Mavmm: Lightweight and purpose built vmm for malware analysis AM Nguyen, N Schear, HD Jung, A Godiyal, ST King, HD Nguyen 2009 Annual Computer Security Applications Conference, 441-450, 2009 | 133 | 2009 |
Computing on masked data: a high performance method for improving big data veracity J Kepner, V Gadepally, P Michaleas, N Schear, M Varia, A Yerukhimovich, ... 2014 IEEE High Performance Extreme Computing Conference (HPEC), 1-6, 2014 | 114 | 2014 |
A survey of cryptographic approaches to securing big-data analytics in the cloud S Yakoubov, V Gadepally, N Schear, E Shen, A Yerukhimovich 2014 IEEE High Performance Extreme Computing Conference (HPEC), 1-6, 2014 | 91 | 2014 |
Website detection using remote traffic analysis X Gong, N Borisov, N Kiyavash, N Schear Privacy Enhancing Technologies: 12th International Symposium, PETS 2012 …, 2012 | 78 | 2012 |
Bootstrapping and maintaining trust in the cloud N Schear, PT Cable, TM Moyer, B Richard, R Rudd Proceedings of the 32nd Annual Conference on Computer Security Applications …, 2016 | 54 | 2016 |
Neon: system support for derived data management Q Zhang, J McCullough, J Ma, N Schear, M Vrable, A Vahdat, ... ACM Sigplan Notices 45 (7), 63-74, 2010 | 54 | 2010 |
Transparent web service auditing via network provenance functions A Bates, WU Hassan, K Butler, A Dobra, B Reaves, P Cable, T Moyer, ... Proceedings of the 26th International Conference on World Wide Web, 887-895, 2017 | 53 | 2017 |
Glavlit: Preventing exfiltration at wire speed N Schear, C Kintana, Q Zhang, A Vahdat Proc. 5th Workshop Hot Topics in Networks, 133-138, 2006 | 44 | 2006 |
Cryptography for Big Data Security. A Hamlin, N Schear, E Shen, M Varia, S Yakoubov, A Yerukhimovich IACR Cryptol. ePrint Arch. 2016, 12, 2016 | 36 | 2016 |
High-speed matching of vulnerability signatures N Schear, DR Albrecht, N Borisov Recent Advances in Intrusion Detection: 11th International Symposium, RAID …, 2008 | 34 | 2008 |
Supporting security sensitive tenants in a {bare-metal} cloud A Mosayyebzadeh, A Mohan, S Tikale, M Abdi, N Schear, T Hudson, ... 2019 USENIX Annual Technical Conference (USENIX ATC 19), 587-602, 2019 | 22 | 2019 |
Secure multiparty computation for cooperative cyber risk assessment K Hogan, N Luther, N Schear, E Shen, D Stott, S Yakoubov, ... 2016 IEEE Cybersecurity Development (SecDev), 75-76, 2016 | 17 | 2016 |
Cloud computing in tactical environments W Smith, G Kuperman, M Chan, E Morgan, H Nguyen, N Schear, B Vu, ... MILCOM 2017-2017 IEEE Military Communications Conference (MILCOM), 882-887, 2017 | 14 | 2017 |
Piracy in the digital age D Dahlstrom, N Farrington, D Gobera, R Roemer, N Schear History of Computing, 1-24, 2006 | 13 | 2006 |
A secure cloud with minimal provider trust A Mosayyebzadeh, G Ravago, A Mohan, A Raza, S Tikale, N Schear, ... 10th USENIX Workshop on Hot Topics in Cloud Computing (HotCloud 18), 2018 | 12 | 2018 |
Automated provenance analytics: A regular grammar based approach with applications in security M Lemay, WU Hassan, T Moyer, N Schear, W Smith 9th USENIX Workshop on the Theory and Practice of Provenance (TaPP 2017), 2017 | 12 | 2017 |
Leveraging data provenance to enhance cyber resilience T Moyer, K Chadha, R Cunningham, N Schear, W Smith, A Bates, K Butler, ... 2016 IEEE Cybersecurity Development (SecDev), 107-114, 2016 | 10 | 2016 |
Models of privacy preserving traffic tunneling DM Nicol, N Schear Simulation 85 (9), 589-607, 2009 | 10 | 2009 |
Performance analysis of real traffic carried with encrypted cover flows N Schear, DM Nicol 2008 22nd Workshop on Principles of Advanced and Distributed Simulation, 80-87, 2008 | 10 | 2008 |
Retrofitting applications with provenance-based security monitoring A Bates, K Butler, A Dobra, B Reaves, P Cable, T Moyer, N Schear arXiv preprint arXiv:1609.00266, 2016 | 7 | 2016 |