Year |
Citation |
Score |
2019 |
Zeng Q, Luo L, Qian Z, Du X, Li Z, Huang C, Farkas C. Resilient User-Side Android Application Repackaging and Tampering Detection Using Cryptographically Obfuscated Logic Bombs Ieee Transactions On Dependable and Secure Computing. 1-1. DOI: 10.1109/Tdsc.2019.2957787 |
0.399 |
|
2019 |
Alsuwat E, Alsuwat H, Valtorta M, Farkas C. Adversarial data poisoning attacks against the PC learning algorithm International Journal of General Systems. 49: 3-31. DOI: 10.1080/03081079.2019.1630401 |
0.31 |
|
2015 |
Dia OA, Farkas C. Risk aware query replacement approach for secure databases performance management Ieee Transactions On Dependable and Secure Computing. 12: 217-229. DOI: 10.1109/Tdsc.2014.2306675 |
0.668 |
|
2013 |
Dia OA, Farkas C. Business driven user role assignment: Nimble adaptation of RBAC to organizational changes International Journal of Information Security and Privacy. 7: 45-62. DOI: 10.4018/Jisp.2013010104 |
0.66 |
|
2012 |
Dia OA, Farkas C. A Practical Framework for Policy Composition and Conflict Resolution International Journal of Secure Software Engineering. 3: 1-26. DOI: 10.4018/Jsse.2012100101 |
0.618 |
|
2010 |
Toland TS, Farkas C, Eastman CM. The inference problem: Maintaining maximal availability in the presence of database updates Computers and Security. 29: 88-103. DOI: 10.1016/J.Cose.2009.07.004 |
0.685 |
|
2006 |
Farkas C, Brodsky A, Jajodia S. Unauthorized inferences in semistructured databases Information Sciences. 176: 3269-3299. DOI: 10.1016/J.Ins.2006.01.004 |
0.63 |
|
2006 |
Ziegler G, Farkas C, Lorincz A. A framework for anonymous but accountable self-organizing communities Information and Software Technology. 48: 726-744. DOI: 10.1016/J.Infsof.2005.08.007 |
0.405 |
|
2005 |
Gowadia V, Farkas C, Valtorta M. PAID: A probabilistic agent-based intrusion detection system Computers and Security. 24: 529-545. DOI: 10.1016/J.Cose.2005.06.008 |
0.691 |
|
2005 |
Kodali N, Farkas C, Wijesekera D. Enforcing semantics-aware security in multimedia surveillance Journal On Data Semantics. 2: 199-221. DOI: 10.1007/978-3-540-30567-5_8 |
0.363 |
|
2005 |
Palotai Z, Farkas C, Lorincz A. Selection in scale-free small world Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3690: 579-582. DOI: 10.1007/11559221_65 |
0.344 |
|
2005 |
Youn I, Farkas C, Thuraisingham B. Multilevel secure teleconferencing over public switched telephone network Lecture Notes in Computer Science. 99-113. DOI: 10.1007/11535706_8 |
0.353 |
|
2004 |
Kodali N, Farkas C, Wijesekera D. An authorization model for multimedia digital libraries International Journal On Digital Libraries. 4: 139-155. DOI: 10.1007/S00799-004-0080-1 |
0.466 |
|
2003 |
Kodali N, Farkas C, Wijesekera D. Multimedia Access Control Using RDF Metadata Lecture Notes in Computer Science. 718-731. DOI: 10.1007/978-3-540-39962-9_73 |
0.424 |
|
2002 |
Farkas C, Jajodia S. The inference problem: a survey Sigkdd Explorations. 4: 6-11. DOI: 10.1145/772862.772864 |
0.365 |
|
2002 |
Farkas C, Huhns MN. Making agents secure on the semantic web Ieee Internet Computing. 6: 76-79. DOI: 10.1109/Mic.2002.1067741 |
0.387 |
|
2000 |
Brodsky A, Farkas C, Jajodia S. Secure databases: constraints, inference channels, and monitoring disclosures Ieee Transactions On Knowledge and Data Engineering. 12: 900-919. DOI: 10.1109/69.895801 |
0.621 |
|
Show low-probability matches. |