Suresh Chari

According to our database1, Suresh Chari authored at least 49 papers between 1991 and 2016.

Collaborative distances :

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2016
Passive security intelligence to analyze the security risks of mobile/BYOD activities.
IBM Journal of Research and Development, 2016

Security 360°: Enterprise security for the cognitive era.
IBM Journal of Research and Development, 2016

Data classification and sensitivity estimation for critical asset discovery.
IBM Journal of Research and Development, 2016

A platform and analytics for usage and entitlement analytics.
IBM Journal of Research and Development, 2016

Tri-Modularization of Firewall Policies.
Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies, 2016

Graph Analytics for Real-Time Scoring of Cross-Channel Transactional Fraud.
Proceedings of the Financial Cryptography and Data Security, 2016

Comparing Password Ranking Algorithms on Real-World Password Datasets.
Proceedings of the Computer Security - ESORICS 2016, 2016

Android malware development on public malware scanning platforms: A large-scale data-driven study.
Proceedings of the 2016 IEEE International Conference on Big Data, 2016

DinTucker: Scaling Up Gaussian Process Models on Large Multidimensional Arrays.
Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence, 2016

2015
Learning from Others: User Anomaly Detection Using Anomalous Samples from Other Users.
Proceedings of the Computer Security - ESORICS 2015, 2015

2014
PAKDD'12 best paper: generating balanced classifier-independent training samples from unlabeled data.
Knowl. Inf. Syst., 2014

Hetero-Labeled LDA: A Partially Supervised Topic Model with Heterogeneous Labels.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2014

Detecting Insider Information Theft Using Features from File Access Logs.
Proceedings of the Computer Security - ESORICS 2014, 2014

2013
IBM POWER7+ processor on-chip accelerators for cryptography and active memory expansion.
IBM Journal of Research and Development, 2013

DinTucker: Scaling up Gaussian process models on multidimensional arrays with billions of elements.
CoRR, 2013

Ensuring continuous compliance through reconciling policy with usage.
Proceedings of the 18th ACM Symposium on Access Control Models and Technologies, 2013

A bigData platform for analytics on access control policies and logs.
Proceedings of the 18th ACM Symposium on Access Control Models and Technologies, 2013

2012
Generative models for access control policies: applications to role mining over logs with attribution.
Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, 2012

Practical risk aggregation in RBAC models.
Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, 2012

Generating Balanced Classifier-Independent Training Samples from Unlabeled Data.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2012

2011
Universally Composable Security Analysis of OAuth v2.0.
IACR Cryptology ePrint Archive, 2011

System for automatic estimation of data sensitivity with applications to access control and other applications.
Proceedings of the 16th ACM Symposium on Access Control Models and Technologies, 2011

Adversaries' Holy Grail: access control analytics.
Proceedings of the First Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, 2011

Composable Security Analysis of OS Services.
Proceedings of the Applied Cryptography and Network Security, 2011

2010
Composable Security Analysis of OS Services.
IACR Cryptology ePrint Archive, 2010

Where Do You Want to Go Today? Escalating Privileges by Pathname Manipulation.
Proceedings of the Network and Distributed System Security Symposium, 2010

Designing a Side Channel Resistant Random Number Generator.
Proceedings of the Smart Card Research and Advanced Application, 2010

2008
SMash: secure component model for cross-domain mashups on unmodified browsers.
Proceedings of the 17th International Conference on World Wide Web, 2008

2007
Improving the resilience of content distribution networks to large scale distributed denial of service attacks.
Computer Networks, 2007

2005
Protecting content distribution networks from denial of service attacks.
Proceedings of IEEE International Conference on Communications, 2005

2003
BlueBoX: A policy-driven, host-based intrusion detection system.
ACM Trans. Inf. Syst. Secur., 2003

2002
BlueBox: A Policy-Driven, Host-Based Intrusion Detection System.
Proceedings of the Network and Distributed System Security Symposium, 2002

Authentication for Distributed Web Caches.
Proceedings of the Computer Security, 2002

Template Attacks.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2002

2001
Security Issues in M-Commerce: A Usage-Based Taxonomy.
Proceedings of the E-Commerce Agents, 2001

2000
Improved Algorithms via Approximations of Probability Distributions.
J. Comput. Syst. Sci., 2000

1999
Towards Sound Approaches to Counteract Power-Analysis Attacks.
Proceedings of the Advances in Cryptology, 1999

1996
On Completeness Under Random Reductions.
J. Comput. Syst. Sci., 1996

1995
Randomness-Optimal Unique Element Isolation with Applications to Perfect Matching and Related Problems.
SIAM J. Comput., 1995

On the Impossibility of Amplifying the Independence of Random Variables.
Random Struct. Algorithms, 1995

1994
Improved algorithms via approximations of probability distributions (extended abstract).
Proceedings of the Twenty-Sixth Annual ACM Symposium on Theory of Computing, 1994

On the Intellectual Terrain Around NP.
Proceedings of the Algorithms and Complexity, Second Italian Conference, 1994

1993
Relativization: a Revisionistic Retrospective.
Proceedings of the Current Trends in Theoretical Computer Science - Essays and Tutorials, 1993

Improving Known Solutions is Hard.
Computational Complexity, 1993

Randomness-optimal unique element isolation, with applications to perfect matching and related problems.
Proceedings of the Twenty-Fifth Annual ACM Symposium on Theory of Computing, 1993

On Completeness under Random Reductions.
Proceedings of the Eigth Annual Structure in Complexity Theory Conference, 1993

1992
Relativization: a revisionistic retrospective.
Bulletin of the EATCS, 1992

On the Complexity of Incremental Computation.
Proceedings of the Mathematical Foundations of Computer Science 1992, 1992

1991
Improving Known Solutions is Hard.
Proceedings of the Automata, Languages and Programming, 18th International Colloquium, 1991


  Loading...