Indrakshi Ray
Orcid: 0000-0002-0714-7676Affiliations:
- Colorado State University, USA
According to our database1,
Indrakshi Ray
authored at least 243 papers
between 1995 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
J. Inf. Secur. Appl., 2024
Exploring gender dynamics in cybersecurity education: A self-determination theory and social cognitive theory perspective.
Comput. Secur., 2024
Proceedings of the 39th ACM/SIGAPP Symposium on Applied Computing, 2024
Proceedings of the 24th IEEE International Conference on Software Quality, 2024
Proceedings of the IEEE International Symposium on Mixed and Augmented Reality Adjunct, 2024
Proceedings of the Data and Applications Security and Privacy XXXVIII, 2024
Tiled Bit Networks: Sub-Bit Neural Network Compression Through Reuse of Learnable Binary Vectors.
Proceedings of the 33rd ACM International Conference on Information and Knowledge Management, 2024
2023
Seeing Should Probably Not Be Believing: The Role of Deceptive Support in COVID-19 Misinformation on Twitter.
ACM J. Data Inf. Qual., March, 2023
Adversarial Autoencoder Data Synthesis for Enhancing Machine Learning-Based Phishing Detection Algorithms.
IEEE Trans. Serv. Comput., 2023
J. Comput. Secur., 2023
Proceedings of the Companion Proceedings of the ACM Web Conference 2023, 2023
Explainable AI for Prioritizing and Deploying Defenses for Cyber-Physical System Resiliency.
Proceedings of the 5th IEEE International Conference on Trust, 2023
Model Based Risk Assessment and Risk Mitigation Framework for Cyber-Physical Systems.
Proceedings of the 5th IEEE International Conference on Trust, 2023
Machine Learning-Based Phishing Detection Using URL Features: A Comprehensive Review.
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2023
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2023
SAFE-PASS: Stewardship, Advocacy, Fairness and Empowerment in Privacy, Accountability, Security, and Safety for Vulnerable Groups.
Proceedings of the 28th ACM Symposium on Access Control Models and Technologies, 2023
Synthesizing and Analyzing Attribute-Based Access Control Model Generated from Natural Language Policy Statements.
Proceedings of the 28th ACM Symposium on Access Control Models and Technologies, 2023
Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2023
Proceedings of the Foundations and Practice of Security - 16th International Symposium, 2023
Proceedings of the Extended Abstracts of the 2023 CHI Conference on Human Factors in Computing Systems, 2023
Poster: Towards a Dataset for the Discrimination between Warranted and Unwarranted Emails.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
Cross-Silo Federated Learning Across Divergent Domains with Iterative Parameter Alignment.
Proceedings of the IEEE International Conference on Big Data, 2023
2022
IEEE Trans. Serv. Comput., 2022
Towards Performance of NLP Transformers on URL-Based Phishing Detection for Mobile Devices.
J. Ubiquitous Syst. Pervasive Networks, 2022
Proceedings of the SACMAT '22: The 27th ACM Symposium on Access Control Models and Technologies, New York, NY, USA, June 8, 2022
Automation of Vulnerability Information Extraction Using Transformer-Based Language Models.
Proceedings of the Computer Security. ESORICS 2022 International Workshops, 2022
Proceedings of the Data and Applications Security and Privacy XXXVI, 2022
Proceedings of the Data and Applications Security and Privacy XXXVI, 2022
Proceedings of the 8th ACM on Cyber-Physical System Security Workshop, 2022
Proceedings of the 4th IEEE International Conference on Cognitive Machine Intelligence, 2022
Proceedings of the CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24, 2022
Proceedings of the Sat-CPS@CODASPY 2022: Proceedings of the 2022 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems, 2022
Proceedings of the CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24, 2022
2021
WIREs Data Mining Knowl. Discov., 2021
On the Performance of Isolation Forest and Multi Layer Perceptron for Anomaly Detection in Industrial Control Systems Networks.
