DNA-based Cryptography A Gehani, T LaBean, J Reif Aspects of Molecular Computing, Lecture Notes in Computer Science 2950, 2004 | 613 | 2004 |
SPADE: Support for Provenance Auditing in Distributed Environments A Gehani, D Tariq 13th ACM/IFIP/USENIX International Middleware Conference, 2012 | 335 | 2012 |
Performance and Extension of User Space File Systems A Rajgarhia, A Gehani 25th ACM Symposium on Applied Computing (SAC), 2010 | 161 | 2010 |
MCI: Modeling-based Causality Inference in Audit Logging for Attack Investigation Y Kwon, F Wang, W Wang, KH Lee, WC Lee, S Ma, X Zhang, D Xu, S Jha, ... 25th Annual Network and Distributed System Security Symposium (NDSS), 2018 | 123 | 2018 |
Trimmer: Application Specialization for Code Debloating H Sharif, M Abubakar, A Gehani, F Zaffar 33rd IEEE/ACM International Conference on Automated Software Engineering (ASE), 2018 | 114 | 2018 |
Data Mining-based Ethereum Fraud Detection E Jung, M Le Tilly, A Gehani, Y Ge 2nd IEEE International Conference on Blockchain, 2019 | 104 | 2019 |
RheoStat: Real-time Risk Management A Gehani, G Kedem 7th International Symposium on Recent Advances in Intrusion Detection (RAID …, 2004 | 95 | 2004 |
Transcoding Characteristics of Web Images S Chandra, A Gehani, C Ellis, A Vahdat Multimedia Computing and Networking (MMCN) 4312, 2001 | 92 | 2001 |
Kernel-Supported Cost-Effective Audit Logging for Causality Tracking S Ma, J Zhai, Y Kwon, KH Lee, X Zhang, G Ciocarlie, A Gehani, ... 29th USENIX Annual Technical Conference (ATC), 2018 | 84 | 2018 |
Towards Automated Collection of Application-Level Data Provenance D Tariq, M Ali, A Gehani 4th USENIX Workshop on the Theory and Practice of Provenance (TaPP …, 2012 | 67 | 2012 |
Microflow Biomolecular Computation A Gehani, J Reif Biosystems, Journal of Biological and Information Processing Sciences 52 (1-3), 1999 | 62 | 1999 |
Automated Categorization of Onion Sites for Analyzing the Darkweb Ecosystem S Ghosh, A Das, P Porras, V Yegneswaran, A Gehani 23rd ACM International Conference on Knowledge Discovery and Data Mining (KDD), 2017 | 58 | 2017 |
Smartphone Security Limitations: Conflicting Traditions N Husted, H Saidi, A Gehani 2nd Workshop on Governance of Technology, Information, and Policies …, 2011 | 51 | 2011 |
Tracking and Sketching Distributed Data Provenance T Malik, L Nistor, A Gehani 6th IEEE International Conference on e-Science, 2010 | 46 | 2010 |
Automated Software Winnowing G Malecha, A Gehani, N Shankar 30th ACM Symposium on Applied Computing (SAC), 2015 | 38 | 2015 |
Mining Data Provenance to Detect Advanced Persistent Threats M Barre, A Gehani, V Yegneswaran 11th USENIX Workshop on the Theory and Practice of Provenance (TaPP), 2019 | 36 | 2019 |
TRACE: Enterprise-Wide Provenance Tracking for Real-Time APT Detection H Irshad, G Ciocarlie, A Gehani, V Yegneswaran, KH Lee, J Patel, S Jha, ... IEEE Transactions on Information Forensics and Security, 2021 | 35 | 2021 |
ALchemist: Fusing Application and Audit Logs for Precise Attack Provenance without Instrumentation L Yu, S Ma, Z Zhang, G Tao, X Zhang, D Xu, V Urias, HW Lin, G Ciocarlie, ... 28th Network and Distributed System Security Symposium (NDSS), 2021 | 34 | 2021 |
Sketching Distributed Data Provenance T Malik, A Gehani, D Tariq, F Zaffar Data Provenance and Data Management for eScience, Studies in Computational …, 2013 | 31 | 2013 |
Using Provenance Patterns to Vet Sensitive Behaviors in Android Apps C Yang, G Yang, A Gehani, V Yegneswaran, D Tariq, G Gu 11th International Conference on Security and Privacy in Communication …, 2015 | 30 | 2015 |