, AX Liu, AL Wang, B Bruhadeshwar
Proceedings of the VLDB Endowment 7 (14), 1953-1964, 2014
הרשאות: National Natural Science Foundation of China
"Kn0w Thy Doma1n Name" Unbiased Phishing Detection Using Domain Name Based Features
H Shirazi, B Bezawada, I Ray
Proceedings of the 23nd ACM on symposium on access control models and …, 2018
הרשאות: US National Science Foundation, US Department of Defense
Securing home IoT environments with attribute-based access control
B Bezawada, K Haefner, I Ray
Proceedings of the Third ACM Workshop on attribute-based access control, 43-53, 2018
הרשאות: US National Science Foundation, US Department of Defense
Adversarial sampling attacks against phishing detection
H Shirazi, B Bezawada, I Ray, C Anderson
Data and Applications Security and Privacy XXXIII: 33rd Annual IFIP WG 11.3 …, 2019
הרשאות: US National Science Foundation, US Department of Defense
Privacy preserving string matching for cloud computing
B Bezawada, AX Liu, B Jayaraman, AL Wang, R Li
2015 IEEE 35th International Conference on Distributed Computing Systems …, 2015
הרשאות: National Natural Science Foundation of China
Independent key distribution protocols for broadcast authentication
B Bezawada, S Kulkarni, I Ray, I Ray, R Li
Proceedings of the 23nd ACM on Symposium on Access Control Models and …, 2018
הרשאות: US National Science Foundation, US Department of Defense, National Natural …
Privacy and Integrity Preserving Top- Query Processing for Two-Tiered Sensor Networks
R Li, AX Liu, S Xiao, H Xu, B Bruhadeshwar, AL Wang
IEEE/ACM Transactions on Networking 25 (4), 2334-2346, 2017
הרשאות: US National Science Foundation, National Natural Science Foundation of China
Behavioral fingerprinting of Internet‐of‐Things devices
B Bezawada, I Ray, I Ray
Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery 11 (1 …, 2021
הרשאות: US National Science Foundation, US Department of Energy, US Department of …
Agbuilder: an ai tool for automated attack graph building, analysis, and refinement
B Bezawada, I Ray, K Tiwary
Data and Applications Security and Privacy XXXIII: 33rd Annual IFIP WG 11.3 …, 2019
הרשאות: US National Science Foundation, US Department of Energy
Directed adversarial sampling attacks on phishing detection
H Shirazi, B Bezawada, I Ray, C Anderson
Journal of Computer Security 29 (1), 1-23, 2021
הרשאות: US National Science Foundation, US Department of Defense
“x-phish: Days of future past”: Adaptive & privacy preserving phishing detection
SK Deval, M Tripathi, B Bezawada, I Ray
2021 IEEE Conference on Communications and Network Security (CNS), 227-235, 2021
הרשאות: US National Science Foundation, US Department of Defense
A template approach for group key distribution in dynamic ad-hoc groups
B Bezawada, AX Liu, X Liang, R Li
2017 IFIP Networking Conference (IFIP Networking) and Workshops, 1-9, 2017
הרשאות: US National Science Foundation, National Natural Science Foundation of China
A secure hash commitment approach for moving target defense of security-critical services
D Mulamba, A Amarnath, B Bezawada, I Ray
Proceedings of the 5th ACM Workshop on Moving Target Defense, 59-68, 2018
הרשאות: US National Science Foundation, US Department of Energy
History-based throttling of distributed denial-of-service attacks
N Mosharraf, AP Jayasumana, I Ray, B Bezawada
E-Business and Telecommunications: 14th International Joint Conference …, 2019
הרשאות: US National Science Foundation
המידע על הפרסום ועל הגורמים המממנים נקבע באופן אוטומטי על ידי תוכנת מחשב