Research Output 2006 2019

Filter
Conference contribution
2019

BlockTag: Design and applications of a tagging system for blockchain analysis

Boshmaf, Y., Jawaheri, H. A. & Sabah, M. A., 1 Jan 2019, ICT Systems Security and Privacy Protection - 34th IFIP TC 11 International Conference, SEC 2019, Proceedings. Dhillon, G., Zúquete, A., Karlsson, F. & Hedström, K. (eds.). Springer New York LLC, p. 299-313 15 p. (IFIP Advances in Information and Communication Technology; vol. 562).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Tagging
Law enforcement
Roads
World Wide Web
Agora

GanDef: A GAN based adversarial training defense for neural network classifier

Liu, G., Khalil, I. & Khreishah, A., 1 Jan 2019, ICT Systems Security and Privacy Protection - 34th IFIP TC 11 International Conference, SEC 2019, Proceedings. Dhillon, G., Zúquete, A., Karlsson, F. & Hedström, K. (eds.). Springer New York LLC, p. 19-32 14 p. (IFIP Advances in Information and Communication Technology; vol. 562).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Classifier
Neural networks
Natural language processing
Train
Evaluation

Optimizing cross-platform data movement

Kruse, S., Kaoudi, Z., Quiane Ruiz, J. A., Chawla, S., Naumann, F. & Contreras-Rojas, B., 1 Apr 2019, Proceedings - 2019 IEEE 35th International Conference on Data Engineering, ICDE 2019. IEEE Computer Society, p. 1642-1645 4 p. 8731354. (Proceedings - International Conference on Data Engineering; vol. 2019-April).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Costs

Truth Inference on Sparse Crowdsourcing Data with Local Differential Privacy

Sun, H., Dong, B., Wang, H. W., Yu, T. & Qin, Z., 22 Jan 2019, Proceedings - 2018 IEEE International Conference on Big Data, Big Data 2018. Song, Y., Liu, B., Lee, K., Abe, N., Pu, C., Qiao, M., Ahmed, N., Kossmann, D., Saltz, J., Tang, J., He, J., Liu, H. & Hu, X. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 488-497 10 p. 8622635. (Proceedings - 2018 IEEE International Conference on Big Data, Big Data 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Factorization
Experiments
2018

A domain is only as good as its buddies: Detecting stealthy malicious domains via graph inference

Khalil, I., Guan, B., Nabeel, M. & Yu, T., 13 Mar 2018, CODASPY 2018 - Proceedings of the 8th ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery, Inc, Vol. 2018-January. p. 330-341 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Scalability
Experiments
2 Citations (Scopus)

Cross-platform data processing: Use cases and challenges

Kaoudi, Z. & Quiane Ruiz, J. A., 24 Oct 2018, Proceedings - IEEE 34th International Conference on Data Engineering, ICDE 2018. Institute of Electrical and Electronics Engineers Inc., p. 1723-1726 4 p. 8509444

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Tutorial
Ad hoc
Excel
End users
Zoo
2 Citations (Scopus)

Enabling GPU-assisted antivirus protection on android devices through edge offloading

Deyannis, D., Tsirbas, R., Vasiliadis, G., Montella, R., Kosta, S. & Ioannidis, S., 10 Jun 2018, EdgeSys 2018 - Proceedings of the 1st ACM International Workshop on Edge Systems, Analytics and Networking, Part of MobiSys 2018. Association for Computing Machinery, Inc, p. 13-18 6 p. (EdgeSys 2018 - Proceedings of the 1st ACM International Workshop on Edge Systems, Analytics and Networking, Part of MobiSys 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
Data storage equipment
Scalability
Graphics processing unit
Malware
2 Citations (Scopus)

RETRO: Retroreflector Based Visible Light Indoor Localization for Real-time Tracking of IoT Devices

Shao, S., Khreishah, A. & Khalil, I., 8 Oct 2018, INFOCOM 2018 - IEEE Conference on Computer Communications. Institute of Electrical and Electronics Engineers Inc., Vol. 2018-April. p. 1025-1033 9 p. 8485817

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Photodiodes
Light sources
Lighting
Experiments
Cameras

