


Остановите войну!
for scientists:


default search action
Elisa Bertino
Person information

- affiliation: Purdue University, USA
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j387]Ruidong Han, Huihui Gong, Siqi Ma, Juanru Li, Chang Xu, Elisa Bertino, Surya Nepal, Zhuo Ma, Jianfeng Ma:
A Credential Usage Study: Flow-Aware Leakage Detection in Open-Source Projects. IEEE Trans. Inf. Forensics Secur. 19: 722-734 (2024) - [j386]Yong-Feng Ge
, Elisa Bertino
, Hua Wang
, Jinli Cao
, Yanchun Zhang
:
Distributed Cooperative Coevolution of Data Publishing Privacy and Transparency. ACM Trans. Knowl. Discov. Data 18(1): 20:1-20:23 (2024) - 2023
- [j385]Mostafa Mirzaie, Behshid Behkamal
, Mohammad Allahbakhsh
, Samad Paydar, Elisa Bertino:
State of the art on quality control for data streams: A systematic literature review. Comput. Sci. Rev. 48: 100554 (2023) - [j384]Fabrizio Cicala, Weicheng Wang, Tianhao Wang, Ninghui Li, Elisa Bertino, Faming Liang, Yang Yang:
PURE: A Framework for Analyzing Proximity-based Contact Tracing Protocols. ACM Comput. Surv. 55(2): 3:1-3:36 (2023) - [j383]Omar Hasan
, Lionel Brunie, Elisa Bertino:
Privacy-Preserving Reputation Systems Based on Blockchain and Other Cryptographic Building Blocks: A Survey. ACM Comput. Surv. 55(2): 32:1-32:37 (2023) - [j382]Elisa Bertino
:
Privacy in the Era of 5G, IoT, Big Data, and Machine Learning. IEEE Secur. Priv. 21(1): 91-92 (2023) - [j381]Elisa Bertino, Suparna Bhattacharya, Elena Ferrari, Dejan S. Milojicic:
Trustworthy AI and Data Lineage. IEEE Internet Comput. 27(6): 5-6 (2023) - [j380]Antonino Rullo
, Elisa Bertino
, Kui Ren
:
Guest Editorial Special Issue on Intrusion Detection for the Internet of Things. IEEE Internet Things J. 10(10): 8327-8330 (2023) - [j379]Mingshan You, Jiao Yin
, Hua Wang
, Jinli Cao, Kate N. Wang, Yuan Miao
, Elisa Bertino:
A knowledge graph empowered online learning framework for access control decision-making. World Wide Web (WWW) 26(2): 827-848 (2023) - [c658]Amani Abu Jabal
, Elisa Bertino
, Jorge Lobo
, Dinesh C. Verma
, Seraphin B. Calo
, Alessandra Russo
:
FLAP - A Federated Learning Framework for Attribute-based Access Control Policies. CODASPY 2023: 263-272 - [c657]Anand Mudgerikar, Elisa Bertino:
Intelligent Security Aware Routing: Using Model-Free Reinforcement Learning. ICCCN 2023: 1-10 - [c656]Elisa Bertino, Baochun Li, Ophir Frieder, Xiaohua Jia:
Welcome Message. ICDCS 2023: xxii-xxiii - [c655]Adrian Shuai Li, Elisa Bertino, Rih-Teng Wu
, Ting-Yan Wu:
Building Manufacturing Deep Learning Models with Minimal and Imbalanced Training Data Using Domain Adaptation and Data Augmentation. ICIT 2023: 1-8 - [c654]Imtiaz Karim, Abdullah Al Ishtiaq, Syed Rafiul Hussain, Elisa Bertino:
BLEDiff: Scalable and Property-Agnostic Noncompliance Checking for BLE Implementations. SP 2023: 3209-3227 - [c653]Xing Han, Yuheng Zhang, Xue Zhang, Zeyuan Chen, Mingzhe Wang, Yiwei Zhang, Siqi Ma, Yu Yu, Elisa Bertino, Juanru Li:
Medusa Attack: Exploring Security Hazards of In-App QR Code Scanning. USENIX Security Symposium 2023: 4607-4624 - [c652]Sanghak Oh
, Minwook Lee
, Hyunwoo Lee
, Elisa Bertino
, Hyoungshick Kim
:
AppSniffer: Towards Robust Mobile App Fingerprinting Against VPN. WWW 2023: 2318-2328 - [i36]Imtiaz Karim, Kazi Samin Mubasshir, Mirza Masfiqur Rahman, Elisa Bertino:
SPEC5G: A Dataset for 5G Cellular Network Protocol Analysis. CoRR abs/2301.09201 (2023) - [i35]Adrian Shuai Li, Elisa Bertino, Rih-Teng Wu, Ting-Yan Wu:
Building Manufacturing Deep Learning Models with Minimal and Imbalanced Training Data Using Domain Adaptation and Data Augmentation. CoRR abs/2306.00202 (2023) - [i34]Adrian Shuai Li, Elisa Bertino, Xuan-Hong Dang, Ankush Singla, Yuhai Tu, Mark N. Wegman:
Maximal Domain Independent Representations Improve Transfer Learning. CoRR abs/2306.00262 (2023) - [i33]Jie Wang, Zheng Yan, Jiahe Lan, Elisa Bertino, Witold Pedrycz:
TrustGuard: GNN-based Robust and Explainable Trust Evaluation with Dynamicity Support. CoRR abs/2306.13339 (2023) - [i32]Diane Jackson, Sorin Adam Matei, Elisa Bertino:
Artificial Intelligence Ethics Education in Cybersecurity: Challenges and Opportunities: a focus group report. CoRR abs/2311.00903 (2023) - [i31]Sorin Adam Matei, Elisa Bertino:
Educating for AI Cybersecurity Work and Research: Ethics, Systems Thinking, and Communication Requirements. CoRR abs/2311.04326 (2023) - 2022
- [j378]Abubakar Sadiq Sani, Elisa Bertino, Dong Yuan, Ke Meng, Zhao Yang Dong:
SPrivAD: A secure and privacy-preserving mutually dependent authentication and data access scheme for smart communities. Comput. Secur. 115: 102610 (2022) - [j377]Adnan Ahmad
, Brian Whitworth, Elisa Bertino:
A framework for the application of socio-technical design methodology. Ethics Inf. Technol. 24(4): 46 (2022) - [j376]Srinibas Swain
, Deepak Puthal
, Elisa Bertino
:
CryptoCliqIn: Graph-Theoretic Cryptography Using Clique Injection. IEEE Intell. Syst. 37(5): 59-65 (2022) - [j375]Elisa Bertino:
The Persistent Problem of Software Insecurity. IEEE Secur. Priv. 20(3): 107-108 (2022) - [j374]Xu Yang
, Xun Yi
, Ibrahim Khalil
, Junwei Luo, Elisa Bertino
, Surya Nepal
, Xinyi Huang
:
Secure and Lightweight Authentication for Mobile-Edge Computing-Enabled WBANs. IEEE Internet Things J. 9(14): 12563-12572 (2022) - [j373]Elisa Bertino, Haya Schulmann, Michael Waidner:
Special issue ESORICS 2021. J. Comput. Secur. 30(6): 753-755 (2022) - [j372]Mahmoud Barhamgi, Elisa Bertino:
Editorial: Special Issue on Data Transparency - Data Quality, Annotation, and Provenance. ACM J. Data Inf. Qual. 14(1): 1:1-1:3 (2022) - [j371]Mahmoud Barhamgi, Elisa Bertino:
Editorial: Special Issue on Data Transparency - Uses Cases and Applications. ACM J. Data Inf. Qual. 14(2): 6:1-6:3 (2022) - [j370]Huawei Huang
, Salil S. Kanhere
, Jiawen Kang
, Zehui Xiong
, Lei Zhang
, Bhaskar Krishnamachari
, Elisa Bertino
, Sichao Yang:
Guest Editorial Special Issue on Intelligent Blockchain for Future Communications and Networking: Technologies, Trends, and Applications. IEEE J. Sel. Areas Commun. 40(12): 3299-3304 (2022) - [j369]Fabrizio Cicala
, Elisa Bertino
:
Analysis of Encryption Key Generation in Modern Crypto Ransomware. IEEE Trans. Dependable Secur. Comput. 19(2): 1239-1253 (2022) - [j368]Siqi Ma
, Juanru Li, Surya Nepal
, Diethelm Ostry, David Lo
, Sanjay K. Jha
, Robert H. Deng
, Elisa Bertino
:
Orchestration or Automation: Authentication Flaw Detection in Android Apps. IEEE Trans. Dependable Secur. Comput. 19(4): 2165-2178 (2022) - [j367]Qinbao Xu
, Elisa Bertino
, Changda Wang
:
Compact Provenance Scheme Through Packet Path Index Differences in WSNs. IEEE Trans. Inf. Forensics Secur. 17: 3511-3524 (2022) - [j366]Mohammad Saidur Rahman, Ibrahim Khalil
, Xun Yi, Mohammed Atiquzzaman, Elisa Bertino:
A Lossless Data-Hiding based IoT Data Authenticity Model in Edge-AI for Connected Living. ACM Trans. Internet Techn. 22(3): 57:1-57:25 (2022) - [j365]Changda Wang, Xiaowei Li, Elisa Bertino:
Network Temperature: A Novel Statistical Index for Networks Measurement and Management. ACM Trans. Internet Techn. 22(3): 66:1-66:20 (2022) - [j364]Andrzej Goscinski
, Elisa Bertino, Shangguang Wang
:
Guest Editor's Introduction: Special Section on EdgeAI as a Service. IEEE Trans. Serv. Comput. 15(2): 588-590 (2022) - [j363]Mohammad Allahbakhsh
, Haleh Amintoosi
, Aleksandar Ignjatovic, Elisa Bertino
:
A Trust-Based Experience-Aware Framework for Integrating Fuzzy Recommendations. IEEE Trans. Serv. Comput. 15(2): 698-709 (2022) - [j362]Mohammad Allahbakhsh
, Haleh Amintoosi
, Behshid Behkamal
, Salil S. Kanhere
, Elisa Bertino
:
AQA: An Adaptive Quality Assessment Framework for Online Review Systems. IEEE Trans. Serv. Comput. 15(3): 1486-1497 (2022) - [c651]Hyunwoo Lee, Imtiaz Karim, Ninghui Li, Elisa Bertino:
VWAnalyzer: A Systematic Security Analysis Framework for the Voice over WiFi Protocol. AsiaCCS 2022: 182-195 - [c650]Laurent d'Orazio, Jalil Boukhobza, Omer F. Rana
, Juba Agoun, Le Gruenwald, Hervé Rannou, Elisa Bertino, Mohand-Saïd Hacid, Taofik Saïdi, Georges Bossert, Van Long Nguyen Huu, Dimitri Tombroff, Makoto Onizuka
:
The Lannion report on Big Data and Security Monitoring Research. IEEE Big Data 2022: 2960-2969 - [c649]Charalampos Katsis, Fabrizio Cicala, Dan Thomsen, Nathan Ringo
, Elisa Bertino:
NEUTRON: A Graph-based Pipeline for Zero-trust Network Architectures. CODASPY 2022: 167-178 - [c648]Elisa Bertino, Ravi S. Sandhu, Bhavani Thuraisingham, Indrakshi Ray, Wenjia Li, Maanak Gupta, Sudip Mittal:
Security and Privacy for Emerging IoT and CPS Domains. CODASPY 2022: 336-337 - [c647]Sen Lin, Ming Shi, Anish Arora, Raef Bassily, Elisa Bertino, Constantine Caramanis, Kaushik R. Chowdhury
, Eylem Ekici, Atilla Eryilmaz, Stratis Ioannidis
, Nan Jiang, Gauri Joshi, Jim Kurose, Yingbin Liang, Zhiqiang Lin, Jia Liu, Mingyan Liu, Tommaso Melodia, Aryan Mokhtari, Rob Nowak, Sewoong Oh, Srini Parthasarathy, Chunyi Peng, Hulya Seferoglu, Ness B. Shroff, Sanjay Shakkottai, Kannan Srinivasan, Ameet Talwalkar, Aylin Yener, Lei Ying
:
Leveraging Synergies Between AI and Networking to Build Next Generation Edge Networks. CIC 2022: 16-25 - [c646]Ankush Singla, Elisa Bertino:
DP-ADA: Differentially Private Adversarial Domain Adaptation for Training Deep Learning based Network Intrusion Detection Systems. CIC 2022: 89-98 - [c645]Yiwei Zhang, Siqi Ma, Juanru Li, Dawu Gu, Elisa Bertino:
KingFisher: Unveiling Insecurely Used Credentials in IoT-to-Mobile Communications. DSN 2022: 488-500 - [c644]Hyunwoo Lee, Anand Mudgerikar, Ashish Kundu, Ninghui Li, Elisa Bertino:
An Infection-Identifying and Self-Evolving System for IoT Early Defense from Multi-Step Attacks. ESORICS (2) 2022: 549-568 - [c643]Yi Xie, Wen Li, Yuqing Sun
, Elisa Bertino, Bin Gong:
Subspace Embedding Based New Paper Recommendation. ICDE 2022: 1767-1780 - [c642]Ruidong Han, Chao Yang, Siqi Ma, Jianfeng Ma, Cong Sun, Juanru Li, Elisa Bertino:
Control Parameters Considered Harmful: Detecting Range Specification Bugs in Drone Configuration Modules via Learning-Guided Search. ICSE 2022: 462-473 - [c641]Yunlong Lyu, Yi Fang, Yiwei Zhang, Qibin Sun, Siqi Ma, Elisa Bertino, Kangjie Lu, Juanru Li:
Goshawk: Hunting Memory Corruptions via Structure-Aware and Object-Centric Memory Operation Synopsis. SP 2022: 2096-2113 - [c640]Shagufta Mehnaz, Sayanton V. Dibbo, Ehsanul Kabir, Ninghui Li, Elisa Bertino:
Are Your Sensitive Attributes Private? Novel Model Inversion Attribute Inference Attacks on Classification Models. USENIX Security Symposium 2022: 4579-4596 - [e76]Xingming Sun, Xiaorui Zhang
, Zhihua Xia
, Elisa Bertino:
Artificial Intelligence and Security - 8th International Conference, ICAIS 2022, Qinghai, China, July 15-20, 2022, Proceedings, Part I. Lecture Notes in Computer Science 13338, Springer 2022, ISBN 978-3-031-06793-8 [contents] - [e75]Xingming Sun, Xiaorui Zhang
, Zhihua Xia
, Elisa Bertino:
Artificial Intelligence and Security - 8th International Conference, ICAIS 2022, Qinghai, China, July 15-20, 2022, Proceedings, Part II. Lecture Notes in Computer Science 13339, Springer 2022, ISBN 978-3-031-06787-7 [contents] - [e74]Xingming Sun, Xiaorui Zhang
, Zhihua Xia
, Elisa Bertino:
Artificial Intelligence and Security - 8th International Conference, ICAIS 2022, Qinghai, China, July 15-20, 2022, Proceedings, Part III. Lecture Notes in Computer Science 13340, Springer 2022, ISBN 978-3-031-06790-7 [contents] - [i30]Shagufta Mehnaz, Sayanton V. Dibbo, Ehsanul Kabir, Ninghui Li, Elisa Bertino:
Are Your Sensitive Attributes Private? Novel Model Inversion Attribute Inference Attacks on Classification Models. CoRR abs/2201.09370 (2022) - [i29]Yiwei Zhang, Siqi Ma, Tiancheng Chen, Juanru Li, Robert H. Deng, Elisa Bertino:
EvilScreen Attack: Smart TV Hijacking via Multi-channel Remote Control Mimicry. CoRR abs/2210.03014 (2022) - 2021
- [j361]Elisa Bertino:
An excellent venue for multidisciplinary research in civil and infrastructure engineering. Comput. Aided Civ. Infrastructure Eng. 36(6): 677 (2021) - [j360]Elisa Bertino, Mohammad R. Jahanshahi, Ankush Singla, Rih-Teng Wu:
Intelligent IoT systems for civil infrastructure health monitoring: a research roadmap. Discov. Internet Things 1(1) (2021) - [j359]Elisa Bertino
:
Attacks on Artificial Intelligence [Last Word]. IEEE Secur. Priv. 19(1): 103-104 (2021) - [j358]Elisa Bertino
:
Zero Trust Architecture: Does It Help? IEEE Secur. Priv. 19(5): 95-96 (2021) - [j357]Mohammad Allahbakhsh, Haleh Amintoosi
, Behshid Behkamal, Amin Beheshti
, Elisa Bertino:
SCiMet: Stable, sCalable and reliable Metric-based framework for quality assessment in collaborative content generation systems. J. Informetrics 15(2): 101127 (2021) - [j356]Yinghui Zhang
, Robert H. Deng
, Elisa Bertino
, Dong Zheng
:
Robust and Universal Seamless Handover Authentication in 5G HetNets. IEEE Trans. Dependable Secur. Comput. 18(2): 858-874 (2021) - [j355]Shagufta Mehnaz
, Elisa Bertino
:
A Fine-Grained Approach for Anomaly Detection in File System Accesses With Enhanced Temporal User Profiles. IEEE Trans. Dependable Secur. Comput. 18(6): 2535-2550 (2021) - [j354]Shahriar Badsha
, Xun Yi
, Ibrahim Khalil
, Dongxi Liu, Surya Nepal
, Elisa Bertino
, Kwok-Yan Lam
:
Privacy Preserving Location-Aware Personalized Web Service Recommendations. IEEE Trans. Serv. Comput. 14(3): 791-804 (2021) - [j353]Amani Abu Jabal
, Maryam Davari
, Elisa Bertino
, Christian Makaya, Seraphin B. Calo
, Dinesh C. Verma
, Christopher Williams:
ProFact: A Provenance-Based Analytics Framework for Access Control Policies. IEEE Trans. Serv. Comput. 14(6): 1914-1928 (2021) - [c639]Abubakar Sadiq Sani, Dong Yuan, Elisa Bertino, Zhao Yang Dong:
Crypto-Chain: A Relay Resilience Framework for Smart Vehicles. ACSAC 2021: 439-454 - [c638]Ankush Singla, Rouzbeh Behnia, Syed Rafiul Hussain, Attila A. Yavuz
, Elisa Bertino:
Look Before You Leap: Secure Connection Bootstrapping for 5G Networks to Defend Against Fake Base-Stations. AsiaCCS 2021: 501-515 - [c637]Syed Rafiul Hussain, Imtiaz Karim, Abdullah Al Ishtiaq
, Omar Chowdhury, Elisa Bertino:
Noncompliance as Deviant Behavior: An Automated Black-box Noncompliance Checker for 4G LTE Cellular Devices. CCS 2021: 1082-1099 - [c636]Elisa Bertino, Murat Kantarcioglu, Cuneyt Gurcan Akcora, Sagar Samtani
, Sudip Mittal, Maanak Gupta:
AI for Security and Security for AI. CODASPY 2021: 333-334 - [c635]Anand Mudgerikar, Elisa Bertino, Jorge Lobo, Dinesh C. Verma:
A Security-Constrained Reinforcement Learning Framework for Software Defined Networks. ICC 2021: 1-6 - [c634]Imtiaz Karim, Syed Rafiul Hussain, Elisa Bertino:
ProChecker: An Automated Security and Privacy Analysis Framework for 4G LTE Protocol Implementations. ICDCS 2021: 773-785 - [c633]Siqi Ma, Juanru Li, Hyoungshick Kim, Elisa Bertino, Surya Nepal
, Diethelm Ostry, Cong Sun:
Fine with "1234"? An Analysis of SMS One-Time Password Randomness in Android Apps. ICSE 2021: 1671-1682 - [c632]Elisa Bertino, Kenneth Brancik:
Services for Zero Trust Architectures - A Research Roadmap. ICWS 2021: 14-20 - [c631]Mark Law, Alessandra Russo, Krysia Broda, Elisa Bertino:
Scalable Non-observational Predicate Learning in ASP. IJCAI 2021: 1936-1943 - [c630]Elisa Bertino, Imtiaz Karim:
AI-powered Network Security: Approaches and Research Directions. NSysS 2021: 97-105 - [c629]Charalampos Katsis, Fabrizio Cicala, Dan Thomsen, Nathan Ringo
, Elisa Bertino:
Can I Reach You? Do I Need To? New Semantics in Security Policy Specification and Testing. SACMAT 2021: 165-174 - [c628]Yi Xie, Yuqing Sun
, Elisa Bertino:
Learning Domain Semantics and Cross-Domain Correlations for Paper Recommendation. SIGIR 2021: 706-715 - [c627]Mortada Al-Banna, Boualem Benatallah
, Moshe Chai Barukh, Elisa Bertino, Salil S. Kanhere
:
Crowdsourcing Software Vulnerability Discovery: Models, Dimensions, and Directions. WISE (1) 2021: 3-13 - [e73]Elisa Bertino
, Haya Schulmann
, Michael Waidner
:
Computer Security - ESORICS 2021 - 26th European Symposium on Research in Computer Security, Darmstadt, Germany, October 4-8, 2021, Proceedings, Part I. Lecture Notes in Computer Science 12972, Springer 2021, ISBN 978-3-030-88417-8 [contents] - [e72]Elisa Bertino
, Haya Schulmann
, Michael Waidner
:
Computer Security - ESORICS 2021 - 26th European Symposium on Research in Computer Security, Darmstadt, Germany, October 4-8, 2021, Proceedings, Part II. Lecture Notes in Computer Science 12973, Springer 2021, ISBN 978-3-030-88427-7 [contents] - [e71]Xingming Sun
, Xiaorui Zhang
, Zhihua Xia
, Elisa Bertino
:
Artificial Intelligence and Security - 7th International Conference, ICAIS 2021, Dublin, Ireland, July 19-23, 2021, Proceedings, Part I. Lecture Notes in Computer Science 12736, Springer 2021, ISBN 978-3-030-78608-3 [contents] - [e70]Xingming Sun
, Xiaorui Zhang
, Zhihua Xia
, Elisa Bertino
:
Artificial Intelligence and Security - 7th International Conference, ICAIS 2021, Dublin, Ireland, July 19-23, 2021, Proceedings, Part II. Lecture Notes in Computer Science 12737, Springer 2021, ISBN 978-3-030-78611-3 [contents] - [i28]Elisa Bertino, Daniel W. Bliss, Daniel Lopresti, Larry Peterson, Henning Schulzrinne:
Computing Research Challenges in Next Generation Wireless Networking. CoRR abs/2101.01279 (2021) - [i27]Siqi Ma, Juanru Li, Hyoungshick Kim, Elisa Bertino, Surya Nepal, Diethelm Ostry, Cong Sun:
Fine with "1234"? An Analysis of SMS One-Time Password Randomness in Android Apps. CoRR abs/2103.05758 (2021) - [i26]Nicholas Malecki, Hye-young Paik, Aleksandar Ignjatovic, Alan Blair, Elisa Bertino:
Simeon - Secure Federated Machine Learning Through Iterative Filtering. CoRR abs/2103.07704 (2021) - [i25]Ruidong Han, Chao Yang, Siqi Ma, Jianfeng Ma, Cong Sun, Juanru Li, Elisa Bertino:
Control Parameters Considered Harmful: Detecting Range Specification Bugs in Drone Configuration Modules via Learning-Guided Search. CoRR abs/2112.03511 (2021) - 2020
- [j352]Elisa Bertino:
Security of cellular networks position paper. CCF Trans. Netw. 3(2): 93-96 (2020) - [j351]Elisa Bertino:
The Quest for Data Transparency. IEEE Secur. Priv. 18(3): 67-68 (2020) - [j350]Zheng Yan
, Willy Susilo
, Elisa Bertino, Jun Zhang, Laurence T. Yang:
AI-driven data security and privacy. J. Netw. Comput. Appl. 172: 102842 (2020) - [j349]Ankush Singla, Syed Rafiul Hussain, Omar Chowdhury, Elisa Bertino, Ninghui Li:
Protecting the 4G and 5G Cellular Paging Protocols against Security and Privacy Attacks. Proc. Priv. Enhancing Technol. 2020(1): 126-142 (2020) - [j348]Xun Yi
, Elisa Bertino
, Fang-Yu Rao
, Kwok-Yan Lam
, Surya Nepal
, Athman Bouguettaya
:
Privacy-Preserving User Profile Matching in Social Networks. IEEE Trans. Knowl. Data Eng. 32(8): 1572-1585 (2020) - [j347]Jongho Won
, Seung-Hyun Seo
, Elisa Bertino
:
A Secure Shuffling Mechanism for White-Box Attack-Resistant Unmanned Vehicles. IEEE Trans. Mob. Comput. 19(5): 1023-1039 (2020) - [j346]Anand Mudgerikar
, Puneet Sharma, Elisa Bertino:
Edge-Based Intrusion Detection for IoT devices. ACM Trans. Manag. Inf. Syst. 11(4): 18:1-18:21 (2020) - [c626]Mark Law, Alessandra Russo, Elisa Bertino, Krysia Broda, Jorge Lobo:
FastLAS: Scalable Inductive Logic Programming Incorporating Domain-Specific Optimisation Criteria. AAAI 2020: 2877-2885 - [c625]Charalampos Katsis, Ankush Singla, Elisa Bertino:
Real-time Digital Signatures for Named Data Networking. ICN 2020: 149-151 - [c624]Siqi Ma, Hehao Li, Wenbo Yang, Juanru Li, Surya Nepal
, Elisa Bertino:
Certified Copy? Understanding Security Risks of Wi-Fi Hotspot based Android Data Clone Services. ACSAC 2020: 320-331 - [c623]Ankush Singla, Elisa Bertino, Dinesh C. Verma:
Preparing Network Intrusion Detection Deep Learning Models with Minimal Data Using Adversarial Domain Adaptation. AsiaCCS 2020: 127-140 - [c622]Elisa Bertino, Anoop Singhal, Srivathsan Srinivasagopalan, Rakesh M. Verma
:
Developing A Compelling Vision for Winning the Cybersecurity Arms Race. CODASPY 2020: 220-222 - [c621]Hong Mei, Elisa Bertino:
IEEE 2020 World Congress on Services Welcome Message from Congress 2020 General Chairs. EDGE 2020: 1 - [c620]Amani Abu Jabal, Elisa Bertino, Jorge Lobo
, Mark Law, Alessandra Russo
, Seraphin B. Calo, Dinesh C. Verma:
Polisma - A Framework for Learning Attribute-Based Access Control Policies. ESORICS (1) 2020: 523-544 - [c619]Anand Mudgerikar, Elisa Bertino:
Jarvis: Moving Towards a Smarter Internet of Things. ICDCS 2020: 122-134 - [c618]Xun Yi, Russell Paulet, Elisa Bertino, Fang-Yu Rao:
Practical Anonymous Subscription with Revocation Based on Broadcast Encryption. ICDE 2020: 241-252 - [c617]Daren Fadolalkarim, Elisa Bertino, Asmaa Sallam:
An Anomaly Detection System for the Protection of Relational Database Systems against Data Leakage by Application Programs. ICDE 2020: 265-276 - [c616]Shagufta Mehnaz, Elisa Bertino:
Privacy-preserving Real-time Anomaly Detection Using Edge Computing. ICDE 2020: 469-480 - [c615]Jorge Lobo
, Elisa Bertino, Alessandra Russo
:
On Security Policy Migrations. SACMAT 2020: 179-188 - [c614]Hong Mei, Elisa Bertino:
IEEE 2020 World Congress on Services Welcome Message from Congress 2020 General Chairs. SERVICES 2020: 1-2 - [c613]Elisa Bertino:
Privacy in the Era of 5G, IoT, Big Data and Machine Learning. TPS-ISA 2020: 134-137 - [c612]Weicheng Wang, Fabrizio Cicala, Syed Rafiul Hussain, Elisa Bertino, Ninghui Li:
Analyzing the attack landscape of Zigbee-enabled IoT systems and reinstating users' privacy. WISEC 2020: 133-143 - [e69]