1. Samir Talegaon and Ram Krishnan. Administrative Models for Role Based Access Control in Android. In Journal of Internet Services and Information Security, Vol. 10, Issue 3, pp 31-46, August 2020. doi: 10.22667/JISIS.2020.08.31.031
  2. Naiwei Liu, Meng Yu, Wanyu Zang and Ravi Sandhu. On the Cost-Effectiveness of TrustZone Defense on ARM Platform. In Proceedings of 21st World Conference on Information Security Applications (WISA), Virtual Event, August 26-28, 2020, 12 pages, doi: https://doi.org/10.1007/978-3-030-65299-9_16
  3. Safwa Ameer, James Benson and Ravi Sandhu. The EGRBAC Model for Smart Home IoT. In Proceedings of the 21st IEEE Conference on Information Reuse and Integration (IRI), Virtual Event, August 11-13, 2020, 8 pgs, doi: 10.1109/IRI49571.2020.00076.
  4. Bao J, He D, Luo M and Choo K-K R. A Survey of Blockchain Applications in the Energy Sector. IEEE Systems Journal, July 2020, doi: https://doi.org/10.1109/JSYST.2020.2998791
  5. Zhang, Xueling, Xiaoyin Wang, Rocky Slavin, Travis Breaux, and Jianwei Niu. How Does Misconfiguration of Analytic Services Compromise Mobile Privacy?. 42nd ACM/IEEE International Conference on Software Engineering (ICSE), July 2020, 12 pgs, doi: https://doi.org/10.1145/3377811.3380401
  6. Smriti Bhatt and Ravi Sandhu. ABAC-CC: Attribute-Based Access Control and Communication Control for Internet of Things. In Proceedings of the 25th ACM Symposium on Access Control Models and Technologies (SACMAT), Virtual Event, June 10-12, 2020, pages 203-212, doi: https://doi.org/10.1145/3381991.3395618
  7. Chen B, He D, Kumar N, Wang H and Choo K-K R. A Blockchain-Based Proxy Re-Encryption with Equality Test for Vehicular Communication Systems. IEEE Transactions on Network Science and Engineering, June 2020. doi: https://doi.org/10.1109/TNSE.2020.2999551
  8. Chen H, Pendleton M, Njilla L, Xu S. A survey on ethereum systems security: Vulnerabilities, attacks and defenses. ACM Computing Surveys:1908.04507. June 2020, doi: https://doi.org/10.1145/3391195
  9. Lin C, He D, Huang X, Kumar N and Choo K-K R. BCPPA: A Blockchain-based Conditional Privacy-preserving Authentication Protocol for Vehicular Ad Hoc Networks. IEEE Transactions on Intelligent Transportation Systems, June 2020, doi: https://doi.org/10.1109/TITS.2020.3002096
  10. Q. Feng, D. He, Z. Liu, H. Wang and K. R. Choo. SecureNLP: A System for Multi-Party Privacy-Preserving Natural Language Processing, in IEEE Transactions on Information Forensics and Security, vol. 15, pp. 3709-3721, May 2020, doi: 10.1109/TIFS.2020.2997134.
  11. Lawa, Sherifdeen, and Ram Krishnan. Policy Review in Attribute Based Access Control A Policy Machine Case Study Journal of Internet Services and Information Security (JISIS) 10.2 May 2020: 14 pgs, doi: 10.22667/JISIS.2020.05.31.067
  12. Zhang X, Upton O, Beebe N and Choo K-K R. IoT Botnet Forensics: A Comprehensive Digital Forensic Case Study on Mirai Botnet Servers. Forensic Science International: Digital Investigation, April 2020, doi: https://doi.org/10.1016/j.fsidi.2020.300926
  13. Hosseini, Mitra Bokaei, Rocky Slavin, Travis Breaux, Xiaoyin Wang, and Jianwei Niu. Disambiguating Requirements Through Syntax-Driven Semantic Analysis of Information Types. In International Working Conference on Requirements Engineering: Foundation for Software Quality, pp. 97-115. Springer, Cham, March 2020, doi: https://doi.org/10.1007/978-3-030-44429-7_7
  14. Mandal S, Bera B, Sutrala A K, Das A K, Choo K-K R and Park Y. Certificateless-Signcryption-Based Three-Factor User Access Control Scheme for IoT Environment. IEEE Internet of Things Journal 7(4): 3184-3197, Jan 2020, doi: https://doi.org/10.1109/JIOT.2020.2966242
  15. Guo C, Jia J, Jie Y, Liu C Z and Choo K-K R. Enabling Secure Cross-Modal Retrieval over Encrypted Heterogeneous IoT Databases with Collective Matrix Factorization. IEEE Internet of Things Journal 7(4): 3104-3113, Jan 2020, doi: https://doi.org/10.1109/JIOT.2020.2964412
  16. Lei Xu, Lin Chen, Zhimin Gao, Xinxin Fan, Kimberly Doan, Shouhuai Xu and Weidong Shi. KCRS: A Blockchain-Based Key Compromise Resilient Signature System. In International Conference on Blockchain and Trustworthy Systems, Dec 2019, doi: https://doi.org/10.1007/978-981-15-2777-7_19
  17. Mehrnoosh Shakarami and Ravi Sandhu. Safety and Consistency of Mutable Attributes Using Quotas: A Formal Analysis. In Proceedings of the 1st IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA), Los Angeles, California, December 12-14, 2019, 9 pages, doi: https://doi.org/10.1109/TPS-ISA48467.2019.00010
  18. Chakraborty Shuvra, Sandhu Ravi, Krishnan Ram. On the Feasibility of RBAC to ABAC Policy Mining: A Formal Analysis. In Proceedings of the 8th International Conference on Secure Knowledge Management in Artificial Intelligence Era (SKM), Goa, India, Dec. 21-22, 2019, doi: https://doi.org/10.1007/978-981-15-3817-9_9
  19. Haque, Md Farhan, and Ram Krishnan. Toward Relationship Based Access Control for Secure Sharing of Structured Cyber Threat Intelligence. In Proceedings of the 8th International Conference on Secure Knowledge Management in Artificial Intelligence Era (SKM), Goa, India, Dec. 21-22, 2019, doi: https://doi.org/10.1007/978-981-15-3817-9_2
  20. Talegaon, Samir & Krishnan, Ram. A Formal Specification of Access Control in Android. In Proceedings of the 8th International Conference on Secure Knowledge Management in Artificial Intelligence Era (SKM), Goa, India, Dec. 21-22, 2019, doi: 10.1007/978-981-15-3817-9_7.
  21. Rodriguez, Rodney; Wang, Xiaoyin. Static Analysis of File Manipulation Scripts, IEEE Pacific Rim International Symposium on Dependable Computing (PRDC), Dec 2019, doi: https://doi.org/10.1109/PRDC47002.2019.00039
  22. Zhang, Xueling; Slavin, Rocky; Wang, Xiaoyin; Niu, Jianwei. Privacy Assurance for Android Augmented Reality Apps, IEEE Pacific Rim International Symposium on Dependable Computing (PRDC), Dec 2019, doi: https://doi.org/10.1109/PRDC47002.2019.00037
  23. Gabriel C. Fernandez and Shouhuai Xu. A Case Study on Using Deep Learning for Network Intrusion Detection. IEEE Milcom, Nov 2019, doi: https://doi.org/10.1109/MILCOM47813.2019.9020824
  24. Eric Ficke, Kristin M. Schweitzer, Raymond M. Bateman, and Shouhuai Xu. Analyzing Root Causes of Intrusion Detection False-Negatives: Methodology and Case Study. IEEE Milcom, Nov 2019, doi: 10.1109/MILCOM47813.2019.9020860
  25. Jonathan Shahen, Jianwei Niu, and Mahesh V. Tripunitara. Cree: a Performant Tool for Safety Analysis of Administrative Temporal Role-Based Access Control (ATRBAC) Policies. IEEE Transactions on Dependable and Secure Computing, Oct 2019, doi: https://doi.org/10.1109/TDSC.2019.2949410
  26. Abdullah Al-Alaj, Ram Krishnan and Ravi Sandhu. SDN-RBAC: An Access Control Model for SDN Controller Applications, In Proceedings of 4th IEEE International Conference on Computing Communication and Security (ICCCS 2019), Rome, Italy, October 10-12, 2019, doi: 10.1109/CCCS.2019.8888031
  27. Randy Klepetko and Ram Krishnan. Analyzing CNN Model Performance Sensitivity to the Ordering of Non-Natural Data, In Proceedings of 4th IEEE International Conference on Computing Communication and Security (ICCCS 2019), Rome, Italy, October 10-12, 2019, doi: https://doi.org/10.1109/CCCS.2019.8888041
  28. D. Zou, S. Wang, S. Xu, Z. Li, and H. Jin. muVulDeePecker: A Deep Learning-Based System for Multiclass Vulnerability Detection. IEEE Transactions on Dependable and Secure Computing (IEEE TDSC), Sept. 2019, doi: 10.1109/TDSC.2019.2942930.
  29. Shaikh Mostafa, Bridgette Findley, Na Meng, and Xiaoyin Wang. SAIS: Self-Adaptive Identification of Security Bug Reports, IEEE Transactions on Dependable and Secure Computing (IEEE TDSC), Sept. 2019, doi: 10.1109/TDSC.2019.2939132.