Proceedings of the 8th International Conference on Internet of Things: Systems, 2021
Proceedings of the 6th International Conference on Internet of Things, 2021
Proceedings of the Critical Infrastructure Protection XV, 2021
Proceedings of the Information Systems Security - 17th International Conference, 2021
Lightweight URL-based phishing detection using natural language processing transformers for mobile devices.
Proceedings of the 18th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2021) / The 16th International Conference on Future Networks and Communications (FNC-2021) / The 11th International Conference on Sustainable Energy Information Technology, 2021
Proceedings of the EuroUSEC '21: European Symposium on Usable Security 2021, Karlsruhe, Germany, October 11, 2021
Proceedings of the Cyber Security Cryptography and Machine Learning, 2021
Proceedings of the Third IEEE International Conference on Cognitive Machine Intelligence, 2021
Context-Aware IoT Device Functionality Extraction from Specifications for Ensuring Consumer Security.
Proceedings of the IEEE Conference on Communications and Network Security, 2021
Proceedings of the IEEE Conference on Communications and Network Security, 2021
Proceedings of the The British International Conference on Databases 2021, 2021
2020
TruckSTM: Runtime Realization of Operational State Transitions for Medium and Heavy Duty Vehicles.
ACM Trans. Cyber Phys. Syst., 2020
Synthesizing DNA molecules with identity-based digital signatures to prevent malicious tampering and enabling source attribution.
J. Comput. Secur., 2020
Proceedings of the Second IEEE International Conference on Trust, 2020
Improved Phishing Detection Algorithms using Adversarial Autoencoder Synthesized Data.
Proceedings of the 45th IEEE Conference on Local Computer Networks, 2020
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020
Proceedings of the Data and Applications Security and Privacy XXXIV, 2020
Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020
2019
Proceedings of the First IEEE International Conference on Trust, 2019
ADQuaTe: An Automated Data Quality Test Approach for Constraint Discovery and Fault Detection.
Proceedings of the 20th IEEE International Conference on Information Reuse and Integration for Data Science, 2019
Proceedings of the First International Conference on Graph Computing, 2019
Proceedings of the Foundations and Practice of Security - 12th International Symposium, 2019
Proceedings of the Data and Applications Security and Privacy XXXIII, 2019
Proceedings of the 5th ACM on Cyber-Physical System Security Workshop, 2019
An Interactive Data Quality Test Approach for Constraint Discovery and Fault Detection.
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019
2018
Proceedings of the Encyclopedia of Database Systems, Second Edition, 2018
Int. J. Multim. Data Eng. Manag., 2018
On the design and analysis of protocols for Personal Health Record storage on Personal Data Server devices.
Future Gener. Comput. Syst., 2018
Component-oriented access control - Application servers meet tuple spaces for the masses.
Future Gener. Comput. Syst., 2018
<i>"Kn0w Thy Doma1n Name"</i>: Unbiased Phishing Detection Using Domain Name Based Features.
Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies, 2018
Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies, 2018
Proceedings of the 16th Annual Conference on Privacy, Security and Trust, 2018
Proceedings of the 16th Annual Conference on Privacy, Security and Trust, 2018
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2018
An Approach for Testing the Extract-Transform-Load Process in Data Warehouse Systems.
Proceedings of the 22nd International Database Engineering & Applications Symposium, 2018
Proceedings of the Foundations and Practice of Security - 11th International Symposium, 2018
An efficient implementation of next generation access control for the mobile health cloud.
Proceedings of the Third International Conference on Fog and Mobile Edge Computing, 2018
Proceedings of the 2018 Workshop on Attacks and Solutions in Hardware Security, 2018
Proceedings of the From Database to Cyber Security, 2018
Proceedings of the New Trends in Databases and Information Systems, 2018
2017
On the formalization, design, and implementation of component-oriented access control in lightweight virtualized server environments.
Comput. Secur., 2017
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017
Proceedings of the 2017 Fourth International Conference on Software Defined Systems, 2017
A Precedence Graph-Based Approach to Detect Message Injection Attacks in J1939 Based Networks.
Proceedings of the 15th Annual Conference on Privacy, Security and Trust, 2017
Proceedings of the 2017 IEEE International Conference on Information Reuse and Integration, 2017
Proceedings of the E-Business and Telecommunications - 14th International Joint Conference, 2017
Proceedings of the Second International Conference on Fog and Mobile Edge Computing, 2017
Proceedings of the Data and Applications Security and Privacy XXXI, 2017
Proceedings of the 2nd ACM Workshop on Attribute-Based Access Control, 2017
POSTER: PenJ1939: An Interactive Framework for Design and Dissemination of Exploits for Commercial Vehicles.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
POSTER: PriReMat: A Distributed Tool for Privacy Preserving Record Linking in Healthcare.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
2016
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016
SybilRadar: A Graph-Structure Based Framework for Sybil Detection in On-line Social Networks.
Proceedings of the ICT Systems Security and Privacy Protection, 2016
Proceedings of the 20th International Database Engineering & Applications Symposium, 2016
Proceedings of the Information Systems Security - 12th International Conference, 2016
Proceedings of the 4th IEEE International Conference on Future Internet of Things and Cloud, 2016
Proceedings of the Data and Applications Security and Privacy XXX, 2016
Proceedings of the 2nd IEEE International Conference on Collaboration and Internet Computing, 2016
Specification and Enforcement of Location-Aware Attribute-Based Access Control for Online Social Networks.
Proceedings of the 2016 ACM International Workshop on Attribute Based Access Control, 2016
Component-Oriented Access Control for Deployment of Application Services in Containerized Environments.
Proceedings of the Cryptology and Network Security - 15th International Conference, 2016
Applying attribute based access control for privacy preserving health data disclosure.
Proceedings of the 2016 IEEE-EMBS International Conference on Biomedical and Health Informatics, 2016
Proceedings of the Advanced Data Mining and Applications - 12th International Conference, 2016
2015
Secur. Commun. Networks, 2015
J. Object Technol., 2015
Analyzing Regulatory Conformance in Medical Research Systems Using Multi-Paradigm Modeling.
Proceedings of the Joint Proceedings of the 3rd International Workshop on the Globalization Of Modeling Languages and the 9th International Workshop on Multi-Paradigm Modeling co-located with ACM/IEEE 18th International Conference on Model Driven Engineering Languages and Systems, 2015
Modeling of Online Social Network Policies Using an Attribute-Based Access Control Framework.
Proceedings of the Information Systems Security - 11th International Conference, 2015
Proceedings of the Data and Applications Security and Privacy XXIX, 2015
Proceedings of the Data and Applications Security and Privacy XXIX, 2015
Proceedings of the Eighth International C* Conference on Computer Science & Software Engineering, 2015
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015
2014
Satisfiability Analysis of Workflows with Control-Flow Patterns and Authorization Constraints.
IEEE Trans. Serv. Comput., 2014
Enforcing the Chinese wall model for tenant conflict of interest in the service cloud.
Int. J. Bus. Process. Integr. Manag., 2014
Proceedings of the IEEE Eighth International Conference on Software Security and Reliability, 2014
Proceedings of the 2014 IEEE World Congress on Services, 2014
Proceedings of the Foundations and Practice of Security - 7th International Symposium, 2014
Proceedings of the Data and Applications Security and Privacy XXVIII, 2014
Proceedings of the Data and Applications Security and Privacy XXVIII, 2014
2013
Specification, Validation, and Enforcement of a Generalized Spatio-Temporal Role-Based Access Control Model.
IEEE Syst. J., 2013
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013
Proceedings of the IEEE Ninth World Congress on Services, 2013
Proceedings of the 18th ACM Symposium on Access Control Models and Technologies, 2013
Proceedings of the 18th ACM Symposium on Access Control Models and Technologies, 2013
Proceedings of the Workshop on Models and Evolution co-located with ACM/IEEE 16th International Conference on Model Driven Engineering Languages and Systems (MoDELS 2013), 2013
Proceedings of the Model-Driven Engineering Languages and Systems, 2013
Proceedings of the 10th International Workshop on Model Driven Engineering, 2013
Proceedings of the 2013 18th International Conference on Engineering of Complex Computer Systems, 2013
Proceedings of the 33rd International Conference on Distributed Computing Systems Workshops (ICDCS 2013 Workshops), 2013
Proceedings of the Data and Applications Security and Privacy XXVII, 2013
Proceedings of the 9th IEEE International Conference on Collaborative Computing: Networking, 2013
2012
J. Comput. Secur., 2012
Appl. Soft Comput., 2012
Query Plan Execution in a Heterogeneous Stream Management System for Situational Awareness.
Proceedings of the IEEE 31st Symposium on Reliable Distributed Systems, 2012
Proceedings of the 17th IEEE International Conference on Engineering of Complex Computer Systems, 2012
2011
IEEE Trans. Knowl. Data Eng., 2011
On the formalization and analysis of a spatio-temporal role-based access control model.
J. Comput. Secur., 2011
Exploring privacy versus data quality trade-offs in anonymization techniques using multi-objective optimization.
J. Comput. Secur., 2011
Proceedings of the POLICY 2011, 2011
Formal Parameterization of Log Synchronization Events within a Distributed Forensic Compute Cloud Database Environment.
Proceedings of the Digital Forensics and Cyber Crime - Third International ICST Conference, 2011
Supporting Iterative Development of Robust Operation Contracts in UML Requirements Models.
Proceedings of the 13th IEEE International Symposium on High-Assurance Systems Engineering, 2011
Proceedings of the Data and Applications Security and Privacy XXV, 2011
2010
IEEE Trans. Software Eng., 2010
Trans. Comput. Sci., 2010
Real time stochastic scheduling in broadcast systems with decentralized data storage.
Real Time Syst., 2010
Int. J. Next Gener. Comput., 2010
Int. J. Next Gener. Comput., 2010
Proceedings of the Security and Privacy in Communication Networks, 2010
Query m-Invariance: Preventing Query Disclosures in Continuous Location-Based Services.
Proceedings of the Eleventh International Conference on Mobile Data Management, 2010
Proceedings of the Data and Applications Security and Privacy XXIV, 2010
Proceedings of the Data and Applications Security and Privacy XXIV, 2010
2009
Proceedings of the Encyclopedia of Database Systems, 2009
Trans. Data Priv., 2009
Inf. Softw. Technol., 2009
IET Inf. Secur., 2009
Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, 2009
Proceedings of the Information Security, 12th International Conference, 2009
Proceedings of the 14th IEEE International Conference on Engineering of Complex Computer Systems, 2009
A multi-objective approach to data sharing with privacy constraints and preference based objectives.
Proceedings of the Genetic and Evolutionary Computation Conference, 2009
Proceedings of the EDBT 2009, 2009
Proceedings of the Data and Applications Security XXIII, 2009
Proceedings of the 18th ACM Conference on Information and Knowledge Management, 2009
2008
A Spatio-temporal Access Control Model Supporting Delegation for Pervasive Computing Applications.
Proceedings of the Trust, 2008
Optimizing Real-Time Ordered-Data Broadcasts in Pervasive Environments Using Evolution Strategy.
Proceedings of the Parallel Problem Solving from Nature, 2008
Proceedings of the Model Driven Engineering Languages and Systems, 2008
Proceedings of the 24th International Conference on Data Engineering, 2008
Proceedings of the SIGSPATIAL ACM GIS 2008 International Workshop on Security and Privacy in GIS and LBS, 2008
Evolution strategy based optimization of on-demand dependent data broadcast scheduling.
Proceedings of the Genetic and Evolutionary Computation Conference, 2008
Proceedings of the Computer Security, 2008
Proceedings of the EDBT 2008, 2008
Proceedings of the Data and Applications Security XXII, 2008
Proceedings of the Advances in Databases and Information Systems, 2008
2007
Inf. Syst., 2007
Proceedings of the Model Driven Engineering Languages and Systems, 2007
A method for early correspondence discovery using instance data.
