Liviu Iftode
Affiliations: | Rutgers University, New Brunswick, New Brunswick, NJ, United States |
Area:
Computer ScienceGoogle:
"Liviu Iftode"Children
Sign in to add traineeCristian M. Borcea | grad student | 2004 | Rutgers, New Brunswick |
Florin Sultan | grad student | 2004 | Rutgers, New Brunswick |
Aniruddha Bohra | grad student | 2008 | Rutgers, New Brunswick |
Nishkam Ravi | grad student | 2008 | Rutgers, New Brunswick |
Arati Baliga | grad student | 2009 | Rutgers, New Brunswick |
Vivek Pathak | grad student | 2009 | Rutgers, New Brunswick |
Pravin Shankar | grad student | 2011 | Rutgers, New Brunswick |
Stephen D. Smaldone | grad student | 2011 | Rutgers, New Brunswick |
Daehan Kwak | grad student | 2010-2017 | Rutgers, New Brunswick |
BETA: Related publications
See more...
Publications
You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect. |
Kwak D, Liu R, Kim D, et al. (2016) Seeing Is Believing: Sharing Real-Time Visual Traffic Information via Vehicular Clouds Ieee Access. 4: 3617-3631 |
Smaldone S, Gilbert B, Harkes J, et al. (2013) Optimizing storage performance for VM-based mobile computing Acm Transactions On Computer Systems. 31 |
Kinebuchi Y, Butt S, Ganapathy V, et al. (2013) Monitoring integrity using limited local memory Ieee Transactions On Information Forensics and Security. 8: 1230-1242 |
Datta A, Dikaiakos MD, Haridi S, et al. (2012) Infrastructures for online social networking services Ieee Internet Computing. 16: 10-12 |
Baliga A, Ganapathy V, Iftode L. (2011) Detecting kernel-level rootkits using data structure invariants Ieee Transactions On Dependable and Secure Computing. 8: 670-684 |
Xu G, Borcea C, Iftode L. (2011) A policy enforcing mechanism for trusted ad hoc networks Ieee Transactions On Dependable and Secure Computing. 8: 321-326 |
Bickford J, O'Hare R, Baliga A, et al. (2010) Rootkits on smart phones: Attacks, implications and opportunities Hotmobile 2010: the 11th Workshop On Mobile Computing Systems and Applications. 49-53 |
Baliga A, Kamat P, Ganapathy V, et al. (2009) Identifying systemic threats to kernel data: Attacks and defense techniques Advanced Operating Systems and Kernel Applications: Techniques and Technologies. 46-70 |
Smaldone S, Ganapathy V, Iftode L. (2009) Working set-based access control for network file systems Proceedings of Acm Symposium On Access Control Models and Technologies, Sacmat. 207-216 |
Baliga A, Ganapathy V, Iftode L. (2008) Automatic inference and enforcement of kernel data structure invariants Proceedings - Annual Computer Security Applications Conference, Acsac. 77-86 |