Follow
Kapil Singh
Kapil Singh
IBM T.J. Watson Research Center
Verified email at us.ibm.com - Homepage
Title
Cited by
Cited by
Year
Protection of user data in hosted application environments
M Christodorescu, D Pendarakis, KK Singh
US Patent 9,245,126, 2016
2782016
Biometric authentication on a mobile device: a study of user effort, error and task disruption
S Trewin, C Swart, L Koved, J Martino, K Singh, S Ben-David
Proceedings of the 28th Annual Computer Security Applications Conference …, 2012
2052012
{PolicyLint}: Investigating internal privacy policy contradictions on google play
B Andow, SY Mahmud, W Wang, J Whitaker, W Enck, B Reaves, K Singh, ...
28th USENIX security symposium (USENIX security 19), 585-602, 2019
1452019
xBook: Redesigning Privacy Control in Social Networking Platforms.
K Singh, S Bhola, W Lee
USENIX Security Symposium, 249-266, 2009
1222009
Evaluating bluetooth as a medium for botnet command and control
K Singh, S Sangal, N Jain, P Traynor, W Lee
Detection of Intrusions and Malware, and Vulnerability Assessment: 7th …, 2010
1202010
Actions speak louder than words:{Entity-Sensitive} privacy policy and data flow analysis with {PoliCheck}
B Andow, SY Mahmud, J Whitaker, W Enck, B Reaves, K Singh, ...
29th USENIX Security Symposium (USENIX Security 20), 985-1002, 2020
1152020
On the incoherencies in web browser access control policies
K Singh, A Moshchuk, HJ Wang, W Lee
2010 IEEE Symposium on Security and Privacy, 463-478, 2010
1152010
Trust/value/risk-based access control policy
PC Cheng, L Koved, KK Singh
US Patent 9,432,375, 2016
792016
Protection of confidentiality, privacy and ownership assurance in a blockchain based decentralized identity management system
S Chari, H Gunasinghe, HM Krawczyk, A Kundu, KK Singh, D Su
US Patent 10,833,861, 2020
722020
Adaptive behavior profiling and anomaly scoring through continuous learning
PC Cheng, L Koved, KK Singh
US Patent 9,807,105, 2017
722017
Aphids: A mobile agent-based programmable hybrid intrusion detection system
K Deeter, K Singh, S Wilson, L Filipozzi, S Vuong
Mobility Aware Technologies and Applications: First International Workshop …, 2004
552004
Evaluating email’s feasibility for botnet command and control
K Singh, A Srivastava, J Giffin, W Lee
2008 IEEE International Conference on Dependable Systems and Networks With …, 2008
432008
Uiref: analysis of sensitive user inputs in android applications
B Andow, A Acharya, D Li, W Enck, K Singh, T Xie
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless …, 2017
422017
Practical context-aware permission control for hybrid mobile applications
K Singh
International Workshop on Recent Advances in Intrusion Detection, 307-327, 2013
422013
Decentralized database identity management system
KK Singh, SN Chari, A Kundu, S Muppidi, D Su
US Patent 11,178,151, 2021
402021
Context-aware permission control of hybrid mobile applications
KK Singh
US Patent 9,275,221, 2016
372016
Method and apparatus for server-side authentication and authorization for mobile clients without client-side application modification
L Koved, KK Singh
US Patent 9,088,555, 2015
372015
Understanding precision in host based intrusion detection: Formal analysis and practical models
M Sharif, K Singh, J Giffin, W Lee
Recent Advances in Intrusion Detection: 10th International Symposium, RAID …, 2007
352007
Protection of confidentiality, privacy and financial fairness in a blockchain based decentralized identity management system
S Chari, H Gunasinghe, A Kundu, KK Singh, D Su
US Patent 10,715,317, 2020
342020
VulnerableMe: Measuring systemic weaknesses in mobile browser security
C Amrutkar, K Singh, A Verma, P Traynor
Information Systems Security: 8th International Conference, ICISS 2012 …, 2012
342012
The system can't perform the operation now. Try again later.
Articles 1–20