Follow
Bruhadeshwar Bezawada
Bruhadeshwar Bezawada
Southern Arkansas University, Magnolia, Arkansas
Verified email at saumag.edu - Homepage
Title
Cited by
Cited by
Year
Behavioral fingerprinting of iot devices
B Bezawada, M Bachani, J Peterson, H Shirazi, I Ray, I Ray
Proceedings of the 2018 Workshop on Attacks and Solutions in Hardware …, 2018
2932018
Signature generation and detection of malware families
VS Sathyanarayan, P Kohli, B Bruhadeshwar
Information Security and Privacy: 13th Australasian Conference, ACISP 2008 …, 2008
1932008
Fast range query processing with strong privacy protection for cloud computing
R Li, AX Liu, AL Wang, B Bruhadeshwar
Proceedings of the VLDB Endowment 7 (14), 1953-1964, 2014
1272014
"Kn0w Thy Doma1n Name" Unbiased Phishing Detection Using Domain Name Based Features
H Shirazi, B Bezawada, I Ray
Proceedings of the 23nd ACM on symposium on access control models and …, 2018
1162018
An improved and effective secure password-based authentication and key agreement scheme using smart cards for the telecare medicine information system
AK Das, B Bruhadeshwar
Journal of medical systems 37, 1-17, 2013
862013
Fast and scalable range query processing with strong privacy protection for cloud computing
R Li, AX Liu, AL Wang, B Bruhadeshwar
IEEE/ACM Transactions On Networking 24 (4), 2305-2318, 2015
842015
Securing home IoT environments with attribute-based access control
B Bezawada, K Haefner, I Ray
Proceedings of the Third ACM Workshop on Attribute-Based Access Control, 43-53, 2018
642018
Anomalous packet detection using partitioned payload
SA Thorat, AK Khandelwal, B Bruhadeshwar, K Kishore
Journal of Information Assurance and Security 3 (3), 195-202, 2008
59*2008
Cross-domain privacy-preserving cooperative firewall optimization
F Chen, B Bruhadeshwar, AX Liu
IEEE/ACM transactions on Networking 21 (3), 857-868, 2012
48*2012
Adversarial sampling attacks against phishing detection
H Shirazi, B Bezawada, I Ray, C Anderson
Data and Applications Security and Privacy XXXIII: 33rd Annual IFIP WG 11.3 …, 2019
412019
Balancing revocation and storage trade-offs in secure group communication
B Bruhadeshwar, SS Kulkarni
IEEE Transactions on dependable and secure computing 8 (1), 58-73, 2009
372009
Privacy preserving string matching for cloud computing
B Bezawada, AX Liu, B Jayaraman, AL Wang, R Li
2015 IEEE 35th International Conference on Distributed Computing Systems …, 2015
342015
Independent key distribution protocols for broadcast authentication
B Bezawada, S Kulkarni, I Ray, I Ray, R Li
Proceedings of the 23nd ACM on Symposium on Access Control Models and …, 2018
32*2018
A biometric-based user authentication scheme for heterogeneous wireless sensor networks
AK Das, B Bruhadeshwar
2013 27th International Conference on Advanced Information Networking and …, 2013
302013
Key-update distribution in secure group communication
SS Kulkarni, B Bruhadeshwar
Computer Communications 33 (6), 689-705, 2010
28*2010
Symmetric key approaches to securing BGP—a little bit trust is enough
B Bruhadeshwar, SS Kulkarni, AX Liu
IEEE Transactions on Parallel and Distributed Systems 22 (9), 1536-1549, 2011
262011
Privacy and Integrity Preserving Top- Query Processing for Two-Tiered Sensor Networks
R Li, AX Liu, S Xiao, H Xu, B Bruhadeshwar, AL Wang
IEEE/ACM Transactions on Networking 25 (4), 2334-2346, 2017
252017
EspyDroid+: Precise reflection analysis of android apps
J Gajrani, U Agarwal, V Laxmi, B Bezawada, MS Gaur, M Tripathi, ...
Computers & Security 90, 101688, 2020
242020
Privacy-preserving quantification of cross-domain network reachability
F Chen, B Bezawada, AX Liu
IEEE/ACM Transactions on Networking 23 (3), 946-958, 2014
24*2014
Behavioral fingerprinting of Internet‐of‐Things devices
B Bezawada, I Ray, I Ray
Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery 11 (1 …, 2021
232021
The system can't perform the operation now. Try again later.
Articles 1–20