


default search action
70th Birthday: Sushil Jajodia , 2018
 - Pierangela Samarati, Indrajit Ray, Indrakshi Ray: 
 From Database to Cyber Security - Essays Dedicated to Sushil Jajodia on the Occasion of His 70th Birthday. Lecture Notes in Computer Science 11170, Springer 2018, ISBN 978-3-030-04833-4
- Massimiliano Albanese  : :
 From Cyber Situational Awareness to Adaptive Cyber Defense: Leveling the Cyber Playing Field. 1-23
- Saptarshi Das  , Barsha Mitra, Vijayalakshmi Atluri , Barsha Mitra, Vijayalakshmi Atluri , Jaideep Vaidya, Shamik Sural , Jaideep Vaidya, Shamik Sural : :
 Policy Engineering in RBAC and ABAC. 24-54
- Ramaswamy Chandramouli: 
 Comprehensive Security Assurance Measures for Virtualized Server Environments. 55-77
- Frédéric Cuppens, Nora Cuppens-Boulahia: 
 Stratification Based Model for Security Policy with Exceptions and Contraries to Duty. 78-103
- George Cybenko, Gabriel Fortunato Stocco: 
 Asymptotic Behavior of Attack Graph Games. 104-112
- Stelvio Cimato  , Ernesto Damiani: , Ernesto Damiani:
 Some Ideas on Privacy-Aware Data Analytics in the Internet-of-Everything. 113-124
- Enrico Bacis  , Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, Marco Rosa , Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, Marco Rosa , Pierangela Samarati: , Pierangela Samarati:
 Protecting Resources and Regulating Access in Cloud-Based Object Storage. 125-142
- Yvo Desmedt, Arash Shaghaghi: 
 Function-Based Access Control (FBAC): Towards Preventing Insider Threats in Organizations. 143-165
- Roberto Di Pietro  , Flavio Lombardi , Flavio Lombardi : :
 Virtualization Technologies and Cloud Security: Advantages, Issues, and Perspectives. 166-185
- Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, Gerardo Pelosi  , Pierangela Samarati: , Pierangela Samarati:
 Access Privacy in the Cloud. 186-205
- Rajesh Ganesan  , Ankit Shah: , Ankit Shah:
 A Strategy for Effective Alert Analysis at a Cyber Security Operations Center. 206-226
- Tao Lin, Chen Zhong, John Yen, Peng Liu: 
 Retrieval of Relevant Historical Data Triage Operations in Security Operation Centers. 227-243
- Sabrina De Capitani di Vimercati, Sara Foresti, Giovanni Livraga, Vincenzo Piuri, Pierangela Samarati: 
 Supporting Users in Cloud Plan Selection. 244-260
- Mauro Conti  , Edlira Dushku , Edlira Dushku , Luigi V. Mancini: , Luigi V. Mancini:
 Distributed Services Attestation in IoT. 261-273
- Sharad Mehrotra, Kerim Yasin Oktay, Shantanu Sharma: 
 Exploiting Data Sensitivity on Partitioned Data. 274-299
- Steven Noel: 
 A Review of Graph Approaches to Network Security Analytics. 300-323
- Angelo Genovese  , Enrique Muñoz Ballester, Vincenzo Piuri, Fabio Scotti , Enrique Muñoz Ballester, Vincenzo Piuri, Fabio Scotti : :
 Advanced Biometric Technologies: Emerging Scenarios and Research Trends. 324-352
- Bruhadeshwar Bezawada  , Indrakshi Ray: , Indrakshi Ray:
 Attribute-Based Encryption: Applications and Future Directions. 353-374
- Sankardas Roy, Dewan Chaulagain, Shiva Bhusal: 
 Static Analysis for Security Vetting of Android Apps. 375-404
- Shang Li, Srijan Kumar, Tudor Dumitras, V. S. Subrahmanian: 
 Breaking Bad: Forecasting Adversarial Android Bad Behavior. 405-431
- Zi Chu, Steven Gianvecchio, Haining Wang: 
 Bot or Human? A Behavior-Based Online Bot Detection System. 432-449
- Lingyu Wang, Mengyuan Zhang  , Anoop Singhal: , Anoop Singhal:
 Network Security Metrics: From Known Vulnerabilities to Zero Day Attacks. 450-469
- Karim Eldefrawy, Rafail Ostrovsky, Moti Yung: 
 Theoretical Foundations for Mobile Target Defense: Proactive Secret Sharing and Secure Multiparty Computation. 470-486

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


 Google
Google Google Scholar
Google Scholar Semantic Scholar
Semantic Scholar Internet Archive Scholar
Internet Archive Scholar CiteSeerX
CiteSeerX ORCID
ORCID














