Csilla Farkas
Affiliations: | Computer Science & Engineering | University of South Carolina, Columbia, SC |
Area:
Computer ScienceGoogle:
"Csilla Farkas"Parents
Sign in to add mentorAlexander Brodsky | grad student | 2000 | George Mason (Computer Science Tree) | |
(Secure databases: Constraints and inference channels.) |
Children
Sign in to add traineeAndrei G. Stoica | grad student | 2004 | University of South Carolina |
Tyrone S. Toland | grad student | 2005 | University of South Carolina |
Vaibhav Gowadia | grad student | 2007 | University of South Carolina |
Amit Jain | grad student | 2008 | University of South Carolina |
Maryam Jafari-Lafti | grad student | 2010 | University of South Carolina |
Ousmane A. Dia | grad student | 2013 | University of South Carolina |
Sidney E. Valentine | grad student | 2013 | University of South Carolina |
Aspen Olmsted | grad student | 2014 | University of South Carolina |
BETA: Related publications
See more...
Publications
You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect. |
Zeng Q, Luo L, Qian Z, et al. (2019) Resilient User-Side Android Application Repackaging and Tampering Detection Using Cryptographically Obfuscated Logic Bombs Ieee Transactions On Dependable and Secure Computing. 1-1 |
Alsuwat E, Alsuwat H, Valtorta M, et al. (2019) Adversarial data poisoning attacks against the PC learning algorithm International Journal of General Systems. 49: 3-31 |
Dia OA, Farkas C. (2015) Risk aware query replacement approach for secure databases performance management Ieee Transactions On Dependable and Secure Computing. 12: 217-229 |
Dia OA, Farkas C. (2013) Business driven user role assignment: Nimble adaptation of RBAC to organizational changes International Journal of Information Security and Privacy. 7: 45-62 |
Dia OA, Farkas C. (2012) A Practical Framework for Policy Composition and Conflict Resolution International Journal of Secure Software Engineering. 3: 1-26 |
Toland TS, Farkas C, Eastman CM. (2010) The inference problem: Maintaining maximal availability in the presence of database updates Computers and Security. 29: 88-103 |
Farkas C, Brodsky A, Jajodia S. (2006) Unauthorized inferences in semistructured databases Information Sciences. 176: 3269-3299 |
Ziegler G, Farkas C, Lorincz A. (2006) A framework for anonymous but accountable self-organizing communities Information and Software Technology. 48: 726-744 |
Gowadia V, Farkas C, Valtorta M. (2005) PAID: A probabilistic agent-based intrusion detection system Computers and Security. 24: 529-545 |
Kodali N, Farkas C, Wijesekera D. (2005) Enforcing semantics-aware security in multimedia surveillance Journal On Data Semantics. 2: 199-221 |