Ashish Gehani
Ashish Gehani
Bestätigte E-Mail-Adresse bei - Startseite
Zitiert von
Zitiert von
DNA-based Cryptography
A Gehani, T LaBean, J Reif
Aspects of Molecular Computing, Lecture Notes in Computer Science 2950, 2004
SPADE: Support for Provenance Auditing in Distributed Environments
A Gehani, D Tariq
13th ACM/IFIP/USENIX International Middleware Conference, 2012
Performance and Extension of User Space File Systems
A Rajgarhia, A Gehani
25th ACM Symposium on Applied Computing (SAC), 2010
Transcoding Characteristics of Web Images
S Chandra, A Gehani, C Ellis, A Vahdat
Multimedia Computing and Networking (MMCN) 4312, 2001
RheoStat: Real-time Risk Management
A Gehani, G Kedem
7th International Symposium on Recent Advances in Intrusion Detection (RAID …, 2004
Microflow Biomolecular Computation
A Gehani, J Reif
Biosystems, Journal of Biological and Information Processing Sciences 52 (1-3), 1999
Smartphone Security Limitations: Conflicting Traditions
N Husted, H Saidi, A Gehani
2nd Workshop on Governance of Technology, Information, and Policies …, 2011
Towards Automated Collection of Application-Level Data Provenance
D Tariq, M Ali, A Gehani
4th USENIX Workshop on the Theory and Practice of Provenance (TaPP …, 2012
Trimmer: Application Specialization for Code Debloating
H Sharif, M Abubakar, A Gehani, F Zaffar
33rd IEEE/ACM International Conference on Automated Software Engineering (ASE), 2018
MCI: Modeling-based Causality Inference in Audit Logging for Attack Investigation
Y Kwon, F Wang, W Wang, KH Lee, WC Lee, S Ma, X Zhang, D Xu, S Jha, ...
25th Annual Network and Distributed System Security Symposium (NDSS), 2018
Tracking and Sketching Distributed Data Provenance
T Malik, L Nistor, A Gehani
6th IEEE International Conference on e-Science, 2010
Sketching Distributed Data Provenance
T Malik, A Gehani, D Tariq, F Zaffar
Data Provenance and Data Management for eScience, Studies in Computational …, 2013
Bonsai: Balanced Lineage Authentication
A Gehani, U Lindqvist
23rd Annual Computer Security Applications Conference (ACSAC), 2007
ICEMAN: A System for Efficient, Robust and Secure Situational Awareness at the Network Edge
S Wood, J Mathewson, J Joy, MO Stehr, M Kim, A Gehani, M Gerla, ...
32nd IEEE Military Communications Conference (MILCOM), 2013
Mendel: Efficiently Verifying the Lineage of Data Modified in Multiple Trust Domains
A Gehani, M Kim
19th ACM International Symposium on High Performance Distributed Computing …, 2010
Identifying the Provenance of Correlated Anomalies
D Tariq, B Baig, A Gehani, S Mahmood, R Tahir, A Aqil, F Zaffar
26th ACM Symposium on Applied Computing (SAC), 2011
Kernel-Supported Cost-Effective Audit Logging for Causality Tracking
S Ma, J Zhai, Y Kwon, KH Lee, X Zhang, G Ciocarlie, A Gehani, ...
29th USENIX Annual Technical Conference (ATC), 2018
Tradeoffs in Automatic Provenance Capture
M Stamatogiannakis, H Kazmi, H Sharif, R Vermeulen, A Gehani, H Bos, ...
Provenance and Annotation of Data and Processes, Lecture Notes in Computer …, 2016
Automated Software Winnowing
G Malecha, A Gehani, N Shankar
30th ACM Symposium on Applied Computing (SAC), 2015
PIDGIN: Privacy-Preserving Interest and Content Sharing in Opportunistic Networks
R Asghar, A Gehani, B Crispo, G Russello
9th ACM Symposium on Information, Computer and Communications Security (ASIACCS), 2014
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20