Securing named data networks: Challenges and theway forward

Bertino, E. & Nabeel, M., 7 Jun 2018, SACMAT 2018 - Proceedings of the 23rd ACM Symposium on Access Control Models and Technologies. Association for Computing Machinery, Vol. Part F137153. p. 51-59 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Internet
Slate
Servers
Network protocols
Communication
1 Citation (Scopus)

Source attribution of cryptographic API misuse in android applications

Muslukhov, I., Boshmaf, Y. & Beznosov, K., 29 May 2018, ASIACCS 2018 - Proceedings of the 2018 ACM Asia Conference on Computer and Communications Security. Association for Computing Machinery, Inc, p. 133-146 14 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Application programming interfaces (API)
Cryptography
2017
10 Citations (Scopus)

A cost-based optimizer for gradient descent optimization

Kaoudi, Z., Quiané-Ruiz, J. A., Thirumuruganathan, S., Chawla, S. & Agrawal, D., 9 May 2017, SIGMOD 2017 - Proceedings of the 2017 ACM International Conference on Management of Data. Association for Computing Machinery, Vol. Part F127746. p. 977-992 16 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Learning systems
Costs
Mathematical operators
Specifications
Experiments
2 Citations (Scopus)

A minorization-maximization algorithm for an-based mimome secrecy rate maximization

Masood, M., Ghrayeb, A., Babu, P., Khalil, I. & Hasna, M., 19 Apr 2017, 2016 IEEE Global Conference on Signal and Information Processing, GlobalSIP 2016 - Proceedings. Institute of Electrical and Electronics Engineers Inc., p. 975-980 6 p. 7905987

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Antennas
Beamforming
Transmitters
9 Citations (Scopus)

A rigorous and efficient run-time security monitor for real-time critical embedded system applications

Khan, M. T., Serpanos, D. & Shrobe, H., 6 Feb 2017, 2016 IEEE 3rd World Forum on Internet of Things, WF-IoT 2016. Institute of Electrical and Electronics Engineers Inc., p. 100-105 6 p. 7845510

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Embedded systems
Specification languages
Acoustic waves
Legacy systems
Intrusion detection
1 Citation (Scopus)

Differentially private k-skyband query answering through adaptive spatial decomposition

Chen, L., Yu, T. & Chirkova, R., 1 Jan 2017, Data and Applications Security and Privacy XXXI - 31st Annual IFIP WG 11.3 Conference, DBSec 2017, Proceedings. Springer Verlag, p. 142-163 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10359 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Bulletin boards
Query
Decomposition
Decompose
K-tree
2 Citations (Scopus)

Distributed Cardinality Estimation of Set Operations with Differential Privacy

Stanojevic, R., Nabeel, M. & Yu, T., 4 Dec 2017, Proceedings - 2017 IEEE Symposium on Privacy-Aware Computing, PAC 2017. Institute of Electrical and Electronics Engineers Inc., Vol. 2017-January. p. 37-48 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Servers
Data integration
Monitoring
Sensors
16 Citations (Scopus)

Efficient 3D placement of a UAV using particle swarm optimization

Shakhatreh, H., Khreishah, A., Alsarhan, A., Khalil, I., Sawalmeh, A. & Othman, N. S., 8 May 2017, 2017 8th International Conference on Information and Communication Systems, ICICS 2017. Institute of Electrical and Electronics Engineers Inc., p. 258-263 6 p. 7921981

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Earthquakes
Disasters
Unmanned aerial vehicles (UAV)
Particle swarm optimization (PSO)
Air
1 Citation (Scopus)

Exact detection of information leakage: Decidability and complexity

Chirkova, R. & Yu, T., 1 Jan 2017, Transactions on Large-Scale Data- and Knowledge- Centered Systems XXXII - Special Issue on Big Data Analytics and Knowledge Discovery. Springer Verlag, p. 1-23 23 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10420 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Computability and decidability
Decidability
Access control
Leakage
Electronic data interchange
13 Citations (Scopus)

Generating synthetic decentralized social graphs with local differential privacy

Qin, Z., Yu, T., Yang, Y., Khalil, I., Xiao, X. & Ren, K., 30 Oct 2017, CCS 2017 - Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, Vol. Part F131467. p. 425-438 14 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Experiments
3 Citations (Scopus)

No sugar but all the taste! Memory encryption without architectural support

Papadopoulos, P., Vasiliadis, G., Christou, G., Markatos, E. & Ioannidis, S., 1 Jan 2017, Computer Security – ESORICS 2017 - 22nd European Symposium on Research in Computer Security, Proceedings. Springer Verlag, p. 362-380 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10493 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Sugars
Encryption
Cryptography
Data storage equipment
Architecture
12 Citations (Scopus)

On the continuous coverage problem for a swarm of UAVs

Shakhatreh, H., Khreishah, A., Chakareski, J., Salameh, H. B. & Khalil, I., 7 Feb 2017, 37th IEEE Sarnoff Symposium, Sarnoff 2016. Institute of Electrical and Electronics Engineers Inc., p. 130-135 6 p. 7846742

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Unmanned aerial vehicles (UAV)
Disasters
Computational complexity
Wireless networks
10 Citations (Scopus)

Please hold on: Unobtrusive user authentication using smartphone's built-in sensors

Buriro, A., Crispo, B. & Zhauniarovich, Y., 13 Jun 2017, 2017 IEEE International Conference on Identity, Security and Behavior Analysis, ISBA 2017. Institute of Electrical and Electronics Engineers Inc., 7947684

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Smartphones
Authentication
Sensors
Electronic mail
transaction
2 Citations (Scopus)

Profiling DRDoS attacks with data analytics pipeline

Berti-Equille, L. & Zhauniarovich, Y., 6 Nov 2017, CIKM 2017 - Proceedings of the 2017 ACM Conference on Information and Knowledge Management. Association for Computing Machinery, Vol. Part F131841. p. 1983-1986 4 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Denial
Attack
Profiling
Filter
Commonality

The Many Faces of End-to-End Encryption and Their Security Analysis

Nabeel, M., 7 Sep 2017, Proceedings - 2017 IEEE 1st International Conference on Edge Computing, EDGE 2017. Institute of Electrical and Electronics Engineers Inc., p. 252-259 8 p. 8029288

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptography
Metadata
Systems analysis
Wire
Communication
2016
1 Citation (Scopus)

A design study to identify inconsistencies in kinship information: The case of the 1000 Genomes project

Aupetit, M., Ullah, E., Rawi, R. & Bensmail, H., 4 May 2016, 2016 IEEE Pacific Visualization Symposium, PacificVis 2016 - Proceedings. IEEE Computer Society, Vol. 2016-May. p. 254-258 5 p. 7465281

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Genes
Data visualization
7 Citations (Scopus)

An O(1)-competitive online caching algorithm for content centric networking

Gharaibeh, A., Khreishah, A. & Khalil, I., 27 Jul 2016, IEEE INFOCOM 2016 - 35th Annual IEEE International Conference on Computer Communications. Institute of Electrical and Electronics Engineers Inc., Vol. 2016-July. 7524444

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Internet service providers
Costs
Internet
10 Citations (Scopus)

Automated vulnerability analysis of AC state estimation under constrained false data injection in electric power systems

Gao, S., Xie, L., Solar-Lezama, A., Serpanos, D. & Shrobe, H., 8 Feb 2016, Proceedings of the IEEE Conference on Decision and Control. Institute of Electrical and Electronics Engineers Inc., Vol. 2016-February. p. 2613-2620 8 p. 7402610

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Electric Power System
State Estimation
State estimation
Electric power systems
Vulnerability
20 Citations (Scopus)

Discovering malicious domains through passive DNS data graph analysis

Khalil, I., Yu, T. & Guan, B., 30 May 2016, ASIA CCS 2016 - Proceedings of the 11th ACM Asia Conference on Computer and Communications Security. Association for Computing Machinery, Inc, p. 663-674 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Classifiers
Experiments
5 Citations (Scopus)

Evaluation of resource-based app repackaging detection in android

Gadyatskaya, O., Lezza, A. L. & Zhauniarovich, Y., 1 Jan 2016, Secure IT Systems - 21st Nordic Conference, NordSec 2016, Proceedings. Springer Verlag, p. 135-151 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10014 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Application programs
Resources
Evaluation
Similarity Coefficient
Obfuscation
3 Citations (Scopus)

GRIM: Leveraging GPUs for Kernel integrity monitoring

Koromilas, L., Vasiliadis, G., Athanasopoulos, E. & Ioannidis, S., 2016, Research in Attacks, Intrusions, and Defenses - 19th International Symposium, RAID 2016, Proceedings. Springer Verlag, Vol. 9854 LNCS. p. 3-23 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9854 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Integrity
Monitor
Monitoring
kernel
Data storage equipment
2 Citations (Scopus)

