Protection of user data in hosted application environments M Christodorescu, D Pendarakis, KK Singh US Patent 9,245,126, 2016 | 285 | 2016 |
Biometric authentication on a mobile device: a study of user effort, error and task disruption S Trewin, C Swart, L Koved, J Martino, K Singh, S Ben-David Proceedings of the 28th Annual Computer Security Applications Conference …, 2012 | 208 | 2012 |
{PolicyLint}: investigating internal privacy policy contradictions on google play B Andow, SY Mahmud, W Wang, J Whitaker, W Enck, B Reaves, K Singh, ... 28th USENIX security symposium (USENIX security 19), 585-602, 2019 | 186 | 2019 |
Actions speak louder than words:{Entity-Sensitive} privacy policy and data flow analysis with {PoliCheck} B Andow, SY Mahmud, J Whitaker, W Enck, B Reaves, K Singh, ... 29th USENIX Security Symposium (USENIX Security 20), 985-1002, 2020 | 143 | 2020 |
xBook: Redesigning Privacy Control in Social Networking Platforms. K Singh, S Bhola, W Lee USENIX Security Symposium, 249-266, 2009 | 124 | 2009 |
Evaluating bluetooth as a medium for botnet command and control K Singh, S Sangal, N Jain, P Traynor, W Lee Detection of Intrusions and Malware, and Vulnerability Assessment: 7th …, 2010 | 119 | 2010 |
On the incoherencies in web browser access control policies K Singh, A Moshchuk, HJ Wang, W Lee 2010 IEEE Symposium on Security and Privacy, 463-478, 2010 | 117 | 2010 |
Trust/value/risk-based access control policy PC Cheng, L Koved, KK Singh US Patent 9,432,375, 2016 | 83 | 2016 |
Protection of confidentiality, privacy and ownership assurance in a blockchain based decentralized identity management system S Chari, H Gunasinghe, HM Krawczyk, A Kundu, KK Singh, D Su US Patent 10,833,861, 2020 | 76 | 2020 |
Adaptive behavior profiling and anomaly scoring through continuous learning PC Cheng, L Koved, KK Singh US Patent 9,807,105, 2017 | 74 | 2017 |
APHIDS: A mobile agent-based programmable hybrid intrusion detection system K Deeter, K Singh, S Wilson, L Filipozzi, S Vuong Mobility Aware Technologies and Applications: First International Workshop …, 2004 | 53 | 2004 |
Uiref: analysis of sensitive user inputs in android applications B Andow, A Acharya, D Li, W Enck, K Singh, T Xie Proceedings of the 10th acm conference on security and privacy in wireless …, 2017 | 47 | 2017 |
Evaluating email’s feasibility for botnet command and control K Singh, A Srivastava, J Giffin, W Lee 2008 IEEE International Conference on Dependable Systems and Networks With …, 2008 | 45 | 2008 |
Practical context-aware permission control for hybrid mobile applications K Singh International Workshop on Recent Advances in Intrusion Detection, 307-327, 2013 | 43 | 2013 |
Decentralized database identity management system KK Singh, SN Chari, A Kundu, S Muppidi, D Su US Patent 11,178,151, 2021 | 42 | 2021 |
Method and apparatus for server-side authentication and authorization for mobile clients without client-side application modification L Koved, KK Singh US Patent 9,088,555, 2015 | 41 | 2015 |
Protection of confidentiality, privacy and financial fairness in a blockchain based decentralized identity management system S Chari, H Gunasinghe, A Kundu, KK Singh, D Su US Patent 10,715,317, 2020 | 39 | 2020 |
Context-aware permission control of hybrid mobile applications KK Singh US Patent 9,275,221, 2016 | 39 | 2016 |
Understanding precision in host based intrusion detection: Formal analysis and practical models M Sharif, K Singh, J Giffin, W Lee Recent Advances in Intrusion Detection: 10th International Symposium, RAID …, 2007 | 36 | 2007 |
VulnerableMe: Measuring systemic weaknesses in mobile browser security C Amrutkar, K Singh, A Verma, P Traynor Information Systems Security: 8th International Conference, ICISS 2012 …, 2012 | 34 | 2012 |