default search action
Abhrajit Ghosh
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [c23]Dmitry Evtyushkin, Thomas Benjamin, Jesse Elwell, Jeffrey A. Eitel, Angelo Sapello, Abhrajit Ghosh:
Computing with time: microarchitectural weird machines. ASPLOS 2021: 758-772
2010 – 2019
- 2018
- [c22]Jesse Elwell, Angelo Sapello, Alexander Poylisher, Giovanni Di Crescenzo, Abhrajit Ghosh, Ayumu Kubota, Takashi Matsunaka:
Runtime Attestation for IAAS Clouds. CLOSER 2018: 233-247 - 2017
- [c21]Angelo Sapello, C. Jason Chiang, Jesse Elwell, Abhrajit Ghosh, Ayumu Kubota, Takashi Matsunaka:
ROP Defense in the Cloud through LIve Text Page-level Re-ordering - The LITPR System. CLOSER 2017: 191-200 - 2015
- [c20]Giovanni Di Crescenzo, Abhrajit Ghosh:
Privacy-Preserving Range Queries from Keyword Queries. DBSec 2015: 35-50 - [c19]Roberto Pagliari, Abhrajit Ghosh, Yitzchak M. Gottlieb, Ritu Chadha, Akshay Vashist, Gregory Hadynski:
Insider attack detection using weak indicators over network flow data. MILCOM 2015: 1-6 - [c18]Ritu Chadha, Abhrajit Ghosh, Alexander Poylisher, Constantin Serban:
TREND: Trust estimation system for wireless networks via multi-pronged detection. MILCOM 2015: 13-18 - 2014
- [c17]Abhrajit Ghosh, Angelo Sapello, Alexander Poylisher, C. Jason Chiang, Ayumu Kubota, Takashi Matsunaka:
On the Feasibility of Deploying Software Attestation in Cloud Environments. IEEE CLOUD 2014: 128-135 - 2012
- [c16]Ravichander Vaidyanathan, Abhrajit Ghosh, Yukiko Sawaya, Ayumu Kubota:
On the use of Enhanced Bogon Lists (EBLs) to detect malicious traffic. ICNC 2012: 1-6 - [c15]Constantin Serban, Ritu Chadha, C. Jason Chiang, Feng Ge, Abhrajit Ghosh, Yitzchak M. Gottlieb, Michael Kaplan, Kathleen Kurachik, Gary Levin, Yow-Jia Lin, Alexander Poylisher, Angelo Sapello, Florin Sultan, Akshay Vashist, Michelle Wolberg, Kimberly Moeltner:
TITAN: Integrated network management in tactical mobile ad hoc networks. MILCOM 2012: 1-6 - 2011
- [j4]Giovanni Di Crescenzo, Abhrajit Ghosh, Abhinay Kampasi, Rajesh Talpade, Yin Zhang:
Detecting Anomalies in Active Insider Stepping Stone Attacks. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 2(1): 103-120 (2011) - [c14]Akshay Vashist, Siun-Chuon Mau, Alexander Poylisher, Ritu Chadha, Abhrajit Ghosh:
Leveraging social network for predicting demand and estimating available resources for communication network management. Integrated Network Management 2011: 547-554 - [c13]Alexander Poylisher, Florin Sultan, Abhrajit Ghosh, Shiwei Li, C. Jason Chiang, Ritu Chadha, Kimberly Moeltner, Kimberly Jakubowski:
QAM: A comprehensive QoS-aware Middleware suite for tactical communications. MILCOM 2011: 1586-1591 - 2010
- [j3]Pratik K. Biswas, Alexander Poylisher, Ritu Chadha, Abhrajit Ghosh:
Integrated network experimentation for QoS measurements in opaque MANETs. Int. J. Netw. Manag. 20(4): 199-218 (2010) - [c12]Patrick Traynor, Joshua Schiffman, Thomas La Porta, Patrick D. McDaniel, Abhrajit Ghosh:
Constructing Secure Localization Systems with Adjustable Granularity Using Commodity Hardware. GLOBECOM 2010: 1-6 - [c11]Akshay Vashist, Siun-Chuon Mau, Alexander Poylisher, Ritu Chadha, Abhrajit Ghosh:
Predicting End-to-end Network Load. ICMLA 2010: 917-920
2000 – 2009
- 2008
- [c10]Abhrajit Ghosh, Vikram Kaul, David Famolari:
An Approach to Secure Localization in WLANs. WCNC 2008: 3145-3150 - [c9]Pratik K. Biswas, Alexander Poylisher, Ritu Chadha, Abhrajit Ghosh:
Hybrid testbeds for QoS management in opaque MANETS. WICON 2008: 72 - 2005
- [c8]Moncef Elaoud, David Famolari, Abhrajit Ghosh:
Experimental VoIP capacity measurements for 802.11b WLANs. CCNC 2005: 272-277 - [c7]Giovanni Di Crescenzo, Abhrajit Ghosh, Rajesh Talpade:
Towards a Theory of Intrusion Detection. ESORICS 2005: 267-286 - [c6]Abhrajit Ghosh, Larry Wong, Giovanni Di Crescenzo, Rajesh Talpade:
InFilter: Predictive Ingress Filtering to Detect Spoofed IP Traffic. ICDCS Workshops 2005: 99-106 - [c5]Abhrajit Ghosh, Farooq Anjum:
Last hop topology sensitive multicasting key managment. Q2SWinet 2005: 63-70 - 2004
- [j2]Rabih Zbib, Farooq Anjum, Abhrajit Ghosh, Amjad Umar:
Intrusion Tolerance in Distributed Middleware. Inf. Syst. Frontiers 6(1): 67-75 (2004) - 2003
- [c4]Farooq Anjum, Moncef Elaoud, David Famolari, Abhrajit Ghosh, Ravichander Vaidyanathan, Ashutosh Dutta, Prathima Agrawal, Toshikazu Kodama, Yasuhiro Katsube:
Voice performance in WLAN networks - an experimental study. GLOBECOM 2003: 3504-3508 - 2002
- [j1]Stan Moyer, Dave Marples, Simon Tsang, Abhrajit Ghosh:
Service portability of networked appliances. IEEE Commun. Mag. 40(1): 116-121 (2002) - [c3]Manish Rathi, Farooq Anjum, Rabih Zbib, Abhrajit Ghosh, Amjad Umar:
Investigation of intrusion tolerance for COTS middleware. ICC 2002: 1169-1173 - 2001
- [c2]Abhrajit Ghosh, David Marples, Stanley Moyer:
ASP perspectives on networked appliances. ICC 2001: 1299-1302
1990 – 1999
- 1999
- [c1]Kanad Ghose, Sudhir Aggarwal, Abhrajit Ghosh, David Goldman, Peter Sulatycke, Pavel Vasek, David R. Vogel:
Designing Multiprocessor/Distributed Real-Time Systems Using the ASSERTS Toolkit. Euro-Par 1999: 505-510
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:40 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint