Abhrajit Ghosh

According to our database1, Abhrajit Ghosh authored at least 27 papers between 1999 and 2021.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
Computing with time: microarchitectural weird machines.
Proceedings of the ASPLOS '21: 26th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, 2021

2018
Runtime Attestation for IAAS Clouds.
Proceedings of the 8th International Conference on Cloud Computing and Services Science, 2018

2017
ROP Defense in the Cloud through LIve Text Page-level Re-ordering - The LITPR System.
Proceedings of the CLOSER 2017, 2017

2015
Insider attack detection using weak indicators over network flow data.
Proceedings of the 34th IEEE Military Communications Conference, 2015

TREND: Trust estimation system for wireless networks via multi-pronged detection.
Proceedings of the 34th IEEE Military Communications Conference, 2015

Privacy-Preserving Range Queries from Keyword Queries.
Proceedings of the Data and Applications Security and Privacy XXIX, 2015

2014
On the Feasibility of Deploying Software Attestation in Cloud Environments.
Proceedings of the 2014 IEEE 7th International Conference on Cloud Computing, Anchorage, AK, USA, June 27, 2014

2012
TITAN: Integrated network management in tactical mobile ad hoc networks.
Proceedings of the 31st IEEE Military Communications Conference, 2012

On the use of Enhanced Bogon Lists (EBLs) to detect malicious traffic.
Proceedings of the International Conference on Computing, Networking and Communications, 2012

2011
Detecting Anomalies in Active Insider Stepping Stone Attacks.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2011

QAM: A comprehensive QoS-aware Middleware suite for tactical communications.
Proceedings of the MILCOM 2011, 2011

Leveraging social network for predicting demand and estimating available resources for communication network management.
Proceedings of the 12th IFIP/IEEE International Symposium on Integrated Network Management, 2011

2010
Integrated network experimentation for QoS measurements in opaque MANETs.
Int. J. Netw. Manag., 2010

Predicting End-to-end Network Load.
Proceedings of the Ninth International Conference on Machine Learning and Applications, 2010

Constructing Secure Localization Systems with Adjustable Granularity Using Commodity Hardware.
Proceedings of the Global Communications Conference, 2010

2008
Hybrid testbeds for QoS management in opaque MANETS.
Proceedings of the 4th Annual International Conference on Wireless Internet, 2008

An Approach to Secure Localization in WLANs.
Proceedings of the WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008, 2008

2005
Last hop topology sensitive multicasting key managment.
Proceedings of the Q2SWinet'05, 2005

InFilter: Predictive Ingress Filtering to Detect Spoofed IP Traffic.
Proceedings of the 25th International Conference on Distributed Computing Systems Workshops (ICDCS 2005 Workshops), 2005

Towards a Theory of Intrusion Detection.
Proceedings of the Computer Security, 2005

Experimental VoIP capacity measurements for 802.11b WLANs.
Proceedings of the 2nd IEEE Consumer Communications and Networking Conference, 2005

2004
Intrusion Tolerance in Distributed Middleware.
Inf. Syst. Frontiers, 2004

2003
Voice performance in WLAN networks - an experimental study.
Proceedings of the Global Telecommunications Conference, 2003

2002
Service portability of networked appliances.
IEEE Commun. Mag., 2002

Investigation of intrusion tolerance for COTS middleware.
Proceedings of the IEEE International Conference on Communications, 2002

2001
ASP perspectives on networked appliances.
Proceedings of the IEEE International Conference on Communications, 2001

1999
Designing Multiprocessor/Distributed Real-Time Systems Using the ASSERTS Toolkit.
Proceedings of the Euro-Par '99 Parallel Processing, 5th International Euro-Par Conference, Toulouse, France, August 31, 1999


  Loading...