
Elisa Bertino
Person information
- affiliation: Purdue University
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2021
- [i25]Elisa Bertino, Daniel Bliss, Daniel Lopresti, Larry Peterson, Henning Schulzrinne:
Computing Research Challenges in Next Generation Wireless Networking. CoRR abs/2101.01279 (2021) - 2020
- [j350]Elisa Bertino:
Security of cellular networks position paper. CCF Trans. Netw. 3(2): 93-96 (2020) - [j349]Elisa Bertino:
The Quest for Data Transparency. IEEE Secur. Priv. 18(3): 67-68 (2020) - [j348]Zheng Yan, Willy Susilo, Elisa Bertino, Jun Zhang, Laurence T. Yang:
AI-driven data security and privacy. J. Netw. Comput. Appl. 172: 102842 (2020) - [j347]Ankush Singla, Syed Rafiul Hussain, Omar Chowdhury, Elisa Bertino, Ninghui Li:
Protecting the 4G and 5G Cellular Paging Protocols against Security and Privacy Attacks. Proc. Priv. Enhancing Technol. 2020(1): 126-142 (2020) - [j346]Xun Yi
, Elisa Bertino
, Fang-Yu Rao
, Kwok-Yan Lam
, Surya Nepal
, Athman Bouguettaya
:
Privacy-Preserving User Profile Matching in Social Networks. IEEE Trans. Knowl. Data Eng. 32(8): 1572-1585 (2020) - [j345]Jongho Won
, Seung-Hyun Seo
, Elisa Bertino
:
A Secure Shuffling Mechanism for White-Box Attack-Resistant Unmanned Vehicles. IEEE Trans. Mob. Comput. 19(5): 1023-1039 (2020) - [j344]Anand Mudgerikar, Puneet Sharma, Elisa Bertino:
Edge-Based Intrusion Detection for IoT devices. ACM Trans. Manag. Inf. Syst. 11(4): 18:1-18:21 (2020) - [c619]Mark Law, Alessandra Russo, Elisa Bertino, Krysia Broda, Jorge Lobo:
FastLAS: Scalable Inductive Logic Programming Incorporating Domain-Specific Optimisation Criteria. AAAI 2020: 2877-2885 - [c618]Charalampos Katsis, Ankush Singla, Elisa Bertino:
Real-time Digital Signatures for Named Data Networking. ICN 2020: 149-151 - [c617]Siqi Ma, Hehao Li, Wenbo Yang, Juanru Li, Surya Nepal
, Elisa Bertino:
Certified Copy? Understanding Security Risks of Wi-Fi Hotspot based Android Data Clone Services. ACSAC 2020: 320-331 - [c616]Ankush Singla, Elisa Bertino, Dinesh C. Verma:
Preparing Network Intrusion Detection Deep Learning Models with Minimal Data Using Adversarial Domain Adaptation. AsiaCCS 2020: 127-140 - [c615]Elisa Bertino, Anoop Singhal, Srivathsan Srinivasagopalan, Rakesh M. Verma:
Developing A Compelling Vision for Winning the Cybersecurity Arms Race. CODASPY 2020: 220-222 - [c614]Amani Abu Jabal, Elisa Bertino, Jorge Lobo, Mark Law, Alessandra Russo, Seraphin B. Calo, Dinesh C. Verma:
Polisma - A Framework for Learning Attribute-Based Access Control Policies. ESORICS (1) 2020: 523-544 - [c613]Xun Yi, Russell Paulet, Elisa Bertino, Fang-Yu Rao:
Practical Anonymous Subscription with Revocation Based on Broadcast Encryption. ICDE 2020: 241-252 - [c612]Daren Fadolalkarim, Elisa Bertino, Asmaa Sallam:
An Anomaly Detection System for the Protection of Relational Database Systems against Data Leakage by Application Programs. ICDE 2020: 265-276 - [c611]Shagufta Mehnaz, Elisa Bertino:
Privacy-preserving Real-time Anomaly Detection Using Edge Computing. ICDE 2020: 469-480 - [c610]Jorge Lobo, Elisa Bertino, Alessandra Russo:
On Security Policy Migrations. SACMAT 2020: 179-188 - [c609]Weicheng Wang, Fabrizio Cicala, Syed Rafiul Hussain, Elisa Bertino, Ninghui Li:
Analyzing the attack landscape of Zigbee-enabled IoT systems and reinstating users' privacy. WISEC 2020: 133-143 - [e69]Xingming Sun, Jinwei Wang
, Elisa Bertino
:
Artificial Intelligence and Security - 6th International Conference, ICAIS 2020, Hohhot, China, July 17-20, 2020, Proceedings, Part I. Lecture Notes in Computer Science 12239, Springer 2020, ISBN 978-3-030-57883-1 [contents] - [e68]Xingming Sun, Jinwei Wang
, Elisa Bertino
:
Artificial Intelligence and Security - 6th International Conference, ICAIS 2020, Hohhot, China, July 17-20, 2020, Proceedings, Part II. Lecture Notes in Computer Science 12240, Springer 2020, ISBN 978-3-030-57880-0 [contents] - [i24]Elisa Bertino, Syed Rafiul Hussain, Omar Chowdhury:
5G Security and Privacy: A Research Roadmap. CoRR abs/2003.13604 (2020) - [i23]Amani Abu Jabal, Elisa Bertino, Jorge Lobo, Dinesh Verma, Seraphin B. Calo, Alessandra Russo:
FLAP - A Federated Learning Framework for Attribute-based Access Control Policies. CoRR abs/2010.09767 (2020) - [i22]Shagufta Mehnaz, Ninghui Li, Elisa Bertino:
Black-box Model Inversion Attribute Inference Attacks on Classification Models. CoRR abs/2012.03404 (2020) - [i21]Elisa Bertino, Sujata Banerjee:
Artificial Intelligence at the Edge. CoRR abs/2012.05410 (2020) - [i20]Elisa Bertino, Finale Doshi-Velez, Maria L. Gini, Daniel Lopresti, David Parkes:
Artificial Intelligence & Cooperation. CoRR abs/2012.06034 (2020) - [i19]Fabrizio Cicala, Weicheng Wang, Tianhao Wang, Ninghui Li, Elisa Bertino, Faming Liang, Yang Yang:
PURE: A Framework for Analyzing Proximity-based Contact Tracing Protocols. CoRR abs/2012.09520 (2020)
2010 – 2019
- 2019
- [j343]Rih-Teng Wu
, Ankush Singla, Mohammad R. Jahanshahi, Elisa Bertino, Bongjun Ko, Dinesh C. Verma:
Pruning deep convolutional neural networks for efficient edge computing in condition assessment of infrastructures. Comput. Aided Civ. Infrastructure Eng. 34(9): 774-789 (2019) - [j342]Daren Fadolalkarim, Elisa Bertino:
A-PANDDE: Advanced Provenance-based ANomaly Detection of Data Exfiltration. Comput. Secur. 84: 276-287 (2019) - [j341]Elisa Bertino
, Shawn Merrill, Alina Nesen, Christine Utz
:
Redefining Data Transparency: A Multidimensional Approach. Computer 52(1): 16-26 (2019) - [j340]Ankush Singla
, Elisa Bertino
:
How Deep Learning Is Making Information Security More Intelligent. IEEE Secur. Priv. 17(3): 56-65 (2019) - [j339]Elisa Bertino
:
It Takes a Village to Secure Cellular Networks. IEEE Secur. Priv. 17(5): 96-95 (2019) - [j338]Fenghua Li, Hui Li, Cong Wang, Kui Ren, Elisa Bertino:
Guest Editorial Special Issue on Security and Privacy Protection for Big Data and IoT. IEEE Internet Things J. 6(2): 1446-1449 (2019) - [j337]Elisa Bertino, Ashish Kundu, Zehra Sura:
Data Transparency with Blockchain and AI Ethics. ACM J. Data Inf. Qual. 11(4): 16:1-16:8 (2019) - [j336]Fang-Yu Rao
, Elisa Bertino
:
Privacy Techniques for Edge Computing Systems. Proc. IEEE 107(8): 1632-1654 (2019) - [j335]Abubakar Sadiq Sani
, Dong Yuan, Wei Bao
, Zhao Yang Dong
, Branka Vucetic
, Elisa Bertino
:
Universally Composable Key Bootstrapping and Secure Communication Protocols for the Energy Internet. IEEE Trans. Inf. Forensics Secur. 14(8): 2113-2127 (2019) - [j334]Fang-Yu Rao, Jianneng Cao, Elisa Bertino, Murat Kantarcioglu:
Hybrid Private Record Linkage: Separating Differentially Private Synopses from Matching Records. ACM Trans. Priv. Secur. 22(3): 15:1-15:36 (2019) - [j333]Jongho Won
, Elisa Bertino
:
Robust Sensor Localization against Known Sensor Position Attacks. IEEE Trans. Mob. Comput. 18(12): 2954-2967 (2019) - [c608]Mark Law, Alessandra Russo, Elisa Bertino, Krysia Broda, Jorge Lobo:
Representing and Learning Grammars in Answer Set Programming. AAAI 2019: 2919-2928 - [c607]Siqi Ma, Runhan Feng, Juanru Li, Yang Liu, Surya Nepal
, Diethelm Ostry, Elisa Bertino, Robert H. Deng
, Zhuo Ma, Sanjay Jha:
An empirical study of SMS one-time password authentication in Android apps. ACSAC 2019: 339-354 - [c606]Imtiaz Karim, Fabrizio Cicala, Syed Rafiul Hussain, Omar Chowdhury, Elisa Bertino:
Opening Pandora's box through ATFuzzer: dynamic analysis of AT interface for Android smartphones. ACSAC 2019: 529-543 - [c605]Luca Cappelletti, Stefano Valtolina, Giorgio Valentini, Marco Mesiti, Elisa Bertino:
On the Quality of Classification Models for Inferring ABAC Policies from Access Logs. BigData 2019: 4000-4007 - [c604]Daniel Cunnington, Mark Law, Alessandra Russo, Elisa Bertino, Seraphin B. Calo:
Towards a Neural-Symbolic Generative Policy Model. BigData 2019: 4008-4016 - [c603]Maryam Davari, Elisa Bertino:
Access Control Model Extensions to Support Data Privacy Protection based on GDPR. BigData 2019: 4017-4024 - [c602]Dinesh C. Verma, Seraphin B. Calo, Elisa Bertino, Alessandra Russo, Graham White:
Policy based Ensembles for applying ML on Big Data. BigData 2019: 4038-4044 - [c601]Anand Mudgerikar, Puneet Sharma, Elisa Bertino:
E-Spion: A System-Level Intrusion Detection System for IoT Devices. AsiaCCS 2019: 493-500 - [c600]Syed Rafiul Hussain, Mitziu Echeverria, Imtiaz Karim, Omar Chowdhury, Elisa Bertino:
5GReasoner: A Property-Directed Security and Privacy Analysis Framework for 5G Cellular Network Protocol. CCS 2019: 669-684 - [c599]Huan Yang, Tianyuan Liu, Yuqing Sun, Elisa Bertino:
Exploring The Interaction Effects for Temporal Spatial Behavior Prediction. CIKM 2019: 2013-2022 - [c598]Asmaa Sallam, Elisa Bertino:
Result-Based Detection of Insider Threats to Relational Databases. CODASPY 2019: 133-143 - [c597]Elisa Bertino:
IoT Security A Comprehensive Life Cycle Framework. CIC 2019: 196-203 - [c596]Syed Rafiul Hussain, Shahriar Nirjon, Elisa Bertino:
Securing the Insecure Link of Internet-of-Things Using Next-Generation Smart Gateways. DCOSS 2019: 66-73 - [c595]Xun Yi, Kwok-Yan Lam, Elisa Bertino, Fang-Yu Rao:
Location Privacy-Preserving Mobile Crowd Sensing with Anonymous Reputation. ESORICS (2) 2019: 387-411 - [c594]Siqi Ma, Elisa Bertino, Surya Nepal
, Juanru Li, Diethelm Ostry, Robert H. Deng, Sanjay Jha:
Finding Flaws from Password Authentication Code in Android Apps. ESORICS (1) 2019: 619-637 - [c593]Dinesh C. Verma, Seraphin B. Calo, Elisa Bertino, Geeth de Mel, Mudhakar Srivatsa:
Generating Client Side Policies for Cyber-Physical Safety. ICCCN 2019: 1-8 - [c592]Elisa Bertino, Graham White, Jorge Lobo
, John Ingham, Gregory H. Cirincione, Alessandra Russo, Mark Law, Seraphin B. Calo, Irene Manotas, Dinesh C. Verma, Amani Abu Jabal, Daniel Cunnington, Geeth de Mel:
Generative Policies for Coalition Systems - A Symbolic Learning Framework. ICDCS 2019: 1590-1600 - [c591]Jian Kang, Dan Lin, Elisa Bertino, Ozan K. Tonguz:
From Autonomous Vehicles to Vehicular Clouds: Challenges of Management, Security and Dependability. ICDCS 2019: 1730-1741 - [c590]Abubakar Sadiq Sani, Dong Yuan, Wei Bao, Phee Lep Yeoh, Zhao Yang Dong, Branka Vucetic
, Elisa Bertino:
Xyreum: A High-Performance and Scalable Blockchain for IIoT Security and Privacy. ICDCS 2019: 1920-1930 - [c589]Graham White, Daniel Cunnington, Mark Law, Elisa Bertino, Geeth de Mel, Alessandra Russo:
A Comparison Between Statistical and Symbolic Learning Approaches for Generative Policy Models. ICMLA 2019: 1314-1321 - [c588]Daniel Cunnington, Irene Manotas, Mark Law, Geeth de Mel, Seraphin B. Calo, Elisa Bertino, Alessandra Russo:
A Generative Policy Model for Connected and Autonomous Vehicles. ITSC 2019: 1558-1565 - [c587]Syed Rafiul Hussain, Mitziu Echeverria, Omar Chowdhury, Ninghui Li, Elisa Bertino:
Privacy Attacks to the 4G and 5G Cellular Paging Protocols Using Side Channel Information. NDSS 2019 - [c586]Ankush Singla, Elisa Bertino, Dinesh C. Verma:
Overcoming the Lack of Labeled Data: Training Intrusion Detection Models Using Transfer Learning. SMARTCOMP 2019: 69-74 - [c585]Dinesh C. Verma, Elisa Bertino, Geeth de Mel, John Melrose:
On the Impact of Generative Policies on Security Metrics. SMARTCOMP 2019: 104-109 - [c584]Valentina Salapura, David Wood, Shonda Adena Witherspoon, Keith Grueneberg, Elisa Bertino, Amani Abu Jabal, Seraphin B. Calo:
Generative Policy Framework for AI Training Data Curation. SMARTCOMP 2019: 475-477 - [c583]Syed Rafiul Hussain, Mitziu Echeverria, Ankush Singla, Omar Chowdhury, Elisa Bertino:
Insecure connection bootstrapping in cellular networks: the root of all evil. WiSec 2019: 1-11 - [c582]Hasini Gunasinghe, Ashish Kundu, Elisa Bertino, Hugo Krawczyk, Suresh Chari, Kapil Singh, Dong Su:
PrivIdEx: Privacy Preserving and Secure Exchange of Digital Identity Assets. WWW 2019: 594-604 - [p12]Antonino Rullo
, Edoardo Serra
, Elisa Bertino, Jorge Lobo
:
Optimal Placement of Security Resources for the Internet of Things. The Internet of Things for Smart Urban Ecosystems 2019: 95-124 - [e67]Elisa Bertino, Carl K. Chang, Peter Chen, Ernesto Damiani, Michael Goul, Katsunori Oyama:
12th IEEE International Conference on Cloud Computing, CLOUD 2019, Milan, Italy, July 8-13, 2019. IEEE 2019, ISBN 978-1-7281-2705-7 [contents] - [e66]Elisa Bertino, Carl K. Chang, Peter Chen, Ernesto Damiani, Michael Goul, Katsunori Oyama:
2019 IEEE International Conference on Services Computing, SCC 2019, Milan, Italy, July 8-13, 2019. IEEE 2019, ISBN 978-1-7281-2720-0 [contents] - [e65]Elisa Bertino, Carl K. Chang, Peter Chen, Ernesto Damiani, Michael Goul, Katsunori Oyama:
2019 IEEE International Congress on Big Data, BigData Congress 2019, Milan, Italy, July 8-13, 2019. IEEE 2019, ISBN 978-1-7281-2772-9 [contents] - [e64]Elisa Bertino, Carl K. Chang, Peter Chen, Ernesto Damiani, Michael Goul, Katsunori Oyama:
3rd IEEE International Conference on Edge Computing, EDGE 2019, Milan, Italy, July 8-13, 2019. IEEE 2019, ISBN 978-1-7281-2708-8 [contents] - [e63]Seraphin B. Calo, Elisa Bertino, Dinesh C. Verma:
Policy-Based Autonomic Data Governance [extended papers from the Second International Workshop on Policy-based Autonomic Data Governance, PADG@ESORICS 2018, September 6, 2018, Barcelona, Spain]. Lecture Notes in Computer Science 11550, Springer 2019, ISBN 978-3-030-17276-3 [contents] - [e62]Xingming Sun, Zhaoqing Pan, Elisa Bertino:
Artificial Intelligence and Security - 5th International Conference, ICAIS 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part I. Lecture Notes in Computer Science 11632, Springer 2019, ISBN 978-3-030-24273-2 [contents] - [e61]Xingming Sun, Zhaoqing Pan, Elisa Bertino:
Artificial Intelligence and Security - 5th International Conference, ICAIS 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part II. Lecture Notes in Computer Science 11633, Springer 2019, ISBN 978-3-030-24264-0 [contents] - [e60]Xingming Sun, Zhaoqing Pan, Elisa Bertino:
Artificial Intelligence and Security - 5th International Conference, ICAIS 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part III. Lecture Notes in Computer Science 11634, Springer 2019, ISBN 978-3-030-24270-1 [contents] - [e59]Xingming Sun, Zhaoqing Pan, Elisa Bertino:
Artificial Intelligence and Security - 5th International Conference, ICAIS 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part IV. Lecture Notes in Computer Science 11635, Springer 2019, ISBN 978-3-030-24267-1 [contents] - [e58]Elisa Bertino, Carl K. Chang, Peter Chen, Ernesto Damiani, Michael Goul, Katsunori Oyama:
2019 IEEE International Congress on Internet of Things, ICIOT 2019, Milan, Italy, July 8-13, 2019. IEEE 2019, ISBN 978-1-7281-2714-9 [contents] - [e57]Elisa Bertino, Carl K. Chang, Peter Chen, Ernesto Damiani, Michael Goul, Katsunori Oyama:
2019 IEEE International Conference on Web Services, ICWS 2019, Milan, Italy, July 8-13, 2019. IEEE 2019, ISBN 978-1-7281-2717-0 [contents] - [e56]Elisa Bertino, Carl K. Chang, Peter Chen, Ernesto Damiani, Michael Goul, Katsunori Oyama:
2019 IEEE International Conference on Cognitive Computing, ICCC 2019, Milan, Italy, July 8-13, 2019. IEEE 2019, ISBN 978-1-7281-2711-8 [contents] - [i18]Dinesh C. Verma, Seraphin B. Calo, Shonda Witherspoon, Elisa Bertino, Amani Abu Jabal, Ananthram Swami, Greg Cirincione, Simon Julier, Graham White, Geeth de Mel, Gavin Pearson:
Federated Learning for Coalition Operations. CoRR abs/1910.06799 (2019) - 2018
- [j332]Elisa Bertino, Valentina Casola
, Aniello Castiglione
, Willy Susilo:
Editorial: Security and privacy protection vs sustainable development. Comput. Secur. 76: 250-251 (2018) - [j331]Oyindamola Oluwatimi, Maria Luisa Damiani, Elisa Bertino:
A context-aware system to secure enterprise content: Incorporating reliability specifiers. Comput. Secur. 77: 162-178 (2018) - [j330]Amani Abu Jabal, Elisa Bertino:
A Comprehensive Query Language for Provenance Information. Int. J. Cooperative Inf. Syst. 27(3): 1850007:1-1850007:22 (2018) - [j329]Elisa Bertino, Mohammad R. Jahanshahi:
Adaptive and Cost-Effective Collection of High-Quality Data for Critical Infrastructure and Emergency Management in Smart Cities - Framework and Challenges. ACM J. Data Inf. Qual. 10(1): 1:1-1:6 (2018) - [j328]Elisa Bertino, Amani Abu Jabal, Seraphin B. Calo, Dinesh C. Verma, Christopher Williams:
The Challenge of Access Control Policies Quality. ACM J. Data Inf. Qual. 10(2): 6:1-6:6 (2018) - [j327]Jian Kang, Dan Lin, Wei Jiang, Elisa Bertino:
Highly efficient randomized authentication in VANETs. Pervasive Mob. Comput. 44: 31-44 (2018) - [j326]Sorin Adam Matei, Amani Abu Jabal
, Elisa Bertino:
Social-collaborative determinants of content quality in online knowledge production systems: comparing Wikipedia and Stack Overflow. Soc. Netw. Anal. Min. 8(1): 36:1-36:16 (2018) - [j325]Bahman Rashidi
, Carol J. Fung, Anh Nguyen, Tam Vu, Elisa Bertino:
Android User Privacy Preserving Through Crowdsourcing. IEEE Trans. Inf. Forensics Secur. 13(3): 773-787 (2018) - [j324]Hasini Gunasinghe
, Elisa Bertino
:
PrivBioMTAuth: Privacy Preserving Biometrics-Based and User Centric Protocol for User Authentication From Mobile Phones. IEEE Trans. Inf. Forensics Secur. 13(4): 1042-1057 (2018) - [j323]Muhammad Umer Arshad
, Ashish Kundu, Elisa Bertino
, Arif Ghafoor
, Chinmay Kundu:
Efficient and Scalable Integrity Verification of Data and Query Results for Graph Databases. IEEE Trans. Knowl. Data Eng. 30(5): 866-879 (2018) - [j322]Syed Rafiul Hussain
, Shagufta Mehnaz, Shahriar Nirjon, Elisa Bertino
:
Secure Seamless Bluetooth Low Energy Connection Migration for Unmodified IoT Devices. IEEE Trans. Mob. Comput. 17(4): 927-944 (2018) - [j321]Mohsen Rezvani, Aleksandar Ignjatovic, Elisa Bertino:
A Provenance-Aware Multi-dimensional Reputation System for Online Rating Systems. ACM Trans. Internet Techn. 18(4): 55:1-55:20 (2018) - [j320]Xianqi Yu, Yuqing Sun, Elisa Bertino, Xin Li:
Modeling User Intrinsic Characteristic on Social Media for Identity Linkage. ACM Trans. Soc. Comput. 1(3): 11:1-11:25 (2018) - [c581]Oyindamola Oluwatimi, Elisa Bertino:
A Multi-Enterprise Containerization Approach with an Interoperable Position-Based System. CODASPY 2018: 256-266 - [c580]Ankush Singla, Elisa Bertino:
Blockchain-Based PKI Solutions for IoT. CIC 2018: 9-15 - [c579]Jongho Won, Elisa Bertino:
Securing Mobile Data Collectors by Integrating Software Attestation and Encrypted Data Repositories. CIC 2018: 26-35 - [c578]Asmaa Sallam, Elisa Bertino:
Detection of Temporal Data Ex-Filtration Threats to Relational Databases. CIC 2018: 146-155 - [c577]Antonino Rullo
, Elisa Bertino, Domenico Saccà:
PAST: Protocol-Adaptable Security Tool for Heterogeneous IoT Ecosystems. DSC 2018: 1-8 - [c576]Seraphin B. Calo, Irene Manotas, Geeth de Mel, Daniel Cunnington, Mark Law, Dinesh C. Verma, Alessandra Russo, Elisa Bertino:
AGENP: An ASGrammar-based GENerative Policy Framework. PADG@ESORICS 2018: 3-20 - [c575]Dinesh C. Verma, Seraphin B. Calo, Shonda Witherspoon, Irene Manotas, Elisa Bertino, Amani M. Abu Jabal, Greg Cirincione, Ananthram Swami, Gavin Pearson, Geeth de Mel:
Self-Generating Policies for Machine Learning in Coalition Environments. PADG@ESORICS 2018: 42-65 - [c574]Sorin Adam Matei, Elisa Bertino:
Can N-Version Decision-Making Prevent the Rebirth of HAL 9000 in Military Camo? Using a "Golden Rule" Threshold to Prevent AI Mission Individuation. PADG@ESORICS 2018: 69-81 - [c573]Asmaa Sallam, Elisa Bertino:
Techniques and Systems for Anomaly Detection in Database Systems. PADG@ESORICS 2018: 113-133 - [c572]Elisa Bertino, Dinesh C. Verma, Seraphin B. Calo:
A Policy System for Control of Data Fusion Processes and Derived Data. FUSION 2018: 807-813 - [c571]Greg Cirincione, Dinesh C. Verma, Elisa Bertino, Ananthram Swami:
Security Issues for Distributed Fusion in Coalition Environments. FUSION 2018: 830-837 - [c570]Xianqi Yu, Yuqing Sun, Elisa Bertino, Xin Li:
Modeling User Intrinsic Characteristic on Social Media for Identity Linkage. GROUP 2018: 39-50 - [c569]Fang-Yu Rao, Gabriel Ghinita, Elisa Bertino:
Hybrid Differentially-Private String Matching. ICDCS 2018: 478-488 - [c568]Seraphin B. Calo, Dinesh C. Verma, Elisa Bertino, John Ingham, Gregory H. Cirincione:
How to Prevent Skynet from Forming (A Perspective from Policy-Based Autonomic Device Management). ICDCS 2018: 1369-1376 - [c567]Muhammad Umer Arshad, Ashish Kundu, Elisa Bertino, Arif Ghafoor, Chinmay Kundu:
Efficient and Scalable Integrity Verification of Data and Query Results for Graph Databases. ICDE 2018: 1821-1822 - [c566]Arash Shaghaghi, Salil S. Kanhere, Mohamed Ali Kâafar
, Elisa Bertino, Sanjay Jha:
Gargoyle: A Network-based Insider Attack Resilient Framework for Organizations. LCN 2018: 553-561 - [c565]Xun Yi, Fang-Yu Rao, Gabriel Ghinita, Elisa Bertino:
Privacy-Preserving Spatial Crowdsourcing Based on Anonymous Credentials. MDM 2018: 187-196 - [c564]Jongho Won, Ankush Singla, Elisa Bertino, Greg Bollella:
Decentralized Public Key Infrastructure for Internet-of-Things. MILCOM 2018: 907-913 - [c563]Syed Rafiul Hussain, Omar Chowdhury, Shagufta Mehnaz, Elisa Bertino:
LTEInspector: A Systematic Approach for Adversarial Testing of 4G LTE. NDSS 2018 - [c562]Mortada Al-Banna, Boualem Benatallah, Daniel Schlagwein, Elisa Bertino, Moshe Chai Barukh:
Friendly Hackers to the Rescue: How Organizations Perceive Crowdsourced Vulnerability Discovery. PACIS 2018: 230 - [c561]Shagufta Mehnaz, Anand Mudgerikar, Elisa Bertino:
RWGuard: A Real-Time Detection System Against Cryptographic Ransomware. RAID 2018: 114-136 - [c560]Seraphin B. Calo, Dinesh C. Verma, Supriyo Chakraborty, Elisa Bertino, Emil Lupu, Gregory H. Cirincione:
Self-Generation of Access Control Policies. SACMAT 2018: 39-47 - [c559]Elisa Bertino, Mohamed Nabeel:
Securing Named Data Networks: Challenges and the Way Forward. SACMAT 2018: 51-59 - [c558]Dan Thomsen, Elisa Bertino:
Network Policy Enforcement Using Transactions: The NEUTRON Approach. SACMAT 2018: 129-136 - [c557]Bhavani M. Thuraisingham, Murat Kantarcioglu, Elisa Bertino, Jonathan Z. Bakdash, Maribel Fernández:
Towards a Privacy-Aware Qunatified Self Data Management Framework. SACMAT 2018: 173-184 - [c556]Maryam Davari, Elisa Bertino:
Reactive Access Control Systems. SACMAT 2018: 205-207 - [p11]Elisa Bertino, Elena Ferrari:
Big Data Security and Privacy. A Comprehensive Guide Through the Italian Database Research 2018: 425-439 - [e55]Xingming Sun, Zhaoqing Pan, Elisa Bertino:
Cloud Computing and Security - 4th International Conference, ICCCS 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part I. Lecture Notes in Computer Science 11063, Springer 2018, ISBN 978-3-030-00005-9 [contents] - [e54]Xingming Sun, Zhaoqing Pan, Elisa Bertino:
Cloud Computing and Security - 4th International Conference, ICCCS 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part II. Lecture Notes in Computer Science 11064, Springer 2018, ISBN 978-3-030-00008-0 [contents]