Nabil Schear

According to our database1, Nabil Schear authored at least 21 papers between 2006 and 2021.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2021
Lessons Learned From Designing a Security Architecture for Real-World Government Agencies.
IEEE Secur. Priv., 2021

2019
Supporting Security Sensitive Tenants in a Bare-Metal Cloud.
Proceedings of the 2019 USENIX Annual Technical Conference, 2019

2018
A Secure Cloud with Minimal Provider Trust.
Proceedings of the 10th USENIX Workshop on Hot Topics in Cloud Computing, 2018

2017
Transparent Web Service Auditing via Network Provenance Functions.
Proceedings of the 26th International Conference on World Wide Web, 2017

Automated Provenance Analytics: A Regular Grammar Based Approach with Applications in Security.
Proceedings of the 9th USENIX Workshop on the Theory and Practice of Provenance, 2017

Cloud computing in tactical environments.
Proceedings of the 2017 IEEE Military Communications Conference, 2017

2016
Cryptography for Big Data Security.
IACR Cryptol. ePrint Arch., 2016

Retrofitting Applications with Provenance-Based Security Monitoring.
CoRR, 2016

Leveraging Data Provenance to Enhance Cyber Resilience.
Proceedings of the IEEE Cybersecurity Development, 2016

Secure Multiparty Computation for Cooperative Cyber Risk Assessment.
Proceedings of the IEEE Cybersecurity Development, 2016

Bootstrapping and maintaining trust in the cloud.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016

2015
Spyglass: Demand-Provisioned Linux Containers for Private Network Access.
Proceedings of the 29th Large Installation System Administration Conference, 2015

2014
A survey of cryptographic approaches to securing big-data analytics in the cloud.
Proceedings of the IEEE High Performance Extreme Computing Conference, 2014

Computing on masked data: a high performance method for improving big data veracity.
Proceedings of the IEEE High Performance Extreme Computing Conference, 2014

2012
Website Detection Using Remote Traffic Analysis.
Proceedings of the Privacy Enhancing Technologies - 12th International Symposium, 2012

2010
Neon: system support for derived data management.
Proceedings of the 6th International Conference on Virtual Execution Environments, 2010

2009
Models of Privacy Preserving Traffic Tunneling.
Simul., 2009

MAVMM: Lightweight and Purpose Built VMM for Malware Analysis.
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009

2008
High-Speed Matching of Vulnerability Signatures.
Proceedings of the Recent Advances in Intrusion Detection, 11th International Symposium, 2008

Performance Analysis of Real Traffic Carried with Encrypted Cover Flows.
Proceedings of the 22st International Workshop on Principles of Advanced and Distributed Simulation, 2008

2006
Glavlit: Preventing Exfiltration at Wire Speed.
Proceedings of the 5th ACM Workshop on Hot Topics in Networks, 2006


  Loading...