default search action
Indrakshi Ray
Person information
- affiliation: Colorado State University, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j59]Saneesh P. Francis, Vysakh Kani Kolil, Vipin Pavithran, Indrakshi Ray, Krishnashree Achuthan:
Exploring gender dynamics in cybersecurity education: A self-determination theory and social cognitive theory perspective. Comput. Secur. 144: 103968 (2024) - [j58]Yaser Baseri, Abdelhakim Hafid, Mahdi Daghmehchi Firoozjaei, Soumaya Cherkaoui, Indrakshi Ray:
Statistical privacy protection for secure data access control in cloud. J. Inf. Secur. Appl. 84: 103823 (2024) - [c180]Matt Gorbett, Hossein Shirazi, Indrakshi Ray:
Tiled Bit Networks: Sub-Bit Neural Network Compression Through Reuse of Learnable Binary Vectors. CIKM 2024: 674-684 - [c179]Mahmoud Abdelgawad, Indrakshi Ray:
Resiliency Analysis of Mission-Critical System of Systems Using Formal Methods. DBSec 2024: 153-170 - [c178]Oluwatosin Falebita, Mahmoud Abdelgawad, Evan Anspach, Indrakshi Ray:
Securing Virtual Reality Apps Inter-process Communication. ICISS 2024: 63-84 - [c177]Asif Uz Zaman Asif, Meera Sridhar, Indrakshi Ray, Francisco R. Ortega:
Breaking the Virtual Barrier of Exploit Chain Attacks in XR Systems. ISMAR-Adjunct 2024: 32-34 - [c176]Shwetha Gowdanakatte, Mahmoud Abdelgawad, Indrakshi Ray:
Assets Criticality Assessment of Industrial Control Systems: A Wind Farm Case Study. QRS 2024: 352-363 - [c175]Mahmoud Abdelgawad, Indrakshi Ray:
Methodology for Resiliency Analysis of Mission-critical Systems. SAC 2024: 1292-1300 - [i7]Matt Gorbett, Hossein Shirazi, Indrakshi Ray:
Tiled Bit Networks: Sub-Bit Neural Network Compression Through Reuse of Learnable Binary Vectors. CoRR abs/2407.12075 (2024) - 2023
- [j57]Matt Gorbett, Caspian Siebert, Hossein Shirazi, Indrakshi Ray:
The intrinsic dimensionality of network datasets and its applications. J. Comput. Secur. 31(6): 679-704 (2023) - [j56]Chaoyuan Zuo, Ritwik Banerjee, Fateme Hashemi Chaleshtori, Hossein Shirazi, Indrakshi Ray:
Seeing Should Probably Not Be Believing: The Role of Deceptive Support in COVID-19 Misinformation on Twitter. ACM J. Data Inf. Qual. 15(1): 9:1-9:26 (2023) - [j55]Hossein Shirazi, Shashika Ranga Muramudalige, Indrakshi Ray, Anura P. Jayasumana, Haonan Wang:
Adversarial Autoencoder Data Synthesis for Enhancing Machine Learning-Based Phishing Detection Algorithms. IEEE Trans. Serv. Comput. 16(4): 2411-2422 (2023) - [c174]Matt Gorbett, Hossein Shirazi, Indrakshi Ray:
Cross-Silo Federated Learning Across Divergent Domains with Iterative Parameter Alignment. IEEE Big Data 2023: 5233-5242 - [c173]Eric Burton Samuel Martin, Hossein Shirazi, Indrakshi Ray:
Poster: Towards a Dataset for the Discrimination between Warranted and Unwarranted Emails. CCS 2023: 3603-3605 - [c172]Faiza Tazi, Suleiman Saka, Griffin Opp, Shradha Neupane, Sanchari Das, Lorenzo De Carli, Indrakshi Ray:
Accessibility Evaluation of IoT Android Mobile Companion Apps. CHI Extended Abstracts 2023: 19:1-19:7 - [c171]Maxwel Bar-on, Bruhadeshwar Bezawada, Indrakshi Ray, Indrajit Ray:
A Small World-Privacy Preserving IoT Device-Type Fingerprinting with Small Datasets. FPS (1) 2023: 104-122 - [c170]Matt Gorbett, Hossein Shirazi, Indrakshi Ray:
Sparse Binary Transformers for Multivariate Time Series Modeling. KDD 2023: 544-556 - [c169]Mahmoud Abdelgawad, Indrakshi Ray, Saja Alqurashi, Videep Venkatesha, Hossein Shirazi:
Synthesizing and Analyzing Attribute-Based Access Control Model Generated from Natural Language Policy Statements. SACMAT 2023: 91-98 - [c168]Indrajit Ray, Bhavani Thuraisingham, Jaideep Vaidya, Sharad Mehrotra, Vijayalakshmi Atluri, Indrakshi Ray, Murat Kantarcioglu, Ramesh Raskar, Babak Salimi, Steve Simske, Nalini Venkatasubramanian, Vivek K. Singh:
SAFE-PASS: Stewardship, Advocacy, Fairness and Empowerment in Privacy, Accountability, Security, and Safety for Vulnerable Groups. SACMAT 2023: 145-155 - [c167]Asif Uz Zaman Asif, Hossein Shirazi, Indrakshi Ray:
Machine Learning-Based Phishing Detection Using URL Features: A Comprehensive Review. SSS 2023: 481-497 - [c166]Mahmoud Abdelgawad, Indrakshi Ray, Tomas Vasquez:
Workflow Resilience for Mission Critical Systems. SSS 2023: 498-512 - [c165]Indrajit Ray, Sarath Sreedharan, Rakesh Podder, Shadaab Kawnain Bashir, Indrakshi Ray:
Explainable AI for Prioritizing and Deploying Defenses for Cyber-Physical System Resiliency. TPS-ISA 2023: 184-192 - [c164]Shwetha Gowdanakatte, Indrakshi Ray, Mahmoud Abdelgawad:
Model Based Risk Assessment and Risk Mitigation Framework for Cyber-Physical Systems. TPS-ISA 2023: 203-212 - [c163]Noushin Salek Faramarzi, Fateme Hashemi Chaleshtori, Hossein Shirazi, Indrakshi Ray, Ritwik Banerjee:
Claim Extraction and Dynamic Stance Detection in COVID-19 Tweets. WWW (Companion Volume) 2023: 1059-1068 - [i6]Matt Gorbett, Hossein Shirazi, Indrakshi Ray:
Sparse Binary Transformers for Multivariate Time Series Modeling. CoRR abs/2308.04637 (2023) - [i5]Matt Gorbett, Hossein Shirazi, Indrakshi Ray:
Cross-Silo Federated Learning Across Divergent Domains with Iterative Parameter Alignment. CoRR abs/2311.04818 (2023) - 2022
- [j54]Hossein Shirazi, Katherine Haynes, Indrakshi Ray:
Towards Performance of NLP Transformers on URL-Based Phishing Detection for Mobile Devices. J. Ubiquitous Syst. Pervasive Networks 17(1): 35-42 (2022) - [j53]Shashika Ranga Muramudalige, Benjamin W. K. Hung, Anura P. Jayasumana, Indrakshi Ray, Jytte Klausen:
Enhancing Investigative Pattern Detection via Inexact Matching and Graph Databases. IEEE Trans. Serv. Comput. 15(5): 2780-2794 (2022) - [c162]Shwetha Gowdanakatte, Indrakshi Ray, Siv Hilde Houmb:
Attribute Based Access Control Model for Protecting Programmable Logic Controllers. SAT-CPS@CODASPY 2022: 47-56 - [c161]Hossein Shirazi, William Pickard, Indrakshi Ray, Haonan Wang:
Towards Resiliency of Heavy Vehicles through Compromised Sensor Data Reconstruction. CODASPY 2022: 276-287 - [c160]Elisa Bertino, Ravi S. Sandhu, Bhavani Thuraisingham, Indrakshi Ray, Wenjia Li, Maanak Gupta, Sudip Mittal:
Security and Privacy for Emerging IoT and CPS Domains. CODASPY 2022: 336-337 - [c159]Gabriele Maurina, Hajar Homayouni, Sudipto Ghosh, Indrakshi Ray, Gerald P. Duggan:
A Methodology for Energy Usage Prediction in Long-Lasting Abnormal Events. CogMI 2022: 91-100 - [c158]Vinayak S. Prabhu, Mohit Singh, Indrajit Ray, Indrakshi Ray, Sudipto Ghosh:
Detecting Secure Memory Deallocation Violations with CBMC. CPSS@AsiaCCS 2022: 27-38 - [c157]Matt Gorbett, Hossein Shirazi, Indrakshi Ray:
Local Intrinsic Dimensionality of IoT Networks for Unsupervised Intrusion Detection. DBSec 2022: 143-161 - [c156]Shradha Neupane, Faiza Tazi, Upakar Paudel, Freddy Veloz Baez, Merzia Adamjee, Lorenzo De Carli, Sanchari Das, Indrakshi Ray:
On the Data Privacy, Security, and Risk Postures of IoT Mobile Companion Apps. DBSec 2022: 162-182 - [c155]Fateme Hashemi Chaleshtori, Indrakshi Ray:
Automation of Vulnerability Information Extraction Using Transformer-Based Language Models. CyberICPS/SECPRE/SPOSE/CPS4CIP/CDT&SECOMAN/EIS/SecAssure@ESORICS 2022: 645-665 - [c154]Matt Gorbett, Hossein Shirazi, Indrakshi Ray:
WiP: The Intrinsic Dimensionality of IoT Networks. SACMAT 2022: 245-250 - 2021
- [j52]Hossein Shirazi, Bruhadeshwar Bezawada, Indrakshi Ray, Chuck Anderson:
Directed adversarial sampling attacks on phishing detection. J. Comput. Secur. 29(1): 1-23 (2021) - [j51]Hajar Homayouni, Indrakshi Ray, Sudipto Ghosh, Shlok Gondalia, Michael G. Kahn:
Anomaly Detection in COVID-19 Time-Series Data. SN Comput. Sci. 2(4): 279 (2021) - [j50]Bruhadeshwar Bezawada, Indrakshi Ray, Indrajit Ray:
Behavioral fingerprinting of Internet-of-Things devices. WIREs Data Mining Knowl. Discov. 11(1) (2021) - [c153]Joaquin Cuomo, Hajar Homayouni, Indrakshi Ray, Sudipto Ghosh:
Detecting Temporal Dependencies in Data. BICOD 2021: 29-39 - [c152]Upakar Paudel, Andy Dolan, Suryadipta Majumdar, Indrakshi Ray:
Context-Aware IoT Device Functionality Extraction from Specifications for Ensuring Consumer Security. CNS 2021: 155-163 - [c151]Shalin Kumar Deval, Meenakshi Tripathi, Bruhadeshwar Bezawada, Indrakshi Ray:
"X-Phish: Days of Future Past"‡: Adaptive & Privacy Preserving Phishing Detection. CNS 2021: 227-235 - [c150]Ritwik Banerjee, Indrakshi Ray:
Diagnosis, Prevention, and Cure for Misinformation. CogMI 2021: 156-162 - [c149]Kyle Haefner, Indrakshi Ray:
Trust and Verify: A Complexity-Based IoT Behavioral Enforcement Method. CSCML 2021: 432-450 - [c148]Lorenzo De Carli, Indrakshi Ray, Erin Solovey:
Vision: Stewardship of Smart Devices Security for the Aging Population. EuroUSEC 2021: 236-241 - [c147]Katherine Haynes, Hossein Shirazi, Indrakshi Ray:
