Bezawada Bruhadeshwar

Orcid: 0000-0002-1021-8121

According to our database1, Bezawada Bruhadeshwar authored at least 49 papers between 2002 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
A Small World-Privacy Preserving IoT Device-Type Fingerprinting with Small Datasets.
Proceedings of the Foundations and Practice of Security - 16th International Symposium, 2023

2022
SHIELD: A Multimodal Deep Learning Framework for Android Malware Detection.
Proceedings of the Information Systems Security - 18th International Conference, 2022

2021
Behavioral fingerprinting of Internet-of-Things devices.
WIREs Data Mining Knowl. Discov., 2021

Directed adversarial sampling attacks on phishing detection.
J. Comput. Secur., 2021

<i>Scaling & fuzzing: </i> Personal image privacy from automated attacks in mobile cloud computing.
J. Inf. Secur. Appl., 2021

MapperDroid: Verifying app capabilities from description to permissions and API calls.
Comput. Secur., 2021

"X-Phish: Days of Future Past"‡: Adaptive & Privacy Preserving Phishing Detection.
Proceedings of the IEEE Conference on Communications and Network Security, 2021

2020
EspyDroid+: Precise reflection analysis of android apps.
Comput. Secur., 2020

2019
Adversarial Sampling Attacks Against Phishing Detection.
Proceedings of the Data and Applications Security and Privacy XXXIII, 2019

AGBuilder: An AI Tool for Automated Attack Graph Building, Analysis, and Refinement.
Proceedings of the Data and Applications Security and Privacy XXXIII, 2019

2018
IoTSense: Behavioral Fingerprinting of IoT Devices.
CoRR, 2018

<i>"Kn0w Thy Doma1n Name"</i>: Unbiased Phishing Detection Using Domain Name Based Features.
Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies, 2018

Independent Key Distribution Protocols for Broadcast Authentication.
Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies, 2018

A Secure Hash Commitment Approach for Moving Target Defense of Security-critical Services.
Proceedings of the 5th ACM Workshop on Moving Target Defense, 2018

Behavioral Fingerprinting of IoT Devices.
Proceedings of the 2018 Workshop on Attacks and Solutions in Hardware Security, 2018

Attribute-Based Encryption: Applications and Future Directions.
Proceedings of the From Database to Cyber Security, 2018

2017
Privacy and Integrity Preserving Top-k Query Processing for Two-Tiered Sensor Networks.
IEEE/ACM Trans. Netw., 2017

Symmetric Key Based Secure Resource Sharing.
Proceedings of the Security in Computing and Communications - 5th International Symposium, 2017

Secure and efficient proof of ownership for deduplicated cloud storage.
Proceedings of the 10th International Conference on Security of Information and Networks, 2017

A template approach for group key distribution in dynamic ad-hoc groups.
Proceedings of the 2017 IFIP Networking Conference, 2017

History-Based Throttling of Distributed Denial-of-Service Attacks.
Proceedings of the E-Business and Telecommunications - 14th International Joint Conference, 2017

2016
Fast and Scalable Range Query Processing With Strong Privacy Protection for Cloud Computing.
IEEE/ACM Trans. Netw., 2016

Topological ordering based iterative TCAM rule compression using bi-partite graphs.
Proceedings of the 24th IEEE International Conference on Network Protocols, 2016

A template approach to group key establishment in dynamic ad-hoc groups.
Proceedings of the 24th IEEE International Conference on Network Protocols, 2016

2015
Privacy-Preserving Quantification of Cross-Domain Network Reachability.
IEEE/ACM Trans. Netw., 2015

Privacy Preserving String Matching for Cloud Computing.
Proceedings of the 35th IEEE International Conference on Distributed Computing Systems, 2015

2014
Fast Range Query Processing with Strong Privacy Protection for Cloud Computing.
Proc. VLDB Endow., 2014

CORP: A Browser Policy to Mitigate Web Infiltration Attacks.
Proceedings of the Information Systems Security - 10th International Conference, 2014

2013
Cross-Domain Privacy-Preserving Cooperative Firewall Optimization.
IEEE/ACM Trans. Netw., 2013

An Improved and Effective Secure Password-Based Authentication and Key Agreement Scheme Using Smart Cards for the Telecare Medicine Information System.
J. Medical Syst., 2013

A Biometric-Based User Authentication Scheme for Heterogeneous Wireless Sensor Networks.
Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops, 2013

2011
Symmetric Key Approaches to Securing BGP - A Little Bit Trust Is Enough.
IEEE Trans. Parallel Distributed Syst., 2011

Balancing Revocation and Storage Trade-Offs in Secure Group Communication.
IEEE Trans. Dependable Secur. Comput., 2011

A cross-domain privacy-preserving protocol for cooperative firewall optimization.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Privacy-preserving cross-domain network reachability quantification.
Proceedings of the 19th annual IEEE International Conference on Network Protocols, 2011

An Oblivious Image Retrieval Protocol.
Proceedings of the 25th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2011

2010
Automatic analysis of distance bounding protocols
CoRR, 2010

Key-update distribution in secure group communication.
Comput. Commun., 2010

A Fully Dynamic and Self-Stabilizing TDMA Scheme for Wireless Ad-hoc Networks.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, 2010

2009
Routing Protocol Security Using Symmetric Key Based Techniques.
Proceedings of the The Forth International Conference on Availability, 2009

Reducing the Cost of Session Key Establishment.
Proceedings of the The Forth International Conference on Availability, 2009

2008
A Family of Collusion Resistant Symmetric Key Protocols for Authentication.
Proceedings of the Distributed Computing and Networking, 9th International Conference, 2008

Signature Generation and Detection of Malware Families.
Proceedings of the Information Security and Privacy, 13th Australasian Conference, 2008

FormatShield: A Binary Rewriting Defense against Format String Attacks.
Proceedings of the Information Security and Privacy, 13th Australasian Conference, 2008

2005
Rekeying and Storage Cost for Multiple User Revocation.
Proceedings of the Network and Distributed System Security Symposium, 2005

A Family of Collusion Resistant Protocols for Instantiating Security.
Proceedings of the 13th IEEE International Conference on Network Protocols (ICNP 2005), 2005

User Revocation in Secure Adhoc Networks.
Proceedings of the Distributed Computing and Internet Technology, 2005

2004
Distributing Key Updates in Secure Dynamic Groups.
Proceedings of the Distributed Computing and Internet Technology, 2004

2002
Reducing the Cost of the Critical Path in Secure Multicast for Dynamic Groups.
Proceedings of the 22nd International Conference on Distributed Computing Systems, 2002


  Loading...