The state of public infrastructure-as-a-service cloud security W Huang, A Ganjali, BH Kim, S Oh, D Lie ACM Computing Surveys (CSUR) 47 (4), 1-31, 2015 | 114 | 2015 |
Unicorn: Two-Factor Attestation for Data Security M Mannan, BH Kim, A Ganjali, D Lie ACM Conference on Computer and Communications Security (CCS), 17-28, 2011 | 31 | 2011 |
Auditing Cloud Administrators Using Information Flow Tracking A Ganjali, D Lie ACM Workshop on Scalable Trusted Computing (STC), 79-84, 2012 | 25* | 2012 |
A Requirements-Based Partition Testing Framework Using Particle Swarm Optimization Technique A Ganjali University of Waterloo, 2008 | 17 | 2008 |
A Requirement-Based Software Testing Framework: An Industrial Practice S Mirarab, A Ganjali, L Tahvildari, S Li, W Liu, M Morrissey IEEE International Conference on Software Maintenance (ICSM), 452-455, 2008 | 13 | 2008 |
Unity 2.0: Secure and Durable Personal Cloud Storage B Heyn Kim, W Huang, A Ganjali, D Lie arXiv e-prints, arXiv: 1710.03861, 2017 | | 2017 |