Detecting Credential Spearphishing in Enterprise Settings G Ho, A Sharma, M Javed, V Paxson, D Wagner 26th USENIX Security Symposium (USENIX Security 17), 469-485, 2017 | 149 | 2017 |
Analysis of security data from a large computing organization A Sharma, Z Kalbarczyk, J Barlow, R Iyer 2011 IEEE/IFIP 41st International Conference on Dependable Systems …, 2011 | 71 | 2011 |
Identifying compromised users in shared computing infrastructures: A data-driven bayesian network approach A Pecchia, A Sharma, Z Kalbarczyk, D Cotroneo, RK Iyer 2011 IEEE 30th International Symposium on Reliable Distributed Systems, 127-136, 2011 | 41 | 2011 |
Analysis of credential stealing attacks in an open networked environment A Sharma, Z Kalbarczyk, R Iyer, J Barlow 4th International Conference on Network and System Security, NSS 2010 …, 2010 | 36 | 2010 |
A lone wolf no more: Supporting network intrusion detection with real-time intelligence J Amann, R Sommer, A Sharma, S Hall Research in Attacks, Intrusions, and Defenses: 15th International Symposium …, 2012 | 26 | 2012 |
100g intrusion detection V Stoffer, A Sharma, J Krous Lawrence Berkeley National Laboratory (LBL), 2015 | 17 | 2015 |
AN E-TAX INTERNET FILING SYSTEM INCORPORATING SECURITY AND USABILITY BEST PRACTICES-Prototype implementation of the best practices identified in government and commercial E-tax … A Sharma, W Yurcik International Conference on E-Business and Telecommunication Networks 3, 257-262, 2004 | 12 | 2004 |
Security assessment of E-Tax filing websites A Sharma, W Yurcik arXiv preprint cs/0608034, 2006 | 9 | 2006 |
A study of e-Filing tax websites contrasting security techniques versus security perception A Sharma, W Yurcik Proceedings of the Tenth Americas Conference on Information Systems, 2004 | 9 | 2004 |
The emergence of rural digital libraries in India: The Gyandoot digital library intranet A Sharma, W Yurcik Proceedings of the ASIS Annual Conference (ASIS 2000), Chicago, 2000 | 9 | 2000 |
False impressions: Contrasting perceptions of security as a major impediment to achieving survivable systems W Yurcik, A Sharma, D Doss Proceedings of the IEEE/CERT/SEI 4th Survivability Workshop, Vancouver, BC …, 2002 | 8 | 2002 |
The gyandoot digital library intranet A Sharma, W Yurcik Bulletin of the American Society for Information Science and Technology 27 …, 2001 | 8 | 2001 |
HPLC determination of phenolic acids in infected plants of chickpea. A Sharma, N Joshi, P Sharma, S Sharma, A Maheshwari | 4 | 2011 |
Managing business health in the presence of malicious attacks SA Zonouz, A Sharma, HGV Ramasamy, ZT Kalbarczyk, B Pfitzmann, ... 2011 IEEE/IFIP 41st International Conference on Dependable Systems and …, 2011 | 4 | 2011 |
Effect of antiarrhythmic drugs on recurrent atrial tachyarrhythmias in paced patients with the tachycardia-bradycardia syndrome JM Wharton, RA Sorrentino, A Curtis, E Keating, A Sharma, WE Sanders, ... Circulation 98 (17), 633-633, 1998 | 4 | 1998 |
Network Detection of Interactive {SSH} Impostors Using Deep Learning J Piet, A Sharma, V Paxson, D Wagner 32nd USENIX Security Symposium (USENIX Security 23), 4283-4300, 2023 | 3 | 2023 |
MICROSTRUCTURE AND MECHANICAL PROPERTIES OF HYBRID SOL-GEL PROCESSED Al 2 O 3-ZrO 2 COMPOSITES A Saha, DC Agrawal, A Sharma Ceram. Trans. 38, 497-507, 1993 | 3 | 1993 |
Bro: Actively defending so that you can do other stuff A Sharma BroCon-14, University of Illinois, Urbana-Champaign, 2014 | 2 | 2014 |
Effect of underlying cardiovascular disease on mortality and atrial fibrillation in WI-R and DDD-R paced patients JM Wharton, DA Criger, RA Sorrentino, A Sharma, CR Grill, KL Lee Circulation 100 (18), 69-69, 1999 | 2 | 1999 |
Network Traffic Analysis A Sharma | | 2023 |