Ram Krishnan
Orcid: 0000-0002-7402-553X
According to our database1,
Ram Krishnan
authored at least 98 papers
between 1993 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Proceedings of the 2024 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems, 2024
2023
Inf. Syst. Frontiers, April, 2023
Visualizing Convolutional Neural Network Models' Sensitivity to Nonnatural Data Order.
Inf. Syst. Frontiers, April, 2023
Proceedings of the 5th IEEE International Conference on Trust, 2023
Proceedings of the Information Systems Security - 19th International Conference, 2023
Proceedings of the Data and Applications Security and Privacy XXXVII, 2023
Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy, 2023
2022
On the role of deep learning model complexity in adversarial robustness for medical images.
BMC Medical Informatics Decis. Mak., 2022
Proceedings of the 1st Italian Conference on Big Data and Data Science (itaDATA 2022), 2022
Proceedings of the Computer Security - ESORICS 2022, 2022
Proceedings of the CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24, 2022
2021
Inf. Syst. Frontiers, 2021
Toward Automated Cyber Defense with Secure Sharing of Structured Cyber Threat Intelligence.
Inf. Syst. Frontiers, 2021
Proceedings of the Secure Knowledge Management In The Artificial Intelligence Era, 2021
Proceedings of the Secure Knowledge Management In The Artificial Intelligence Era, 2021
Proceedings of the Data and Applications Security and Privacy XXXV, 2021
Utilizing Policy Machine for Attribute-Based Access Control in Permissioned Blockchain.
Proceedings of the 2021 IEEE International Conference on Omni-Layer Intelligent Systems, 2021
Enabling Flexible Administration in ABAC Through Policy Review: A Policy Machine Case Study.
Proceedings of the 7th IEEE International Conference on Big Data Security on Cloud, 2021
2020
Service Function Chaining (SFC) Operations, Administration, and Maintenance (OAM) Framework.
RFC, October, 2020
J. Internet Serv. Inf. Secur., 2020
J. Internet Serv. Inf. Secur., 2020
Proceedings of the Second IEEE International Conference on Trust, 2020
A Model for the Administration of Access Control in Software Defined Networking using Custom Permissions.
Proceedings of the Second IEEE International Conference on Trust, 2020
ParaSDN: An Access Control Model for SDN Applications based on Parameterized Roles and Permissions.
Proceedings of the 6th IEEE International Conference on Collaboration and Internet Computing, 2020
2019
Autom., 2019
Proceedings of the Secure Knowledge Management In Artificial Intelligence Era, 2019
Toward Relationship Based Access Control for Secure Sharing of Structured Cyber Threat Intelligence.
Proceedings of the Secure Knowledge Management In Artificial Intelligence Era, 2019
Proceedings of the Secure Knowledge Management In Artificial Intelligence Era, 2019
Proceedings of the 20th IEEE International Conference on Information Reuse and Integration for Data Science, 2019
Proceedings of the 2019 4th International Conference on Computing, 2019
Proceedings of the 2019 4th International Conference on Computing, 2019
Online Malware Detection in Cloud Auto-scaling Systems Using Shallow Convolutional Neural Networks.
Proceedings of the Data and Applications Security and Privacy XXXIII, 2019
Proceedings of the SDN-NFV@CODASPY 2019, 2019
2018
Proceedings of the 2018 International Conference on Advances in Computing, 2018
Proceedings of the 11th IEEE International Conference on Cloud Computing, 2018
2017
CoRR, 2017
Proceedings of the 3rd IEEE International Conference on Collaboration and Internet Computing, 2017
Proceedings of the 2nd ACM Workshop on Attribute-Based Access Control, 2017
Proceedings of the 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), 2017
2016
IEEE Trans. Dependable Secur. Comput., 2016
Intell. Autom. Soft Comput., 2016
Proceedings of the Network and System Security - 10th International Conference, 2016
Proceedings of the Information Security - 19th International Conference, 2016
Proceedings of the International Conference on Mobile Software Engineering and Systems, 2016
Toward a framework for detecting privacy policy violations in android application code.
