The Cyber Center at Purdue provides a venue for all IT-related research, hardware, software, and staffing to come together in a single venue allowing new discoveries that can have immediate impact on discovery, learning, and engagement.
This series contains publications published through The Cyber Center at Purdue University.
Submissions from 2012
Whole-genome resequencing of two elite sires for the detection of haplotypes under selection in dairy cattle Supporting Information, Denis M. Larkin, Hans D. Daetwyler, Alvaro G. Hernandez, Chris L. Wright, Lorie A. Hetrick, Lisa Boucek, Sharon Bachman, and Jyothi Thimmapuram
Submissions from 2011
Access Control for Databases: Concepts and Systems, Elisa Bertino, Gabriel Ghinita, and Ashish Kamra
ACConv -- An Access Control Model for Conversational Web Services, Federica Paci, Massimo Mecella, Mourad Ouzzani, and Elisa Bertino
A conditional purpose-based access control model with dynamic roles, Enamul Kabir, Hua Wang, and Elisa Bertino
A conditional purpose-based access control model with dynamic roles, Md. Enamul Kabir, Hua Wang, and Elisa Bertino
Aggregated Privacy-Preserving Identity Verification for Composite Web Services, Nan Guo, Tianhan Gao, Ben Zhang, Ruchith Fernando, and Elisa Bertino
Analysis of an Expert Search Query Log, Yi Fang, Naveen Somasundaram, Luo Si, Jeongwoo Ko, and Aditya P. Mathur
A New Class of Buffer Overflow Attacks, Ashish Kundu and Elisa Bertino
Approximate and exact hybrid algorithms for private nearest-neighbor queries with database protection, Gabriel Ghinita, Panos Kalnis, Murat Kantarcioglu, and Elisa Bertino
A Provenance Based Mechanism to Identify Malicious Packet Dropping Adversaries in Sensor Networks, Salmin Sultana, Elisa Bertino, and Mohamed Shehab
A Provenance Based Mechanism to Identify Malicious Packet Dropping Adversaries in Sensor Networks, Salmin Sultana, Elisa Bertino, and Mohamed Shehab
A Weighted Curve Fitting Method for Result Merging in Federated Search, Chuan He, Dzung Hong, and Luo Si
BGP molecules: Understanding and predicting prefix failures, Ravish Khosla, Sonia Fahmy, and Y.C. Hu
Composite Hashing with Multiple Information Sources, Dan Zhang, Fei Wang, and Luo Si
DECHO—a framework for the digital exploration of cultural heritage objects, Daniel G. Aliaga, Elisa Bertino, and Stefano Valtolina
Design and Implementation of an Intrusion Response System for Relational Databases, Ashish Kamra and Elisa Bertino
Detection and Protection against Distributed Denial of Service Attacks in Accountable Grid Computing Systems, Wonjun Lee, Anna Squicciarini, and Elisa Bertino
Detection and Protection against Distributed Denial of Service Attacks in Accountable Grid Computing Systems, Wonjun Lee, Anna Squicciarini, and Elisa Bertino
Document clustering with universum, Dan Zhang, Jingdong Wang, and Luo Si
Efficient systematic clustering method for k-anonymization, Enamul Kabir, Hua Wang, and Elisa Bertino
Energy-efficient provenance transmission in large-scale wireless sensor networks, S.M.I. Alam and Sonia Fahmy
Federated Search”. Foundations and Trends in Information Retrieval (FTIR), Milad Shokouhi and Luo Si
Fine-Grained Cloaking of Sensitive Positions in Location-Sharing Applications, Maria Luisa Damiani, Claudio Silvestri, and Elisa Bertino
Fine-grained integration of access control policies, Prathima Rao, Dan Lin, Elisa Bertino, Ninghui Li, and Jorge Lobo
Forecasting Counts of User Visits for Online Display Advertising with Prob. Latent Class Models, Suleyman Cetintas, Datong Chen, Luo Si, Ben Chen, and Zhanibek Datbayev