default search action
Bezawada Bruhadeshwar
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c34]Maxwel Bar-on, Bruhadeshwar Bezawada, Indrakshi Ray, Indrajit Ray:
A Small World-Privacy Preserving IoT Device-Type Fingerprinting with Small Datasets. FPS (1) 2023: 104-122 - 2022
- [c33]Narendra Singh, Somanath Tripathy, Bruhadeshwar Bezawada:
SHIELD: A Multimodal Deep Learning Framework for Android Malware Detection. ICISS 2022: 64-83 - 2021
- [j14]Rajendra Kumar Solanki, Vijay Laxmi, Bruhadeshwar Bezawada, Manoj Singh Gaur:
MapperDroid: Verifying app capabilities from description to permissions and API calls. Comput. Secur. 111: 102493 (2021) - [j13]Shweta Saharan, Vijay Laxmi, Bruhadeshwar Bezawada, Manoj Singh Gaur:
Scaling & fuzzing: Personal image privacy from automated attacks in mobile cloud computing. J. Inf. Secur. Appl. 60: 102850 (2021) - [j12]Hossein Shirazi, Bruhadeshwar Bezawada, Indrakshi Ray, Chuck Anderson:
Directed adversarial sampling attacks on phishing detection. J. Comput. Secur. 29(1): 1-23 (2021) - [j11]Bruhadeshwar Bezawada, Indrakshi Ray, Indrajit Ray:
Behavioral fingerprinting of Internet-of-Things devices. WIREs Data Mining Knowl. Discov. 11(1) (2021) - [c32]Shalin Kumar Deval, Meenakshi Tripathi, Bruhadeshwar Bezawada, Indrakshi Ray:
"X-Phish: Days of Future Past"‡: Adaptive & Privacy Preserving Phishing Detection. CNS 2021: 227-235 - 2020
- [j10]Jyoti Gajrani, Umang Agarwal, Vijay Laxmi, Bruhadeshwar Bezawada, Manoj Singh Gaur, Meenakshi Tripathi, Akka Zemmari:
EspyDroid+: Precise reflection analysis of android apps. Comput. Secur. 90: 101688 (2020)
2010 – 2019
- 2019
- [c31]Bruhadeshwar Bezawada, Indrajit Ray, Kushagra Tiwary:
AGBuilder: An AI Tool for Automated Attack Graph Building, Analysis, and Refinement. DBSec 2019: 23-42 - [c30]Hossein Shirazi, Bruhadeshwar Bezawada, Indrakshi Ray, Charles Anderson:
Adversarial Sampling Attacks Against Phishing Detection. DBSec 2019: 83-101 - 2018
- [c29]Bruhadeshwar Bezawada, Indrakshi Ray:
Attribute-Based Encryption: Applications and Future Directions. From Database to Cyber Security 2018: 353-374 - [c28]Bruhadeshwar Bezawada, Maalvika Bachani, Jordan Peterson, Hossein Shirazi, Indrakshi Ray, Indrajit Ray:
Behavioral Fingerprinting of IoT Devices. ASHES@CCS 2018: 41-50 - [c27]Dieudonne Mulamba, Athith Amarnath, Bruhadeshwar Bezawada, Indrajit Ray:
A Secure Hash Commitment Approach for Moving Target Defense of Security-critical Services. MTD@CCS 2018: 59-68 - [c26]Bruhadeshwar Bezawada, Sandeep S. Kulkarni, Indrajit Ray, Indrakshi Ray, Rui Li:
Independent Key Distribution Protocols for Broadcast Authentication. SACMAT 2018: 27-38 - [c25]Hossein Shirazi, Bruhadeshwar Bezawada, Indrakshi Ray:
"Kn0w Thy Doma1n Name": Unbiased Phishing Detection Using Domain Name Based Features. SACMAT 2018: 69-75 - [i2]Bruhadeshwar Bezawada, Maalvika Bachani, Jordan Peterson, Hossein Shirazi, Indrakshi Ray, Indrajit Ray:
IoTSense: Behavioral Fingerprinting of IoT Devices. CoRR abs/1804.03852 (2018) - 2017
- [j9]Rui Li, Alex X. Liu, Sheng Xiao, Hongyue Xu, Bezawada Bruhadeshwar, Ann L. Wang:
Privacy and Integrity Preserving Top-k Query Processing for Two-Tiered Sensor Networks. IEEE/ACM Trans. Netw. 25(4): 2334-2346 (2017) - [c24]Negar Mosharraf, Anura P. Jayasumana, Indrakshi Ray, Bruhadeshwar Bezawada:
History-Based Throttling of Distributed Denial-of-Service Attacks. ICETE (Selected Papers) 2017: 199-223 - [c23]Bruhadeshwar Bezawada, Alex X. Liu, Xiaojiang Liang, Rui Li:
A template approach for group key distribution in dynamic ad-hoc groups. Networking 2017: 1-9 - [c22]Jay Dave, Parvez Faruki, Vijay Laxmi, Bruhadeshwar Bezawada, Manoj Singh Gaur:
Secure and efficient proof of ownership for deduplicated cloud storage. SIN 2017: 19-26 - [c21]Bruhadeshwar Bezawada, Kishore Kothapalli, Raman Dugyala, Rui Li:
Symmetric Key Based Secure Resource Sharing. SSCC 2017: 179-194 - 2016
- [j8]Rui Li, Alex X. Liu, Ann L. Wang, Bezawada Bruhadeshwar:
Fast and Scalable Range Query Processing With Strong Privacy Protection for Cloud Computing. IEEE/ACM Trans. Netw. 24(4): 2305-2318 (2016) - [c20]Bruhadeshwar Bezawada, Xiaojiang Liang, Alex X. Liu, Rui Li:
A template approach to group key establishment in dynamic ad-hoc groups. ICNP 2016: 1-2 - [c19]Rui Li, Wenjie Li, Bruhadeshwar Bezawada, Zheng Qin:
Topological ordering based iterative TCAM rule compression using bi-partite graphs. ICNP 2016: 1-2 - 2015
- [j7]Fei Chen, Bruhadeshwar Bezawada, Alex X. Liu:
Privacy-Preserving Quantification of Cross-Domain Network Reachability. IEEE/ACM Trans. Netw. 23(3): 946-958 (2015) - [c18]Bruhadeshwar Bezawada, Alex X. Liu, Bargav Jayaraman, Ann L. Wang, Rui Li:
Privacy Preserving String Matching for Cloud Computing. ICDCS 2015: 609-618 - 2014
- [j6]Rui Li, Alex X. Liu, Ann L. Wang, Bezawada Bruhadeshwar:
Fast Range Query Processing with Strong Privacy Protection for Cloud Computing. Proc. VLDB Endow. 7(14): 1953-1964 (2014) - [c17]Krishna Chaitanya Telikicherla, Venkatesh Choppella, Bruhadeshwar Bezawada:
CORP: A Browser Policy to Mitigate Web Infiltration Attacks. ICISS 2014: 277-297 - 2013
- [j5]Ashok Kumar Das, Bezawada Bruhadeshwar:
An Improved and Effective Secure Password-Based Authentication and Key Agreement Scheme Using Smart Cards for the Telecare Medicine Information System. J. Medical Syst. 37(5): 9969 (2013) - [j4]Fei Chen, Bezawada Bruhadeshwar, Alex X. Liu:
Cross-Domain Privacy-Preserving Cooperative Firewall Optimization. IEEE/ACM Trans. Netw. 21(3): 857-868 (2013) - [c16]Ashok Kumar Das, Bezawada Bruhadeshwar:
A Biometric-Based User Authentication Scheme for Heterogeneous Wireless Sensor Networks. AINA Workshops 2013: 291-296 - 2011
- [j3]Bezawada Bruhadeshwar, Sandeep S. Kulkarni:
Balancing Revocation and Storage Trade-Offs in Secure Group Communication. IEEE Trans. Dependable Secur. Comput. 8(1): 58-73 (2011) - [j2]Bezawada Bruhadeshwar, Sandeep S. Kulkarni, Alex X. Liu:
Symmetric Key Approaches to Securing BGP - A Little Bit Trust Is Enough. IEEE Trans. Parallel Distributed Syst. 22(9): 1536-1549 (2011) - [c15]Pruthvi Reddy Sabbu, Ganugula Umadevi, Kannan Srinathan, Bezawada Bruhadeshwar:
An Oblivious Image Retrieval Protocol. AINA Workshops 2011: 349-354 - [c14]Fei Chen, Bezawada Bruhadeshwar, Alex X. Liu:
Privacy-preserving cross-domain network reachability quantification. ICNP 2011: 155-164 - [c13]Fei Chen, Bezawada Bruhadeshwar, Alex X. Liu:
A cross-domain privacy-preserving protocol for cooperative firewall optimization. INFOCOM 2011: 2903-2911 - 2010
- [j1]Sandeep S. Kulkarni, Bezawada Bruhadeshwar:
Key-update distribution in secure group communication. Comput. Commun. 33(6): 689-705 (2010) - [c12]Bezawada Bruhadeshwar, Kishore Kothapalli, Indira Radhika Pulla:
A Fully Dynamic and Self-Stabilizing TDMA Scheme for Wireless Ad-hoc Networks. AINA 2010: 511-518 - [i1]Sreekanth Malladi, Bezawada Bruhadeshwar, Kishore Kothapalli:
Automatic analysis of distance bounding protocols. CoRR abs/1003.5383 (2010)
2000 – 2009
- 2009
- [c11]Bezawada Bruhadeshwar, Kishore Kothapalli, M. Poornima, M. Divya:
Routing Protocol Security Using Symmetric Key Based Techniques. ARES 2009: 193-200 - [c10]Bezawada Bruhadeshwar, Kishore Kothapalli, Maddi Sree Deepya:
Reducing the Cost of Session Key Establishment. ARES 2009: 369-373 - 2008
- [c9]V. Sai Sathyanarayan, Pankaj Kohli, Bezawada Bruhadeshwar:
Signature Generation and Detection of Malware Families. ACISP 2008: 336-349 - [c8]Pankaj Kohli, Bezawada Bruhadeshwar:
FormatShield: A Binary Rewriting Defense against Format String Attacks. ACISP 2008: 376-390 - [c7]Bezawada Bruhadeshwar, Sandeep S. Kulkarni, Alex X. Liu:
Symmetric Key Approaches to Securing BGP - A Little Bit Trust Is Enough. ESORICS 2008: 82-96 - [c6]Bezawada Bruhadeshwar, Kishore Kothapalli:
A Family of Collusion Resistant Symmetric Key Protocols for Authentication. ICDCN 2008: 387-392 - 2005
- [c5]Bezawada Bruhadeshwar, Sandeep S. Kulkarni:
User Revocation in Secure Adhoc Networks. ICDCIT 2005: 377-388 - [c4]Sandeep S. Kulkarni, Bezawada Bruhadeshwar:
A Family of Collusion Resistant Protocols for Instantiating Security. ICNP 2005: 279-288 - [c3]Sandeep S. Kulkarni, Bezawada Bruhadeshwar:
Rekeying and Storage Cost for Multiple User Revocation. NDSS 2005 - 2004
- [c2]Sandeep S. Kulkarni, Bezawada Bruhadeshwar:
Distributing Key Updates in Secure Dynamic Groups. ICDCIT 2004: 410-419 - 2002
- [c1]Sandeep S. Kulkarni, Bezawada Bruhadeshwar:
Reducing the Cost of the Critical Path in Secure Multicast for Dynamic Groups. ICDCS Workshops 2002: 43-48
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:20 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint