Josyula R. Rao

According to our database1, Josyula R. Rao authored at least 35 papers between 1989 and 2021.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
AI vs. AI: Exploring the Intersections of AI and Cybersecurity.
Proceedings of the IWSPA@CODASPY 2021: ACM Workshop on Security and Privacy Analytics, 2021

2018
Threat Intelligence Computing.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2016
Passive security intelligence to analyze the security risks of mobile/BYOD activities.
IBM J. Res. Dev., 2016

Security 360°: Enterprise security for the cognitive era.
IBM J. Res. Dev., 2016

Data classification and sensitivity estimation for critical asset discovery.
IBM J. Res. Dev., 2016

A platform and analytics for usage and entitlement analytics.
IBM J. Res. Dev., 2016

Security intelligence for cloud management infrastructures.
IBM J. Res. Dev., 2016

Closing the loop: Network and in-host monitoring tandem for comprehensive cloud security visibility.
IBM J. Res. Dev., 2016

BAYWATCH: Robust Beaconing Detection to Identify Infected Hosts in Large-Scale Enterprise Networks.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2016

2014
Stream computing for large-scale, multi-channel cyber threat analytics.
Proceedings of the 15th IEEE International Conference on Information Reuse and Integration, 2014

2013
Practical Comprehensive Bounds on Surreptitious Communication over DNS.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013

2010
Designing a Side Channel Resistant Random Number Generator.
Proceedings of the Smart Card Research and Advanced Application, 2010

2009
Security for the cloud infrastructure: Trusted virtual data center implementation.
IBM J. Res. Dev., 2009

2005
Templates as Master Keys.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2005, 7th International Workshop, Edinburgh, UK, August 29, 2005

2003
Multi-channel Attacks.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2003

2002
Partitioning Attacks: Or How to Rapidly Clone Some GSM Cards.
Proceedings of the 2002 IEEE Symposium on Security and Privacy, 2002

Template Attacks.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2002

The EM Side-Channel(s).
Proceedings of the Cryptographic Hardware and Embedded Systems, 2002

2001
On the role of formal methods in security.
Inf. Process. Lett., 2001

EMpowering Side-Channel Attacks.
IACR Cryptol. ePrint Arch., 2001

Efficient Rijndael Encryption Implementation with Composite Field Arithmetic.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2001

2000
Can Pseudonymity Really Guarantee Privacy?
Proceedings of the 9th USENIX Security Symposium, 2000

An IPSec-based Host Architecture for Secure Internet Multicast.
Proceedings of the Network and Distributed System Security Symposium, 2000

1999
A survey of security issues in multicast communications.
IEEE Netw., 1999

Towards Sound Approaches to Counteract Power-Analysis Attacks.
Proceedings of the Advances in Cryptology, 1999

1997
A Flexible Security System for Using Internet Content.
IEEE Softw., 1997

A Methodology for Designing Proof Rules for Fair Parallel Programs.
Formal Aspects Comput., 1997

A Flexible Security Model for Using Internet Content.
Proceedings of the Sixteenth Symposium on Reliable Distributed Systems, 1997

1996
Eventual Determinism: Using Probabilistic Means to Achieve Deterministic Ends.
Parallel Algorithms Appl., 1996

Experiences with building distributed debuggers.
Proceedings of the SIGMETRICS symposium on Parallel and distributed tools, 1996

1995
Extensions of the UNITY Methodology - Compositionality, Fairness and Probability in Parallelism
Lecture Notes in Computer Science 908, Springer, ISBN: 3-540-59173-7, 1995

1994
Reasoning about Probabilistic Parallel Programs.
ACM Trans. Program. Lang. Syst., 1994

Concert/C: A Language for Distributed Programming.
Proceedings of the USENIX Winter 1994 Technical Conference, 1994

1990
Reasoning About Probabilistic Algorithms.
Proceedings of the Ninth Annual ACM Symposium on Principles of Distributed Computing, 1990

1989
A Predicate Transformer Approach to Semantics of Parallel Programs.
Proceedings of the Eighth Annual ACM Symposium on Principles of Distributed Computing, 1989


  Loading...