Lightweight URL-based phishing detection using natural language processing transformers for mobile devices. FNC/MobiSPC 2021: 127-134 - [c146]Sina Mahdipour Saravani, Indrajit Ray, Indrakshi Ray:
Automated Identification of Social Media Bots Using Deepfake Text Detection. ICISS 2021: 111-123 - [c145]Brandt Reutimann, Indrakshi Ray:
Simulating Measurement Attacks in a Scada System Testbed. Critical Infrastructure Protection 2021: 135-153 - [c144]Vishwajeet Bhosale, Lorenzo De Carli, Indrakshi Ray:
Detection of Anomalous User Activity for Home IoT Devices. IoTBDS 2021: 309-314 - [c143]Saja Alqurashi, Hossein Shirazi, Indrakshi Ray:
On the Performance of Isolation Forest and Multi Layer Perceptron for Anomaly Detection in Industrial Control Systems Networks. IOTSMS 2021: 1-6 - 2020
- [j49]Diptendu Mohan Kar, Indrajit Ray, Jenna Gallegos, Jean Peccoud, Indrakshi Ray:
Synthesizing DNA molecules with identity-based digital signatures to prevent malicious tampering and enabling source attribution. J. Comput. Secur. 28(4): 437-467 (2020) - [j48]Subhojeet Mukherjee, Jeffrey C. Van Etten, Namburi Rani Samyukta, Jacob Walker, Indrakshi Ray, Indrajit Ray:
TruckSTM: Runtime Realization of Operational State Transitions for Medium and Heavy Duty Vehicles. ACM Trans. Cyber Phys. Syst. 4(1): 4:1-4:25 (2020) - [c142]Hajar Homayouni, Sudipto Ghosh, Indrakshi Ray, Shlok Gondalia, Jerry Duggan, Michael G. Kahn:
An Autocorrelation-based LSTM-Autoencoder for Anomaly Detection on Time-Series Data. IEEE BigData 2020: 5068-5077 - [c141]Andy Dolan, Indrakshi Ray, Suryadipta Majumdar:
Proactively Extracting IoT Device Capabilities: An Application to Smart Homes. DBSec 2020: 42-63 - [c140]Hossein Shirazi, Landon Zweigle, Indrakshi Ray:
A Machine-learning based Unbiased Phishing Detection Approach. ICETE (2) 2020: 423-430 - [c139]Majdi Khalid, Hamidreza Chitsaz, Indrakshi Ray:
Proximal Stochastic AUC Maximization. IJCNN 2020: 1-8 - [c138]Hossein Shirazi, Shashika Ranga Muramudalige, Indrakshi Ray, Anura P. Jayasumana:
Improved Phishing Detection Algorithms using Adversarial Autoencoder Synthesized Data. LCN 2020: 24-32 - [c137]Sowmya Ravidas, Indrakshi Ray, Nicola Zannone:
Handling Incomplete Information in Policy Evaluation using Attribute Similarity. TPS-ISA 2020: 79-88 - [i4]Drew Johnston, Jarret Flack, Indrakshi Ray, Francisco R. Ortega:
Towards a Virtual Reality Home IoT Network Visualizer. CoRR abs/2001.06579 (2020)
2010 – 2019
- 2019
- [j47]Hajar Homayouni, Sudipto Ghosh, Indrakshi Ray:
Chapter Five - Data Warehouse Testing. Adv. Comput. 112: 223-273 (2019) - [c136]Hajar Homayouni, Sudipto Ghosh, Indrakshi Ray, Michael G. Kahn:
An Interactive Data Quality Test Approach for Constraint Discovery and Fault Detection. IEEE BigData 2019: 200-205 - [c135]Indrakshi Ray, Ramadan Abdunabi, Rejina Basnet:
Access Control for Internet of Things Applications. CPSS@AsiaCCS 2019: 35-36 - [c134]Hossein Shirazi, Bruhadeshwar Bezawada, Indrakshi Ray, Charles Anderson:
Adversarial Sampling Attacks Against Phishing Detection. DBSec 2019: 83-101 - [c133]Hossein Shirazi, Indrakshi Ray, Charles Anderson:
Using Machine Learning to Detect Anomalies in Embedded Networks in Heavy Vehicles. FPS 2019: 39-55 - [c132]Shashika Ranga Muramudalige, Benjamin W. K. Hung, Anura P. Jayasumana, Indrakshi Ray:
Investigative Graph Search using Graph Databases. GC 2019: 60-67 - [c131]Hajar Homayouni, Sudipto Ghosh, Indrakshi Ray:
ADQuaTe: An Automated Data Quality Test Approach for Constraint Discovery and Fault Detection. IRI 2019: 61-68 - [c130]Kyle Haefner, Indrakshi Ray:
ComplexIoT: Behavior-Based Trust For IoT Networks. TPS-ISA 2019: 56-65 - 2018
- [j46]Kirill Belyaev, Wuliang Sun, Indrakshi Ray, Indrajit Ray:
On the design and analysis of protocols for Personal Health Record storage on Personal Data Server devices. Future Gener. Comput. Syst. 80: 467-482 (2018) - [j45]Kirill Belyaev, Indrakshi Ray:
Component-oriented access control - Application servers meet tuple spaces for the masses. Future Gener. Comput. Syst. 86: 726-739 (2018) - [j44]Hossein Shirazi, Kyle Haefner, Indrakshi Ray:
Improving Auto-Detection of Phishing Websites using Fresh-Phish Framework. Int. J. Multim. Data Eng. Manag. 9(1): 51-64 (2018) - [j43]Tarik Moataz, Indrajit Ray, Indrakshi Ray, Abdullatif Shikfa, Frédéric Cuppens, Nora Cuppens:
Substring search over encrypted data. J. Comput. Secur. 26(1): 1-30 (2018) - [j42]Victor Bahl, Barbara Carminati, James Caverlee, Ing-Ray Chen, Wynne Hsu, Toru Ishida, Valérie Issarny, Surya Nepal, Indrakshi Ray, Kui Ren, Shamik Sural, Mei-Ling Shyu:
Editorial. IEEE Trans. Serv. Comput. 11(1): 1-4 (2018) - [c129]Kirill Belyaev, Indrakshi Ray:
Towards Service Orchestration in XML Filtering Overlays. ADBIS (Short Papers and Workshops) 2018: 12-19 - [c128]Bruhadeshwar Bezawada, Indrakshi Ray:
Attribute-Based Encryption: Applications and Future Directions. From Database to Cyber Security 2018: 353-374 - [c127]Bruhadeshwar Bezawada, Maalvika Bachani, Jordan Peterson, Hossein Shirazi, Indrakshi Ray, Indrajit Ray:
Behavioral Fingerprinting of IoT Devices. ASHES@CCS 2018: 41-50 - [c126]Rejina Basnet, Subhojeet Mukherjee, Vignesh M. Pagadala, Indrakshi Ray:
An efficient implementation of next generation access control for the mobile health cloud. FMEC 2018: 131-138 - [c125]Vignesh M. Pagadala, Indrakshi Ray:
Achieving Mobile-Health Privacy Using Attribute-Based Access Control. FPS 2018: 301-316 - [c124]Hajar Homayouni, Sudipto Ghosh, Indrakshi Ray:
An Approach for Testing the Extract-Transform-Load Process in Data Warehouse Systems. IDEAS 2018: 236-245 - [c123]Majdi Khalid, Indrakshi Ray, Hamidreza Chitsaz:
Scalable Nonlinear AUC Maximization Methods. ECML/PKDD (2) 2018: 292-307 - [c122]Ibrahim Lazrig, Toan C. Ong, Indrajit Ray, Indrakshi Ray, Xiaoqian Jiang, Jaideep Vaidya:
Privacy Preserving Probabilistic Record Linkage Without Trusted Third Party. PST 2018: 1-10 - [c121]Dieudonne Mulamba, Indrajit Ray, Indrakshi Ray:
On Sybil Classification in Online Social Networks Using Only Structural Features. PST 2018: 1-10 - [c120]Bruhadeshwar Bezawada, Sandeep S. Kulkarni, Indrajit Ray, Indrakshi Ray, Rui Li:
Independent Key Distribution Protocols for Broadcast Authentication. SACMAT 2018: 27-38 - [c119]Hossein Shirazi, Bruhadeshwar Bezawada, Indrakshi Ray:
"Kn0w Thy Doma1n Name": Unbiased Phishing Detection Using Domain Name Based Features. SACMAT 2018: 69-75 - [e8]Pierangela Samarati, Indrajit Ray, Indrakshi Ray:
From Database to Cyber Security - Essays Dedicated to Sushil Jajodia on the Occasion of His 70th Birthday. Lecture Notes in Computer Science 11170, Springer 2018, ISBN 978-3-030-04833-4 [contents] - [r2]Indrakshi Ray, Thilina Buddhika:
Secure Transaction Processing. Encyclopedia of Database Systems (2nd ed.) 2018 - [i3]Bruhadeshwar Bezawada, Maalvika Bachani, Jordan Peterson, Hossein Shirazi, Indrakshi Ray, Indrajit Ray:
IoTSense: Behavioral Fingerprinting of IoT Devices. CoRR abs/1804.03852 (2018) - 2017
- [j41]Kirill Belyaev, Indrakshi Ray:
On the formalization, design, and implementation of component-oriented access control in lightweight virtualized server environments. Comput. Secur. 71: 15-35 (2017) - [c118]Diptendu Mohan Kar, Ibrahim Lazrig, Indrajit Ray, Indrakshi Ray:
POSTER: PriReMat: A Distributed Tool for Privacy Preserving Record Linking in Healthcare. CCS 2017: 2507-2509 - [c117]Subhojeet Mukherjee, Noah Cain, Jacob Walker, David White, Indrajit Ray, Indrakshi Ray:
POSTER: PenJ1939: An Interactive Framework for Design and Dissemination of Exploits for Commercial Vehicles. CCS 2017: 2559-2561 - [c116]Subhojeet Mukherjee, Indrakshi Ray, Indrajit Ray, Hossein Shirazi, Toan Ong, Michael G. Kahn:
Attribute Based Access Control for Healthcare Resources. ABAC@CODASPY 2017: 29-40 - [c115]Negar Mosharraf, Anura P. Jayasumana, Indrakshi Ray:
A Distributed Mechanism to Protect Against DDoS Attacks. DBSec 2017: 529-540 - [c114]Indrakshi Ray:
Keynote speech 2: Attribute-based access control status and directions. FMEC 2017: 2 - [c113]Negar Mosharraf, Anura P. Jayasumana, Indrakshi Ray, Bruhadeshwar Bezawada:
History-Based Throttling of Distributed Denial-of-Service Attacks. ICETE (Selected Papers) 2017: 199-223 - [c112]Hossein Shirazi, Kyle Haefner, Indrakshi Ray:
Fresh-Phish: A Framework for Auto-Detection of Phishing Websites. IRI 2017: 137-143 - [c111]Subhojeet Mukherjee, Jacob Walker, Indrakshi Ray, Jeremy Daily:
A Precedence Graph-Based Approach to Detect Message Injection Attacks in J1939 Based Networks. PST 2017: 67-76 - [c110]Indrakshi Ray:
Keynote speech 2: Attribute-based access control status and directions. SDS 2017: 2 - [c109]Indrakshi Ray, Bithin Alangot, Shilpa Nair, Krishnashree Achuthan:
Using Attribute-Based Access Control for Remote Healthcare Monitoring. SDS 2017: 137-142 - [c108]Negar Mosharraf, Anura P. Jayasumana, Indrakshi Ray:
Using a History-based Profile to Detect and Respond to DDoS Attacks. SECRYPT 2017: 175-186 - [i2]Majdi Khalid, Indrakshi Ray, Hamidreza Chitsaz:
AUC Maximization with K-hyperplane. CoRR abs/1710.00760 (2017) - 2016
- [c107]Majdi Khalid, Indrakshi Ray, Hamidreza Chitsaz:
Confidence-Weighted Bipartite Ranking. ADMA 2016: 35-49 - [c106]Indrakshi Ray, Toan C. Ong, Indrajit Ray, Michael G. Kahn:
Applying attribute based access control for privacy preserving health data disclosure. BHI 2016: 1-4 - [c105]Kirill Belyaev, Indrakshi Ray:
Component-Oriented Access Control for Deployment of Application Services in Containerized Environments. CANS 2016: 383-399 - [c104]Andy Chunliang Hsu, Indrakshi Ray:
Specification and Enforcement of Location-Aware Attribute-Based Access Control for Online Social Networks. ABAC@CODASPY 2016: 25-34 - [c103]Negar Mosharraf, Anura P. Jayasumana, Indrakshi Ray:
Compacted Bloom Filter. CIC 2016: 304-311 - [c102]Ibrahim Lazrig, Toan Ong, Indrajit Ray, Indrakshi Ray, Michael G. Kahn:
Privacy Preserving Probabilistic Record Linkage Using Locality Sensitive Hashes. DBSec 2016: 61-76 - [c101]Victor R. Kebande, Indrakshi Ray:
A Generic Digital Forensic Investigation Framework for Internet of Things (IoT). FiCloud 2016: 356-362 - [c100]Subhojeet Mukherjee, Hossein Shirazi, Indrakshi Ray, Jeremy Daily, Rose F. Gamble:
Practical DoS Attacks on Embedded Networks in Commercial Vehicles. ICISS 2016: 23-42 - [c99]Kirill Belyaev, Indrakshi Ray:
Enhancing applications with filtering of XML message streams. IDEAS 2016: 322-327 - [c98]Dieudonne Mulamba, Indrajit Ray, Indrakshi Ray:
SybilRadar: A Graph-Structure Based Framework for Sybil Detection in On-line Social Networks. SEC 2016: 179-193 - [c97]Kirill Belyaev, Indrakshi Ray:
Towards Access Control for Isolated Applications. SECRYPT 2016: 171-182 - [e7]Guojun Wang, Indrakshi Ray, José M. Alcaraz Calero, Sabu M. Thampi:
Security, Privacy, and Anonymity in Computation, Communication, and Storage - 9th International Conference, SpaCCS 2016, Zhangjiajie, China, November 16-18, 2016, Proceedings. Lecture Notes in Computer Science 10066, 2016, ISBN 978-3-319-49147-9 [contents] - [e6]Guojun Wang, Indrakshi Ray, José M. Alcaraz Calero, Sabu M. Thampi:
Security, Privacy and Anonymity in Computation, Communication and Storage - SpaCCS 2016 International Workshops, TrustData, TSP, NOPE, DependSys, BigDataSPT, and WCSSC, Zhangjiajie, China, November 16-18, 2016, Proceedings. Lecture Notes in Computer Science 10067, 2016, ISBN 978-3-319-49144-8 [contents] - [i1]Majdi Khalid, Indrakshi Ray, Hamidreza Chitsaz:
Confidence-Weighted Bipartite Ranking. CoRR abs/1607.00847 (2016) - 2015
- [j40]