Harvesting the low-hanging fruits: Defending against automated large-scale cyber-intrusions by focusing on the vulnerable population

Halawa, H., Beznosov, K., Boshmaf, Y., Coskun, B., Ripeanu, M. & Santos-Neto, E., 26 Sep 2016, NSPW 2016 - Proceedings of the 2016 New Security Paradigms Workshop. Association for Computing Machinery, Vol. 26-29-September-2016. p. 11-22 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Fruits
Infiltration
Electronic mail
Education
Friction
60 Citations (Scopus)

Heavy hitter estimation over set-valued data with local differential privacy

Qin, Z., Yang, Y., Yu, T., Khalil, I., Xiao, X. & Ren, K., 24 Oct 2016, CCS 2016 - Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, Vol. 24-28-October-2016. p. 192-203 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Statistics
Leakage (fluid)
Refining
Data mining
Experiments

Privacy-preserving two-party skyline queries over horizontally partitioned data

Chen, L., Yu, T. & Chirkova, R., 2016, Information Security Theory and Practice - 10th IFIP WG 11.2 International Conference, WISTP 2016, Proceedings. Springer Verlag, Vol. 9895 LNCS. p. 187-203 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9895 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Skyline
Privacy Preserving
Query
Multi Criteria Analysis
Privacy
10 Citations (Scopus)

Publishing attributed social graphs with formal privacy guarantees

Jorgensen, Z., Yu, T. & Cormode, G., 26 Jun 2016, SIGMOD 2016 - Proceedings of the 2016 International Conference on Management of Data. Association for Computing Machinery, Vol. 26-June-2016. p. 107-122 16 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

9 Citations (Scopus)

PVSAE: A public verifiable searchable encryption service framework for outsourced encrypted data

Zhang, R., Xue, R., Yu, T. & Liu, L., 31 Aug 2016, Proceedings - 2016 IEEE International Conference on Web Services, ICWS 2016. Institute of Electrical and Electronics Engineers Inc., p. 428-435 8 p. 7558031

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptography
Data privacy
Servers
Concretes
2 Citations (Scopus)

RDFind: Scalable conditional inclusion dependency discovery in RDF datasets

Kruse, S., Jentzsch, A., Papenbrock, T., Kaoudi, Z., Quiane Ruiz, J. A. & Naumann, F., 26 Jun 2016, SIGMOD 2016 - Proceedings of the 2016 International Conference on Management of Data. Association for Computing Machinery, Vol. 26-June-2016. p. 953-967 15 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Information management
Data structures
Processing
14 Citations (Scopus)

Rheem: Enabling multi-platform task execution

Agrawal, D., Ba, L., Berti-Equille, L., Chawla, S., Elmagarmid, A., Hammady, H., Idris, Y., Kaoudi, Z., Khayyat, Z., Kruse, S., Ouzzani, M., Papotti, P., Quiane Ruiz, J. A., Tang, N. & Zaki, M. J., 26 Jun 2016, SIGMOD 2016 - Proceedings of the 2016 International Conference on Management of Data. Association for Computing Machinery, Vol. 26-June-2016. p. 2069-2072 4 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data fusion
Learning systems
Cleaning
Gases
Oils
16 Citations (Scopus)

Road to freedom in big data analytics

Agrawal, D., Chawla, S., Elmagarmid, A., Kaoudi, Z., Ouzzani, M., Papotti, P., Quiane Ruiz, J. A., Tang, N. & Zaki, M. J., 1 Jan 2016, Advances in Database Technology - EDBT 2016: 19th International Conference on Extending Database Technology, Proceedings. OpenProceedings.org, Vol. 2016-March. p. 479-484 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Interoperability
Cleaning
Big data
6 Citations (Scopus)

Secure inter cloud data migration

Khalil, I., Hababeh, I. & Khreishah, A., 20 May 2016, 2016 7th International Conference on Information and Communication Systems, ICICS 2016. Institute of Electrical and Electronics Engineers Inc., p. 62-67 6 p. 7476087

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cloud computing
Throughput
Availability
Denial-of-service attack
5 Citations (Scopus)

