Csilla Farkas - Publications

Affiliations: 
Computer Science & Engineering University of South Carolina, Columbia, SC 
Area:
Computer Science

17 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2019 Zeng Q, Luo L, Qian Z, Du X, Li Z, Huang C, Farkas C. Resilient User-Side Android Application Repackaging and Tampering Detection Using Cryptographically Obfuscated Logic Bombs Ieee Transactions On Dependable and Secure Computing. 1-1. DOI: 10.1109/Tdsc.2019.2957787  0.399
2019 Alsuwat E, Alsuwat H, Valtorta M, Farkas C. Adversarial data poisoning attacks against the PC learning algorithm International Journal of General Systems. 49: 3-31. DOI: 10.1080/03081079.2019.1630401  0.31
2015 Dia OA, Farkas C. Risk aware query replacement approach for secure databases performance management Ieee Transactions On Dependable and Secure Computing. 12: 217-229. DOI: 10.1109/Tdsc.2014.2306675  0.668
2013 Dia OA, Farkas C. Business driven user role assignment: Nimble adaptation of RBAC to organizational changes International Journal of Information Security and Privacy. 7: 45-62. DOI: 10.4018/Jisp.2013010104  0.66
2012 Dia OA, Farkas C. A Practical Framework for Policy Composition and Conflict Resolution International Journal of Secure Software Engineering. 3: 1-26. DOI: 10.4018/Jsse.2012100101  0.618
2010 Toland TS, Farkas C, Eastman CM. The inference problem: Maintaining maximal availability in the presence of database updates Computers and Security. 29: 88-103. DOI: 10.1016/J.Cose.2009.07.004  0.685
2006 Farkas C, Brodsky A, Jajodia S. Unauthorized inferences in semistructured databases Information Sciences. 176: 3269-3299. DOI: 10.1016/J.Ins.2006.01.004  0.63
2006 Ziegler G, Farkas C, Lorincz A. A framework for anonymous but accountable self-organizing communities Information and Software Technology. 48: 726-744. DOI: 10.1016/J.Infsof.2005.08.007  0.405
2005 Gowadia V, Farkas C, Valtorta M. PAID: A probabilistic agent-based intrusion detection system Computers and Security. 24: 529-545. DOI: 10.1016/J.Cose.2005.06.008  0.691
2005 Kodali N, Farkas C, Wijesekera D. Enforcing semantics-aware security in multimedia surveillance Journal On Data Semantics. 2: 199-221. DOI: 10.1007/978-3-540-30567-5_8  0.363
2005 Palotai Z, Farkas C, Lorincz A. Selection in scale-free small world Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3690: 579-582. DOI: 10.1007/11559221_65  0.344
2005 Youn I, Farkas C, Thuraisingham B. Multilevel secure teleconferencing over public switched telephone network Lecture Notes in Computer Science. 99-113. DOI: 10.1007/11535706_8  0.353
2004 Kodali N, Farkas C, Wijesekera D. An authorization model for multimedia digital libraries International Journal On Digital Libraries. 4: 139-155. DOI: 10.1007/S00799-004-0080-1  0.466
2003 Kodali N, Farkas C, Wijesekera D. Multimedia Access Control Using RDF Metadata Lecture Notes in Computer Science. 718-731. DOI: 10.1007/978-3-540-39962-9_73  0.424
2002 Farkas C, Jajodia S. The inference problem: a survey Sigkdd Explorations. 4: 6-11. DOI: 10.1145/772862.772864  0.365
2002 Farkas C, Huhns MN. Making agents secure on the semantic web Ieee Internet Computing. 6: 76-79. DOI: 10.1109/Mic.2002.1067741  0.387
2000 Brodsky A, Farkas C, Jajodia S. Secure databases: constraints, inference channels, and monitoring disclosures Ieee Transactions On Knowledge and Data Engineering. 12: 900-919. DOI: 10.1109/69.895801  0.621
Show low-probability matches.