If you made any changes in Pure these will be visible here soon.

Fingerprint Fingerprint is based on mining the text of the expert's scholarly documents to create an index of weighted terms, which defines the key subjects of each individual researcher.

  • 2 Similar Profiles
Access control Engineering & Materials Science
Semantics Engineering & Materials Science
Active networks Engineering & Materials Science
Network protocols Engineering & Materials Science
Specifications Engineering & Materials Science
Servers Engineering & Materials Science
Monitoring Engineering & Materials Science
Application programs Engineering & Materials Science

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output 1985 2018

Evaluating Detectors on Optimal Attack Vectors that enable Electricity Theft and DER Fraud

Badrinath Krishna, V., Gunter, C. & Sanders, W. H., May 4 2018, (Accepted/In press) In : IEEE Journal on Selected Topics in Signal Processing.

Research output: Contribution to journalArticle

Electricity
Detectors
Energy resources
Advanced metering infrastructures
Smart meters

HanGuard: SDN-driven protection of smart home WiFi devices from malicious mobile apps

Demetriou, S., Zhang, N., Lee, Y., Wang, X., Gunter, C. A., Zhou, X. & Grace, M., Jul 18 2017, Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2017. Association for Computing Machinery, Inc, p. 122-133 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Application programs
Routers
Wi-Fi
Computer hardware
Cryptography

Leaky cauldron on the dark land: Understanding memory side-channel hazards in SGX

Wang, W., Chen, G., Pan, X., Zhang, Y., Wang, X. F., Bindschaedler, V., Tang, H. & Gunter, C. A., Oct 30 2017, CCS 2017 - Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 2421-2434 14 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Dynamic random access storage
Hazards
Data storage equipment
Monitoring
Side channel attack

Malware detection in adversarial settings: Exploiting feature evolutions and confusions in android apps

Yang, W., Kong, D., Xie, T. & Gunter, C. A., Dec 4 2017, Proceedings - 33rd Annual Computer Security Applications Conference, ACSAC 2017. Association for Computing Machinery, Vol. Part F132521, p. 288-302 15 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Application programs
Android (operating system)
Malware
Semantics

Mining on someone else’s dime: Mitigating covert mining operations in clouds and enterprises

Tahir, R., Huzaifa, M., Das, A., Ahmad, M., Gunter, C., Zaffar, F., Caesar, M. & Borisov, N., Jan 1 2017, Research in Attacks, Intrusions, and Defenses - 20th International Symposium, RAID 2017, Proceedings. Polychronakis, M., Antonakakis, M., Dacier, M. & Bailey, M. (eds.). Springer-Verlag, p. 287-310 24 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10453 LNCS)

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Mining
Miners
Industry
Program processors
Virtualization