<?xml version="1.0"?>
<dblpperson name="Indrajit Ray" pid="r/IndrajitRay" n="183">
<person key="homepages/r/IndrajitRay" mdate="2016-02-09">
<author pid="r/IndrajitRay">Indrajit Ray</author>
<note type="affiliation">Colorado State University, USA</note>
<url>http://www.cs.colostate.edu/~indrajit/</url>
</person>
<r><article key="journals/jss/PodderARRSR25" mdate="2026-03-24">
<author orcid="0009-0008-7394-1369" pid="370/0240">Rakesh Podder</author>
<author pid="166/4266">Mahmoud Abdelgawad</author>
<author pid="r/IndrakshiRay">Indrakshi Ray</author>
<author pid="r/IndrajitRay">Indrajit Ray</author>
<author pid="388/1955">Madhan B. Santharam</author>
<author pid="388/1940">Stefano Righi</author>
<title>Correctness and security analysis of the protection in transit (PIT) protocol.</title>
<pages>112501</pages>
<year>2025</year>
<volume>230</volume>
<journal>J. Syst. Softw.</journal>
<ee>https://doi.org/10.1016/j.jss.2025.112501</ee>
<url>db/journals/jss/jss230.html#PodderARRSR25</url>
<stream>streams/journals/jss</stream>
</article>
</r>
<r><inproceedings key="conf/codaspy/AminTSR25" mdate="2025-06-11">
<author orcid="0000-0003-1700-7201" pid="306/7633">Md. Al Amin</author>
<author orcid="0009-0007-7778-5845" pid="365/3645">Hemanth Tummala</author>
<author orcid="0009-0005-5658-0950" pid="205/6827">Rushabh Shah</author>
<author orcid="0000-0002-3612-7738" pid="r/IndrajitRay">Indrajit Ray</author>
<title>Proof of Compliance (PoC): A Consensus Mechanism to Verify the Compliance with Informed Consent Policy in Healthcare.</title>
<pages>119-130</pages>
<year>2025</year>
<booktitle>CODASPY</booktitle>
<ee>https://doi.org/10.1145/3714393.3726512</ee>
<crossref>conf/codaspy/2025</crossref>
<url>db/conf/codaspy/codaspy2025.html#AminTSR25</url>
</inproceedings>
</r>
<r><inproceedings key="conf/dbsec/BaronKLBRR25" mdate="2026-03-24">
<author pid="374/7674">Maxwel Bar-on</author>
<author pid="409/5600">Kiley Krosky</author>
<author orcid="0009-0008-6439-3508" pid="404/0399">Federico Larrieu</author>
<author pid="64/1299">Bruhadeshwar Bezawada</author>
<author pid="r/IndrakshiRay">Indrakshi Ray</author>
<author pid="r/IndrajitRay">Indrajit Ray</author>
<title>Jibber-Jabber!: Encoding the (Un-)Natural Language of Network Devices and Applications.</title>
<pages>3-22</pages>
<year>2025</year>
<booktitle>DBSec</booktitle>
<ee>https://doi.org/10.1007/978-3-031-96590-6_1</ee>
<crossref>conf/dbsec/2025</crossref>
<url>db/conf/dbsec/dbsec2025.html#BaronKLBRR25</url>
<stream>streams/conf/dbsec</stream>
</inproceedings>
</r>
<r><inproceedings key="conf/sacmat/PodderCBSRR25" mdate="2025-09-06">
<author orcid="0009-0008-7394-1369" pid="370/0240">Rakesh Podder</author>
<author pid="346/0173">Turgay Caglar</author>
<author orcid="0009-0008-3090-7187" pid="370/0432">Shadaab Kawnain Bashir</author>
<author orcid="0000-0002-2299-0178" pid="162/5110">Sarath Sreedharan</author>
<author pid="r/IndrajitRay">Indrajit Ray</author>
<author pid="r/IndrakshiRay">Indrakshi Ray</author>
<title>SPEAR: Security Posture Evaluation using AI Planner-Reasoning on Attack-Connectivity Hypergraphs.</title>
<pages>62-73</pages>
<year>2025</year>
<booktitle>SACMAT</booktitle>
<ee>https://doi.org/10.1145/3734436.3734451</ee>
<crossref>conf/sacmat/2025</crossref>
<url>db/conf/sacmat/sacmat2025.html#PodderCBSRR25</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sacmat/Bar-onPBRR25" mdate="2025-08-05">
<author pid="374/7674">Maxwel Bar-on</author>
<author pid="410/3905">Katherine Patterson</author>
<author orcid="0000-0002-1021-8121" pid="64/1299">Bruhadeshwar Bezawada</author>
<author pid="r/IndrakshiRay">Indrakshi Ray</author>
<author pid="r/IndrajitRay">Indrajit Ray</author>
<title><i>&#34;Bring your own device!&#34;: </i> Adaptive IoT Device-type Fingerprinting using Automatic Behavior Extraction [Work In Progress Paper].</title>
<pages>201-206</pages>
<year>2025</year>
<booktitle>SACMAT</booktitle>
<ee>https://doi.org/10.1145/3734436.3734456</ee>
<crossref>conf/sacmat/2025</crossref>
<url>db/conf/sacmat/sacmat2025.html#Bar-onPBRR25</url>
</inproceedings>
</r>
<r><inproceedings key="conf/secrypt/AminSTR25" mdate="2025-07-22">
<author pid="306/7633">Md. Al Amin</author>
<author pid="205/6827">Rushabh Shah</author>
<author pid="365/3645">Hemanth Tummala</author>
<author pid="r/IndrajitRay">Indrajit Ray</author>
<title>Did You Break the Glass Properly? A Policy Compliance Framework for Protected Health Information (PHI) Emergency Access.</title>
<pages>195-208</pages>
<year>2025</year>
<booktitle>SECRYPT</booktitle>
<ee>https://doi.org/10.5220/0013527000003979</ee>
<crossref>conf/secrypt/2025</crossref>
<url>db/conf/secrypt/secrypt2025.html#AminSTR25</url>
</inproceedings>
</r>
<r><inproceedings key="conf/secrypt/TalukderPR25" mdate="2026-03-24">
<author pid="333/9371">Md. Rakibul Hasan Talukder</author>
<author orcid="0009-0008-7394-1369" pid="370/0240">Rakesh Podder</author>
<author pid="r/IndrajitRay">Indrajit Ray</author>
<title>VKG2AG : Generating Automated Knowledge-Enriched Attack Graph (AG) from Vulnerability Knowledge Graph (VKG).</title>
<pages>420-428</pages>
<year>2025</year>
<booktitle>SECRYPT</booktitle>
<ee>https://doi.org/10.5220/0013526700003979</ee>
<crossref>conf/secrypt/2025</crossref>
<url>db/conf/secrypt/secrypt2025.html#TalukderPR25</url>
</inproceedings>
</r>
<r><inproceedings key="conf/tpsisa/BaronABRR25" mdate="2026-03-26">
<author pid="374/7674">Maxwel Bar-on</author>
<author pid="417/5906">Alanood Alqobaisi</author>
<author pid="64/1299">Bruhadeshwar Bezawada</author>
<author pid="r/IndrakshiRay">Indrakshi Ray</author>
<author pid="r/IndrajitRay">Indrajit Ray</author>
<title>It's About Time!: Exploiting Timing Variance for IoT Device-Type Fingerprinting.</title>
<booktitle>TPS-ISA</booktitle>
<year>2025</year>
<pages>119-129</pages>
<crossref>conf/tpsisa/2025</crossref>
<ee>https://doi.org/10.1109/TPS-ISA67132.2025.00022</ee>
<url>db/conf/tpsisa/tpsisa2025.html#BaronABRR25</url>
<stream>streams/conf/tpsisa</stream>
</inproceedings>
</r>
<r><inproceedings key="conf/tpsisa/PodderSAMR25" mdate="2026-03-26">
<author pid="370/0240">Rakesh Podder</author>
<author pid="426/0783">Jason Simental</author>
<author pid="426/1240">Elmaddin Azizli</author>
<author pid="328/3203">Bharadwaj Mantha</author>
<author pid="r/IndrajitRay">Indrajit Ray</author>
<title>CoDICE: Roll the DICE for Firmware Attestation.</title>
<booktitle>TPS-ISA</booktitle>
<year>2025</year>
<pages>183-196</pages>
<crossref>conf/tpsisa/2025</crossref>
<ee>https://doi.org/10.1109/TPS-ISA67132.2025.00028</ee>
<url>db/conf/tpsisa/tpsisa2025.html#PodderSAMR25</url>
<stream>streams/conf/tpsisa</stream>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/corr/abs-2506-01227" mdate="2025-07-06">
<author pid="370/0240">Rakesh Podder</author>
<author pid="346/0173">Turgay Caglar</author>
<author pid="370/0432">Shadaab Kawnain Bashir</author>
<author pid="162/5110">Sarath Sreedharan</author>
<author pid="r/IndrajitRay">Indrajit Ray</author>
<author pid="r/IndrakshiRay">Indrakshi Ray</author>
<title>SPEAR: Security Posture Evaluation using AI Planner-Reasoning on Attack-Connectivity Hypergraphs.</title>
<year>2025</year>
<month>June</month>
<volume>abs/2506.01227</volume>
<journal>CoRR</journal>
<ee type="oa">https://doi.org/10.48550/arXiv.2506.01227</ee>
<url>db/journals/corr/corr2506.html#abs-2506-01227</url>
<stream>streams/journals/corr</stream>
</article>
</r>
<r><inproceedings key="conf/iciss/PodderRRRR24" mdate="2025-03-03">
<author orcid="0009-0008-7394-1369" pid="370/0240">Rakesh Podder</author>
<author pid="393/6914">Tyler Rios</author>
<author pid="r/IndrajitRay">Indrajit Ray</author>
<author pid="393/6730">Presanna Raman</author>
<author pid="388/1940">Stefano Righi</author>
<title>S-RFUP: Secure Remote Firmware Update Protocol.</title>
<pages>42-62</pages>
<year>2024</year>
<booktitle>ICISS</booktitle>
<ee>https://doi.org/10.1007/978-3-031-80020-7_3</ee>
<crossref>conf/iciss/2024</crossref>
<url>db/conf/iciss/iciss2024.html#PodderRRRR24</url>
<stream>streams/conf/iciss</stream>
</inproceedings>
</r>
<r><inproceedings key="conf/qrs/PodderSRSR24" mdate="2025-03-03">
<author orcid="0009-0008-7394-1369" pid="370/0240">Rakesh Podder</author>
<author pid="388/2132">Jack Sovereign</author>
<author pid="r/IndrajitRay">Indrajit Ray</author>
<author pid="388/1955">Madhan B. Santharam</author>
<author pid="388/1940">Stefano Righi</author>
<title>The PIT-Cerberus Framework: Preventing Device Tampering During Transit.</title>
<pages>584-595</pages>
<year>2024</year>
<booktitle>QRS</booktitle>
<ee>https://doi.org/10.1109/QRS62785.2024.00064</ee>
<crossref>conf/qrs/2024</crossref>
<url>db/conf/qrs/qrs2024.html#PodderSRSR24</url>
</inproceedings>
</r>
<r><inproceedings key="conf/secrypt/AminTSR24" mdate="2024-09-05">
<author pid="306/7633">Md. Al Amin</author>
<author pid="365/3645">Hemanth Tummala</author>
<author pid="205/6827">Rushabh Shah</author>
<author pid="r/IndrajitRay">Indrajit Ray</author>
<title>Balancing Patient Privacy and Health Data Security: The Role of Compliance in Protected Health Information (PHI) Sharing.</title>
<pages>211-223</pages>
<year>2024</year>
<booktitle>SECRYPT</booktitle>
<ee>https://doi.org/10.5220/0012767400003767</ee>
<crossref>conf/secrypt/2024</crossref>
<url>db/conf/secrypt/secrypt2024.html#AminTSR24</url>
</inproceedings>
</r>
<r><inproceedings key="conf/tpsisa/BashirPSRR24" mdate="2025-05-01">
<author pid="370/0432">Shadaab Kawnain Bashir</author>
<author orcid="0009-0008-7394-1369" pid="370/0240">Rakesh Podder</author>
<author pid="162/5110">Sarath Sreedharan</author>
<author pid="r/IndrakshiRay">Indrakshi Ray</author>
<author pid="r/IndrajitRay">Indrajit Ray</author>
<title>Resiliency Graphs: Modelling the Interplay between Cyber Attacks and System Failures through AI Planning.</title>
<pages>292-302</pages>
<year>2024</year>
<booktitle>TPS-ISA</booktitle>
<ee>https://doi.org/10.1109/TPS-ISA62245.2024.00041</ee>
<crossref>conf/tpsisa/2023</crossref>
<url>db/conf/tpsisa/tpsisa2024.html#BashirPSRR24</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/corr/abs-2407-02766" mdate="2024-08-07">
<author pid="306/7633">Md. Al Amin</author>
<author pid="365/3645">Hemanth Tummala</author>
<author pid="205/6827">Rushabh Shah</author>
<author pid="r/IndrajitRay">Indrajit Ray</author>
<title>Balancing Patient Privacy and Health Data Security: The Role of Compliance in Protected Health Information (PHI) Sharing.</title>
<year>2024</year>
<volume>abs/2407.02766</volume>
<journal>CoRR</journal>
<ee type="oa">https://doi.org/10.48550/arXiv.2407.02766</ee>
<url>db/journals/corr/corr2407.html#abs-2407-02766</url>
<stream>streams/journals/corr</stream>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-2407-17765" mdate="2024-08-24">
<author pid="306/7633">Md. Al Amin</author>
<author pid="205/6827">Rushabh Shah</author>
<author pid="365/3645">Hemanth Tummala</author>
<author pid="r/IndrajitRay">Indrajit Ray</author>
<title>Utilizing Blockchain and Smart Contracts for Enhanced Fraud Prevention and Minimization in Health Insurance through Multi-Signature Claim Processing.</title>
<year>2024</year>
<volume>abs/2407.17765</volume>
<journal>CoRR</journal>
<ee type="oa">https://doi.org/10.48550/arXiv.2407.17765</ee>
<url>db/journals/corr/corr2407.html#abs-2407-17765</url>
<stream>streams/journals/corr</stream>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-2412-09820" mdate="2025-01-20">
<author pid="306/7633">Md. Al Amin</author>
<author pid="365/3645">Hemanth Tummala</author>
<author pid="205/6827">Rushabh Shah</author>
<author pid="r/IndrajitRay">Indrajit Ray</author>
<title>Empowering Patients for Disease Diagnosis and Clinical Treatment: A Smart Contract-Enabled Informed Consent Strategy.</title>
<year>2024</year>
<volume>abs/2412.09820</volume>
<journal>CoRR</journal>
<ee type="oa">https://doi.org/10.48550/arXiv.2412.09820</ee>
<url>db/journals/corr/corr2412.html#abs-2412-09820</url>
<stream>streams/journals/corr</stream>
</article>
</r>
<r><article key="journals/games/GangulyR23" mdate="2025-05-31">
<author orcid="0009-0001-6836-7525" pid="343/4956">Chirantan Ganguly</author>
<author orcid="0000-0001-5254-3144" pid="r/IndrajitRay">Indrajit Ray</author>
<title>Simple Mediation in a Cheap-Talk Game.</title>
<pages>47</pages>
<year>2023</year>
<volume>14</volume>
<journal>Games</journal>
<number>3</number>
<ee type="oa">https://doi.org/10.3390/g14030047</ee>
<url>db/journals/games/games14.html#GangulyR23</url>
</article>
</r>
<r><article key="journals/ijgt/GangulyR23" mdate="2025-05-31">
<author orcid="0009-0001-6836-7525" pid="343/4956">Chirantan Ganguly</author>
<author orcid="0000-0001-5254-3144" pid="r/IndrajitRay">Indrajit Ray</author>
<title>Information revelation and coordination using cheap talk in a game with two-sided private information.</title>
<pages>957-992</pages>
<year>2023</year>
<month>December</month>
<volume>52</volume>
<journal>Int. J. Game Theory</journal>
<number>4</number>
<ee type="oa">https://doi.org/10.1007/s00182-023-00857-0</ee>
<url>db/journals/ijgt/ijgt52.html#GangulyR23</url>
</article>
</r>
<r><inproceedings key="conf/coinco/0001SRC23" mdate="2024-03-07">
<author pid="82/2760">Dimitrios Georgakopoulos 0001</author>
<author pid="93/6593">Mei-Ling Shyu</author>
<author pid="r/IndrajitRay">Indrajit Ray</author>
<author pid="83/2099">Barbara Carminati</author>
<title>Message from the General Chairs and PC Chairs CIC 2023.</title>
<pages>viii-ix</pages>
<year>2023</year>
<booktitle>CIC</booktitle>
<ee>https://doi.org/10.1109/CIC58953.2023.00005</ee>
<crossref>conf/coinco/2023</crossref>
<url>db/conf/coinco/cic2023.html#0001SRC23</url>
</inproceedings>
</r>
<r><inproceedings key="conf/fps/BaronBRR23" mdate="2024-05-09">
<author pid="374/7674">Maxwel Bar-on</author>
<author pid="64/1299">Bruhadeshwar Bezawada</author>
<author pid="r/IndrakshiRay">Indrakshi Ray</author>
<author pid="r/IndrajitRay">Indrajit Ray</author>
<title>A Small World-Privacy Preserving IoT Device-Type Fingerprinting with Small Datasets.</title>
<pages>104-122</pages>
<year>2023</year>
<booktitle>FPS (1)</booktitle>
<ee>https://doi.org/10.1007/978-3-031-57537-2_7</ee>
<crossref>conf/fps/2023-1</crossref>
<url>db/conf/fps/fps2023-1.html#BaronBRR23</url>
</inproceedings>
</r>
<r><inproceedings key="conf/metacom/QuXSCSR23" mdate="2024-03-21">
<author pid="225/4581">Qian Qu</author>
<author pid="43/1887">Ronghua Xu</author>
<author pid="49/6614">Han Sun</author>
<author pid="87/1254-2">Yu Chen 0002</author>
<author pid="122/1620">Sumantra Sarkar</author>
<author pid="r/IndrajitRay">Indrajit Ray</author>
<title>A Digital Healthcare Service Architecture for Seniors Safety Monitoring in Metaverse.</title>
<pages>86-93</pages>
<year>2023</year>
<booktitle>MetaCom</booktitle>
<ee>https://doi.org/10.1109/MetaCom57706.2023.00027</ee>
<crossref>conf/metacom/2023</crossref>
<url>db/conf/metacom/metacom2023.html#QuXSCSR23</url>
</inproceedings>
</r>
<r><inproceedings key="conf/noms/JamesRM23" mdate="2023-06-26">
<author pid="261/8805">Fathima James</author>
<author pid="r/IndrajitRay">Indrajit Ray</author>
<author pid="m/DeepMedhi">Deep Medhi</author>
<title>Worst Attack Vulnerability and Fortification for IoT Security Management: An approach and An Illustration for Smart Home IoT.</title>
<pages>1-6</pages>
<year>2023</year>
<booktitle>NOMS</booktitle>
<ee>https://doi.org/10.1109/NOMS56928.2023.10154338</ee>
<crossref>conf/noms/2023</crossref>
<url>db/conf/noms/noms2023.html#JamesRM23</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sacmat/RayTVMARKRSSV023" mdate="2025-01-19">
<author pid="r/IndrajitRay">Indrajit Ray</author>
<author pid="t/BMThuraisingham">Bhavani Thuraisingham</author>
<author pid="61/3091">Jaideep Vaidya</author>
<author orcid="0000-0003-1667-5435" pid="m/SharadMehrotra">Sharad Mehrotra</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author pid="r/IndrakshiRay">Indrakshi Ray</author>
<author orcid="0000-0001-9795-9063" pid="36/195">Murat Kantarcioglu</author>
<author pid="r/RameshRaskar">Ramesh Raskar</author>
<author pid="11/6446">Babak Salimi</author>
<author orcid="0000-0002-6937-1956" pid="41/5693">Steve Simske</author>
<author pid="66/1875">Nalini Venkatasubramanian</author>
<author pid="00/6451-7">Vivek K. Singh 0001</author>
<title>SAFE-PASS: Stewardship, Advocacy, Fairness and Empowerment in Privacy, Accountability, Security, and Safety for Vulnerable Groups.</title>
<pages>145-155</pages>
<year>2023</year>
<booktitle>SACMAT</booktitle>
<ee>https://doi.org/10.1145/3589608.3593830</ee>
<ee>https://www.wikidata.org/entity/Q130912479</ee>
<crossref>conf/sacmat/2023</crossref>
<url>db/conf/sacmat/sacmat2023.html#RayTVMARKRSSV023</url>
</inproceedings>
</r>
<r><inproceedings key="conf/secrypt/AminAR23" mdate="2025-12-07">
<author orcid="0000-0003-1700-7201" pid="306/7633">Md. Al Amin</author>
<author pid="251/5049">Amani Altarawneh</author>
<author pid="r/IndrajitRay">Indrajit Ray</author>
<title>Informed Consent as Patient Driven Policy for Clinical Diagnosis and Treatment: A Smart Contract Based Approach.</title>
<pages>159-170</pages>
<year>2023</year>
<booktitle>SECRYPT</booktitle>
<ee>https://doi.org/10.5220/0012090600003555</ee>
<crossref>conf/secrypt/2023</crossref>
<url>db/conf/secrypt/secrypt2023.html#AminAR23</url>
</inproceedings>
</r>
<r><inproceedings key="conf/tpsisa/RaySPBR23" mdate="2024-10-06">
<author pid="r/IndrajitRay">Indrajit Ray</author>
<author pid="162/5110">Sarath Sreedharan</author>
<author orcid="0009-0008-7394-1369" pid="370/0240">Rakesh Podder</author>
<author orcid="0009-0008-3090-7187" pid="370/0432">Shadaab Kawnain Bashir</author>
<author pid="r/IndrakshiRay">Indrakshi Ray</author>
<title>Explainable AI for Prioritizing and Deploying Defenses for Cyber-Physical System Resiliency.</title>
<pages>184-192</pages>
<year>2023</year>
<booktitle>TPS-ISA</booktitle>
<ee>https://doi.org/10.1109/TPS-ISA58951.2023.00032</ee>
<crossref>conf/tpsisa/2023</crossref>
<url>db/conf/tpsisa/tpsisa2023.html#RaySPBR23</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/corr/abs-2312-10214" mdate="2024-01-15">
<author pid="306/7633">Md. Al Amin</author>
<author pid="365/3645">Hemanth Tummala</author>
<author pid="365/3298">Seshamalini Mohan</author>
<author pid="r/IndrajitRay">Indrajit Ray</author>
<title>Healthcare Policy Compliance: A Blockchain Smart Contract-Based Approach.</title>
<year>2023</year>
<volume>abs/2312.10214</volume>
<journal>CoRR</journal>
<ee type="oa">https://doi.org/10.48550/arXiv.2312.10214</ee>
<url>db/journals/corr/corr2312.html#abs-2312-10214</url>
</article>
</r>
<r><book key="books/sp/SmidtsRZVZHDTP22" mdate="2023-06-26">
<author pid="157/3580">Carol S. Smidts</author>
<author pid="r/IndrajitRay">Indrajit Ray</author>
<author pid="03/6207">Quanyan Zhu</author>
<author pid="331/4664">Pavan Kumar Vaddi</author>
<author orcid="0000-0003-1314-4081" pid="240/8099">Yunfei Zhao</author>
<author orcid="0000-0003-1591-8749" pid="172/2771">Linan Huang</author>
<author pid="186/3480">Xiaoxu Diao</author>
<author pid="331/4826">Rakibul Talukdar</author>
<author pid="331/4689">Michael C. Pietrykowski</author>
<title>Cyber-Security Threats and Response Models in Nuclear Power Plants</title>
<publisher>Springer</publisher>
<year>2022</year>
<pages>1-90</pages>
<series href="db/series/sbcs/index.html">Springer Briefs in Computer Science</series>
<isbn>978-3-031-12710-6</isbn>
<ee>https://doi.org/10.1007/978-3-031-12711-3</ee>
</book>
</r>
<r><inproceedings key="conf/cpss/PrabhuSRRG22" mdate="2025-01-19">
<author pid="85/1190">Vinayak S. Prabhu</author>
<author pid="21/6018">Mohit Singh</author>
<author pid="r/IndrajitRay">Indrajit Ray</author>
<author pid="r/IndrakshiRay">Indrakshi Ray</author>
<author pid="244/6021-1">Sudipto Ghosh 0001</author>
<title>Detecting Secure Memory Deallocation Violations with CBMC.</title>
<pages>27-38</pages>
<year>2022</year>
<booktitle>CPSS@AsiaCCS</booktitle>
<ee>https://doi.org/10.1145/3494107.3522779</ee>
<ee>https://www.wikidata.org/entity/Q130965207</ee>
<crossref>conf/cpss/2022</crossref>
<url>db/conf/cpss/cpss2022.html#PrabhuSRRG22</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ispec/TalukderAR22" mdate="2025-12-07">
<author orcid="0009-0007-7820-0853" pid="333/9371">Md. Rakibul Hasan Talukder</author>
<author orcid="0000-0003-1700-7201" pid="306/7633">Md. Al Amin</author>
<author pid="r/IndrajitRay">Indrajit Ray</author>
<title>Protecting Cyber-Physical System Testbeds from Red-Teaming/Blue-Teaming Experiments Gone Awry.</title>
<pages>140-157</pages>
<year>2022</year>
<booktitle>ISPEC</booktitle>
<ee>https://doi.org/10.1007/978-3-031-21280-2_8</ee>
<crossref>conf/ispec/2022</crossref>
<url>db/conf/ispec/ispec2022.html#TalukderAR22</url>
</inproceedings>
</r>
<r><article key="journals/widm/BezawadaRR21" mdate="2025-01-19">
<author pid="64/1299">Bruhadeshwar Bezawada</author>
<author pid="r/IndrakshiRay">Indrakshi Ray</author>
<author pid="r/IndrajitRay">Indrajit Ray</author>
<title>Behavioral fingerprinting of Internet-of-Things devices.</title>
<year>2021</year>
<volume>11</volume>
<journal>WIREs Data Mining Knowl. Discov.</journal>
<number>1</number>
<ee>https://doi.org/10.1002/widm.1337</ee>
<ee>https://www.wikidata.org/entity/Q127215592</ee>
<url>db/journals/widm/widm11.html#BezawadaRR21</url>
</article>
</r>
<r><inproceedings key="conf/iciss/SaravaniRR21" mdate="2023-06-26">
<author orcid="0000-0003-4285-1439" pid="309/4517">Sina Mahdipour Saravani</author>
<author pid="r/IndrajitRay">Indrajit Ray</author>
<author pid="r/IndrakshiRay">Indrakshi Ray</author>
<title>Automated Identification of Social Media Bots Using Deepfake Text Detection.</title>
<pages>111-123</pages>
<year>2021</year>
<booktitle>ICISS</booktitle>
<ee>https://doi.org/10.1007/978-3-030-92571-0_7</ee>
<crossref>conf/iciss/2021</crossref>
<url>db/conf/iciss/iciss2021.html#SaravaniRR21</url>
</inproceedings>
</r>
<r><inproceedings key="conf/tpsisa/JamesRM21" mdate="2022-04-21">
<author pid="261/8805">Fathima James</author>
<author pid="r/IndrajitRay">Indrajit Ray</author>
<author pid="m/DeepMedhi">Deep Medhi</author>
<title>Situational Awareness for Smart Home IoT Security via Finite State Automata Based Attack Modeling.</title>
<pages>61-69</pages>
<year>2021</year>
<booktitle>TPS-ISA</booktitle>
<ee>https://doi.org/10.1109/TPSISA52974.2021.00007</ee>
<crossref>conf/tpsisa/2021</crossref>
<url>db/conf/tpsisa/tpsisa2021.html#JamesRM21</url>
</inproceedings>
</r>
<r><article key="journals/jcs/KarRGPR20" mdate="2023-08-28">
<author pid="207/6601">Diptendu Mohan Kar</author>
<author pid="r/IndrajitRay">Indrajit Ray</author>
<author pid="238/8864">Jenna Gallegos</author>
<author pid="15/3865">Jean Peccoud</author>
<author pid="r/IndrakshiRay">Indrakshi Ray</author>
<title>Synthesizing DNA molecules with identity-based digital signatures to prevent malicious tampering and enabling source attribution.</title>
<pages>437-467</pages>
<year>2020</year>
<volume>28</volume>
<journal>J. Comput. Secur.</journal>
<number>4</number>
<ee>https://doi.org/10.3233/JCS-191383</ee>
<ee>https://www.wikidata.org/entity/Q114845061</ee>
<url>db/journals/jcs/jcs28.html#KarRGPR20</url>
</article>
</r>
<r><article key="journals/tcps/MukherjeeESWRR20" mdate="2025-01-19">
<author pid="160/7682">Subhojeet Mukherjee</author>
<author pid="256/9779">Jeffrey C. Van Etten</author>
<author pid="256/9837">Namburi Rani Samyukta</author>
<author pid="135/1696">Jacob Walker</author>
<author pid="r/IndrakshiRay">Indrakshi Ray</author>
<author pid="r/IndrajitRay">Indrajit Ray</author>
<title>TruckSTM: Runtime Realization of Operational State Transitions for Medium and Heavy Duty Vehicles.</title>
<pages>4:1-4:25</pages>
<year>2020</year>
<volume>4</volume>
<journal>ACM Trans. Cyber Phys. Syst.</journal>
<number>1</number>
<ee>https://doi.org/10.1145/3300183</ee>
<ee>https://www.wikidata.org/entity/Q131114923</ee>
<url>db/journals/tcps/tcps4.html#MukherjeeESWRR20</url>
</article>
</r>
<r><inproceedings key="conf/coinco/RayKPG19" mdate="2022-05-27">
<author pid="r/IndrajitRay">Indrajit Ray</author>
<author pid="207/6601">Diptendu Mohan Kar</author>
<author pid="218/5166">Jordan Peterson 0001</author>
<author pid="236/8138">Steve Goeringer</author>
<title>Device Identity and Trust in IoT-sphere Forsaking Cryptography.</title>
<pages>204-213</pages>
<year>2019</year>
<booktitle>CIC</booktitle>
<ee>https://doi.org/10.1109/CIC48465.2019.00034</ee>
<crossref>conf/coinco/2019</crossref>
<url>db/conf/coinco/cic2019.html#RayKPG19</url>
</inproceedings>
</r>
<r><inproceedings key="conf/dbsec/BezawadaRT19" mdate="2019-10-19">
<author orcid="0000-0002-1021-8121" pid="64/1299">Bruhadeshwar Bezawada</author>
<author pid="r/IndrajitRay">Indrajit Ray</author>
<author pid="244/0548">Kushagra Tiwary</author>
<title>AGBuilder: An AI Tool for Automated Attack Graph Building, Analysis, and Refinement.</title>
<pages>23-42</pages>
<year>2019</year>
<booktitle>DBSec</booktitle>
<ee>https://doi.org/10.1007/978-3-030-22479-0_2</ee>
<crossref>conf/dbsec/2019</crossref>
<url>db/conf/dbsec/dbsec2019.html#BezawadaRT19</url>
</inproceedings>
</r>
<r><inproceedings key="conf/dbsec/KarR19" mdate="2019-07-04">
<author pid="207/6601">Diptendu Mohan Kar</author>
<author pid="r/IndrajitRay">Indrajit Ray</author>
<title>That's My DNA: Detecting Malicious Tampering of Synthesized DNA.</title>
<pages>61-80</pages>
<year>2019</year>
<booktitle>DBSec</booktitle>
<ee>https://doi.org/10.1007/978-3-030-22479-0_4</ee>
<crossref>conf/dbsec/2019</crossref>
<url>db/conf/dbsec/dbsec2019.html#KarR19</url>
</inproceedings>
</r>
<r><inproceedings key="conf/wsc/ShettyRCMBZ19" mdate="2025-04-29">
<author orcid="0000-0002-8789-0610" pid="82/2803">Sachin Shetty</author>
<author pid="r/IndrajitRay">Indrajit Ray</author>
<author pid="48/8423">Nurcin Celik</author>
<author pid="258/9311">Michael Mesham</author>
<author pid="132/5837">Nathaniel D. Bastian</author>
<author pid="03/6207">Quanyan Zhu</author>
<title>Simulation for Cyber Risk Management - Where are we, and Where do we Want to Go?</title>
<pages>726-737</pages>
<year>2019</year>
<booktitle>WSC</booktitle>
<ee>https://doi.org/10.1109/WSC40007.2019.9004688</ee>
<crossref>conf/wsc/2019</crossref>
<url>db/conf/wsc/wsc2019.html#ShettyRCMBZ19</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/corr/abs-1905-01002" mdate="2021-02-23">
<author pid="39/8969">Pin-Yu Chen</author>
<author pid="57/7437">Sutanay Choudhury</author>
<author pid="168/9512">Luke Rodriguez</author>
<author pid="h/AlfredOHeroIII">Alfred O. Hero III</author>
<author pid="r/IndrajitRay">Indrajit Ray</author>
<title>Enterprise Cyber Resiliency Against Lateral Movement: A Graph Theoretic Approach.</title>
<year>2019</year>
<volume>abs/1905.01002</volume>
<journal>CoRR</journal>
<ee type="oa">http://arxiv.org/abs/1905.01002</ee>
<url>db/journals/corr/corr1905.html#abs-1905-01002</url>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-1908-05366" mdate="2019-08-19">
<author pid="207/6601">Diptendu Mohan Kar</author>
<author pid="r/IndrajitRay">Indrajit Ray</author>
<title>Systematization of Knowledge and Implementation: Short Identity-Based Signatures.</title>
<year>2019</year>
<volume>abs/1908.05366</volume>
<journal>CoRR</journal>
<ee type="oa">http://arxiv.org/abs/1908.05366</ee>
<url>db/journals/corr/corr1908.html#abs-1908-05366</url>
</article>
</r>
<r><article key="journals/fgcs/BelyaevSRR18" mdate="2020-02-19">
<author pid="128/7861">Kirill Belyaev</author>
<author pid="70/2962">Wuliang Sun</author>
<author pid="r/IndrakshiRay">Indrakshi Ray</author>
<author pid="r/IndrajitRay">Indrajit Ray</author>
<title>On the design and analysis of protocols for Personal Health Record storage on Personal Data Server devices.</title>
<pages>467-482</pages>
<year>2018</year>
<volume>80</volume>
<journal>Future Gener. Comput. Syst.</journal>
<ee>https://doi.org/10.1016/j.future.2016.05.027</ee>
<url>db/journals/fgcs/fgcs80.html#BelyaevSRR18</url>
</article>
</r>
<r><article key="journals/jcs/MoatazRRSCC18" mdate="2023-08-28">
<author pid="77/11487">Tarik Moataz</author>
<author pid="r/IndrajitRay">Indrajit Ray</author>
<author pid="r/IndrakshiRay">Indrakshi Ray</author>
<author orcid="0000-0002-6479-3578" pid="24/4245">Abdullatif Shikfa</author>
<author pid="c/FredericCuppens">Fr&#233;d&#233;ric Cuppens</author>
<author pid="c/NoraCuppens">Nora Cuppens</author>
<title>Substring search over encrypted data.</title>
<pages>1-30</pages>
<year>2018</year>
<volume>26</volume>
<journal>J. Comput. Secur.</journal>
<number>1</number>
<ee>https://doi.org/10.3233/JCS-14652</ee>
<ee>https://www.wikidata.org/entity/Q114944865</ee>
<url>db/journals/jcs/jcs26.html#MoatazRRSCC18</url>
</article>
</r>
<r><inproceedings key="conf/ccs/BezawadaBPSRR18" mdate="2021-06-30">
<author orcid="0000-0002-1021-8121" pid="64/1299">Bruhadeshwar Bezawada</author>
<author pid="218/5240">Maalvika Bachani</author>
<author pid="218/5166">Jordan Peterson 0001</author>
<author pid="58/2807">Hossein Shirazi</author>
<author pid="r/IndrakshiRay">Indrakshi Ray</author>
<author pid="r/IndrajitRay">Indrajit Ray</author>
<title>Behavioral Fingerprinting of IoT Devices.</title>
<pages>41-50</pages>
<year>2018</year>
<booktitle>ASHES@CCS</booktitle>
<ee>https://doi.org/10.1145/3266444.3266452</ee>
<crossref>conf/ccs/2018ashes</crossref>
<url>db/conf/ccs/ashes2018.html#BezawadaBPSRR18</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ccs/MulambaABR18" mdate="2019-10-19">
<author pid="128/7879">Dieudonne Mulamba</author>
<author pid="228/0546">Athith Amarnath</author>
<author orcid="0000-0002-1021-8121" pid="64/1299">Bruhadeshwar Bezawada</author>
<author pid="r/IndrajitRay">Indrajit Ray</author>
<title>A Secure Hash Commitment Approach for Moving Target Defense of Security-critical Services.</title>
<pages>59-68</pages>
<year>2018</year>
<booktitle>MTD@CCS</booktitle>
<ee>https://doi.org/10.1145/3268966.3268969</ee>
<crossref>conf/ccs/2018mtd</crossref>
<url>db/conf/ccs/mtd2018.html#MulambaABR18</url>
</inproceedings>
</r>
<r><inproceedings key="conf/nspw/KarRGP18" mdate="2019-04-12">
<author pid="207/6601">Diptendu Mohan Kar</author>
<author pid="r/IndrajitRay">Indrajit Ray</author>
<author pid="238/8864">Jenna Gallegos</author>
<author pid="15/3865">Jean Peccoud</author>
<title>Digital Signatures to Ensure the Authenticity and Integrity of Synthetic DNA Molecules.</title>
<pages>110-122</pages>
<year>2018</year>
<booktitle>NSPW</booktitle>
<ee>https://doi.org/10.1145/3285002.3285007</ee>
<crossref>conf/nspw/2018</crossref>
<url>db/conf/nspw/nspw2018.html#KarRGP18</url>
</inproceedings>
</r>
<r><inproceedings key="conf/pst/LazrigORRJV18" mdate="2023-03-23">
<author pid="164/0743">Ibrahim Lazrig</author>
<author pid="33/3818">Toan C. Ong</author>
<author pid="r/IndrajitRay">Indrajit Ray</author>
<author pid="r/IndrakshiRay">Indrakshi Ray</author>
<author pid="43/3924">Xiaoqian Jiang</author>
<author pid="61/3091">Jaideep Vaidya</author>
<title>Privacy Preserving Probabilistic Record Linkage Without Trusted Third Party.</title>
<pages>1-10</pages>
<year>2018</year>
<booktitle>PST</booktitle>
<ee>https://doi.org/10.1109/PST.2018.8514192</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/PST.2018.8514192</ee>
<crossref>conf/pst/2018</crossref>
<url>db/conf/pst/pst2018.html#LazrigORRJV18</url>
</inproceedings>
</r>
<r><inproceedings key="conf/pst/MulambaRR18" mdate="2023-03-23">
<author pid="128/7879">Dieudonne Mulamba</author>
<author pid="r/IndrajitRay">Indrajit Ray</author>
<author pid="r/IndrakshiRay">Indrakshi Ray</author>
<title>On Sybil Classification in Online Social Networks Using Only Structural Features.</title>
<pages>1-10</pages>
<year>2018</year>
<booktitle>PST</booktitle>
<ee>https://doi.org/10.1109/PST.2018.8514162</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/PST.2018.8514162</ee>
<crossref>conf/pst/2018</crossref>
<url>db/conf/pst/pst2018.html#MulambaRR18</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sacmat/BezawadaKRRL18" mdate="2025-01-19">
<author orcid="0000-0002-1021-8121" pid="64/1299">Bruhadeshwar Bezawada</author>
<author pid="k/SandeepSKulkarni">Sandeep S. Kulkarni</author>
<author pid="r/IndrajitRay">Indrajit Ray</author>
<author pid="r/IndrakshiRay">Indrakshi Ray</author>
<author pid="96/4282-20">Rui Li 0020</author>
<title>Independent Key Distribution Protocols for Broadcast Authentication.</title>
<pages>27-38</pages>
<year>2018</year>
<booktitle>SACMAT</booktitle>
<ee>https://doi.org/10.1145/3205977.3205985</ee>
<ee>https://www.wikidata.org/entity/Q130978417</ee>
<crossref>conf/sacmat/2018</crossref>
<url>db/conf/sacmat/sacmat2018.html#BezawadaKRRL18</url>
</inproceedings>
</r>
<r><proceedings key="conf/birthday/2018jajodia" mdate="2019-05-14">
<editor pid="s/PSamarati">Pierangela Samarati</editor>
<editor pid="r/IndrajitRay">Indrajit Ray</editor>
<editor pid="r/IndrakshiRay">Indrakshi Ray</editor>
<title>From Database to Cyber Security - Essays Dedicated to Sushil Jajodia on the Occasion of His 70th Birthday</title>
<booktitle>From Database to Cyber Security</booktitle>
<publisher>Springer</publisher>
<year>2018</year>
<series href="db/series/lncs/index.html">Lecture Notes in Computer Science</series>
<volume>11170</volume>
<isbn>978-3-030-04833-4</isbn>
<isbn>978-3-030-04834-1</isbn>
<ee>https://doi.org/10.1007/978-3-030-04834-1</ee>
<url>db/conf/birthday/jajodia2018.html</url>
</proceedings>
</r>
<r><article publtype="informal" key="journals/corr/abs-1804-03852" mdate="2021-06-30">
<author pid="64/1299">Bruhadeshwar Bezawada</author>
<author pid="218/5240">Maalvika Bachani</author>
<author pid="218/5166">Jordan Peterson 0001</author>
<author pid="58/2807">Hossein Shirazi</author>
<author pid="r/IndrakshiRay">Indrakshi Ray</author>
<author pid="r/IndrajitRay">Indrajit Ray</author>
<title>IoTSense: Behavioral Fingerprinting of IoT Devices.</title>
<year>2018</year>
<volume>abs/1804.03852</volume>
<journal>CoRR</journal>
<ee type="oa">http://arxiv.org/abs/1804.03852</ee>
<url>db/journals/corr/corr1804.html#abs-1804-03852</url>
</article>
</r>
<r><inproceedings key="conf/ccs/KarLRR17" mdate="2020-11-10">
<author pid="207/6601">Diptendu Mohan Kar</author>
<author pid="164/0743">Ibrahim Lazrig</author>
<author pid="r/IndrajitRay">Indrajit Ray</author>
<author pid="r/IndrakshiRay">Indrakshi Ray</author>
<title>POSTER: PriReMat: A Distributed Tool for Privacy Preserving Record Linking in Healthcare.</title>
<pages>2507-2509</pages>
<year>2017</year>
<booktitle>CCS</booktitle>
<ee>https://doi.org/10.1145/3133956.3138845</ee>
<crossref>conf/ccs/2017</crossref>
<url>db/conf/ccs/ccs2017.html#KarLRR17</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ccs/MukherjeeCWWRR17" mdate="2020-11-10">
<author pid="160/7682">Subhojeet Mukherjee</author>
<author pid="207/6578">Noah Cain</author>
<author pid="135/1696">Jacob Walker</author>
<author pid="31/6546">David White</author>
<author pid="r/IndrajitRay">Indrajit Ray</author>
<author pid="r/IndrakshiRay">Indrakshi Ray</author>
<title>POSTER: PenJ1939: An Interactive Framework for Design and Dissemination of Exploits for Commercial Vehicles.</title>
<pages>2559-2561</pages>
<year>2017</year>
<booktitle>CCS</booktitle>
<ee>https://doi.org/10.1145/3133956.3138844</ee>
<crossref>conf/ccs/2017</crossref>
<url>db/conf/ccs/ccs2017.html#MukherjeeCWWRR17</url>
</inproceedings>
</r>
<r><inproceedings key="conf/codaspy/MukherjeeRRSOK17" mdate="2020-10-25">
<author pid="160/7682">Subhojeet Mukherjee</author>
<author pid="r/IndrakshiRay">Indrakshi Ray</author>
<author pid="r/IndrajitRay">Indrajit Ray</author>
<author orcid="0000-0002-3326-8527" pid="58/2807">Hossein Shirazi</author>
<author pid="33/3818">Toan Ong</author>
<author pid="59/256">Michael G. Kahn</author>
<title>Attribute Based Access Control for Healthcare Resources.</title>
<pages>29-40</pages>
<year>2017</year>
<booktitle>ABAC@CODASPY</booktitle>
<ee>https://doi.org/10.1145/3041048.3041055</ee>
<crossref>conf/codaspy/2017abac</crossref>
<url>db/conf/codaspy/abac2017.html#MukherjeeRRSOK17</url>
</inproceedings>
</r>
<r><inproceedings key="conf/dbsec/MulambaR17" mdate="2017-07-10">
<author pid="128/7879">Dieudonne Mulamba</author>
<author pid="r/IndrajitRay">Indrajit Ray</author>
<title>Resilient Reference Monitor for Distributed Access Control via Moving Target Defense.</title>
<pages>20-40</pages>
<year>2017</year>
<booktitle>DBSec</booktitle>
<ee>https://doi.org/10.1007/978-3-319-61176-1_2</ee>
<crossref>conf/dbsec/2017</crossref>
<url>db/conf/dbsec/dbsec2017.html#MulambaR17</url>
</inproceedings>
</r>
<r><article key="journals/chb/ByrneDPRHS16" mdate="2022-04-14">
<author pid="116/8612">Zinta S. Byrne</author>
<author pid="177/9987">Kyla J. Dvorak</author>
<author pid="177/9782">Janet M. Peters</author>
<author pid="r/IndrajitRay">Indrajit Ray</author>
<author pid="h/AdeleEHowe">Adele E. Howe</author>
<author orcid="0000-0003-4937-9114" pid="252/4010">Diana R. Sanchez</author>
<title>From the user's perspective: Perceptions of risk relative to benefit associated with using the Internet.</title>
<pages>456-468</pages>
<year>2016</year>
<volume>59</volume>
<journal>Comput. Hum. Behav.</journal>
<ee>https://doi.org/10.1016/j.chb.2016.02.024</ee>
<url>db/journals/chb/chb59.html#ByrneDPRHS16</url>
</article>
</r>
<r><article key="journals/fi/StrizhovOR16" mdate="2023-08-28">
<author pid="128/7855">Mikhail Strizhov</author>
<author pid="183/4403">Zachary Osman</author>
<author pid="r/IndrajitRay">Indrajit Ray</author>
<title>Substring Position Search over Encrypted Cloud Data Supporting Efficient Multi-User Setup.</title>
<year>2016</year>
<volume>8</volume>
<journal>Future Internet</journal>
<number>3</number>
<ee type="oa">https://doi.org/10.3390/fi8030028</ee>
<ee>https://www.wikidata.org/entity/Q121009601</ee>
<url>db/journals/fi/fi8.html#StrizhovOR16</url>
<pages>28</pages>
</article>
</r>
<r><article key="journals/sqj/YounisMR16" mdate="2025-01-19">
<author pid="142/7178">Awad A. Younis</author>
<author pid="m/YKMalaiya">Yashwant K. Malaiya</author>
<author pid="r/IndrajitRay">Indrajit Ray</author>
<title>Assessing vulnerability exploitability risk using software properties.</title>
<pages>159-202</pages>
<year>2016</year>
<volume>24</volume>
<journal>Softw. Qual. J.</journal>
<number>1</number>
<ee>https://doi.org/10.1007/s11219-015-9274-6</ee>
<ee>https://www.wikidata.org/entity/Q123253261</ee>
<url>db/journals/sqj/sqj24.html#YounisMR16</url>
</article>
</r>
<r><article key="journals/tdp/StrizhovR16" mdate="2020-05-22">
<author pid="128/7855">Mikhail Strizhov</author>
<author pid="r/IndrajitRay">Indrajit Ray</author>
<title>Secure Multi-keyword Similarity Search Over Encrypted Cloud Data Supporting Efficient Multi-user Setup.</title>
<pages>131-159</pages>
<year>2016</year>
<volume>9</volume>
<journal>Trans. Data Priv.</journal>
<number>2</number>
<ee type="oa">http://www.tdp.cat/issues16/tdp.a228a15.pdf</ee>
<url>db/journals/tdp/tdp9.html#StrizhovR16</url>
</article>
</r>
<r><inproceedings key="conf/bhi/RayORK16" mdate="2017-05-26">
<author pid="r/IndrakshiRay">Indrakshi Ray</author>
<author pid="33/3818">Toan C. Ong</author>
<author pid="r/IndrajitRay">Indrajit Ray</author>
<author pid="59/256">Michael G. Kahn</author>
<title>Applying attribute based access control for privacy preserving health data disclosure.</title>
<pages>1-4</pages>
<year>2016</year>
<booktitle>BHI</booktitle>
<ee>https://doi.org/10.1109/BHI.2016.7455820</ee>
<crossref>conf/bhi/2016</crossref>
<url>db/conf/bhi/bhi2016.html#RayORK16</url>
</inproceedings>
</r>
<r><inproceedings key="conf/codaspy/YounisMAR16" mdate="2025-01-19">
<author pid="142/7178">Awad A. Younis</author>
<author pid="m/YKMalaiya">Yashwant K. Malaiya</author>
<author orcid="0000-0001-7392-3840" pid="92/5241">Charles Anderson 0001</author>
<author pid="r/IndrajitRay">Indrajit Ray</author>
<title>To Fear or Not to Fear That is the Question: Code Characteristics of a Vulnerable Functionwith an Existing Exploit.</title>
<pages>97-104</pages>
<year>2016</year>
<booktitle>CODASPY</booktitle>
<ee>https://doi.org/10.1145/2857705.2857750</ee>
<ee>https://www.wikidata.org/entity/Q130921168</ee>
<crossref>conf/codaspy/2016</crossref>
<url>db/conf/codaspy/codaspy2016.html#YounisMAR16</url>
</inproceedings>
</r>
<r><inproceedings key="conf/dbsec/LazrigORRK16" mdate="2017-05-26">
<author pid="164/0743">Ibrahim Lazrig</author>
<author pid="33/3818">Toan Ong</author>
<author pid="r/IndrajitRay">Indrajit Ray</author>
<author pid="r/IndrakshiRay">Indrakshi Ray</author>
<author pid="59/256">Michael G. Kahn</author>
<title>Privacy Preserving Probabilistic Record Linkage Using Locality Sensitive Hashes.</title>
<pages>61-76</pages>
<year>2016</year>
<booktitle>DBSec</booktitle>
<ee>https://doi.org/10.1007/978-3-319-41483-6_5</ee>
<crossref>conf/dbsec/2016</crossref>
<url>db/conf/dbsec/dbsec2016.html#LazrigORRK16</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sec/YounisMR16" mdate="2017-05-19">
<author pid="142/7178">Awad A. Younis</author>
<author pid="m/YKMalaiya">Yashwant K. Malaiya</author>
<author pid="r/IndrajitRay">Indrajit Ray</author>
<title>Evaluating CVSS Base Score Using Vulnerability Rewards Programs.</title>
<pages>62-75</pages>
<year>2016</year>
<booktitle>SEC</booktitle>
<ee>https://doi.org/10.1007/978-3-319-33630-5_5</ee>
<crossref>conf/sec/2016</crossref>
<url>db/conf/sec/sec2016.html#YounisMR16</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sec/MulambaRR16" mdate="2017-05-19">
<author pid="128/7879">Dieudonne Mulamba</author>
<author pid="r/IndrajitRay">Indrajit Ray</author>
<author pid="r/IndrakshiRay">Indrakshi Ray</author>
<title>SybilRadar: A Graph-Structure Based Framework for Sybil Detection in On-line Social Networks.</title>
<pages>179-193</pages>
<year>2016</year>
<booktitle>SEC</booktitle>
<ee>https://doi.org/10.1007/978-3-319-33630-5_13</ee>
<crossref>conf/sec/2016</crossref>
<url>db/conf/sec/sec2016.html#MulambaRR16</url>
</inproceedings>
</r>
<r><proceedings key="conf/css/2016" mdate="2019-10-16">
<editor pid="86/246">Javier Garc&#237;a Blas</editor>
<editor pid="c/JCarretero">Jes&#250;s Carretero 0001</editor>
<editor pid="r/IndrajitRay">Indrajit Ray</editor>
<editor pid="54/2551">Qun Jin</editor>
<editor pid="19/320">Nektarios Georgalas</editor>
<title>15th International Conference on Ubiquitous Computing and 8th Communications and International Symposium on Cyberspace Safety and Security, IUCC-CSS 2016, Granada, Spain, December 14-16, 2016</title>
<booktitle>IUCC-CSS</booktitle>
<publisher>IEEE Computer Society</publisher>
<year>2016</year>
<isbn>978-1-5090-5566-1</isbn>
<ee>https://ieeexplore.ieee.org/xpl/conhome/7827384/proceeding</ee>
<ee>https://www.computer.org/csdl/proceedings/iucc-css/2016/5566/00/index.html</ee>
<url>db/conf/css/css2016.html</url>
</proceedings>
</r>
<r><proceedings key="conf/iciss/2016" mdate="2020-09-10">
<editor pid="r/IndrajitRay">Indrajit Ray</editor>
<editor pid="80/7311">Manoj Singh Gaur</editor>
<editor pid="82/4386">Mauro Conti</editor>
<editor pid="66/4913">Dheeraj Sanghi</editor>
<editor pid="25/3336">V. Kamakoti 0001</editor>
<title>Information Systems Security - 12th International Conference, ICISS 2016, Jaipur, India, December 16-20, 2016, Proceedings</title>
<booktitle>ICISS</booktitle>
<publisher>Springer</publisher>
<year>2016</year>
<series href="db/series/lncs/index.html">Lecture Notes in Computer Science</series>
<volume>10063</volume>
<isbn>978-3-319-49805-8</isbn>
<ee>https://doi.org/10.1007/978-3-319-49806-5</ee>
<url>db/conf/iciss/iciss2016.html</url>
</proceedings>
</r>
<r><inproceedings key="conf/ccs/RodriguezCCONCR15" mdate="2020-12-29">
<author pid="168/9512">Luke Rodriguez</author>
<author orcid="0000-0002-4907-4575" pid="30/6822">Darren S. Curtis</author>
<author pid="57/7437">Sutanay Choudhury</author>
<author pid="168/9449">Kiri Oler</author>
<author pid="97/583">Peter Nordquist</author>
<author pid="39/8969">Pin-Yu Chen</author>
<author pid="r/IndrajitRay">Indrajit Ray</author>
<title>DEMO: Action Recommendation for Cyber Resilience.</title>
<pages>1620-1622</pages>
<year>2015</year>
<booktitle>CCS</booktitle>
<ee>https://doi.org/10.1145/2810103.2810104</ee>
<crossref>conf/ccs/2015</crossref>
<url>db/conf/ccs/ccs2015.html#RodriguezCCONCR15</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ccs/MukherjeeWDRH15" mdate="2020-11-10">
<author pid="160/7682">Subhojeet Mukherjee</author>
<author pid="57/10716">Sachini S. Weerawardhana</author>
<author pid="168/9538">Chancey Dunn</author>
<author pid="r/IndrajitRay">Indrajit Ray</author>
<author pid="h/AdeleEHowe">Adele E. Howe</author>
<title>POSTER: PsychoRithm: A Framework for Studying How Human Traits Affect User Response to Security Situations.</title>
<pages>1662-1664</pages>
<year>2015</year>
<booktitle>CCS</booktitle>
<ee>https://doi.org/10.1145/2810103.2810125</ee>
<crossref>conf/ccs/2015</crossref>
<url>db/conf/ccs/ccs2015.html#MukherjeeWDRH15</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ccs/KerschbaumNR15" mdate="2020-11-10">
<author pid="26/5304">Florian Kerschbaum</author>
<author pid="n/CristinaNitaRotaru">Cristina Nita-Rotaru</author>
<author pid="r/IndrajitRay">Indrajit Ray</author>
<title>CCSW 2015: The 7th ACM Cloud Computing Security Workshop.</title>
<pages>1703-1704</pages>
<year>2015</year>
<booktitle>CCS</booktitle>
<ee>https://doi.org/10.1145/2810103.2812620</ee>
<crossref>conf/ccs/2015</crossref>
<url>db/conf/ccs/ccs2015.html#KerschbaumNR15</url>
</inproceedings>
</r>
<r><inproceedings key="conf/dbsec/LazrigMRROKCC15" mdate="2019-08-20">
<author pid="164/0743">Ibrahim Lazrig</author>
<author pid="77/11487">Tarik Moataz</author>
<author pid="r/IndrajitRay">Indrajit Ray</author>
<author pid="r/IndrakshiRay">Indrakshi Ray</author>
<author pid="33/3818">Toan Ong</author>
<author pid="59/256">Michael G. Kahn</author>
<author pid="c/FredericCuppens">Fr&#233;d&#233;ric Cuppens</author>
<author pid="c/NoraCuppens">Nora Cuppens-Boulahia</author>
<title>Privacy Preserving Record Matching Using Automated Semi-trusted Broker.</title>
<pages>103-118</pages>
<year>2015</year>
<booktitle>DBSec</booktitle>
<ee type="oa">https://doi.org/10.1007/978-3-319-20810-7_7</ee>
<crossref>conf/dbsec/2015</crossref>
<url>db/conf/dbsec/dbsec2015.html#LazrigMRROKCC15</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ic2e/StrizhovR15" mdate="2017-05-25">
<author pid="128/7855">Mikhail Strizhov</author>
<author pid="r/IndrajitRay">Indrajit Ray</author>
<title>Substring Position Search over Encrypted Cloud Data Using Tree-Based Index.</title>
<pages>165-174</pages>
<year>2015</year>
<booktitle>IC2E</booktitle>
<ee>https://doi.org/10.1109/IC2E.2015.33</ee>
<crossref>conf/ic2e/2015</crossref>
<url>db/conf/ic2e/ic2e2015.html#StrizhovR15</url>
</inproceedings>
</r>
<r><inproceedings key="conf/safeconfig/ChoudhuryRCONCR15" mdate="2025-12-25">
<author pid="57/7437">Sutanay Choudhury</author>
<author pid="168/9512">Luke Rodriguez</author>
<author orcid="0000-0002-4907-4575" pid="30/6822">Darren S. Curtis</author>
<author pid="168/9449">Kiri Oler</author>
<author orcid="0009-0004-4900-9302" pid="97/583">Peter Nordquist</author>
<author pid="39/8969">Pin-Yu Chen</author>
<author pid="r/IndrajitRay">Indrajit Ray</author>
<title>Action Recommendation for Cyber Resilience.</title>
<pages>3-8</pages>
<year>2015</year>
<booktitle>SafeConfig@CCS</booktitle>
<ee>https://doi.org/10.1145/2809826.2809837</ee>
<crossref>conf/safeconfig/2015</crossref>
<url>db/conf/safeconfig/safeconfig2015.html#ChoudhuryRCONCR15</url>
</inproceedings>
</r>
<r><proceedings key="conf/ccs/2015" mdate="2026-02-10">
<editor pid="r/IndrajitRay">Indrajit Ray</editor>
<editor pid="l/NinghuiLi">Ninghui Li 0001</editor>
<editor pid="k/ChristopherKruegel">Christopher Kruegel</editor>
<title>Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015</title>
<publisher>ACM</publisher>
<booktitle>CCS</booktitle>
<year>2015</year>
<isbn>978-1-4503-3832-5</isbn>
<ee>http://dl.acm.org/citation.cfm?id=2810103</ee>
<url>db/conf/ccs/ccs2015.html</url>
</proceedings>
</r>
<r><proceedings key="conf/ccs/2015aisec" mdate="2020-11-10">
<editor pid="r/IndrajitRay">Indrajit Ray</editor>
<editor pid="99/2479">Xiaofeng Wang</editor>
<editor pid="20/6179-1">Kui Ren 0001</editor>
<editor pid="17/2535">Christos Dimitrakakis</editor>
<editor pid="22/417">Aikaterini Mitrokotsa</editor>
<editor pid="26/9089">Arunesh Sinha</editor>
<title>Proceedings of the 8th ACM Workshop on Artificial Intelligence and Security, AISec 2015, Denver, Colorado, USA, October 16, 2015</title>
<booktitle>AISec@CCS</booktitle>
<publisher>ACM</publisher>
<year>2015</year>
<isbn>978-1-4503-3826-4</isbn>
<ee>https://doi.org/10.1145/2808769</ee>
<url>db/conf/ccs/aisec2015.html</url>
</proceedings>
</r>
<r><proceedings key="conf/ccs/2015ccsw" mdate="2020-11-10">
<editor pid="r/IndrajitRay">Indrajit Ray</editor>
<editor pid="99/2479">Xiaofeng Wang</editor>
<editor pid="20/6179-1">Kui Ren 0001</editor>
<editor pid="26/5304">Florian Kerschbaum</editor>
<editor pid="n/CristinaNitaRotaru">Cristina Nita-Rotaru</editor>
<title>Proceedings of the 2015 ACM Workshop on Cloud Computing Security Workshop, CCSW 2015, Denver, Colorado, USA, October 16, 2015</title>
<booktitle>CCSW</booktitle>
<publisher>ACM</publisher>
<year>2015</year>
<isbn>978-1-4503-3825-7</isbn>
<ee>https://doi.org/10.1145/2808425</ee>
<url>db/conf/ccs/ccsw2015.html</url>
</proceedings>
</r>
<r><proceedings key="conf/ccs/2015cpsspc" mdate="2020-11-10">
<editor pid="r/IndrajitRay">Indrajit Ray</editor>
<editor pid="09/613">Roshan K. Thomas</editor>
<editor pid="48/6119">Alvaro A. C&#225;rdenas</editor>
<title>Proceedings of the First ACM Workshop on Cyber-Physical Systems-Security and/or PrivaCy, CPS-SPC 2015, Denver, Colorado, USA, October 16, 2015</title>
<booktitle>CPS-SPC@CCS</booktitle>
<publisher>ACM</publisher>
<year>2015</year>
<isbn>978-1-4503-3827-1</isbn>
<ee>https://doi.org/10.1145/2808705</ee>
<url>db/conf/ccs/cpsspc2015.html</url>
</proceedings>
</r>
<r><proceedings key="conf/ccs/2015trusted" mdate="2020-11-10">
<editor pid="r/IndrajitRay">Indrajit Ray</editor>
<editor pid="99/2479">Xiaofeng Wang</editor>
<editor pid="20/6179-1">Kui Ren 0001</editor>
<title>Proceedings of the 5th International Workshop on Trustworthy Embedded Devices, TrustED 2015, Denver, Colorado, USA, October 16, 2015</title>
<booktitle>TrustED@CCS</booktitle>
<publisher>ACM</publisher>
<year>2015</year>
<isbn>978-1-4503-3828-8</isbn>
<ee>https://doi.org/10.1145/2808414</ee>
<url>db/conf/ccs/trusted2015.html</url>
</proceedings>
</r>
<r><proceedings key="conf/ccs/2015wiscs" mdate="2020-11-10">
<editor pid="r/IndrajitRay">Indrajit Ray</editor>
<editor pid="59/4684">Tomas Sander</editor>
<editor pid="y/MotiYung">Moti Yung</editor>
<title>Proceedings of the 2nd ACM Workshop on Information Sharing and Collaborative Security, WISCS 2015, Denver, Colorado, USA, October 12, 2015</title>
<booktitle>WISCS@CCS</booktitle>
<publisher>ACM</publisher>
<year>2015</year>
<isbn>978-1-4503-3822-6</isbn>
<ee>https://doi.org/10.1145/2808128</ee>
<url>db/conf/ccs/wiscs2015.html</url>
</proceedings>
</r>
<r><proceedings key="conf/crisis/2014" mdate="2019-08-29">
<editor pid="02/3236-1">Javier L&#243;pez 0001</editor>
<editor pid="r/IndrajitRay">Indrajit Ray</editor>
<editor pid="c/BrunoCrispo">Bruno Crispo</editor>
<title>Risks and Security of Internet and Systems - 9th International Conference, CRiSIS 2014, Trento, Italy, August 27-29, 2014, Revised Selected Papers</title>
<booktitle>CRiSIS</booktitle>
<publisher>Springer</publisher>
<year>2015</year>
<series href="db/series/lncs/index.html">Lecture Notes in Computer Science</series>
<volume>8924</volume>
<isbn>978-3-319-17126-5</isbn>
<ee>https://doi.org/10.1007/978-3-319-17127-2</ee>
<url>db/conf/crisis/crisis2014.html</url>
</proceedings>
</r>
<r><proceedings key="conf/wpes/2015" mdate="2018-11-06">
<editor pid="r/IndrajitRay">Indrajit Ray</editor>
<editor pid="11/5469">Nicholas Hopper</editor>
<editor pid="14/7561">Rob Jansen</editor>
<title>Proceedings of the 14th ACM Workshop on Privacy in the Electronic Society, WPES 2015, Denver, Colorado, USA, October 12, 2015</title>
<booktitle>WPES@CCS</booktitle>
<publisher>ACM</publisher>
<year>2015</year>
<isbn>978-1-4503-3820-2</isbn>
<ee>https://doi.org/10.1145/2808138</ee>
<url>db/conf/wpes/wpes2015.html</url>
</proceedings>
</r>
<r><article publtype="informal" key="journals/iacr/StrizhovR15" mdate="2020-05-11">
<author pid="128/7855">Mikhail Strizhov</author>
<author pid="r/IndrajitRay">Indrajit Ray</author>
<title>Multi-keyword Similarity Search Over Encrypted Cloud Data.</title>
<pages>137</pages>
<year>2015</year>
<volume>2015</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2015/137</ee>
<url>db/journals/iacr/iacr2015.html#StrizhovR15</url>
</article>
</r>
<r><article key="journals/jet/MoulinRG14" mdate="2023-01-30">
<author pid="84/6201">Herv&#233; Moulin 0001</author>
<author pid="r/IndrajitRay">Indrajit Ray</author>
<author orcid="0000-0002-8731-463X" pid="129/9057">Sonali Sen Gupta</author>
<title>Improving Nash by coarse correlation.</title>
<pages>852-865</pages>
<year>2014</year>
<volume>150</volume>
<journal>J. Econ. Theory</journal>
<ee>https://doi.org/10.1016/j.jet.2013.10.008</ee>
<url>db/journals/jet/jet150.html#MoulinRG14</url>
</article>
</r>
<r><inproceedings key="conf/aips/RobertsHR14" mdate="2014-07-31">
<author pid="75/5516">Mark Roberts</author>
<author pid="h/AdeleEHowe">Adele E. Howe</author>
<author pid="r/IndrajitRay">Indrajit Ray</author>
<title>Evaluating Diversity in Classical Planning.</title>
<year>2014</year>
<booktitle>ICAPS</booktitle>
<ee>http://www.aaai.org/ocs/index.php/ICAPS/ICAPS14/paper/view/7947</ee>
<crossref>conf/aips/2014</crossref>
<url>db/conf/aips/icaps2014.html#RobertsHR14</url>
</inproceedings>
</r>
<r><inproceedings key="conf/dbsec/MoatazJRCCR14" mdate="2018-07-04">
<author pid="77/11487">Tarik Moataz</author>
<author pid="41/8688">Benjamin Justus</author>
<author pid="r/IndrakshiRay">Indrakshi Ray</author>
<author pid="c/NoraCuppens">Nora Cuppens-Boulahia</author>
<author pid="c/FredericCuppens">Fr&#233;d&#233;ric Cuppens</author>
<author pid="r/IndrajitRay">Indrajit Ray</author>
<title>Privacy-Preserving Multiple Keyword Search on Outsourced Data in the Clouds.</title>
<pages>66-81</pages>
<year>2014</year>
<booktitle>DBSec</booktitle>
<ee type="oa">https://doi.org/10.1007/978-3-662-43936-4_5</ee>
<crossref>conf/dbsec/2014</crossref>
<url>db/conf/dbsec/dbsec2014.html#MoatazJRCCR14</url>
</inproceedings>
</r>
<r><inproceedings key="conf/dbsec/MoatazCCRR14" mdate="2018-07-04">
<author pid="77/11487">Tarik Moataz</author>
<author pid="c/NoraCuppens">Nora Cuppens-Boulahia</author>
<author pid="c/FredericCuppens">Fr&#233;d&#233;ric Cuppens</author>
<author pid="r/IndrajitRay">Indrajit Ray</author>
<author pid="r/IndrakshiRay">Indrakshi Ray</author>
<title>ELITE: zEro Links Identity managemenT systEm.</title>
<pages>195-210</pages>
<year>2014</year>
<booktitle>DBSec</booktitle>
<ee type="oa">https://doi.org/10.1007/978-3-662-43936-4_13</ee>
<crossref>conf/dbsec/2014</crossref>
<url>db/conf/dbsec/dbsec2014.html#MoatazCCRR14</url>
</inproceedings>
</r>
<r><inproceedings key="conf/fps/WeerawardhanaMR14" mdate="2017-05-24">
<author pid="57/10716">Sachini S. Weerawardhana</author>
<author pid="160/7682">Subhojeet Mukherjee</author>
<author pid="r/IndrajitRay">Indrajit Ray</author>
<author pid="h/AdeleEHowe">Adele E. Howe</author>
<title>Automated Extraction of Vulnerability Information for Home Computer Security.</title>
<pages>356-366</pages>
<year>2014</year>
<booktitle>FPS</booktitle>
<ee>https://doi.org/10.1007/978-3-319-17040-4_24</ee>
<crossref>conf/fps/2014</crossref>
<url>db/conf/fps/fps2014.html#WeerawardhanaMR14</url>
</inproceedings>
</r>
<r><inproceedings key="conf/hase/YounisMR14" mdate="2023-03-24">
<author pid="142/7178">Awad A. Younis</author>
<author pid="m/YKMalaiya">Yashwant K. Malaiya</author>
<author pid="r/IndrajitRay">Indrajit Ray</author>
<title>Using Attack Surface Entry Points and Reachability Analysis to Assess the Risk of Software Vulnerability Exploitability.</title>
<pages>1-8</pages>
<year>2014</year>
<booktitle>HASE</booktitle>
<ee>https://doi.org/10.1109/HASE.2014.10</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/HASE.2014.10</ee>
<crossref>conf/hase/2014</crossref>
<url>db/conf/hase/hase2014.html#YounisMR14</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sec/StrizhovR14" mdate="2018-06-26">
<author pid="128/7855">Mikhail Strizhov</author>
<author pid="r/IndrajitRay">Indrajit Ray</author>
<title>Multi-keyword Similarity Search over Encrypted Cloud Data.</title>
<pages>52-65</pages>
<year>2014</year>
<booktitle>SEC</booktitle>
<ee type="oa">https://doi.org/10.1007/978-3-642-55415-5_5</ee>
<crossref>conf/sec/2014</crossref>
<url>db/conf/sec/sec2014.html#StrizhovR14</url>
</inproceedings>
</r>
<r><article key="journals/ijgt/RayG13" mdate="2017-06-14">
<author pid="r/IndrajitRay">Indrajit Ray</author>
<author orcid="0000-0002-8731-463X" pid="129/9057">Sonali Sen Gupta</author>
<title>Coarse correlated equilibria in linear duopoly games.</title>
<pages>541-562</pages>
<year>2013</year>
<volume>42</volume>
<journal>Int. J. Game Theory</journal>
<number>2</number>
<ee>https://doi.org/10.1007/s00182-012-0360-8</ee>
<url>db/journals/ijgt/ijgt42.html#RayG13</url>
</article>
</r>
<r><article key="journals/sj/RayBSMR13" mdate="2020-09-11">
<author pid="r/IndrajitRay">Indrajit Ray</author>
<author pid="128/7861">Kirill Belyaev</author>
<author pid="128/7855">Mikhail Strizhov</author>
<author pid="128/7879">Dieudonne Mulamba</author>
<author pid="128/7876">Mariappan Rajaram</author>
<title>Secure Logging as a Service - Delegating Log Management to the Cloud.</title>
<pages>323-334</pages>
<year>2013</year>
<volume>7</volume>
<journal>IEEE Syst. J.</journal>
<number>2</number>
<ee>https://doi.org/10.1109/JSYST.2012.2221958</ee>
<url>db/journals/sj/sj7.html#RayBSMR13</url>
</article>
</r>
<r><inproceedings key="conf/codaspy/UrbanskaRRHB13" mdate="2018-11-06">
<author pid="116/8671">Malgorzata Urbanska</author>
<author pid="75/5516">Mark Roberts</author>
<author pid="r/IndrajitRay">Indrajit Ray</author>
<author pid="h/AdeleEHowe">Adele E. Howe</author>
<author pid="116/8612">Zinta S. Byrne</author>
<title>Accepting the inevitable: factoring the user into home computer security.</title>
<pages>325-332</pages>
<year>2013</year>
<booktitle>CODASPY</booktitle>
<ee>https://doi.org/10.1145/2435349.2435396</ee>
<crossref>conf/codaspy/2013</crossref>
<url>db/conf/codaspy/codaspy2013.html#UrbanskaRRHB13</url>
</inproceedings>
</r>
<r><inproceedings key="conf/colcom/BelyaevRRL13" mdate="2021-08-08">
<author pid="128/7861">Kirill Belyaev</author>
<author pid="r/IndrakshiRay">Indrakshi Ray</author>
<author pid="r/IndrajitRay">Indrajit Ray</author>
<author pid="141/1535">Gary Luckasen</author>
<title>Personal health record storage on privacy preserving green clouds.</title>
<pages>448-457</pages>
<year>2013</year>
<booktitle>CollaborateCom</booktitle>
<ee>https://doi.org/10.4108/icst.collaboratecom.2013.254117</ee>
<ee>https://ieeexplore.ieee.org/document/6680012/</ee>
<crossref>conf/colcom/2013</crossref>
<url>db/conf/colcom/colcom2013.html#BelyaevRRL13</url>
</inproceedings>
</r>
<r><inproceedings key="conf/dbsec/ThorpeRGBF13" mdate="2020-10-25">
<author pid="54/8330">Sean S. E. Thorpe</author>
<author pid="r/IndrajitRay">Indrajit Ray</author>
<author orcid="0000-0003-1989-3913" pid="g/TyroneGrandison">Tyrone Grandison</author>
<author pid="68/6180">Abbie Barbir</author>
<author pid="f/RBFrance">Robert B. France</author>
<title>Hypervisor Event Logs as a Source of Consistent Virtual Machine Evidence for Forensic Cloud Investigations.</title>
<pages>97-112</pages>
<year>2013</year>
<booktitle>DBSec</booktitle>
<ee type="oa">https://doi.org/10.1007/978-3-642-39256-6_7</ee>
<crossref>conf/dbsec/2013</crossref>
<url>db/conf/dbsec/dbsec2013.html#ThorpeRGBF13</url>
</inproceedings>
</r>
<r><inproceedings key="conf/dbsec/RayMRH13" mdate="2018-06-26">
<author pid="r/IndrajitRay">Indrajit Ray</author>
<author pid="128/7879">Dieudonne Mulamba</author>
<author pid="r/IndrakshiRay">Indrakshi Ray</author>
<author pid="07/2814">Keesook J. Han</author>
<title>A Model for Trust-Based Access Control and Delegation in Mobile Clouds.</title>
<pages>242-257</pages>
<year>2013</year>
<booktitle>DBSec</booktitle>
<ee type="oa">https://doi.org/10.1007/978-3-642-39256-6_16</ee>
<crossref>conf/dbsec/2013</crossref>
<url>db/conf/dbsec/dbsec2013.html#RayMRH13</url>
</inproceedings>
</r>
<r><inproceedings key="conf/isi/HalappanavarCHHJRH13" mdate="2017-05-26">
<author pid="41/3413">Mahantesh Halappanavar</author>
<author pid="57/7437">Sutanay Choudhury</author>
<author pid="01/3729">Emilie Hogan</author>
<author pid="58/2913">Peter Hui</author>
<author pid="24/5284">John R. Johnson</author>
<author pid="r/IndrajitRay">Indrajit Ray</author>
<author pid="h/LawrenceBHolder">Lawrence B. Holder</author>
<title>Towards a network-of-networks framework for cyber security.</title>
<pages>106-108</pages>
<year>2013</year>
<booktitle>ISI</booktitle>
<ee>https://doi.org/10.1109/ISI.2013.6578796</ee>
<crossref>conf/isi/2013</crossref>
<url>db/conf/isi/isi2013.html#HalappanavarCHHJRH13</url>
</inproceedings>
</r>
<r><inproceedings key="conf/services/ThorpeGCWBR13" mdate="2023-03-24">
<author pid="54/8330">Sean S. E. Thorpe</author>
<author orcid="0000-0003-1989-3913" pid="g/TyroneGrandison">Tyrone Grandison</author>
<author pid="139/7920">Arnett Campbell</author>
<author orcid="0000-0003-2913-3862" pid="08/8703">Janet Williams</author>
<author pid="139/7966">Khalilah Burrell</author>
<author pid="r/IndrajitRay">Indrajit Ray</author>
<title>Towards a Forensic-Based Service Oriented Architecture Framework for Auditing of Cloud Logs.</title>
<pages>75-83</pages>
<year>2013</year>
<booktitle>SERVICES</booktitle>
<ee>https://doi.org/10.1109/SERVICES.2013.76</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/SERVICES.2013.76</ee>
<crossref>conf/services/2013</crossref>
<url>db/conf/services/services2013.html#ThorpeGCWBR13</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/corr/abs-1304-6761" mdate="2018-08-13">
<author pid="41/3413">Mahantesh Halappanavar</author>
<author pid="57/7437">Sutanay Choudhury</author>
<author pid="01/3729">Emilie Hogan</author>
<author pid="58/2913">Peter Hui</author>
<author pid="24/5284">John R. Johnson</author>
<author pid="r/IndrajitRay">Indrajit Ray</author>
<author pid="h/LawrenceBHolder">Lawrence B. Holder</author>
<title>Towards a Networks-of-Networks Framework for Cyber Security</title>
<ee type="oa">http://arxiv.org/abs/1304.6761</ee>
<year>2013</year>
<journal>CoRR</journal>
<volume>abs/1304.6761</volume>
<url>db/journals/corr/corr1304.html#abs-1304-6761</url>
</article>
</r>
<r><article key="journals/asc/DewriRRW12" mdate="2026-04-07">
<author orcid="0000-0002-8332-2157" pid="26/2836">Rinku Dewri</author>
<author pid="r/IndrakshiRay">Indrakshi Ray</author>
<author pid="r/IndrajitRay">Indrajit Ray</author>
<author pid="w/LDarrellWhitley">L. Darrell Whitley</author>
<title>Utility driven optimization of real time data broadcast schedules.</title>
<pages>1832-1846</pages>
<year>2012</year>
<volume>12</volume>
<journal>Appl. Soft Comput.</journal>
<number>7</number>
<ee>https://doi.org/10.1016/j.asoc.2011.04.006</ee>
<url>db/journals/asc/asc12.html#DewriRRW12</url>
</article>
</r>
<r><article key="journals/ijisec/DewriRPW12" mdate="2026-04-07">
<author orcid="0000-0002-8332-2157" pid="26/2836">Rinku Dewri</author>
<author pid="r/IndrajitRay">Indrajit Ray</author>
<author pid="19/4857">Nayot Poolsappasit</author>
<author pid="w/LDarrellWhitley">L. Darrell Whitley</author>
<title>Optimal security hardening on attack tree models of networks: a cost-benefit analysis.</title>
<pages>167-188</pages>
<year>2012</year>
<volume>11</volume>
<journal>Int. J. Inf. Sec.</journal>
<number>3</number>
<ee>https://doi.org/10.1007/s10207-012-0160-y</ee>
<url>db/journals/ijisec/ijisec11.html#DewriRPW12</url>
</article>
</r>
<r><article key="journals/tdsc/PoolsappasitDR12" mdate="2026-04-07">
<author pid="19/4857">Nayot Poolsappasit</author>
<author orcid="0000-0002-8332-2157" pid="26/2836">Rinku Dewri</author>
<author pid="r/IndrajitRay">Indrajit Ray</author>
<title>Dynamic Security Risk Management Using Bayesian Attack Graphs.</title>
<pages>61-74</pages>
<year>2012</year>
<volume>9</volume>
<journal>IEEE Trans. Dependable Secur. Comput.</journal>
<number>1</number>
<ee>https://doi.org/10.1109/TDSC.2011.34</ee>
<ee>http://doi.ieeecomputersociety.org/10.1109/TDSC.2011.34</ee>
<url>db/journals/tdsc/tdsc9.html#PoolsappasitDR12</url>
</article>
</r>
<r><inproceedings key="conf/compsac/ThorpeRGB12" mdate="2023-03-24">
<author pid="54/8330">Sean S. E. Thorpe</author>
<author pid="r/IndrajitRay">Indrajit Ray</author>
<author orcid="0000-0003-1989-3913" pid="g/TyroneGrandison">Tyrone Grandison</author>
<author pid="68/6180">Abbie Barbir</author>
<title>Cloud Log Forensics Metadata Analysis.</title>
<pages>194-199</pages>
<year>2012</year>
<booktitle>COMPSAC Workshops</booktitle>
<ee>https://doi.org/10.1109/COMPSACW.2012.44</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/COMPSACW.2012.44</ee>
<crossref>conf/compsac/2012w</crossref>
<url>db/conf/compsac/compsac2012w.html#ThorpeRGB12</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sdmw/ThorpeGRB12" mdate="2020-10-25">
<author pid="54/8330">Sean S. E. Thorpe</author>
<author orcid="0000-0003-1989-3913" pid="g/TyroneGrandison">Tyrone Grandison</author>
<author pid="r/IndrajitRay">Indrajit Ray</author>
<author pid="68/6180">Abbie Barbir</author>
<title>Towards Enabling Behavioral Trust among Participating Cloud Forensic Data Center Agencies.</title>
<pages>156-161</pages>
<year>2012</year>
<booktitle>Secure Data Management</booktitle>
<ee>https://doi.org/10.1007/978-3-642-32873-2_11</ee>
<crossref>conf/sdmw/2012</crossref>
<url>db/conf/sdmw/sdmw2012.html#ThorpeGRB12</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sp/HoweRRUB12" mdate="2023-03-24">
<author pid="h/AdeleEHowe">Adele E. Howe</author>
<author pid="r/IndrajitRay">Indrajit Ray</author>
<author pid="75/5516">Mark Roberts</author>
<author pid="116/8671">Malgorzata Urbanska</author>
<author pid="116/8612">Zinta S. Byrne</author>
<title>The Psychology of Security for the Home Computer User.</title>
<pages>209-223</pages>
<year>2012</year>
<booktitle>IEEE Symposium on Security and Privacy</booktitle>
<ee>https://doi.org/10.1109/SP.2012.23</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/SP.2012.23</ee>
<crossref>conf/sp/2012</crossref>
<url>db/conf/sp/sp2012.html#HoweRRUB12</url>
</inproceedings>
</r>
<r><article key="journals/jcs/DewriRRW11" mdate="2026-04-07">
<author orcid="0000-0002-8332-2157" pid="26/2836">Rinku Dewri</author>
<author pid="r/IndrajitRay">Indrajit Ray</author>
<author pid="r/IndrakshiRay">Indrakshi Ray</author>
<author pid="w/LDarrellWhitley">L. Darrell Whitley</author>
<title>Exploring privacy versus data quality trade-offs in anonymization techniques using multi-objective optimization.</title>
<pages>935-974</pages>
<year>2011</year>
<volume>19</volume>
<journal>J. Comput. Secur.</journal>
<number>5</number>
<ee>https://doi.org/10.3233/JCS-2011-0428</ee>
<ee>https://www.wikidata.org/entity/Q114943927</ee>
<url>db/journals/jcs/jcs19.html#DewriRRW11</url>
</article>
</r>
<r><article key="journals/tkde/DewriRRW11" mdate="2026-04-07">
<author orcid="0000-0002-8332-2157" pid="26/2836">Rinku Dewri</author>
<author pid="r/IndrajitRay">Indrajit Ray</author>
<author pid="r/IndrakshiRay">Indrakshi Ray</author>
<author pid="w/LDarrellWhitley">L. Darrell Whitley</author>
<title>k-Anonymization in the Presence of Publisher Preferences.</title>
<pages>1678-1690</pages>
<year>2011</year>
<volume>23</volume>
<journal>IEEE Trans. Knowl. Data Eng.</journal>
<number>11</number>
<ee>https://doi.org/10.1109/TKDE.2011.106</ee>
<ee>http://doi.ieeecomputersociety.org/10.1109/TKDE.2011.106</ee>
<url>db/journals/tkde/tkde23.html#DewriRRW11</url>
</article>
</r>
<r><inproceedings key="conf/cisis-spain/ThorpeRG11" mdate="2020-10-25">
<author pid="54/8330">Sean S. E. Thorpe</author>
<author pid="r/IndrajitRay">Indrajit Ray</author>
<author orcid="0000-0003-1989-3913" pid="g/TyroneGrandison">Tyrone Grandison</author>
<title>Use of Schema Associative Mapping for Synchronization of the Virtual Machine Audit Logs.</title>
<pages>259-264</pages>
<year>2011</year>
<booktitle>CISIS</booktitle>
<ee>https://doi.org/10.1007/978-3-642-21323-6_33</ee>
<crossref>conf/cisis-spain/2011</crossref>
<url>db/conf/cisis-spain/cisis2011.html#ThorpeRG11</url>
</inproceedings>
</r>
<r><inproceedings key="conf/cisis-spain/ThorpeRG11a" mdate="2020-10-25">
<author pid="54/8330">Sean S. E. Thorpe</author>
<author pid="r/IndrajitRay">Indrajit Ray</author>
<author orcid="0000-0003-1989-3913" pid="g/TyroneGrandison">Tyrone Grandison</author>
<title>Enforcing Data Quality Rules for a Synchronized VM Log Audit Environment Using Transformation Mapping Techniques.</title>
<pages>265-271</pages>
<year>2011</year>
<booktitle>CISIS</booktitle>
<ee>https://doi.org/10.1007/978-3-642-21323-6_34</ee>
<crossref>conf/cisis-spain/2011</crossref>
<url>db/conf/cisis-spain/cisis2011.html#ThorpeRG11a</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icdf2c/ThorpeRRGBF11" mdate="2020-10-25">
<author pid="54/8330">Sean S. E. Thorpe</author>
<author pid="r/IndrakshiRay">Indrakshi Ray</author>
<author pid="r/IndrajitRay">Indrajit Ray</author>
<author orcid="0000-0003-1989-3913" pid="g/TyroneGrandison">Tyrone Grandison</author>
<author pid="68/6180">Abbie Barbir</author>
<author pid="f/RBFrance">Robert B. France</author>
<title>Formal Parameterization of Log Synchronization Events within a Distributed Forensic Compute Cloud Database Environment.</title>
<pages>156-171</pages>
<year>2011</year>
<booktitle>ICDF2C</booktitle>
<ee>https://doi.org/10.1007/978-3-642-35515-8_13</ee>
<ee>http://eudl.eu/doi/10.1007/978-3-642-35515-8_13</ee>
<crossref>conf/icdf2c/2011</crossref>
<url>db/conf/icdf2c/icdf2c2011.html#ThorpeRRGBF11</url>
</inproceedings>
</r>
<r><article key="journals/geb/KarRS10" mdate="2020-02-22">
<author pid="12/2623">Anirban Kar</author>
<author pid="r/IndrajitRay">Indrajit Ray</author>
<author pid="74/7210">Roberto Serrano</author>
<title>A difficulty in implementing correlated equilibrium distributions.</title>
<pages>189-193</pages>
<year>2010</year>
<volume>69</volume>
<journal>Games Econ. Behav.</journal>
<number>1</number>
<ee>https://doi.org/10.1016/j.geb.2008.11.006</ee>
<url>db/journals/geb/geb69.html#KarRS10</url>
</article>
</r>
<r><article key="journals/pvldb/AllardABGFNPRRY10" mdate="2025-03-03">
<author pid="05/1478">Tristan Allard</author>
<author pid="00/1107">Nicolas Anciaux</author>
<author pid="b/LucBouganim">Luc Bouganim</author>
<author pid="36/1342">Yanli Guo</author>
<author pid="29/8165">Lionel Le Folgoc</author>
<author orcid="0000-0003-0719-9684" pid="69/6924">Benjamin Nguyen</author>
<author pid="p/PPucheral">Philippe Pucheral</author>
<author pid="r/IndrajitRay">Indrajit Ray</author>
<author pid="r/IndrakshiRay">Indrakshi Ray</author>
<author pid="99/3212">Shaoyi Yin</author>
<title>Secure Personal Data Servers: a Vision Paper.</title>
<pages>25-35</pages>
<year>2010</year>
<volume>3</volume>
<journal>Proc. VLDB Endow.</journal>
<number>1</number>
<ee type="oa">https://vldb.org/pvldb/vol3/R02.pdf</ee>
<ee>https://doi.org/10.14778/1920841.1920850</ee>
<url>db/journals/pvldb/pvldb3.html#AllardABGFNPRRY10</url>
</article>
</r>
<r><article key="journals/rts/DewriRRW10" mdate="2020-09-10">
<author pid="26/2836">Rinku Dewri</author>
<author pid="r/IndrakshiRay">Indrakshi Ray</author>
<author pid="r/IndrajitRay">Indrajit Ray</author>
<author pid="w/LDarrellWhitley">L. Darrell Whitley</author>
<title>Real time stochastic scheduling in broadcast systems with decentralized data storage.</title>
<pages>143-175</pages>
<year>2010</year>
<volume>45</volume>
<journal>Real Time Syst.</journal>
<number>3</number>
<ee>https://doi.org/10.1007/s11241-010-9102-9</ee>
<url>db/journals/rts/rts45.html#DewriRRW10</url>
</article>
</r>
<r><article key="journals/tcos/HoumbRRC10" mdate="2021-10-14">
<author pid="h/SivHildeHoumb">Siv Hilde Houmb</author>
<author pid="r/IndrakshiRay">Indrakshi Ray</author>
<author pid="r/IndrajitRay">Indrajit Ray</author>
<author orcid="0000-0002-1752-4682" pid="03/3200">Sudip Chakraborty</author>
<title>Trust-Based Security Level Evaluation Using Bayesian Belief Networks.</title>
<pages>154-186</pages>
<year>2010</year>
<volume>10</volume>
<journal>Trans. Comput. Sci.</journal>
<ee>https://doi.org/10.1007/978-3-642-17499-5_7</ee>
<crossref>journals/tcos/2010-10</crossref>
<url>db/journals/tcos/tcos10.html#HoumbRRC10</url>
</article>
</r>
<r><inproceedings key="conf/dbsec/DewriRRW10" mdate="2020-03-12">
<author pid="26/2836">Rinku Dewri</author>
<author pid="r/IndrajitRay">Indrajit Ray</author>
<author pid="r/IndrakshiRay">Indrakshi Ray</author>
<author pid="w/LDarrellWhitley">L. Darrell Whitley</author>
<title>On the Identification of Property Based Generalizations in Microdata Anonymization.</title>
<pages>81-96</pages>
<year>2010</year>
<booktitle>DBSec</booktitle>
<crossref>conf/dbsec/2010</crossref>
<ee type="oa">https://doi.org/10.1007/978-3-642-13739-6_6</ee>
<ee type="oa">http://dl.ifip.org/db/conf/dbsec/dbsec2010/DewriRRW10.pdf</ee>
<url>db/conf/dbsec/dbsec2010.html#DewriRRW10</url>
</inproceedings>
</r>
<r><inproceedings key="conf/dbsec/HoumbCRR10" mdate="2021-10-14">
<author pid="h/SivHildeHoumb">Siv Hilde Houmb</author>
<author orcid="0000-0002-1752-4682" pid="03/3200">Sudip Chakraborty</author>
<author pid="r/IndrakshiRay">Indrakshi Ray</author>
<author pid="r/IndrajitRay">Indrajit Ray</author>
<title>Using Trust-Based Information Aggregation for Predicting Security Level of Systems.</title>
<pages>241-256</pages>
<year>2010</year>
<booktitle>DBSec</booktitle>
<crossref>conf/dbsec/2010</crossref>
<ee type="oa">https://doi.org/10.1007/978-3-642-13739-6_16</ee>
<ee type="oa">http://dl.ifip.org/db/conf/dbsec/dbsec2010/HoumbCRR10.pdf</ee>
<url>db/conf/dbsec/dbsec2010.html#HoumbCRR10</url>
</inproceedings>
</r>
<r><inproceedings key="conf/mdm/DewriRRW10" mdate="2023-03-23">
<author pid="26/2836">Rinku Dewri</author>
<author pid="r/IndrakshiRay">Indrakshi Ray</author>
<author pid="r/IndrajitRay">Indrajit Ray</author>
<author pid="w/LDarrellWhitley">L. Darrell Whitley</author>
<title>Query m-Invariance: Preventing Query Disclosures in Continuous Location-Based Services.</title>
<pages>95-104</pages>
<year>2010</year>
<booktitle>Mobile Data Management</booktitle>
<ee>https://doi.org/10.1109/MDM.2010.52</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/MDM.2010.52</ee>
<crossref>conf/mdm/2010</crossref>
<url>db/conf/mdm/mdm2010.html#DewriRRW10</url>
</inproceedings>
</r>
<r><inproceedings key="conf/securecomm/DewriRRW10" mdate="2020-02-11">
<author pid="26/2836">Rinku Dewri</author>
<author pid="r/IndrakshiRay">Indrakshi Ray</author>
<author pid="r/IndrajitRay">Indrajit Ray</author>
<author pid="w/LDarrellWhitley">L. Darrell Whitley</author>
<title>On the Formation of Historically k-Anonymous Anonymity Sets in a Continuous LBS.</title>
<pages>71-88</pages>
<year>2010</year>
<booktitle>SecureComm</booktitle>
<ee>https://doi.org/10.1007/978-3-642-16161-2_5</ee>
<ee>http://eudl.eu/doi/10.1007/978-3-642-16161-2_5</ee>
<crossref>conf/securecomm/2010</crossref>
<url>db/conf/securecomm/securecomm2010.html#DewriRRW10</url>
</inproceedings>
</r>
<r><article key="journals/ijmic/UchoaRDT09" mdate="2020-09-17">
<author pid="164/3857">Silvia B. Uchoa</author>
<author pid="r/IndrajitRay">Indrajit Ray</author>
<author pid="164/3962">Julio F. Davalos</author>
<author orcid="0000-0002-4015-9564" pid="164/3889">Josealdo Tonholo</author>
<title>Comparative studies of chloride permeability, conductivity and salt-ponding tests of concrete containing different admixtures.</title>
<pages>160-170</pages>
<year>2009</year>
<volume>7</volume>
<journal>Int. J. Model. Identif. Control.</journal>
<number>2</number>
<ee>https://doi.org/10.1504/IJMIC.2009.027070</ee>
<url>db/journals/ijmic/ijmic7.html#UchoaRDT09</url>
</article>
</r>
<r><article key="journals/jiis/RayRC09" mdate="2021-10-14">
<author pid="r/IndrakshiRay">Indrakshi Ray</author>
<author pid="r/IndrajitRay">Indrajit Ray</author>
<author orcid="0000-0002-1752-4682" pid="03/3200">Sudip Chakraborty</author>
<title>An interoperable context sensitive model of trust.</title>
<pages>75-104</pages>
<year>2009</year>
<volume>32</volume>
<journal>J. Intell. Inf. Syst.</journal>
<number>1</number>
<ee>https://doi.org/10.1007/s10844-007-0049-9</ee>
<url>db/journals/jiis/jiis32.html#RayRC09</url>
</article>
</r>
<r><inproceedings key="conf/cikm/DewriRRW09" mdate="2020-02-11">
<author pid="26/2836">Rinku Dewri</author>
<author pid="r/IndrajitRay">Indrajit Ray</author>
<author pid="r/IndrakshiRay">Indrakshi Ray</author>
<author pid="w/LDarrellWhitley">L. Darrell Whitley</author>
<title>POkA: identifying pareto-optimal k-anonymous nodes in a domain hierarchy lattice.</title>
<pages>1037-1046</pages>
<year>2009</year>
<booktitle>CIKM</booktitle>
<ee>https://doi.org/10.1145/1645953.1646085</ee>
<crossref>conf/cikm/2009</crossref>
<url>db/conf/cikm/cikm2009.html#DewriRRW09</url>
</inproceedings>
</r>
<r><inproceedings key="conf/dbsec/ToahchoodeeARR09" mdate="2020-03-12">
<author pid="39/1765">Manachai Toahchoodee</author>
<author pid="14/7171">Ramadan Abdunabi</author>
<author pid="r/IndrakshiRay">Indrakshi Ray</author>
<author pid="r/IndrajitRay">Indrajit Ray</author>
<title>A Trust-Based Access Control Model for Pervasive Computing Applications.</title>
<pages>307-314</pages>
<year>2009</year>
<booktitle>DBSec</booktitle>
<crossref>conf/dbsec/2009</crossref>
<ee type="oa">https://doi.org/10.1007/978-3-642-03007-9_22</ee>
<ee type="oa">http://dl.ifip.org/db/conf/dbsec/dbsec2009/ToahchoodeeARR09.pdf</ee>
<url>db/conf/dbsec/dbsec2009.html#ToahchoodeeARR09</url>
</inproceedings>
</r>
<r><inproceedings key="conf/edbt/DewriRRW09" mdate="2020-02-11">
<author pid="26/2836">Rinku Dewri</author>
<author pid="r/IndrajitRay">Indrajit Ray</author>
<author pid="r/IndrakshiRay">Indrakshi Ray</author>
<author pid="w/LDarrellWhitley">L. Darrell Whitley</author>
<title>On the comparison of microdata disclosure control algorithms.</title>
<pages>240-251</pages>
<year>2009</year>
<booktitle>EDBT</booktitle>
<ee>https://doi.org/10.1145/1516360.1516389</ee>
<crossref>conf/edbt/2009</crossref>
<url>db/conf/edbt/edbt2009.html#DewriRRW09</url>
</inproceedings>
</r>
<r><inproceedings key="conf/gecco/DewriWRR09" mdate="2020-02-11">
<author pid="26/2836">Rinku Dewri</author>
<author pid="w/LDarrellWhitley">L. Darrell Whitley</author>
<author pid="r/IndrajitRay">Indrajit Ray</author>
<author pid="r/IndrakshiRay">Indrakshi Ray</author>
<title>A multi-objective approach to data sharing with privacy constraints and preference based objectives.</title>
<pages>1499-1506</pages>
<year>2009</year>
<booktitle>GECCO</booktitle>
<ee>https://doi.org/10.1145/1569901.1570102</ee>
<crossref>conf/gecco/2009g</crossref>
<url>db/conf/gecco/gecco2009.html#DewriWRR09</url>
</inproceedings>
</r>
<r><article key="journals/ecra/RayZ08" mdate="2020-02-22">
<author pid="r/IndrajitRay">Indrajit Ray</author>
<author pid="76/2931">Hongjun Zhang</author>
<title>Experiences in developing a fair-exchange e-commerce protocol using common off-the-shelf components.</title>
<pages>247-259</pages>
<year>2008</year>
<volume>7</volume>
<journal>Electron. Commer. Res. Appl.</journal>
<number>2</number>
<ee>https://doi.org/10.1016/j.elerap.2007.03.005</ee>
<url>db/journals/ecra/ecra7.html#RayZ08</url>
</article>
</r>
<r><article key="journals/ijsn/BurtDRTW08" mdate="2020-04-01">
<author pid="32/4823">Andrew Burt</author>
<author pid="56/6986">Michael Darschewski</author>
<author pid="r/IndrajitRay">Indrajit Ray</author>
<author pid="t/RThurimella">Ramakrishna Thurimella</author>
<author pid="53/1531">Hailin Wu</author>
<title>Origins: an approach to trace fast spreading worms to their roots.</title>
<pages>36-46</pages>
<year>2008</year>
<volume>3</volume>
<journal>Int. J. Secur. Networks</journal>
<number>1</number>
<ee>https://doi.org/10.1504/IJSN.2008.016200</ee>
<url>db/journals/ijsn/ijsn3.html#BurtDRTW08</url>
</article>
</r>
<r><article key="journals/ijsn/RayP08" mdate="2023-08-28">
<author pid="r/IndrajitRay">Indrajit Ray</author>
<author pid="19/4857">Nayot Poolsappasit</author>
<title>Using mobile ad hoc networks to acquire digital evidence from remote autonomous agents.</title>
<pages>80-94</pages>
<year>2008</year>
<volume>3</volume>
<journal>Int. J. Secur. Networks</journal>
<number>2</number>
<ee>https://doi.org/10.1504/IJSN.2008.017221</ee>
<ee>https://www.wikidata.org/entity/Q114963492</ee>
<url>db/journals/ijsn/ijsn3.html#RayP08</url>
</article>
</r>
<r><inproceedings key="conf/dbsec/RayPD08" mdate="2020-03-12">
<author pid="r/IndrajitRay">Indrajit Ray</author>
<author pid="19/4857">Nayot Poolsappasit</author>
<author pid="26/2836">Rinku Dewri</author>
<title>An Opinion Model for Evaluating Malicious Activities in Pervasive Computing Systems.</title>
<pages>297-312</pages>
<year>2008</year>
<booktitle>DBSec</booktitle>
<crossref>conf/dbsec/2008</crossref>
<ee type="oa">https://doi.org/10.1007/978-3-540-70567-3_23</ee>
<ee type="oa">http://dl.ifip.org/db/conf/dbsec/dbsec2008/RayPD08.pdf</ee>
<url>db/conf/dbsec/dbsec2008.html#RayPD08</url>
</inproceedings>
</r>
<r><inproceedings key="conf/edbt/DewriRRW08" mdate="2020-02-11">
<author pid="26/2836">Rinku Dewri</author>
<author pid="r/IndrakshiRay">Indrakshi Ray</author>
<author pid="r/IndrajitRay">Indrajit Ray</author>
<author pid="w/LDarrellWhitley">L. Darrell Whitley</author>
<title>Optimizing on-demand data broadcast scheduling in pervasive environments.</title>
<pages>559-569</pages>
<year>2008</year>
<booktitle>EDBT</booktitle>
<ee>https://doi.org/10.1145/1353343.1353411</ee>
<crossref>conf/edbt/2008</crossref>
<url>db/conf/edbt/edbt2008.html#DewriRRW08</url>
</inproceedings>
</r>
<r><inproceedings key="conf/esorics/DewriRRW08" mdate="2020-02-11">
<author pid="26/2836">Rinku Dewri</author>
<author pid="r/IndrakshiRay">Indrakshi Ray</author>
<author pid="r/IndrajitRay">Indrajit Ray</author>
<author pid="w/LDarrellWhitley">L. Darrell Whitley</author>
<title>Security Provisioning in Pervasive Environments Using Multi-objective Optimization.</title>
<pages>349-363</pages>
<year>2008</year>
<booktitle>ESORICS</booktitle>
<ee type="oa">https://doi.org/10.1007/978-3-540-88313-5_23</ee>
<crossref>conf/esorics/2008</crossref>
<url>db/conf/esorics/esorics2008.html#DewriRRW08</url>
</inproceedings>
</r>
<r><inproceedings key="conf/gecco/DewriWRR08" mdate="2020-02-11">
<author pid="26/2836">Rinku Dewri</author>
<author pid="w/LDarrellWhitley">L. Darrell Whitley</author>
<author pid="r/IndrakshiRay">Indrakshi Ray</author>
<author pid="r/IndrajitRay">Indrajit Ray</author>
<title>Evolution strategy based optimization of on-demand dependent data broadcast scheduling.</title>
<pages>1699-1700</pages>
<year>2008</year>
<booktitle>GECCO</booktitle>
<ee>https://doi.org/10.1145/1389095.1389416</ee>
<crossref>conf/gecco/2008</crossref>
<url>db/conf/gecco/gecco2008.html#DewriWRR08</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icde/DewriRRW08" mdate="2023-03-24">
<author pid="26/2836">Rinku Dewri</author>
<author pid="r/IndrajitRay">Indrajit Ray</author>
<author pid="r/IndrakshiRay">Indrakshi Ray</author>
<author pid="w/LDarrellWhitley">L. Darrell Whitley</author>
<title>On the Optimal Selection of k in the k-Anonymity Problem.</title>
<pages>1364-1366</pages>
<year>2008</year>
<booktitle>ICDE</booktitle>
<ee>https://doi.org/10.1109/ICDE.2008.4497557</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/ICDE.2008.4497557</ee>
<crossref>conf/icde/2008</crossref>
<url>db/conf/icde/icde2008.html#DewriRRW08</url>
</inproceedings>
</r>
<r><inproceedings key="conf/lcn/BandaraJR08" mdate="2024-08-04">
<author orcid="0000-0002-2927-5628" pid="89/3098">H. M. N. Dilum Bandara</author>
<author pid="29/1638">Anura P. Jayasumana</author>
<author pid="r/IndrajitRay">Indrajit Ray</author>
<title>Key pre-distribution based secure backbone formation in wireless sensor networks.</title>
<pages>786-793</pages>
<year>2008</year>
<booktitle>LCN</booktitle>
<ee>https://doi.org/10.1109/LCN.2008.4664281</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/LCN.2008.4664281</ee>
<crossref>conf/lcn/2008</crossref>
<url>db/conf/lcn/lcn2008.html#BandaraJR08</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ppsn/DewriWRR08" mdate="2020-02-11">
<author pid="26/2836">Rinku Dewri</author>
<author pid="w/LDarrellWhitley">L. Darrell Whitley</author>
<author pid="r/IndrajitRay">Indrajit Ray</author>
<author pid="r/IndrakshiRay">Indrakshi Ray</author>
<title>Optimizing Real-Time Ordered-Data Broadcasts in Pervasive Environments Using Evolution Strategy.</title>
<pages>991-1000</pages>
<year>2008</year>
<booktitle>PPSN</booktitle>
<ee>https://doi.org/10.1007/978-3-540-87700-4_98</ee>
<crossref>conf/ppsn/2008</crossref>
<url>db/conf/ppsn/ppsn2008.html#DewriWRR08</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sec/RayC08" mdate="2018-06-26">
<author pid="r/IndrajitRay">Indrajit Ray</author>
<author pid="03/3200">Sudip Chakraborty</author>
<title>Facilitating Privacy Related Decisions in Different Privacy Contexts on the Internet by Evaluating Trust in Recipients of Private Data.</title>
<pages>605-620</pages>
<year>2008</year>
<booktitle>SEC</booktitle>
<ee type="oa">https://doi.org/10.1007/978-0-387-09699-5_39</ee>
<crossref>conf/sec/2008</crossref>
<url>db/conf/sec/sec2008.html#RayC08</url>
</inproceedings>
</r>
<r><proceedings key="conf/ifip11-9/2008" mdate="2014-12-02">
<editor pid="r/IndrajitRay">Indrajit Ray</editor>
<editor pid="72/2300">Sujeet Shenoi</editor>
<title>Advances in Digital Forensics IV, Fourth Annual IFIP WG 11.9 Conference on Digital Forensics, Kyoto University, Kyoto, Japan, January 28-30, 2008</title>
<volume>285</volume>
<year>2008</year>
<isbn>978-0-387-84926-3</isbn>
<booktitle>IFIP Int. Conf. Digital Forensics</booktitle>
<series href="db/series/ifip/index.html">IFIP</series>
<publisher>Springer</publisher>
<url>db/conf/ifip11-9/df2008.html</url>
</proceedings>
</r>
<r><article key="journals/compsec/AlhazmiMR07" mdate="2022-08-16">
<author orcid="0000-0002-6158-1801" pid="272/5786">Omar Hussain Alhazmi</author>
<author pid="m/YKMalaiya">Yashwant K. Malaiya</author>
<author pid="r/IndrajitRay">Indrajit Ray</author>
<title>Measuring, analyzing and predicting security vulnerabilities in software systems.</title>
<pages>219-228</pages>
<year>2007</year>
<volume>26</volume>
<journal>Comput. Secur.</journal>
<number>3</number>
<ee>https://doi.org/10.1016/j.cose.2006.10.002</ee>
<ee>https://www.wikidata.org/entity/Q113442771</ee>
<url>db/journals/compsec/compsec26.html#AlhazmiMR07</url>
</article>
</r>
<r><article key="journals/csi/RayZ07" mdate="2020-02-20">
<author pid="r/IndrajitRay">Indrajit Ray</author>
<author pid="52/6351">Junxing Zhang</author>
<title>Towards a new standard for allowing concurrency and ensuring consistency in revision control systems.</title>
<pages>355-364</pages>
<year>2007</year>
<volume>29</volume>
<journal>Comput. Stand. Interfaces</journal>
<number>3</number>
<ee>https://doi.org/10.1016/j.csi.2006.05.008</ee>
<url>db/journals/csi/csi29.html#RayZ07</url>
</article>
</r>
<r><article key="journals/csi/ZhangR07" mdate="2020-02-20">
<author pid="52/6351">Junxing Zhang</author>
<author pid="r/IndrajitRay">Indrajit Ray</author>
<title>Towards secure multi-sited transactional revision control systems.</title>
<pages>365-375</pages>
<year>2007</year>
<volume>29</volume>
<journal>Comput. Stand. Interfaces</journal>
<number>3</number>
<ee>https://doi.org/10.1016/j.csi.2006.05.007</ee>
<url>db/journals/csi/csi29.html#ZhangR07</url>
</article>
</r>
<r><article key="journals/jcp/ChakrabortyR07" mdate="2021-10-14">
<author orcid="0000-0002-1752-4682" pid="03/3200">Sudip Chakraborty</author>
<author pid="r/IndrajitRay">Indrajit Ray</author>
<title>p-Trust: A New Model of Trust to Allow Finer Control Over Privacy in Peer-to-Peer Framework.</title>
<pages>13-24</pages>
<year>2007</year>
<volume>2</volume>
<journal>J. Comput.</journal>
<number>2</number>
<ee type="oa">http://www.jcomputers.us/index.php?m=content&#38;c=index&#38;a=show&#38;catid=73&#38;id=890</ee>
<ee type="archive">https://doi.org/10.4304/jcp.2.2.13-24</ee>
<url>db/journals/jcp/jcp2.html#ChakrabortyR07</url>
</article>
</r>
<r><inproceedings key="conf/ccs/DewriPRW07" mdate="2020-11-10">
<author pid="26/2836">Rinku Dewri</author>
<author pid="19/4857">Nayot Poolsappasit</author>
<author pid="r/IndrajitRay">Indrajit Ray</author>
<author pid="w/LDarrellWhitley">L. Darrell Whitley</author>
<title>Optimal security hardening using multi-objective optimization on attack tree models of networks.</title>
<pages>204-213</pages>
<year>2007</year>
<booktitle>CCS</booktitle>
<ee>https://doi.org/10.1145/1315245.1315272</ee>
<crossref>conf/ccs/2007</crossref>
<url>db/conf/ccs/ccs2007.html#DewriPRW07</url>
</inproceedings>
</r>
<r><inproceedings key="conf/dbsec/ChakrabortyPR07" mdate="2021-10-14">
<author orcid="0000-0002-1752-4682" pid="03/3200">Sudip Chakraborty</author>
<author pid="19/4857">Nayot Poolsappasit</author>
<author pid="r/IndrajitRay">Indrajit Ray</author>
<title>Reliable Delivery of Event Data from Sensors to Actuators in Pervasive Computing Environments.</title>
<pages>77-92</pages>
<year>2007</year>
<crossref>conf/dbsec/2007</crossref>
<booktitle>DBSec</booktitle>
<ee type="oa">https://doi.org/10.1007/978-3-540-73538-0_6</ee>
<ee type="oa">http://dl.ifip.org/db/conf/dbsec/dbsec2007/ChakrabortyPR07.pdf</ee>
<url>db/conf/dbsec/dbsec2007.html#ChakrabortyPR07</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ifip11-9/PoolsapassitR07" mdate="2020-03-12">
<author pid="71/1136">Nayot Poolsapassit</author>
<author pid="r/IndrajitRay">Indrajit Ray</author>
<title>Investigating Computer Attacks Using Attack Trees.</title>
<pages>331-343</pages>
<year>2007</year>
<booktitle>IFIP Int. Conf. Digital Forensics</booktitle>
<ee type="oa">https://doi.org/10.1007/978-0-387-73742-3_23</ee>
<ee type="oa">http://dl.ifip.org/db/conf/ifip11-9/df2007/PoolsapassitR07.pdf</ee>
<crossref>conf/ifip11-9/2007</crossref>
<url>db/conf/ifip11-9/df2007.html#PoolsapassitR07</url>
</inproceedings>
</r>
<r><article key="journals/geb/PolemarchakisR06" mdate="2020-02-22">
<author pid="65/4335">Herakles M. Polemarchakis</author>
<author pid="r/IndrajitRay">Indrajit Ray</author>
<title>Sunspots, correlation and competition.</title>
<pages>174-184</pages>
<year>2006</year>
<volume>56</volume>
<journal>Games Econ. Behav.</journal>
<number>1</number>
<ee>https://doi.org/10.1016/j.geb.2005.05.003</ee>
<url>db/journals/geb/geb56.html#PolemarchakisR06</url>
</article>
</r>
<r><inproceedings key="conf/colcom/YinRR06" mdate="2023-03-24">
<author pid="39/5091">Shuxin Yin</author>
<author pid="r/IndrakshiRay">Indrakshi Ray</author>
<author pid="r/IndrajitRay">Indrajit Ray</author>
<title>A Trust Model for Pervasive Computing Environments.</title>
<year>2006</year>
<booktitle>CollaborateCom</booktitle>
<ee>https://doi.org/10.1109/COLCOM.2006.361880</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/COLCOM.2006.361880</ee>
<ee>http://eudl.eu/doi/10.1109/COLCOM.2006.361880</ee>
<crossref>conf/colcom/2006</crossref>
<url>db/conf/colcom/colcom2006.html#YinRR06</url>
</inproceedings>
</r>
<r><inproceedings key="conf/dbsec/RayC06" mdate="2021-10-14">
<author pid="r/IndrajitRay">Indrajit Ray</author>
<author orcid="0000-0002-1752-4682" pid="03/3200">Sudip Chakraborty</author>
<title>A Framework for Flexible Access Control in Digital Library Systems.</title>
<pages>252-266</pages>
<year>2006</year>
<crossref>conf/dbsec/2006</crossref>
<booktitle>DBSec</booktitle>
<ee type="oa">https://doi.org/10.1007/11805588_18</ee>
<ee type="oa">http://dl.ifip.org/db/conf/dbsec/dbsec2006/RayC06.pdf</ee>
<url>db/conf/dbsec/dbsec2006.html#RayC06</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ifip11-9/Ray06" mdate="2020-03-12">
<author pid="r/IndrajitRay">Indrajit Ray</author>
<title>Remote Upload of Evidence over Mobile Ad Hoc Networks.</title>
<pages>41-54</pages>
<year>2006</year>
<booktitle>IFIP Int. Conf. Digital Forensics</booktitle>
<crossref>conf/ifip11-9/2006</crossref>
<ee type="oa">http://dl.ifip.org/db/conf/ifip11-9/df2006/Ray06.pdf</ee>
<url>db/conf/ifip11-9/df2006.html#Ray06</url>
</inproceedings>
</r>
<r><inproceedings key="conf/itrust/HoumbRR06" mdate="2017-05-25">
<author pid="h/SivHildeHoumb">Siv Hilde Houmb</author>
<author pid="r/IndrakshiRay">Indrakshi Ray</author>
<author pid="r/IndrajitRay">Indrajit Ray</author>
<title>Estimating the Relative Trustworthiness of Information Sources in Security Solution Evaluation.</title>
<pages>135-149</pages>
<year>2006</year>
<crossref>conf/itrust/2006</crossref>
<booktitle>iTrust</booktitle>
<ee>https://doi.org/10.1007/11755593_11</ee>
<url>db/conf/itrust/itrust2006.html#HoumbRR06</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sacmat/ChakrabortyR06" mdate="2018-11-06">
<author pid="03/3200">Sudip Chakraborty</author>
<author pid="r/IndrajitRay">Indrajit Ray</author>
<title>TrustBAC: integrating trust relationships into the RBAC model for access control in open systems.</title>
<pages>49-58</pages>
<year>2006</year>
<crossref>conf/sacmat/2006</crossref>
<booktitle>SACMAT</booktitle>
<ee>https://doi.org/10.1145/1133058.1133067</ee>
<url>db/conf/sacmat/sacmat2006.html#ChakrabortyR06</url>
</inproceedings>
</r>
<r><article key="journals/dss/RayRN05" mdate="2020-02-20">
<author pid="r/IndrajitRay">Indrajit Ray</author>
<author pid="r/IndrakshiRay">Indrakshi Ray</author>
<author pid="29/3088">Natarajan Narasimhamurthi</author>
<title>An anonymous and failure resilient fair-exchange e-commerce protocol.</title>
<pages>267-292</pages>
<year>2005</year>
<volume>39</volume>
<journal>Decis. Support Syst.</journal>
<number>3</number>
<ee>https://doi.org/10.1016/j.dss.2003.10.011</ee>
<url>db/journals/dss/dss39.html#RayRN05</url>
</article>
</r>
<r><inproceedings key="conf/dbsec/AlhazmiMR05" mdate="2021-03-09">
<author pid="272/5786">Omar Hussain Alhazmi</author>
<author pid="m/YKMalaiya">Yashwant K. Malaiya</author>
<author pid="r/IndrajitRay">Indrajit Ray</author>
<title>Security Vulnerabilities in Software Systems: A Quantitative Perspective.</title>
<pages>281-294</pages>
<year>2005</year>
<crossref>conf/dbsec/2005</crossref>
<booktitle>DBSec</booktitle>
<ee type="oa">https://doi.org/10.1007/11535706_21</ee>
<url>db/conf/dbsec/dbsec2005.html#AlhazmiMR05</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ecweb/RayKMM05" mdate="2017-05-23">
<author pid="r/IndrajitRay">Indrajit Ray</author>
<author pid="92/4279">Eunjong Kim</author>
<author pid="41/4249">Ross M. McConnell</author>
<author pid="70/1616">Daniel Massey</author>
<title>Reliably, Securely and Efficiently Distributing Electronic Content Using Multicasting.</title>
<pages>327-336</pages>
<year>2005</year>
<crossref>conf/ecweb/2005</crossref>
<booktitle>EC-Web</booktitle>
<ee>https://doi.org/10.1007/11545163_33</ee>
<url>db/conf/ecweb/ecweb2005.html#RayKMM05</url>
</inproceedings>
</r>
<r><inproceedings key="conf/esorics/RayP05" mdate="2019-08-20">
<author pid="r/IndrajitRay">Indrajit Ray</author>
<author pid="71/1136">Nayot Poolsapassit</author>
<title>Using Attack Trees to Identify Malicious Attacks from Authorized Insiders.</title>
<pages>231-246</pages>
<year>2005</year>
<crossref>conf/esorics/2005</crossref>
<booktitle>ESORICS</booktitle>
<ee type="oa">https://doi.org/10.1007/11555827_14</ee>
<url>db/conf/esorics/esorics2005.html#RayP05</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icdcit/Ray05" mdate="2017-05-25">
<author pid="r/IndrajitRay">Indrajit Ray</author>
<title>System Security Track Chair's Message.</title>
<pages>333</pages>
<year>2005</year>
<crossref>conf/icdcit/2005</crossref>
<booktitle>ICDCIT</booktitle>
<ee>https://doi.org/10.1007/11604655_38</ee>
<url>db/conf/icdcit/icdcit2005.html#Ray05</url>
</inproceedings>
</r>
<r><inproceedings key="conf/iciss/RayCR05" mdate="2017-05-24">
<author pid="r/IndrajitRay">Indrajit Ray</author>
<author pid="03/3200">Sudip Chakraborty</author>
<author pid="r/IndrakshiRay">Indrakshi Ray</author>
<title>VTrust: A Trust Management System Based on a Vector Model of Trust.</title>
<pages>91-105</pages>
<year>2005</year>
<crossref>conf/iciss/2005</crossref>
<booktitle>ICISS</booktitle>
<ee>https://doi.org/10.1007/11593980_7</ee>
<url>db/conf/iciss/iciss2005.html#RayCR05</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ifip11-9/KimMR05" mdate="2020-03-12">
<author pid="92/4279">Eunjong Kim</author>
<author pid="70/1616">Daniel Massey</author>
<author pid="r/IndrajitRay">Indrajit Ray</author>
<title>Global Internet Routing Forensics: Validation of BGP Paths Using ICMP Traceback.</title>
<pages>165-176</pages>
<year>2005</year>
<crossref>conf/ifip11-9/2005</crossref>
<booktitle>IFIP Int. Conf. Digital Forensics</booktitle>
<ee type="oa">http://dl.ifip.org/db/conf/ifip11-9/df2005/KimMR05.pdf</ee>
<url>db/conf/ifip11-9/df2005.html#KimMR05</url>
</inproceedings>
</r>
<r><article key="journals/jnsm/RayT04" mdate="2020-09-24">
<author pid="r/IndrajitRay">Indrajit Ray</author>
<author pid="39/1452">Sonja Tideman</author>
<title>A Secure TCP Connection Migration Protocol to Enable the Survivability of Client-Server Applications under Malicious Attack.</title>
<year>2004</year>
<volume>12</volume>
<journal>J. Netw. Syst. Manag.</journal>
<number>3</number>
<url>db/journals/jnsm/jnsm12.html#RayT04</url>
<ee>https://doi.org/10.1023/B:JONS.0000034216.28565.c7</ee>
<pages>251-276</pages>
</article>
</r>
<r><inproceedings key="conf/dbsec/RayH04" mdate="2017-05-26">
<author pid="r/IndrajitRay">Indrajit Ray</author>
<author pid="79/1605">Tomas Hajek</author>
<title>Securely Distributing Centralized Multimedia Content Utilizing Peer-to-Peer Cooperation.</title>
<pages>295-309</pages>
<year>2004</year>
<crossref>conf/dbsec/2004</crossref>
<booktitle>DBSec</booktitle>
<url>db/conf/dbsec/dbsec2004.html#RayH04</url>
<ee>https://doi.org/10.1007/1-4020-8128-6_20</ee>
</inproceedings>
</r>
<r><inproceedings key="conf/ecweb/RayG04" mdate="2017-05-23">
<author pid="r/IndrajitRay">Indrajit Ray</author>
<author pid="21/2570">Mike Geisterfer</author>
<title>Towards a Privacy Preserving e-Commerce Protocol.</title>
<pages>154-163</pages>
<ee>https://doi.org/10.1007/978-3-540-30077-9_16</ee>
<year>2004</year>
<crossref>conf/ecweb/2004</crossref>
<booktitle>EC-Web</booktitle>
<url>db/conf/ecweb/ecweb2004.html#RayG04</url>
</inproceedings>
</r>
<r><inproceedings key="conf/esorics/RayC04" mdate="2017-05-23">
<author pid="r/IndrajitRay">Indrajit Ray</author>
<author pid="03/3200">Sudip Chakraborty</author>
<title>A Vector Model of Trust for Developing Trustworthy Systems.</title>
<pages>260-275</pages>
<ee>https://doi.org/10.1007/978-3-540-30108-0_16</ee>
<year>2004</year>
<crossref>conf/esorics/2004</crossref>
<booktitle>ESORICS</booktitle>
<url>db/conf/esorics/esorics2004.html#RayC04</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icdcit/KambhampatiRK04" mdate="2017-05-25">
<author pid="21/5426">Vamsi Kambhampati</author>
<author pid="r/IndrajitRay">Indrajit Ray</author>
<author pid="92/4279">Eunjong Kim</author>
<title>A Secure Checkpointing Protocol for Survivable Server Design.</title>
<pages>430-440</pages>
<ee>https://doi.org/10.1007/978-3-540-30555-2_50</ee>
<year>2004</year>
<crossref>conf/icdcit/2004</crossref>
<booktitle>ICDCIT</booktitle>
<url>db/conf/icdcit/icdcit2004.html#KambhampatiRK04</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sec/RayK04" mdate="2017-05-19">
<author pid="r/IndrajitRay">Indrajit Ray</author>
<author pid="92/4279">Eunjong Kim</author>
<title>Collective Signature for Efficient Authentication of XML Documents.</title>
<pages>411-424</pages>
<year>2004</year>
<crossref>conf/sec/2004</crossref>
<booktitle>SEC</booktitle>
<url>db/conf/sec/sec2004.html#RayK04</url>
<ee>https://doi.org/10.1007/1-4020-8143-X_27</ee>
</inproceedings>
</r>
<r><proceedings key="conf/dbsec/2003" mdate="2017-03-29">
<editor pid="v/SabrinaDeCapitanidiVimercati">Sabrina De Capitani di Vimercati</editor>
<editor pid="r/IndrakshiRay">Indrakshi Ray</editor>
<editor pid="r/IndrajitRay">Indrajit Ray</editor>
<title>Data and Applications Security XVII: Status and Prospects, IFIP TC-11 WG 11.3 Seventeenth Annual Working Conference on Data and Application Security, August4-6, 2003, Estes Park, Colorado, USA</title>
<publisher>Kluwer/Springer</publisher>
<series href="db/series/ifip/index.html">IFIP</series>
<volume>142</volume>
<year>2004</year>
<isbn>1-4020-8069-7</isbn>
<booktitle>DBSec</booktitle>
<url>db/conf/dbsec/dbsec2003.html</url>
</proceedings>
</r>
<r><inproceedings key="conf/globecom/0001RCS03" mdate="2017-06-02">
<author pid="66/4019-1">Jung-Min Park 0001</author>
<author pid="r/IndrajitRay">Indrajit Ray</author>
<author orcid="0000-0002-7622-4815" pid="89/2389">Edwin K. P. Chong</author>
<author pid="s/HowardJaySiegel">Howard Jay Siegel</author>
<title>A certified e-mail protocol suitable for mobile environments.</title>
<pages>1394-1398</pages>
<year>2003</year>
<booktitle>GLOBECOM</booktitle>
<ee>https://doi.org/10.1109/GLOCOM.2003.1258467</ee>
<crossref>conf/globecom/2003</crossref>
<url>db/conf/globecom/globecom2003.html#0001RCS03</url>
</inproceedings>
</r>
<r><inproceedings key="conf/tc11-5/RayZ03" mdate="2017-05-23">
<author pid="r/IndrajitRay">Indrajit Ray</author>
<author pid="52/6351">Junxing Zhang</author>
<title>A Secure Multi-Sited Version Control System.</title>
<pages>125-141</pages>
<year>2003</year>
<booktitle>IICIS</booktitle>
<ee>https://doi.org/10.1007/1-4020-7901-X_9</ee>
<crossref>conf/tc11-5/2003</crossref>
<url>db/conf/tc11-5/iicis2003.html#RayZ03</url>
</inproceedings>
</r>
<r><article key="journals/sigecom/RayR02" mdate="2020-06-04">
<author pid="r/IndrajitRay">Indrajit Ray</author>
<author pid="r/IndrakshiRay">Indrakshi Ray</author>
<title>Fair exchange in E-commerce.</title>
<pages>9-17</pages>
<year>2002</year>
<volume>3</volume>
<journal>SIGecom Exch.</journal>
<number>2</number>
<ee>https://doi.org/10.1145/844340.844345</ee>
<url>db/journals/sigecom/sigecom3.html#RayR02</url>
</article>
</r>
<r><inproceedings key="conf/dbsec/RayR02" mdate="2003-08-27">
<author pid="r/IndrajitRay">Indrajit Ray</author>
<author pid="r/IndrakshiRay">Indrakshi Ray</author>
<title>Anonymous and Secure Multicast Subscription.</title>
<pages>313-327</pages>
<year>2002</year>
<crossref>conf/dbsec/2002</crossref>
<booktitle>DBSec</booktitle>
<url>db/conf/dbsec/dbsec2002.html#RayR02</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ipps/RayR02" mdate="2023-03-24">
<author pid="r/IndrakshiRay">Indrakshi Ray</author>
<author pid="r/IndrajitRay">Indrajit Ray</author>
<title>Using Compatible Keys for Secure Multicasting in E-Commerce.</title>
<year>2002</year>
<crossref>conf/ipps/2002</crossref>
<booktitle>IPDPS</booktitle>
<ee>https://doi.org/10.1109/IPDPS.2002.1016642</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/IPDPS.2002.1016642</ee>
<url>db/conf/ipps/ipdps2002.html#RayR02</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sacmat/RayRN02" mdate="2018-11-06">
<author pid="r/IndrakshiRay">Indrakshi Ray</author>
<author pid="r/IndrajitRay">Indrajit Ray</author>
<author pid="29/3088">Natu Narasimhamurthi</author>
<title>A cryptographic solution to implement access control in a hierarchy and more.</title>
<pages>65-73</pages>
<year>2002</year>
<crossref>conf/sacmat/2002</crossref>
<booktitle>SACMAT</booktitle>
<ee>https://doi.org/10.1145/507711.507723</ee>
<url>db/conf/sacmat/sacmat2002.html#RayRN02</url>
</inproceedings>
</r>
<r><article key="journals/geb/RayZ01" mdate="2025-09-15">
<author pid="r/IndrajitRay">Indrajit Ray</author>
<author orcid="0009-0007-4444-3400" pid="69/6147-9">Lin Zhou 0009</author>
<title>Game Theory via Revealed Preferences.</title>
<pages>415-424</pages>
<year>2001</year>
<volume>37</volume>
<journal>Games Econ. Behav.</journal>
<number>2</number>
<ee>https://doi.org/10.1006/game.2001.0845</ee>
<url>db/journals/geb/geb37.html#RayZ01</url>
</article>
</r>
<r><inproceedings key="conf/adbis/RayR01" mdate="2017-05-21">
<author pid="r/IndrakshiRay">Indrakshi Ray</author>
<author pid="r/IndrajitRay">Indrajit Ray</author>
<title>Detecting Termination of Active Database Rules Using Symbolic Model Checking.</title>
<pages>266-279</pages>
<year>2001</year>
<crossref>conf/adbis/2001</crossref>
<booktitle>ADBIS</booktitle>
<ee>https://doi.org/10.1007/3-540-44803-9_21</ee>
<url>db/conf/adbis/adbis2001.html#RayR01</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ipps/RayR01" mdate="2023-03-24">
<author pid="r/IndrakshiRay">Indrakshi Ray</author>
<author pid="r/IndrajitRay">Indrajit Ray</author>
<title>An Anomymous Fair Exchange E-commerce Protocol.</title>
<pages>172</pages>
<year>2001</year>
<crossref>conf/ipps/2001</crossref>
<booktitle>IPDPS</booktitle>
<url>db/conf/ipps/ipdps2001.html#RayR01</url>
<ee>https://doi.org/10.1109/IPDPS.2001.925168</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/IPDPS.2001.925168</ee>
</inproceedings>
</r>
<r><inproceedings key="conf/wecwis/RayRN01" mdate="2023-03-24">
<author pid="r/IndrajitRay">Indrajit Ray</author>
<author pid="r/IndrakshiRay">Indrakshi Ray</author>
<author pid="29/3088">Natarajan Narasimhamurthi</author>
<title>An Anonymous Electronic Voting Protocol for Voting Over The Internet.</title>
<pages>188-191</pages>
<year>2001</year>
<booktitle>WECWIS</booktitle>
<ee>https://doi.org/10.1109/WECWIS.2001.933922</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/WECWIS.2001.933922</ee>
<crossref>conf/wecwis/2001</crossref>
<url>db/conf/wecwis/wecwis2001.html#RayRN01</url>
</inproceedings>
</r>
<r><article key="journals/dpd/ManciniRJB00" mdate="2020-05-18">
<ee>https://doi.org/10.1023/A:1008738705440</ee>
<author orcid="0000-0003-4859-2191" pid="55/6061">Luigi V. Mancini</author>
<author pid="r/IndrajitRay">Indrajit Ray</author>
<author pid="j/SushilJajodia">Sushil Jajodia</author>
<author pid="b/ElisaBertino">Elisa Bertino</author>
<title>Flexible Transaction Dependencies in Database Systems.</title>
<pages>399-446</pages>
<year>2000</year>
<volume>8</volume>
<journal>Distributed Parallel Databases</journal>
<number>4</number>
<url>db/journals/dpd/dpd8.html#ManciniRJB00</url>
<cdrom>DPD/8/P399.pdf</cdrom>
</article>
</r>
<r><article key="journals/scw/Ray00" mdate="2020-07-22">
<author pid="r/IndrajitRay">Indrajit Ray</author>
<title>Consistency, dummy and independence of irrelevant strategies for strategic games.</title>
<pages>217-222</pages>
<year>2000</year>
<volume>17</volume>
<journal>Soc. Choice Welf.</journal>
<number>2</number>
<ee>https://doi.org/10.1007/s003550050016</ee>
<url>db/journals/scw/scw17.html#Ray00</url>
</article>
</r>
<r><article key="journals/tkde/RayMJB00" mdate="2017-06-08">
<author pid="r/IndrajitRay">Indrajit Ray</author>
<author orcid="0000-0003-4859-2191" pid="55/6061">Luigi V. Mancini</author>
<author pid="j/SushilJajodia">Sushil Jajodia</author>
<author pid="b/ElisaBertino">Elisa Bertino</author>
<title>ASEP: A Secure and Flexible Commit Protocol for MLS Distributed Database Systems.</title>
<pages>880-899</pages>
<year>2000</year>
<volume>12</volume>
<journal>IEEE Trans. Knowl. Data Eng.</journal>
<number>6</number>
<ee>https://doi.org/10.1109/69.895800</ee>
<ee>http://doi.ieeecomputersociety.org/10.1109/69.895800</ee>
<url>db/journals/tkde/tkde12.html#RayMJB00</url>
</article>
</r>
<r><inproceedings key="conf/dbsec/RayRN00" mdate="2017-05-26">
<author pid="r/IndrajitRay">Indrajit Ray</author>
<author pid="r/IndrakshiRay">Indrakshi Ray</author>
<author pid="84/6412">Natarajan Narasimhamurthy</author>
<title>A Fair-exchange E-commerce Protocol with Automated Dispute Resolution.</title>
<pages>27-38</pages>
<year>2000</year>
<crossref>conf/dbsec/2000</crossref>
<booktitle>DBSec</booktitle>
<url>db/conf/dbsec/dbsec2000.html#RayRN00</url>
<ee>https://doi.org/10.1007/0-306-47008-X_3</ee>
</inproceedings>
</r>
<r><inproceedings key="conf/ecweb/RayR00" mdate="2017-05-23">
<author pid="r/IndrakshiRay">Indrakshi Ray</author>
<author pid="r/IndrajitRay">Indrajit Ray</author>
<title>An Optimistic Fair Exchange E-commerce Protocol with Automated Dispute Resolution.</title>
<pages>84-93</pages>
<ee>https://doi.org/10.1007/3-540-44463-7_8</ee>
<year>2000</year>
<crossref>conf/ecweb/2000</crossref>
<booktitle>EC-Web</booktitle>
<url>db/conf/ecweb/ecweb2000.html#RayR00</url>
</inproceedings>
</r>
<r><inproceedings key="conf/wecwis/RayR00" mdate="2023-03-24">
<author pid="r/IndrakshiRay">Indrakshi Ray</author>
<author pid="r/IndrajitRay">Indrajit Ray</author>
<title>Failure Analysis of an E-Commerce Protocol Using Model Checking.</title>
<pages>176-183</pages>
<year>2000</year>
<crossref>conf/wecwis/2000</crossref>
<booktitle>WECWIS</booktitle>
<ee>https://doi.org/10.1109/WECWIS.2000.853873</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/WECWIS.2000.853873</ee>
<url>db/conf/wecwis/wecwis2000.html#RayR00</url>
</inproceedings>
</r>
<r><article key="journals/tkde/BertinoJMR98" mdate="2017-06-08">
<author pid="b/ElisaBertino">Elisa Bertino</author>
<author pid="j/SushilJajodia">Sushil Jajodia</author>
<author orcid="0000-0003-4859-2191" pid="55/6061">Luigi V. Mancini</author>
<author pid="r/IndrajitRay">Indrajit Ray</author>
<title>Advanced Transaction Processing in Multilevel Secure File Stores.</title>
<pages>120-135</pages>
<year>1998</year>
<volume>10</volume>
<journal>IEEE Trans. Knowl. Data Eng.</journal>
<number>1</number>
<url>db/journals/tkde/tkde10.html#BertinoJMR98</url>
<ee>https://doi.org/10.1109/69.667095</ee>
<ee>http://doi.ieeecomputersociety.org/10.1109/69.667095</ee>
<cite>books/mk/EppingerMS91</cite>
<cite>...</cite>
<cite>...</cite>
<cite>journals/cacm/Lampson73</cite>
<cite>books/aw/Denning82</cite>
<cite>conf/icde/KeefeTS90</cite>
<cite>journals/cacm/Lamport77</cite>
<cite>journals/cacm/ReedK79</cite>
<cite>...</cite>
<cite>conf/dbsec/AmmannJ91</cite>
<cite>...</cite>
<cite>...</cite>
<cite>...</cite>
<cite>...</cite>
<cite>journals/tc/Cristian82</cite>
<cite>books/mk/GrayR93</cite>
<cite>...</cite>
<cite>...</cite>
<cite>...</cite>
<cite>books/aw/BernsteinHG87</cite>
<cite>...</cite>
</article>
</r>
<r><inproceedings key="conf/dbsec/JajodiaMR97" mdate="2002-10-24">
<author pid="j/SushilJajodia">Sushil Jajodia</author>
<author pid="m/RaviMukkamala">Ravi Mukkamala</author>
<author pid="r/IndrajitRay">Indrajit Ray</author>
<title>A Two-tier Coarse Indexing Scheme for MLS Database Systems.</title>
<pages>199-218</pages>
<year>1997</year>
<crossref>conf/dbsec/1997</crossref>
<booktitle>DBSec</booktitle>
<url>db/conf/dbsec/dbsec97.html#JajodiaMR97</url>
</inproceedings>
</r>
<r><incollection key="books/kl/jajodiaK97/ManciniRJB97" mdate="2019-08-07">
<author pid="55/6061">Luigi V. Mancini</author>
<author pid="r/IndrajitRay">Indrajit Ray</author>
<author pid="j/SushilJajodia">Sushil Jajodia</author>
<author pid="b/ElisaBertino">Elisa Bertino</author>
<title>Flexible Commit Protocols for Advanced Transaction Processing.</title>
<year>1997</year>
<crossref>books/kl/JajodiaK97</crossref>
<booktitle>Advanced Transaction Models and Architectures</booktitle>
<url>db/books/collections/JajodiaK97.html#ManciniRJB97</url>
</incollection>
</r>
<r><inproceedings key="conf/ccs/RayBJM96" mdate="2020-11-10">
<author pid="r/IndrajitRay">Indrajit Ray</author>
<author pid="b/ElisaBertino">Elisa Bertino</author>
<author pid="j/SushilJajodia">Sushil Jajodia</author>
<author pid="55/6061">Luigi V. Mancini</author>
<title>An Advanced Commit Protocol for MLS Distributed Database Systems.</title>
<pages>119-128</pages>
<year>1996</year>
<crossref>conf/ccs/1996</crossref>
<booktitle>CCS</booktitle>
<ee>https://doi.org/10.1145/238168.238198</ee>
<url>db/conf/ccs/ccs1996.html#RayBJM96</url>
</inproceedings>
</r>
<r><inproceedings key="conf/dbsec/JajodiaMR96" mdate="2002-10-24">
<author pid="j/SushilJajodia">Sushil Jajodia</author>
<author pid="55/6061">Luigi V. Mancini</author>
<author pid="r/IndrajitRay">Indrajit Ray</author>
<title>Secure Locking Protocols for Multilevel Database Management Systems.</title>
<pages>177-194</pages>
<year>1996</year>
<crossref>conf/dbsec/1996</crossref>
<booktitle>DBSec</booktitle>
<url>db/conf/dbsec/dbsec96.html#JajodiaMR96</url>
</inproceedings>
</r>
<r><inproceedings key="conf/esorics/ManciniR96" mdate="2017-05-22">
<author pid="55/6061">Luigi V. Mancini</author>
<author pid="r/IndrajitRay">Indrajit Ray</author>
<title>Secure Concurrency Control in MLS Databases with Two Versions of Data.</title>
<pages>304-323</pages>
<year>1996</year>
<crossref>conf/esorics/1996</crossref>
<booktitle>ESORICS</booktitle>
<ee>https://doi.org/10.1007/3-540-61770-1_43</ee>
<url>db/conf/esorics/esorics1996.html#ManciniR96</url>
</inproceedings>
</r>
<coauthors n="207" nc="8">
<co c="0"><na f="a/Abdelgawad:Mahmoud" pid="166/4266">Mahmoud Abdelgawad</na></co>
<co c="0"><na f="a/Abdunabi:Ramadan" pid="14/7171">Ramadan Abdunabi</na></co>
<co c="0"><na f="a/Alhazmi:Omar_Hussain" pid="272/5786">Omar Hussain Alhazmi</na></co>
<co c="0"><na f="a/Allard:Tristan" pid="05/1478">Tristan Allard</na></co>
<co c="0"><na f="a/Alqobaisi:Alanood" pid="417/5906">Alanood Alqobaisi</na></co>
<co c="0"><na f="a/Altarawneh:Amani" pid="251/5049">Amani Altarawneh</na></co>
<co c="0"><na f="a/Amarnath:Athith" pid="228/0546">Athith Amarnath</na></co>
<co c="0"><na f="a/Amin:Md=_Al" pid="306/7633">Md. Al Amin</na></co>
<co c="0"><na f="a/Anciaux:Nicolas" pid="00/1107">Nicolas Anciaux</na></co>
<co c="0" n="2"><na f="a/Anderson:Charles_W=" pid="92/5241">Charles W. Anderson</na><na>Charles Anderson 0001</na></co>
<co c="0"><na f="a/Atluri:Vijayalakshmi" pid="a/VAtluri">Vijayalakshmi Atluri</na></co>
<co c="0"><na f="a/Azizli:Elmaddin" pid="426/1240">Elmaddin Azizli</na></co>
<co c="0"><na f="b/Bachani:Maalvika" pid="218/5240">Maalvika Bachani</na></co>
<co c="0"><na f="b/Bandara:H=_M=_N=_Dilum" pid="89/3098">H. M. N. Dilum Bandara</na></co>
<co c="0"><na f="b/Bar=on:Maxwel" pid="374/7674">Maxwel Bar-on</na></co>
<co c="0"><na f="b/Barbir:Abbie" pid="68/6180">Abbie Barbir</na></co>
<co c="0"><na f="b/Bashir:Shadaab_Kawnain" pid="370/0432">Shadaab Kawnain Bashir</na></co>
<co c="0"><na f="b/Bastian:Nathaniel_D=" pid="132/5837">Nathaniel D. Bastian</na></co>
<co c="0"><na f="b/Belyaev:Kirill" pid="128/7861">Kirill Belyaev</na></co>
<co c="0"><na f="b/Bertino:Elisa" pid="b/ElisaBertino">Elisa Bertino</na></co>
<co c="2" n="2"><na f="b/Blas:Francisco_Javier_Garc=iacute=a" pid="86/246">Francisco Javier Garc&#237;a Blas</na><na>Javier Garc&#237;a Blas</na></co>
<co c="0"><na f="b/Bouganim:Luc" pid="b/LucBouganim">Luc Bouganim</na></co>
<co c="0" n="2"><na f="b/Bruhadeshwar:Bezawada" pid="64/1299">Bezawada Bruhadeshwar</na><na>Bruhadeshwar Bezawada</na></co>
<co c="0"><na f="b/Burrell:Khalilah" pid="139/7966">Khalilah Burrell</na></co>
<co c="0"><na f="b/Burt:Andrew" pid="32/4823">Andrew Burt</na></co>
<co c="0"><na f="b/Byrne:Zinta_S=" pid="116/8612">Zinta S. Byrne</na></co>
<co c="0"><na f="c/Caglar:Turgay" pid="346/0173">Turgay Caglar</na></co>
<co c="0"><na f="c/Cain:Noah" pid="207/6578">Noah Cain</na></co>
<co c="0"><na f="c/Campbell:Arnett" pid="139/7920">Arnett Campbell</na></co>
<co c="0"><na f="c/C=aacute=rdenas:Alvaro_A=" pid="48/6119">Alvaro A. C&#225;rdenas</na></co>
<co c="0"><na f="c/Carminati:Barbara" pid="83/2099">Barbara Carminati</na></co>
<co c="2"><na f="c/Carretero_0001:Jes=uacute=s" pid="c/JCarretero">Jes&#250;s Carretero 0001</na></co>
<co c="0"><na f="c/Celik:Nurcin" pid="48/8423">Nurcin Celik</na></co>
<co c="0"><na f="c/Chakraborty:Sudip" pid="03/3200">Sudip Chakraborty</na></co>
<co c="0"><na f="c/Chen:Pin=Yu" pid="39/8969">Pin-Yu Chen</na></co>
<co c="1"><na f="c/Chen_0002:Yu" pid="87/1254-2">Yu Chen 0002</na></co>
<co c="0"><na f="c/Chong:Edwin_K=_P=" pid="89/2389">Edwin K. P. Chong</na></co>
<co c="0"><na f="c/Choudhury:Sutanay" pid="57/7437">Sutanay Choudhury</na></co>
<co c="0"><na f="c/Conti:Mauro" pid="82/4386">Mauro Conti</na></co>
<co c="0"><na f="c/Crispo:Bruno" pid="c/BrunoCrispo">Bruno Crispo</na></co>
<co c="0"><na f="c/Cuppens:Fr=eacute=d=eacute=ric" pid="c/FredericCuppens">Fr&#233;d&#233;ric Cuppens</na></co>
<co c="0" n="2"><na f="c/Cuppens:Nora" pid="c/NoraCuppens">Nora Cuppens</na><na>Nora Cuppens-Boulahia</na></co>
<co c="0"><na f="c/Curtis:Darren_S=" pid="30/6822">Darren S. Curtis</na></co>
<co c="0"><na f="d/Darschewski:Michael" pid="56/6986">Michael Darschewski</na></co>
<co c="3"><na f="d/Davalos:Julio_F=" pid="164/3962">Julio F. Davalos</na></co>
<co c="0"><na f="d/Dewri:Rinku" pid="26/2836">Rinku Dewri</na></co>
<co c="0"><na f="d/Diao:Xiaoxu" pid="186/3480">Xiaoxu Diao</na></co>
<co c="0"><na f="d/Dimitrakakis:Christos" pid="17/2535">Christos Dimitrakakis</na></co>
<co c="0"><na f="d/Dunn:Chancey" pid="168/9538">Chancey Dunn</na></co>
<co c="0"><na f="d/Dvorak:Kyla_J=" pid="177/9987">Kyla J. Dvorak</na></co>
<co c="0"><na f="e/Etten:Jeffrey_C=_Van" pid="256/9779">Jeffrey C. Van Etten</na></co>
<co c="0"><na f="f/Folgoc:Lionel_Le" pid="29/8165">Lionel Le Folgoc</na></co>
<co c="0"><na f="f/France:Robert_B=" pid="f/RBFrance">Robert B. France</na></co>
<co c="0"><na f="g/Gallegos:Jenna" pid="238/8864">Jenna Gallegos</na></co>
<co c="-1"><na f="g/Ganguly:Chirantan" pid="343/4956">Chirantan Ganguly</na></co>
<co c="0"><na f="g/Gaur:Manoj_Singh" pid="80/7311">Manoj Singh Gaur</na></co>
<co c="-1"><na f="g/Geisterfer:Mike" pid="21/2570">Mike Geisterfer</na></co>
<co c="0"><na f="g/Georgakopoulos_0001:Dimitrios" pid="82/2760">Dimitrios Georgakopoulos 0001</na></co>
<co c="2"><na f="g/Georgalas:Nektarios" pid="19/320">Nektarios Georgalas</na></co>
<co c="0"><na f="g/Ghosh_0001:Sudipto" pid="244/6021-1">Sudipto Ghosh 0001</na></co>
<co c="0"><na f="g/Goeringer:Steve" pid="236/8138">Steve Goeringer</na></co>
<co c="0"><na f="g/Grandison:Tyrone" pid="g/TyroneGrandison">Tyrone Grandison</na></co>
<co c="0"><na f="g/Guo:Yanli" pid="36/1342">Yanli Guo</na></co>
<co c="5"><na f="g/Gupta:Sonali_Sen" pid="129/9057">Sonali Sen Gupta</na></co>
<co c="-1"><na f="h/Hajek:Tomas" pid="79/1605">Tomas Hajek</na></co>
<co c="0"><na f="h/Halappanavar:Mahantesh" pid="41/3413">Mahantesh Halappanavar</na></co>
<co c="0"><na f="h/Han:Keesook_J=" pid="07/2814">Keesook J. Han</na></co>
<co c="0"><na f="h/Hero_III:Alfred_O=" pid="h/AlfredOHeroIII">Alfred O. Hero III</na></co>
<co c="0"><na f="h/Hogan:Emilie" pid="01/3729">Emilie Hogan</na></co>
<co c="0"><na f="h/Holder:Lawrence_B=" pid="h/LawrenceBHolder">Lawrence B. Holder</na></co>
<co c="4"><na f="h/Hopper:Nicholas" pid="11/5469">Nicholas Hopper</na></co>
<co c="0"><na f="h/Houmb:Siv_Hilde" pid="h/SivHildeHoumb">Siv Hilde Houmb</na></co>
<co c="0"><na f="h/Howe:Adele_E=" pid="h/AdeleEHowe">Adele E. Howe</na></co>
<co c="0"><na f="h/Huang:Linan" pid="172/2771">Linan Huang</na></co>
<co c="0"><na f="h/Hui:Peter" pid="58/2913">Peter Hui</na></co>
<co c="0"><na f="j/Jajodia:Sushil" pid="j/SushilJajodia">Sushil Jajodia</na></co>
<co c="6"><na f="j/James:Fathima" pid="261/8805">Fathima James</na></co>
<co c="4"><na f="j/Jansen:Rob" pid="14/7561">Rob Jansen</na></co>
<co c="0"><na f="j/Jayasumana:Anura_P=" pid="29/1638">Anura P. Jayasumana</na></co>
<co c="0"><na f="j/Jiang:Xiaoqian" pid="43/3924">Xiaoqian Jiang</na></co>
<co c="2"><na f="j/Jin:Qun" pid="54/2551">Qun Jin</na></co>
<co c="0"><na f="j/Johnson:John_R=" pid="24/5284">John R. Johnson</na></co>
<co c="0"><na f="j/Justus:Benjamin" pid="41/8688">Benjamin Justus</na></co>
<co c="0"><na f="k/Kahn:Michael_G=" pid="59/256">Michael G. Kahn</na></co>
<co c="0"><na f="k/Kamakoti_0001:V=" pid="25/3336">V. Kamakoti 0001</na></co>
<co c="0"><na f="k/Kambhampati:Vamsi" pid="21/5426">Vamsi Kambhampati</na></co>
<co c="0"><na f="k/Kantarcioglu:Murat" pid="36/195">Murat Kantarcioglu</na></co>
<co c="7"><na f="k/Kar:Anirban" pid="12/2623">Anirban Kar</na></co>
<co c="0"><na f="k/Kar:Diptendu_Mohan" pid="207/6601">Diptendu Mohan Kar</na></co>
<co c="0"><na f="k/Kerschbaum:Florian" pid="26/5304">Florian Kerschbaum</na></co>
<co c="0"><na f="k/Kim:Eunjong" pid="92/4279">Eunjong Kim</na></co>
<co c="0"><na f="k/Krosky:Kiley" pid="409/5600">Kiley Krosky</na></co>
<co c="0" n="2"><na f="k/Kr=uuml=gel:Christopher" pid="k/ChristopherKruegel">Christopher Kr&#252;gel</na><na>Christopher Kruegel</na></co>
<co c="0"><na f="k/Kulkarni:Sandeep_S=" pid="k/SandeepSKulkarni">Sandeep S. Kulkarni</na></co>
<co c="0"><na f="l/Larrieu:Federico" pid="404/0399">Federico Larrieu</na></co>
<co c="0"><na f="l/Lazrig:Ibrahim" pid="164/0743">Ibrahim Lazrig</na></co>
<co c="0"><na f="l/Li_0001:Ninghui" pid="l/NinghuiLi">Ninghui Li 0001</na></co>
<co c="0"><na f="l/Li_0020:Rui" pid="96/4282-20">Rui Li 0020</na></co>
<co c="0"><na f="l/L=oacute=pez_0001:Javier" pid="02/3236-1">Javier L&#243;pez 0001</na></co>
<co c="0"><na f="l/Luckasen:Gary" pid="141/1535">Gary Luckasen</na></co>
<co c="0"><na f="m/Malaiya:Yashwant_K=" pid="m/YKMalaiya">Yashwant K. Malaiya</na></co>
<co c="0"><na f="m/Mancini:Luigi_V=" pid="55/6061">Luigi V. Mancini</na></co>
<co c="0"><na f="m/Mantha:Bharadwaj" pid="328/3203">Bharadwaj Mantha</na></co>
<co c="0"><na f="m/Massey:Daniel" pid="70/1616">Daniel Massey</na></co>
<co c="0"><na f="m/McConnell:Ross_M=" pid="41/4249">Ross M. McConnell</na></co>
<co c="6"><na f="m/Medhi:Deep" pid="m/DeepMedhi">Deep Medhi</na></co>
<co c="0"><na f="m/Mehrotra:Sharad" pid="m/SharadMehrotra">Sharad Mehrotra</na></co>
<co c="0"><na f="m/Mesham:Michael" pid="258/9311">Michael Mesham</na></co>
<co c="0"><na f="m/Mitrokotsa:Aikaterini" pid="22/417">Aikaterini Mitrokotsa</na></co>
<co c="0"><na f="m/Moataz:Tarik" pid="77/11487">Tarik Moataz</na></co>
<co c="0"><na f="m/Mohan:Seshamalini" pid="365/3298">Seshamalini Mohan</na></co>
<co c="5"><na f="m/Moulin_0001:Herv=eacute=" pid="84/6201">Herv&#233; Moulin 0001</na></co>
<co c="0"><na f="m/Mukherjee:Subhojeet" pid="160/7682">Subhojeet Mukherjee</na></co>
<co c="0"><na f="m/Mukkamala:Ravi" pid="m/RaviMukkamala">Ravi Mukkamala</na></co>
<co c="0"><na f="m/Mulamba:Dieudonne" pid="128/7879">Dieudonne Mulamba</na></co>
<co c="0" n="2"><na f="n/Narasimhamurthi:Natarajan" pid="29/3088">Natarajan Narasimhamurthi</na><na>Natu Narasimhamurthi</na></co>
<co c="0"><na f="n/Narasimhamurthy:Natarajan" pid="84/6412">Natarajan Narasimhamurthy</na></co>
<co c="0"><na f="n/Nguyen:Benjamin" pid="69/6924">Benjamin Nguyen</na></co>
<co c="0"><na f="n/Nita=Rotaru:Cristina" pid="n/CristinaNitaRotaru">Cristina Nita-Rotaru</na></co>
<co c="0"><na f="n/Nordquist:Peter" pid="97/583">Peter Nordquist</na></co>
<co c="0"><na f="o/Oler:Kiri" pid="168/9449">Kiri Oler</na></co>
<co c="0" n="2"><na f="o/Ong:Toan" pid="33/3818">Toan Ong</na><na>Toan C. Ong</na></co>
<co c="0"><na f="o/Osman:Zachary" pid="183/4403">Zachary Osman</na></co>
<co c="0"><na f="p/Park_0001:Jung=Min" pid="66/4019-1">Jung-Min Park 0001</na></co>
<co c="0"><na f="p/Patterson:Katherine" pid="410/3905">Katherine Patterson</na></co>
<co c="0"><na f="p/Peccoud:Jean" pid="15/3865">Jean Peccoud</na></co>
<co c="0"><na f="p/Peters:Janet_M=" pid="177/9782">Janet M. Peters</na></co>
<co c="0"><na f="p/Peterson_0001:Jordan" pid="218/5166">Jordan Peterson 0001</na></co>
<co c="0"><na f="p/Pietrykowski:Michael_C=" pid="331/4689">Michael C. Pietrykowski</na></co>
<co c="0"><na f="p/Podder:Rakesh" pid="370/0240">Rakesh Podder</na></co>
<co c="-1" n="2"><na f="p/Polemarchakis:Heracles_M=" pid="65/4335">Heracles M. Polemarchakis</na><na>Herakles M. Polemarchakis</na></co>
<co c="-1"><na f="p/Poolsapassit:Nayot" pid="71/1136">Nayot Poolsapassit</na></co>
<co c="0"><na f="p/Poolsappasit:Nayot" pid="19/4857">Nayot Poolsappasit</na></co>
<co c="0"><na f="p/Prabhu:Vinayak_S=" pid="85/1190">Vinayak S. Prabhu</na></co>
<co c="0"><na f="p/Pucheral:Philippe" pid="p/PPucheral">Philippe Pucheral</na></co>
<co c="1"><na f="q/Qu:Qian" pid="225/4581">Qian Qu</na></co>
<co c="0"><na f="r/Rajaram:Mariappan" pid="128/7876">Mariappan Rajaram</na></co>
<co c="0"><na f="r/Raman:Presanna" pid="393/6730">Presanna Raman</na></co>
<co c="0"><na f="r/Raskar:Ramesh" pid="r/RameshRaskar">Ramesh Raskar</na></co>
<co c="0"><na f="r/Ray:Indrakshi" pid="r/IndrakshiRay">Indrakshi Ray</na></co>
<co c="0"><na f="r/Ren_0001:Kui" pid="20/6179-1">Kui Ren 0001</na></co>
<co c="0"><na f="r/Righi:Stefano" pid="388/1940">Stefano Righi</na></co>
<co c="0"><na f="r/Rios:Tyler" pid="393/6914">Tyler Rios</na></co>
<co c="0"><na f="r/Roberts:Mark" pid="75/5516">Mark Roberts</na></co>
<co c="0"><na f="r/Rodriguez:Luke" pid="168/9512">Luke Rodriguez</na></co>
<co c="0"><na f="s/Salimi:Babak" pid="11/6446">Babak Salimi</na></co>
<co c="0"><na f="s/Samarati:Pierangela" pid="s/PSamarati">Pierangela Samarati</na></co>
<co c="0"><na f="s/Samyukta:Namburi_Rani" pid="256/9837">Namburi Rani Samyukta</na></co>
<co c="0"><na f="s/Sanchez:Diana_R=" pid="252/4010">Diana R. Sanchez</na></co>
<co c="0"><na f="s/Sander:Tomas" pid="59/4684">Tomas Sander</na></co>
<co c="0"><na f="s/Sanghi:Dheeraj" pid="66/4913">Dheeraj Sanghi</na></co>
<co c="0"><na f="s/Santharam:Madhan_B=" pid="388/1955">Madhan B. Santharam</na></co>
<co c="0"><na f="s/Saravani:Sina_Mahdipour" pid="309/4517">Sina Mahdipour Saravani</na></co>
<co c="1"><na f="s/Sarkar:Sumantra" pid="122/1620">Sumantra Sarkar</na></co>
<co c="7"><na f="s/Serrano:Roberto" pid="74/7210">Roberto Serrano</na></co>
<co c="0"><na f="s/Shah:Rushabh" pid="205/6827">Rushabh Shah</na></co>
<co c="-1"><na f="s/Shenoi:Sujeet" pid="72/2300">Sujeet Shenoi</na></co>
<co c="0"><na f="s/Shetty:Sachin" pid="82/2803">Sachin Shetty</na></co>
<co c="0"><na f="s/Shikfa:Abdullatif" pid="24/4245">Abdullatif Shikfa</na></co>
<co c="0"><na f="s/Shirazi:Hossein" pid="58/2807">Hossein Shirazi</na></co>
<co c="0"><na f="s/Shyu:Mei=Ling" pid="93/6593">Mei-Ling Shyu</na></co>
<co c="0"><na f="s/Siegel:Howard_Jay" pid="s/HowardJaySiegel">Howard Jay Siegel</na></co>
<co c="0"><na f="s/Simental:Jason" pid="426/0783">Jason Simental</na></co>
<co c="0" n="2"><na f="s/Simske:Steven_J=" pid="41/5693">Steven J. Simske</na><na>Steve Simske</na></co>
<co c="0"><na f="s/Singh:Mohit" pid="21/6018">Mohit Singh</na></co>
<co c="0"><na f="s/Singh_0001:Vivek_K=" pid="00/6451-7">Vivek K. Singh 0001</na></co>
<co c="0"><na f="s/Sinha:Arunesh" pid="26/9089">Arunesh Sinha</na></co>
<co c="0"><na f="s/Smidts:Carol_S=" pid="157/3580">Carol S. Smidts</na></co>
<co c="0"><na f="s/Sovereign:Jack" pid="388/2132">Jack Sovereign</na></co>
<co c="0"><na f="s/Sreedharan:Sarath" pid="162/5110">Sarath Sreedharan</na></co>
<co c="0"><na f="s/Strizhov:Mikhail" pid="128/7855">Mikhail Strizhov</na></co>
<co c="1"><na f="s/Sun:Han" pid="49/6614">Han Sun</na></co>
<co c="0"><na f="s/Sun:Wuliang" pid="70/2962">Wuliang Sun</na></co>
<co c="0"><na f="t/Talukdar:Rakibul" pid="331/4826">Rakibul Talukdar</na></co>
<co c="0"><na f="t/Talukder:Md=_Rakibul_Hasan" pid="333/9371">Md. Rakibul Hasan Talukder</na></co>
<co c="0"><na f="t/Thomas:Roshan_K=" pid="09/613">Roshan K. Thomas</na></co>
<co c="0"><na f="t/Thorpe:Sean_S=_E=" pid="54/8330">Sean S. E. Thorpe</na></co>
<co c="0"><na f="t/Thuraisingham:Bhavani" pid="t/BMThuraisingham">Bhavani Thuraisingham</na></co>
<co c="0"><na f="t/Thurimella:Ramakrishna" pid="t/RThurimella">Ramakrishna Thurimella</na></co>
<co c="0"><na f="t/Tideman:Sonja" pid="39/1452">Sonja Tideman</na></co>
<co c="0"><na f="t/Tiwary:Kushagra" pid="244/0548">Kushagra Tiwary</na></co>
<co c="0"><na f="t/Toahchoodee:Manachai" pid="39/1765">Manachai Toahchoodee</na></co>
<co c="3"><na f="t/Tonholo:Josealdo" pid="164/3889">Josealdo Tonholo</na></co>
<co c="0"><na f="t/Tummala:Hemanth" pid="365/3645">Hemanth Tummala</na></co>
<co c="3"><na f="u/Uchoa:Silvia_B=" pid="164/3857">Silvia B. Uchoa</na></co>
<co c="0"><na f="u/Urbanska:Malgorzata" pid="116/8671">Malgorzata Urbanska</na></co>
<co c="0"><na f="v/Vaddi:Pavan_Kumar" pid="331/4664">Pavan Kumar Vaddi</na></co>
<co c="0"><na f="v/Vaidya:Jaideep" pid="61/3091">Jaideep Vaidya</na></co>
<co c="0"><na f="v/Venkatasubramanian:Nalini" pid="66/1875">Nalini Venkatasubramanian</na></co>
<co c="0"><na f="v/Vimercati:Sabrina_De_Capitani_di" pid="v/SabrinaDeCapitanidiVimercati">Sabrina De Capitani di Vimercati</na></co>
<co c="0"><na f="w/Walker:Jacob" pid="135/1696">Jacob Walker</na></co>
<co c="0"><na f="w/Wang:Xiaofeng" pid="99/2479">Xiaofeng Wang</na></co>
<co c="0"><na f="w/Weerawardhana:Sachini_S=" pid="57/10716">Sachini S. Weerawardhana</na></co>
<co c="0"><na f="w/White:David" pid="31/6546">David White</na></co>
<co c="0"><na f="w/Whitley:L=_Darrell" pid="w/LDarrellWhitley">L. Darrell Whitley</na></co>
<co c="0"><na f="w/Williams:Janet" pid="08/8703">Janet Williams</na></co>
<co c="0"><na f="w/Wu:Hailin" pid="53/1531">Hailin Wu</na></co>
<co c="1"><na f="x/Xu:Ronghua" pid="43/1887">Ronghua Xu</na></co>
<co c="0"><na f="y/Yin:Shaoyi" pid="99/3212">Shaoyi Yin</na></co>
<co c="0"><na f="y/Yin:Shuxin" pid="39/5091">Shuxin Yin</na></co>
<co c="0"><na f="y/Younis:Awad_A=" pid="142/7178">Awad A. Younis</na></co>
<co c="0"><na f="y/Yung:Moti" pid="y/MotiYung">Moti Yung</na></co>
<co c="-1"><na f="z/Zhang:Hongjun" pid="76/2931">Hongjun Zhang</na></co>
<co c="0"><na f="z/Zhang:Junxing" pid="52/6351">Junxing Zhang</na></co>
<co c="0"><na f="z/Zhao:Yunfei" pid="240/8099">Yunfei Zhao</na></co>
<co c="-1"><na f="z/Zhou_0009:Lin" pid="69/6147-9">Lin Zhou 0009</na></co>
<co c="0"><na f="z/Zhu:Quanyan" pid="03/6207">Quanyan Zhu</na></co>
</coauthors>
</dblpperson>

