The Cyber Center at Purdue provides a venue for all IT-related research, hardware, software, and staffing to come together in a single venue allowing new discoveries that can have immediate impact on discovery, learning, and engagement.

This series contains publications published through The Cyber Center at Purdue University.

Follow

Submissions from 2012

Link

Panel: Using information re-use and integration principles in big data, Elisa Bertino, Stuart Rubin, Taghi Khoshgoftaar, Bhavani Thuraisingham, and James McCaffrey

Link

Polarity Consistency Checking for Sentiment Dictionaries, Eduard Dragut, Hong Wang, Clement Yu, Prasad Sistla, and Weiyi Meng

Link

Preserving privacy of feedback providers in decentralized reputation systems, Omar Hasan, Lionel Brunie, and Elisa Bertino

Link

Privacy-Preserving and Content-Protecting Location Based Queries, Russell Paulet, Md. Golam Koasar, Xun Yi, and Elisa Bertino

Link

Privacy preserving delegated access control in the storage as a service model, Mohamed Nabeel and Elisa Bertino

Link

Privacy-Preserving Enforcement of Spatially Aware RBAC, Michael Kirkpatrick, Gabriel Ghinita, and Elisa Bertino

Link

Reducing the complexity of BGP stability analysis with hybrid combinatorial-algebraic models, Debbie Perouli, Stefano Vissicchio, Alexander Gurney, Olaf Maennel, Timmothy Griffin, Iain Phillips, Sonia Fahmy, and Cristel Pelsser

Link

Reliable, Flexible Cloud Computing, Storage, Backup, Disaster Recovery, Abdulrahman Almutairi, Muhammed Sarfraz, Saleh Basalamah, Walid G. Aref, and Arif Ghafoor

Link

Resilient Authenticated Execution of Critical Applications in Untrusted Environments, Michael Kirkpatrick, Gabriel Ghinita, and Elisa Bertino

Link

Robust Nonnegative Matrix Factorization via $L_1$ Norm Regularization, Bin Shen, Luo Si, Rong Ji, and Baodi Liu

Link

Secure provenance transmission for streaming data, Salmin Sultana, Mohamed Shehab, and Elisa Bertino

Link

Secure sensor network SUM aggregation with detection of malicious nodes, Sunoh Choi, Gabriel Ghinita, and Elisa Bertino

Link

Secure sensor network SUM aggregation with detection of malicious nodes, Sunoh Choi, Gabriel Ghinita, and Elisa Bertino

Link

Sentiment detection with auxiliary data, Dan Zhang, Luo Si, and Vernon Rego

Link

Spatial Queries with Two kNN Predicates, Ahmed Aly, Walid G. Aref, and Mourad Ouzzani

Spatial Queries with Two kNN Predicates, Ahmed Aly, Mourad Ouzzani, and Walid Aref

Link

Special issue: best papers of VLDB 2010, Paolo Atzeni, Elisa Bertino, Masaru Kitsuregawa, and Kian-Lee Tan

Link

SYSTEM ON CHIP AND METHOD FOR CRYPTOGRAPHY USING A PHYSICALLY UNCLONABLE FUNCTION, Michael Kirkpatrick, Sam Kerr, and Elisa Bertino

PDF

The bench scientist's guide to statistical analysis of RNA-Seq data, Craig R. Yendrek, Elizabeth A. Ainsworth, and Jyothi Thimmapuram

Link

Topic 11: Multicore and Manycore Programming, Eduard Ayguade, Dionisios Pnevmatikatos, Rudolf Eigenmann, Mikel Lujan, and Sabri Pllana

Link

Towards a theory for privacy preserving distributed OLAP, Alfredo Cuzzocrea, Elisa Bertino, and Domenico Sacca

Link

Trusted Identities in Cyberspace, Elisa Bertino

Link

Using automated individual white-list to protect web digital identities, Weili Han, Ye Cao, Elisa Bertino, and Jianming Yong

Link

Whole-genome resequencing of two elite sires for the detection of haplotypes under selection in dairy cattle., DM Larkin, HD Daetwyler, AG Hernandez, CL Wright, LA Hetrick, L Boucek, SL Bachman, MR Brand, TV Akraiko, M Cohen-Zinder, Jyothi Thimmapuram, IM Macleod, TT Harkin, JE McCaque, ME Goddard, BJ Hayes, and HA Lewin

Link

Whole-genome resequencing of two elite sires for the detection of haplotypes under selection in dairy cattle., DM Larkin, HD Daetwyler, AG Hernandez, CL Wright, LA Hetrick, L Boucek, SL Bachman, MR Brand, TV Akraiko, M Cohen-Zinder, Jyothi Thimmapuram, IM Macleod, TT Harkin, JE McCaque, BJ Hayes, and HA Lewin