Small changes, big changes: An updated view on the android permission system

Zhauniarovich, Y. & Gadyatskaya, O., 1 Jan 2016, Research in Attacks, Intrusions, and Defenses - 19th International Symposium, RAID 2016, Proceedings. Springer Verlag, p. 346-367 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9854 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Application programs
Certificate
Signed
Patch
Signature
7 Citations (Scopus)

Visualization of actionable knowledge to mitigate DRDoS attacks

Aupetit, M., Zhauniarovich, Y., Vasiliadis, G., Dacier, M. & Boshmaf, Y., 8 Nov 2016, 2016 IEEE Symposium on Visualization for Cyber Security, VizSec 2016. Institute of Electrical and Electronics Engineers Inc., 7739577

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Internet service providers
Denial of Service
Visualization
Attack
Traffic
3 Citations (Scopus)

Your credentials are compromised, do not panic: You can be well protected

Khalil, I., Dou, Z. & Khreishah, A., 30 May 2016, ASIA CCS 2016 - Proceedings of the 11th ACM Asia Conference on Computer and Communications Security. Association for Computing Machinery, Inc, p. 925-930 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Authentication
Communication
Network architecture
Telecommunication networks
2015

Abstract data machine: Data classifier for reliable embedded systems software

Khan, M. T., Fragopoulos, A., Shrobe, H. & Serpanos, D., 4 Oct 2015, Proceedings of the 10th Workshop on Embedded Systems Security, WESS 2015. Association for Computing Machinery, Inc, a8

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Embedded systems
Classifiers
Security of data
Learning algorithms
Learning systems
7 Citations (Scopus)

AMAL: High-fidelity, behavior-based automated malware analysis and classification

Mohaisen, A. & Alrawi, O., 2015, Information Security Applications - 15th International Workshop, WISA 2014, Revised Selected Papers. Springer Verlag, Vol. 8909. p. 107-121 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8909).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Malware
Fidelity
Classifiers
Grouping
Classifier
8 Citations (Scopus)

Asymptotically-optimal incentive-based en-route caching scheme

Gharaibeh, A., Khreishah, A., Khalil, I. & Wu, J., 6 Feb 2015, Proceedings - 11th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, MASS 2014. Institute of Electrical and Electronics Engineers Inc., p. 318-326 9 p. 7035700

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Computer networks
Quality of service
Decision making
Internet
42 Citations (Scopus)

Conservative or liberal? Personalized differential privacy

Jorgensen, Z., Yu, T. & Cormode, G., 26 May 2015, Proceedings - International Conference on Data Engineering. IEEE Computer Society, Vol. 2015-May. p. 1023-1034 12 p. 7113353

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Experiments
19 Citations (Scopus)

Detecting opinion spammer groups through community discovery and sentiment analysis

Choo, E., Yu, T. & Chi, M., 2015, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 9149. p. 170-187 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9149).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Sentiment Analysis
Classifiers
Classifier
Spam
Community Structure
14 Citations (Scopus)

Dimensions of risk in mobile applications: A user study

Jorgensen, Z., Chen, J., Gates, C. S., Li, N., Proctor, R. W. & Yu, T., 2 Mar 2015, CODASPY 2015 - Proceedings of the 5th ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery, Inc, p. 49-60 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Application programs
Sorting
Mobile devices
Availability
1 Citation (Scopus)

Exact detection of information leakage in database access control

Alborzi, F., Chirkova, R. & Yu, T., 2015, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 9263. p. 403-415 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9263).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Access Control
Access control
Leakage
Electronic data interchange
Query languages

Interactive preference-aware query optimization

Ong, N. R., Rojcewicz, S. E., Farnan, N. L., Lee, A. J., Chrysanthis, P. K. & Yu, T., 26 May 2015, Proceedings - International Conference on Data Engineering. IEEE Computer Society, Vol. 2015-May. p. 1512-1515 4 p. 7113414

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Graphical user interfaces
6 Citations (Scopus)

Joint data placement and flow control for cost-efficient data center networks

Khreishah, A., Chakareski, J., Gharaibeh, A., Khalil, I. & Jararweh, Y., 6 May 2015, 2015 6th International Conference on Information and Communication Systems, ICICS 2015. Institute of Electrical and Electronics Engineers Inc., p. 274-279 6 p. 7103188

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Flow control
Costs
Topology
Heuristic methods
Network coding