default search action
Vipin Swarup
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c23]Mehedi Hassan, Mehmet Engin Tozal, Vipin Swarup, Steven Noel, Raju Gottumukkala, Vijay Raghavan:
Anomalous Link Detection in Dynamically Evolving Scale-Free-Like Networked Systems. SysCon 2024: 1-8 - 2022
- [c22]Massimiliano Albanese, Karin Johnsgard, Vipin Swarup:
A Formal Model for Credential Hopping Attacks. ESORICS (1) 2022: 367-386 - [c21]Steven Noel, Vipin Swarup:
Dependency-Based Link Prediction for Learning Microsegmentation Policy. ICICS 2022: 569-588 - 2020
- [e10]Sushil Jajodia, George Cybenko, V. S. Subrahmanian, Vipin Swarup, Cliff Wang, Michael P. Wellman:
Adaptive Autonomous Secure Cyber Systems. Springer 2020, ISBN 978-3-030-33431-4 [contents]
2010 – 2019
- 2016
- [e9]Sushil Jajodia, V. S. Subrahmanian, Vipin Swarup, Cliff Wang:
Cyber Deception, Building the Scientific Foundation. Springer 2016, ISBN 978-3-319-32697-9 [contents] - [e8]Silvio Ranise, Vipin Swarup:
Data and Applications Security and Privacy XXX - 30th Annual IFIP WG 11.3 Conference, DBSec 2016, Trento, Italy, July 18-20, 2016. Proceedings. Lecture Notes in Computer Science 9766, Springer 2016, ISBN 978-3-319-41482-9 [contents] - 2015
- [e7]Sushil Jajodia, Paulo Shakarian, V. S. Subrahmanian, Vipin Swarup, Cliff Wang:
Cyber Warfare - Building the Scientific Foundation. Advances in Information Security 56, Springer 2015, ISBN 978-3-319-14038-4 [contents] - 2014
- [e6]Sushil Jajodia, Krishna Kant, Pierangela Samarati, Anoop Singhal, Vipin Swarup, Cliff Wang:
Secure Cloud Computing. Springer 2014, ISBN 978-1-4614-9277-1 [contents] - 2013
- [e5]Sushil Jajodia, Anup K. Ghosh, V. S. Subrahmanian, Vipin Swarup, Cliff Wang, Xiaoyang Sean Wang:
Moving Target Defense II - Application of Game Theory and Adversarial Modeling. Advances in Information Security 100, Springer 2013, ISBN 978-1-4614-5415-1 [contents] - 2011
- [e4]Sushil Jajodia, Anup K. Ghosh, Vipin Swarup, Cliff Wang, Xiaoyang Sean Wang:
Moving Target Defense - Creating Asymmetric Uncertainty for Cyber Threats. Advances in Information Security 54, Springer 2011, ISBN 978-1-4614-0976-2 [contents] - 2010
- [c20]F. Javier Thayer, Vipin Swarup, Joshua D. Guttman:
Metric Strand Spaces for Locale Authentication Protocols. IFIPTM 2010: 79-94 - [p1]Paul Barford, Marc Dacier, Thomas G. Dietterich, Matt Fredrikson, Jonathon T. Giffin, Sushil Jajodia, Somesh Jha, Jason H. Li, Peng Liu, Peng Ning, Xinming Ou, Dawn Song, Laura Strater, Vipin Swarup, George P. Tadda, C. Wang, John Yen:
Cyber SA: Situational Awareness for Cyber Defense. Cyber Situational Awareness 2010: 3-13 - [e3]Sushil Jajodia, Peng Liu, Vipin Swarup, Cliff Wang:
Cyber Situational Awareness - Issues and Research. Advances in Information Security 46, Springer 2010, ISBN 978-1-4419-0139-2 [contents]
2000 – 2009
- 2008
- [j4]Kenneth P. Smith, Len Seligman, Vipin Swarup:
Everybody Share: The Challenge of Data-Sharing Systems. Computer 41(9): 54-61 (2008) - [c19]Lei Zhang, Alexander Brodsky, Vipin Swarup, Sushil Jajodia:
A Framework for Maximizing Utility of Sanitized Documents Based on Meta-labeling. POLICY 2008: 181-188 - 2006
- [c18]Joseph Pamula, Sushil Jajodia, Paul Ammann, Vipin Swarup:
A weakest-adversary security metric for network configuration security analysis. QoP 2006: 31-38 - [c17]Vipin Swarup, Len Seligman, Arnon Rosenthal:
A Data Sharing Agreement Framework. ICISS 2006: 22-36 - [c16]Vipin Swarup, Len Seligman, Arnon Rosenthal:
Specifying Data Sharing Agreements. POLICY 2006: 157-162 - [c15]David R. Keppler, Vipin Swarup, Sushil Jajodia:
Redirection policies for mission-based information sharing. SACMAT 2006: 210-218 - 2005
- [j3]Yingjiu Li, Vipin Swarup, Sushil Jajodia:
Fingerprinting Relational Databases: Schemes and Specialties. IEEE Trans. Dependable Secur. Comput. 2(1): 34-45 (2005) - [c14]Vipin Swarup, Sushil Jajodia, Joseph Pamula:
Rule-Based Topological Vulnerability Analysis. MMM-ACNS 2005: 23-37 - 2004
- [j2]Kenneth P. Smith, Sushil Jajodia, Vipin Swarup, Jeffrey Hoyt, Gail Hamilton, Donald B. Faatz, Todd Cornett:
Enabling the sharing of neuroimaging data through well-defined intermediate levels of visibility. NeuroImage 22(4): 1646-1656 (2004) - [c13]Yingjiu Li, Vipin Swarup, Sushil Jajodia:
Defending Against Additive Attacks with Maximal Errors in Watermarking Relational Databases. DBSec 2004: 81-94 - [c12]Vipin Swarup:
Remediation Graphs for Security Patch Management. SEC 2004: 17-28 - [e2]Sanjeev Setia, Vipin Swarup:
Proceedings of the 2nd ACM Workshop on Security of ad hoc and Sensor Networks, SASN 2004, Washington, DC, USA, October 25, 2004. ACM 2004, ISBN 1-58113-972-1 [contents] - 2003
- [c11]David Carman, Daniel Coffin, Bruno Dutertre, Vipin Swarup, Ronald J. Watro:
Forum Session: Security for Wireless Sensor Networks. ACSAC 2003: 106-107 - [c10]Kenneth P. Smith, Vipin Swarup, Sushil Jajodia, Donald B. Faatz, Todd Cornett, Jeffrey Hoyt:
Securely sharing neuroimagery. CIKM 2003: 375-377 - [c9]Yingjiu Li, Vipin Swarup, Sushil Jajodia:
Constructing a virtual primary key for fingerprinting relational data. Digital Rights Management Workshop 2003: 133-141 - [e1]Sanjeev Setia, Vipin Swarup:
Proceedings of the 1st ACM Workshop on Security of ad hoc and Sensor Networks, SASN 2003, Fairfax, Virginia, USA, 2003. ACM 2003, ISBN 1-58113-783-4 [contents]
1990 – 1999
- 1999
- [c8]Vipin Swarup, F. Javier Thayer:
Trust: Benefits, Models, and Mechanisms. Secure Internet Programming 1999: 3-18 - 1998
- [c7]Charles M. Schmidt, Vipin Swarup:
Interoperating between Security Domains. ECOOP Workshops 1998: 283 - [c6]Vipin Swarup:
Mobile Computations and Trust. ECOOP Workshops 1998: 305 - [c5]Shimshon Berkovits, Joshua D. Guttman, Vipin Swarup:
Authentication for Mobile Agents. Mobile Agents and Security 1998: 114-136 - 1996
- [c4]William M. Farmer, Joshua D. Guttman, Vipin Swarup:
Security for Mobile Agents: Authentication and State Appraisal. ESORICS 1996: 118-130 - 1995
- [j1]Joshua D. Guttman, John D. Ramsdell, Vipin Swarup:
The VLISP Verified Scheme System. LISP Symb. Comput. 8(1-2): 33-110 (1995) - 1993
- [c3]Deborah J. Bodeau, Vipin Swarup:
Integration of security services into the NORAD/USSPACECOM technical infrastructure: a case study. ACSAC 1993: 2-10 - 1992
- [b1]Vipin Swarup:
Type Theoretic Properties of Assignments. University of Illinois Urbana-Champaign, USA, 1992 - 1991
- [c2]Vipin Swarup, Uday S. Reddy:
A Logical View of Assignments. Constructivity in Computer Science 1991: 131-149 - [c1]Vipin Swarup, Uday S. Reddy, Evan Ireland:
Assignments for Applicative Languages. FPCA 1991: 192-214
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:16 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint