Abraham Jibi
Orcid: 0000-0002-2807-9967
According to our database1,
Abraham Jibi
authored at least 20 papers
between 2007 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2023
Proceedings of the 14th International Conference on Computing Communication and Networking Technologies, 2023
Techniques for Privacy-Preserving Data Aggregation in an Untrusted Distributed Environment.
Proceedings of the 6th Joint International Conference on Data Science & Management of Data (10th ACM IKDD CODS and 28th COMAD), 2023
2022
Secure cloud model for intellectual privacy protection of arithmetic expressions in source codes using data obfuscation techniques.
Theor. Comput. Sci., 2022
2021
Cost-based recommendation of parameters for local differentially private data aggregation.
Comput. Secur., 2021
Selection and Verification of Privacy Parameters for Local Differentially Private Data Aggregation.
Proceedings of the ICISDM 2021: 2021 the 5th International Conference on Information System and Data Mining, Silicon Valley, CA, USA, May 27, 2021
2018
Perceive Core Logical Blocks of a C Program Automatically for Source Code Transformations.
Proceedings of the Intelligent Systems Design and Applications, 2018
A LLC-based DoS Attack Technique on Virtualization System with Detection and Prevention Model.
Proceedings of the 2018 International Conference on Advances in Computing, 2018
Proceedings of the 15th IEEE Annual Consumer Communications & Networking Conference, 2018
2015
Entropy Based Detection And Behavioral Analysis Of Hybrid Covert Channeling Secured Communication.
CoRR, 2015
Optimizing response time and synchronization in User Virtualization via adaptive memory compression.
Proceedings of the 2015 International Conference on Advances in Computing, 2015
Proceedings of the 2015 International Conference on Advances in Computing, 2015
2014
Int. J. Cloud Comput., 2014
Dynamic Selection of Symmetric Key Cryptographic Algorithms for Securing Data Based on Various Parameters.
CoRR, 2014
2011
2010
Proceedings of the Recent Trends in Network Security and Applications, 2010
2009
Energy-efficient relaxed rekeying policies for distributed key management in sensor networks.
Int. J. Ad Hoc Ubiquitous Comput., 2009
Design of Energy Efficient Scheme for Conducting Secure E-Class Application on MANET.
Proceedings of the First International Conference on Computational Intelligence, 2009
2008
Energy Efficient Key Management Protocols to Securely Confirm Intrusion Detection in Wireless Sensor Networks.
Proceedings of the Wireless Sensor and Actor Networks II, 2008
Estimation of communication overhead during Pair-wise key establishment in wireless sensor networks.
Proceedings of the 16th International Conference on Networks, 2008
2007
A Complete Set of Protocols for Distributed Key Management in Clustered Wireless Sensor Networks.
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007