Rashid Tahir

Orcid: 0000-0002-5888-0050

According to our database1, Rashid Tahir authored at least 22 papers between 2011 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
WASEF: Web Acceleration Solutions Evaluation Framework.
CoRR, 2023

2022
An internet of secure and private things: A service-oriented architecture.
Comput. Secur., 2022

FORTIFY: Software Defined Data Plane Resilience.
Proceedings of the IEEE Conference on Network Function Virtualization and Software Defined Networks, 2022

Forensic Analysis of Configuration-based Attacks.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

PACED: Provenance-based Automated Container Escape Detection.
Proceedings of the IEEE International Conference on Cloud Engineering, 2022

2021
Making Honey Files Sweeter: SentryFS - A Service-Oriented Smart Ransomware Solution.
CoRR, 2021

Poster Abstract: BounceBack - A DDoS Attack Using Unsuspecting Accomplices in the Network.
Proceedings of the 2021 IEEE Conference on Computer Communications Workshops, 2021

Seeing is Believing: Exploring Perceptual Differences in DeepFake Videos.
Proceedings of the CHI '21: CHI Conference on Human Factors in Computing Systems, 2021

Accelerating Fourier and Number Theoretic Transforms using Tensor Cores and Warp Shuffles.
Proceedings of the 30th International Conference on Parallel Architectures and Compilation Techniques, 2021

2019
The Browsers Strike Back: Countering Cryptojacking and Parasitic Miners on the Web.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

Poster Abstract: Guardian - A Smart Cloud Fabric for Virtual Patching and Customized Defenses.
Proceedings of the IEEE INFOCOM 2019, 2019

Bringing the kid back into YouTube kids: detecting inappropriate content on video streaming platforms.
Proceedings of the ASONAM '19: International Conference on Advances in Social Networks Analysis and Mining, 2019

2018
Proactive abuse prevention in clouds
PhD thesis, 2018

Using SGX-Based Virtual Clones for IoT Security.
Proceedings of the 17th IEEE International Symposium on Network Computing and Applications, 2018

It's All in the Name: Why Some URLs are More Vulnerable to Typosquatting.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

2017
Mining on Someone Else's Dime: Mitigating Covert Mining Operations in Clouds and Enterprises.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2017

An Anomaly Detection Fabric for Clouds Based on Collaborative VM Communities.
Proceedings of the 17th IEEE/ACM International Symposium on Cluster, 2017

2016
Heuristic Approach for Stagnation Free Energy Aware Routing in Wireless Sensor Networks.
Ad Hoc Sens. Wirel. Networks, 2016

To route or to secure: Tradeoffs in ICNs over MANETs.
Proceedings of the 15th IEEE International Symposium on Network Computing and Applications, 2016

Sneak-Peek: High speed covert channels in data center networks.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

2013
Optimized Rollback and Re-computation.
Proceedings of the 46th Hawaii International Conference on System Sciences, 2013

2011
Identifying the provenance of correlated anomalies.
Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21, 2011


  Loading...