Search results
- On the Nonlinearity Effects on Malicious Data Attack on Power System, Jia Liyan, Robert J. Thomas, Lang Tong, To appear in 2012 Power and Energy Society general meeting, July, 2012
- A path-based approach for web page retrieval, Jian-qiang Li, Yu Zhao, Hector Garcia-Molina, World Wide Web, 15, 3, pp.257-283, May, 2012
- Formalizing and Enforcing Purpose Restrictions in Privacy Policies, Michael Tschantz, Anupam Datta, Jeanette Wing, Proceedings of 33rd IEEE Symposium on Security and Privacy, IEEE, May, 2012
- Detecting Anomalous Insiders in Collaborative Information Systems, Yu Chen, Steve Nyemba, Bradley Malin, IEEE Transactions on Dependable and Secure Computing, 9, 3, pp.332-344, May, 2012
- TRUST Annual Report 2011-2012, Faculty and Staff, May, 2012
- Privacy-Aware Sampling for Residential Demand Response Programs, Alvaro Cardenas, Saurabh Amin, Galina A. Schwartz, Proceedings of the 1st International ACM Conference on High Confidence Networked Systems (HiCoNS), April, 2012
- NCS Security Experimentation Using DETER, Alefiya Hussain, Saurabh Amin, Proceedings of the 1st International ACM Conference on High Confidence Networked Systems (HiCoNS), April, 2012
- Provable De-anonymization of Large Datasets with Sparse Dimensions, Anupam Datta, Divya Sharma, Arunesh Sinha, Proceedings of ETAPS Conference on Principles of Security and Trust, March, 2012
- ACCessory: Keystroke Inference using Accelerometers on Smartphones, Emmanuel Owusu, Jun Han, Sauvik Das, Adrian Perrig, Joy Zhang, To appear in Proceedings of The Thirteenth Workshop on Mobile Computing Systems and Applications (HotMobile), ACM, 28, February, 2012
- Metrics for Measuring ISP Badness: The Case of Spam, Benjamin Johnson, John Chuang, Jens Grossklags, Nicolas Christin, To appear in Proceedings of the 16th International Conference on Financial Cryptography and Data Security (FC'12, International Financial Cryptography Association, 12, February, 2012
- ACCessory: Password Inference using Accelerometers on Smartphones, Emmanuel Owusu, Jun Han, Sauvik Das, Adrian Perrig, To appear in Proceedings of The Thirteenth Workshop on Mobile Computing Systems and Applications (HotMobile), ACM, February, 2012
- A Critical Look at Decentralized Personal Data Architectures, Arvind Narayanan, Vincent Toubiana, Solon Barocas, Helen Nissenbaum, Dan Boneh, CoRR, February, 2012
- Specializing network analysis to detect anomalous insider actions, You Chen, Steve Nyemba, Wen Zhang, Bradley Malin, Security Informatics, February, 2012
- Impacts of Malicious Data on Real-time Price of Electricity Market Operations, Jia Liyan, Robert J. Thomas, Lang Tong, 45th Hawaii International Conference on System Sciences, pp.1907-1914, 4, January, 2012
- Cyber–Physical Security of a Smart Grid Infrastructure, Y. Mo, K. Brancik, D. Dickenson, H. Lee, Proceedings of the IEEE, IEEE, pp 195-209, 2012
- Adaptive Regret Minimization in Bounded-Memory Games, Jeremiah Blocki, Nicholas Cristin, Anupam Datta, Arunesh Sinha, Carnegie Mellon University, 2012
- Targeted malleability: homomorphic encryption for restricted computations, Dan Boneh, Gil Segev, Brent Waters, Proceedings of the 3rd Innovations in Theoretical Computer Science Conference, 2012
- Sponsored search auctions with conflict constraints, Panagiotis Papadimitriou, Hector Garcia-Molina, Proceedings of the fifth ACM international conference on Web search and data mining, 2012
- The case for prefetching and prevalidating TLS server certificates, E. Stark, L.S. Huang, D. Israni, C. Jackson, D. Boneh, To appear in Proceedings of Network & Distributed System Security (NDSS), 2012
- Declarative privacy policy: finite models and attribute-based encryption, Peifung E. Lam, John C. Mitchell, Andre Scedrov, sharada sundaram, Frank Wang, Proceedings of the 2nd ACM SIGHIT International Health Informatics Symposium (IHI'12), 2012
- Community-based web security: complementary roles of the serious and casual contributors, Pern Hui Chia, John Chuang, Proceedings of the ACM 2012 conference on Computer Supported Cooperative Work, ACM, 2012
- Colonel Blotto in the Phishing War, Pern Hui Chia, John Chuang, Lecture Notes in Computer Science, GameSec 2011, Springer, pp.201-218, 2012
- NCSWT: An Integrated Modeling and Simulation Tool for Networked Control Systems, Emeka Eyisi, Jia Bai, Derek Riley, Jiannian Weng, Jan Wei, Yuan Xue, Xenofon Koutsoukos, Janos Sztipanovits, Hybrid Systems: Computation and Control 2012, 2012
- SENTINEL: securing database from logic flaws in web applications, Xiaowei Li, Wei Yan, Yuan Xue, Proceedings of the second ACM conference on Data and Application Security and Privacy, 2012
- Android Permissions Demystified, Adrienne Porter Felt, Dawn Song, David Wagner, Steve Hanna, 18th ACM conference on Computer and communications security, ACM, 2012
- Maelstrom: Transparent Error Correction for Communication Between Data Centers, Mahesh Balakrishnan, Tudor Marian, Ken Birman, Hakim Weatherspoon, IEEE/ACM Transactions on Networking (ToN), 19, 3, pp.617-629, 2012
- PIA Requirements and Privacy Decisionmaking in U.S. Government Agencies PRIVACY IMPACT ASSESSMENTS: ENGAGING STAKEHOLDERS IN PROTECTING PRIVACY, Deirdre Mulligan, Kenneth A. Bamberger, De Hert and Wright, 10, 225-250, Springer, 2012
- Malicious Data Attacks on the Smart Grid, Oliver Kosut, Jia Liyan, Robert J. Thomas, Lang Tong, IEEE Trans. Smart Grid Special Issue on Cyber, Physical, and System Security for Smart Grid, 2, 4, pp. 645-658, 2012
- Exploiting Privacy Policy Conflicts in Online Social Networks, Akira Yamada, Tiffany Hyun-Jin Kim, Adrian Perrig, Carnegie Mellon University, CMU-CyLab-012-005, 2012
- DefAT: Dependable Connection Setup for Network Capabilities, Soo Bum Lee, Virgil D. Gligor, Adrian Perrig, Carnegie Mellon University, CMU-CyLab-011-018, 2012
Found 30 publications.
Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright.