Abhinav Srivastava

According to our database1, Abhinav Srivastava authored at least 46 papers between 2003 and 2021.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
Unsignalized Intersection Level of Service: A Bicyclist's Perspective.
Int. J. Intell. Transp. Syst. Res., 2021

Attendance System with Emotion Detection: A case study with CNN and OpenCV.
Proceedings of the DSMLAI '21: International Conference on Data Science, Machine Learning and Artificial Intelligence, Windhoek Namibia, August 9, 2021

2020
Energy Disaggregation for Small and Medium Businesses and their Operational Characteristics.
Proceedings of the NILM '20, 2020

2019
ShadeNF: Testing Online Network Functions.
Proceedings of the IEEE International Conference on Cloud Engineering, 2019

2018
Peek-a-boo: Inferring program behaviors in a virtualized infrastructure without introspection.
Comput. Secur., 2018

Go Serverless: Securing Cloud via Serverless Design Patterns.
Proceedings of the 10th USENIX Workshop on Hot Topics in Cloud Computing, 2018

ShadeNF: A Platform for Online Network Function Verification.
Proceedings of the ACM Symposium on Cloud Computing, 2018

2017
Bring your own controller: Enabling tenant-defined SDN apps in IaaS clouds.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

CloudSight: A tenant-oriented transparency framework for cross-layer cloud troubleshooting.
Proceedings of the 17th IEEE/ACM International Symposium on Cluster, 2017

2016
Development of mathematical model for signal-dependent linear adaptive level-based sampling.
Int. J. Circuit Theory Appl., 2016

Exploring infrastructure support for app-based services on cloud platforms.
Comput. Secur., 2016

Detecting plagiarized mobile apps using API birthmarks.
Autom. Softw. Eng., 2016

Understanding security group usage in a public IaaS cloud.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

StorM: Enabling Tenant-Defined Cloud Storage Middle-Box Services.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2016

Hardening OpenStack Cloud Platforms against Compute Node Compromises.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

2014
Secgras: Security Group Analysis as a Cloud Service.
Proceedings of the 22nd IEEE International Conference on Network Protocols, 2014

CloudVMI: Virtual Machine Introspection as a Cloud Service.
Proceedings of the 2014 IEEE International Conference on Cloud Engineering, 2014

On the Control Plane of a Self-service Cloud Platform.
Proceedings of the ACM Symposium on Cloud Computing, 2014

On the feasibility of software attacks on commodity virtual machine monitors via direct device assignment.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014

2013
High Performance Adaptive Distributed Scheduling Algorithm.
Proceedings of the 2013 IEEE International Symposium on Parallel & Distributed Processing, 2013

2012
Trusted VM Snapshots in Untrusted Cloud Infrastructures.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2012

High Performance Offline and Online Distributed Collaborative Filtering.
Proceedings of the 12th IEEE International Conference on Data Mining, 2012

Distributed hierarchical co-clustering and collaborative filtering algorithm.
Proceedings of the 19th International Conference on High Performance Computing, 2012

Dynamic Distributed Scheduling Algorithm for State Space Search.
Proceedings of the Euro-Par 2012 Parallel Processing - 18th International Conference, 2012

Towards a richer model of cloud app markets.
Proceedings of the 2012 ACM Workshop on Cloud computing security, 2012

Self-service cloud computing.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

Efficient protection of kernel data structures via object partitioning.
Proceedings of the 28th Annual Computer Security Applications Conference, 2012

2011
Performance driven multi-objective distributed scheduling for parallel computations.
ACM SIGOPS Oper. Syst. Rev., 2011

Efficient Monitoring of Untrusted Kernel-Mode Execution.
Proceedings of the Network and Distributed System Security Symposium, 2011

Affinity Driven Distributed Scheduling Algorithm for Parallel Computations.
Proceedings of the Distributed Computing and Networking - 12th International Conference, 2011

Distributed Scalable Collaborative Filtering Algorithm.
Proceedings of the Euro-Par 2011 Parallel Processing - 17th International Conference, 2011

Operating System Interface Obfuscation and the Revealing of Hidden Operations.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2011

2010
Protecting E-healthcare Client Devices against Malware and Physical Theft.
Proceedings of the 1st USENIX Workshop on Health Security and Privacy, 2010

Automatic Discovery of Parasitic Malware.
Proceedings of the Recent Advances in Intrusion Detection, 13th International Symposium, 2010

Attribution of Malicious Behavior.
Proceedings of the Information Systems Security - 6th International Conference, 2010

2009
Robust signatures for kernel data structures.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

2008
Credit Card Fraud Detection Using Hidden Markov Model.
IEEE Trans. Dependable Secur. Comput., 2008

System Call API Obfuscation (Extended Abstract).
Proceedings of the Recent Advances in Intrusion Detection, 11th International Symposium, 2008

Tamper-Resistant, Application-Aware Blocking of Malicious Network Connections.
Proceedings of the Recent Advances in Intrusion Detection, 11th International Symposium, 2008

Evaluating email's feasibility for botnet command and control.
Proceedings of the 38th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2008

2006
Network-based control with real-time prediction of delayed/lost sensor data.
IEEE Trans. Control. Syst. Technol., 2006

Database Intrusion Detection using Weighted Sequence Mining.
J. Comput., 2006

Weighted Intra-transactional Rule Mining for Database Intrusion Detection.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2006

Flow Aware Differential Delay Routing for next-generation Ethernet over SONET/SDH.
Proceedings of IEEE International Conference on Communications, 2006

2005
Speeding Up Web Access Using Weighted Association Rules.
Proceedings of the Pattern Recognition and Machine Intelligence, 2005

2003
Internet-based supervisory control and stability analysis for time delay.
Proceedings of the American Control Conference, 2003


  Loading...