Proceedings of the 38th International Conference on Software Engineering, 2016
Proceedings of the Data and Applications Security and Privacy XXX, 2016
Proceedings of the 2016 ACM International Workshop on Attribute Based Access Control, 2016
2015
Mechanisms for Optimizing Link Aggregation Group (LAG) and Equal-Cost Multipath (ECMP) Component Link Utilization in Networks.
RFC, January, 2015
Time Series Forecasting of Cloud Data Center Workloads for Dynamic Resource Provisioning.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2015
J. Internet Serv. Inf. Secur., 2015
Proceedings of the Trust, Privacy and Security in Digital Business, 2015
Mitigating Multi-Tenancy Risks in IaaS Cloud Through Constraints-Driven Virtual Resource Scheduling.
Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, 2015
Smartphone-based secure authenticated session sharing in Internet of Personal Things.
Proceedings of the Mobile Devices and Multimedia: Enabling Technologies, 2015
Proceedings of the Data and Applications Security and Privacy XXIX, 2015
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015
Proceedings of the 3rd International Workshop on Security in Cloud Computing, 2015
An open NFV and cloud architectural framework for managing application virality behaviour.
Proceedings of the 12th Annual IEEE Consumer Communications and Networking Conference, 2015
2014
Bringing Knowledge to the Edge with Jnana Edge and Buddhi Edge: Architecture, Implementation, and Future Directions.
Proceedings of the Sixth IEEE International Conference on Technology for Education, 2014
Proceedings of the Network and System Security - 8th International Conference, 2014
Behavioral Security Threat Detection Strategies for Data Center Switches and Routers.
Proceedings of the 34th International Conference on Distributed Computing Systems Workshops (ICDCS 2014 Workshops), Madrid, Spain, June 30, 2014
Proceedings of the 10th IEEE International Conference on Collaborative Computing: Networking, 2014
Proceedings of the 2014 ACM Workshop on Information Sharing & Collaborative Security, 2014
2013
Computer, 2013
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013
Proceedings of the DIM'13, 2013
Proceedings of the IEEE Conference on Communications and Network Security, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
2012
Proceedings of the 2012 IEEE Fourth International Conference on Technology for Education, 2012
Proceedings of the Computer Network Security, 2012
Proceedings of the Information Systems Security, 8th International Conference, 2012
Proceedings of the IEEE International Symposium on Dynamic Spectrum Access Networks, 2012
Proceedings of the Data and Applications Security and Privacy XXVI, 2012
A group-centric model for collaboration with expedient insiders in multilevel systems.
Proceedings of the 2012 International Conference on Collaboration Technologies and Systems, 2012
Proceedings of the 8th International Conference on Collaborative Computing: Networking, 2012
2011
ACM Trans. Inf. Syst. Secur., 2011
Authorization Policy Specification and Enforcement for Group-Centric Secure Information Sharing.
Proceedings of the Information Systems Security - 7th International Conference, 2011
Proceedings of the 7th International Conference on Collaborative Computing: Networking, 2011
2010
Proceedings of the Computer Network Security, 2010
Proceedings of the 6th International Conference on Collaborative Computing: Networking, 2010
Proceedings of the 2nd ACM Cloud Computing Security Workshop, 2010
2009
Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, 2009
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009
Proceedings of the 5th International Conference on Collaborative Computing: Networking, 2009
Proceedings of the 2009 ACM Symposium on Information, 2009
2008
Proceedings of the 6th ACM Workshop on Formal Methods in Security Engineering, 2008
2007
Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, 2007
2002
RFC, May, 2002
1997
Rate-based control schemes for ABR traffic - Design principles and performance comparison.
Comput. Networks ISDN Syst., 1997
1993
IEEE J. Sel. Areas Commun., 1993
Proceedings of the Proceedings IEEE INFOCOM '93, The Conference on Computer Communications, Twelfth Annual Joint Conference of the IEEE Computer and Communications Societies, Networking: Foundation for the Future, San Francisco, CA, USA, March 28, 1993
Is There Life beyond Linear Topologies? A Comparison of DQDB and Manhattan Street Network.
Proceedings of the Proceedings IEEE INFOCOM '93, The Conference on Computer Communications, Twelfth Annual Joint Conference of the IEEE Computer and Communications Societies, Networking: Foundation for the Future, San Francisco, CA, USA, March 28, 1993