Proceedings of the ICEIS 2007, 2007
Proceedings of the 12th International Conference on Engineering of Complex Computer Systems (ICECCS 2007), 2007
Proceedings of the Tenth IEEE International Symposium on High Assurance Systems Engineering (HASE 2007), 2007
Proceedings of the Data and Applications Security XXI, 2007
2006
IEEE Trans. Dependable Secur. Comput., 2006
Distributed Parallel Databases, 2006
Estimating the Relative Trustworthiness of Information Sources in Security Solution Evaluation.
Proceedings of the Trust Management, 4th International Conference, 2006
Proceedings of the Information Systems Security, Second International Conference, 2006
Proceedings of the 2006 IEEE/WIC/ACM International Conference on Intelligent Agent Technology, 2006
Proceedings of the Genetic and Evolutionary Computation Conference, 2006
Proceedings of the Database and Expert Systems Applications, 17th International Conference, 2006
Proceedings of the Data and Applications Security XX, 2006
Proceedings of the 2nd International ICST Conference on Collaborative Computing: Networking, 2006
2005
IEEE Trans. Knowl. Data Eng., 2005
Decis. Support Syst., 2005
Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, 2005
Proceedings of the 10th ACM Symposium on Access Control Models and Technologies, 2005
Proceedings of the Privacy Enhancing Technologies, 5th International Workshop, 2005
Proceedings of the Ninth International Database Engineering and Applications Symposium (IDEAS 2005), 2005
Proceedings of the Information Systems Security, First International Conference, 2005
Proceedings of the Information Systems Security, First International Conference, 2005
Proceedings of the Distributed Computing and Internet Technology, 2005
Proceedings of the Database and Expert Systems Applications, 16th International Conference, 2005
Proceedings of the Data and Applications Security XIX, 2005
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005
2004
Inf. Softw. Technol., 2004
Proceedings of the 9th ACM Symposium on Access Control Models and Technologies, 2004
Proceedings of the Information Systems Technology and its Applications, 2004
Proceedings of the Distributed Computing and Internet Technology, 2004
Proceedings of the Fundamental Approaches to Software Engineering, 2004
Proceedings of the Database and Expert Systems Applications, 15th International Conference, 2004
Proceedings of the Research Directions in Data and Applications Security XVIII, 2004
Proceedings of the Key Technologies for Data Management, 2004
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004
2003
Proceedings of the Integrity and Internal Control in Information Systems VI, 2003
Proceedings of the Database and Expert Systems Applications, 14th International Conference, 2003
Proceedings of the New Horizons in Information Management, 2003
2002
Designing High Integrity Systems Using Aspects.
Proceedings of the Integrity and Internal Control in Information Systems V, 2002
Proceedings of the 7th ACM Symposium on Access Control Models and Technologies, 2002
Proceedings of the 16th International Parallel and Distributed Processing Symposium (IPDPS 2002), 2002
Proceedings of the 8th International Conference on Engineering of Complex Computer Systems (ICECCS 2002), 2002
Anonymous and Secure Multicast Subscription.
Proceedings of the Research Directions in Data and Applications Security, 2002
2001
Proceedings of the Third International Workshop on Advanced Issues of E-Commerce and Web-Based Information Systems (WECWIS '01), 2001
Proceedings of the 15th International Parallel & Distributed Processing Symposium (IPDPS-01), 2001
Proceedings of the Advances in Databases and Information Systems, 2001
2000
Using semantic correctness in multidatabases to achieve local autonomy, distribute coordination, and maintain global integrity.
Inf. Sci., 2000
Proceedings of the Second International Workshop on Advance Issues of E-Commerce and Web-Based Information Systems (WECWIS 2000), 2000
Proceedings of the Electronic Commerce and Web Technologies, 2000
Proceedings of the Data and Application Security, 2000
1998
J. Comput. Secur., 1998
1997
ACM Trans. Database Syst., 1997
Proceedings of the Advanced Information Systems Engineering, 1997
Semantic-Based Decomposition of Transactions.
Proceedings of the Advanced Transaction Models and Architectures, 1997
1996
Proceedings of the 1996 IEEE Symposium on Security and Privacy, 1996
1995
Proceedings of the VLDB'95, 1995