Ian Molloy
Ian Molloy
IBM Research
Email verificata su us.ibm.com
TitoloCitata daAnno
Using probabilistic generative models for ranking risks of android apps
H Peng, C Gates, B Sarma, N Li, Y Qi, R Potharaju, C Nita-Rotaru, ...
Proceedings of the 2012 ACM conference on Computer and communicationsá…, 2012
3752012
Android permissions: a perspective combining risks and benefits
BP Sarma, N Li, C Gates, R Potharaju, C Nita-Rotaru, I Molloy
Proceedings of the 17th ACM symposium on Access Control Models andá…, 2012
2962012
Slicing: A new approach for privacy preserving data publishing
T Li, N Li, J Zhang, I Molloy
IEEE transactions on knowledge and data engineering 24 (3), 561-574, 2010
2602010
Article locator system
TL Crabtree, RP Rassool, MF Wells, GJ DelMain, P White, P McArthur
US Patent 6,788,199, 2004
2512004
Mining roles with semantic meanings
I Molloy, H Chen, T Li, Q Wang, N Li, E Bertino, S Calo, J Lobo
Proceedings of the 13th ACM symposium on Access control models andá…, 2008
1692008
Evaluating role mining algorithms
I Molloy, N Li, T Li, Z Mao, Q Wang, J Lobo
Proceedings of the 14th ACM symposium on Access control models andá…, 2009
1312009
Defeating cross-site request forgery attacks with browser-enforced authenticity protection
Z Mao, N Li, I Molloy
International Conference on Financial Cryptography and Data Security, 238-255, 2009
832009
Mining roles with multiple objectives
I Molloy, H Chen, T Li, Q Wang, N Li, E Bertino, S Calo, J Lobo
ACM Transactions on Information and System Security (TISSEC) 13 (4), 36, 2010
802010
Automatic mapping of valley networks on Mars
I Molloy, TF Stepinski
Computers & Geosciences 33 (6), 728-738, 2007
672007
Mining roles with noisy data
I Molloy, N Li, YA Qi, J Lobo, L Dickens
Proceedings of the 15th ACM symposium on Access control models andá…, 2010
552010
Trading in risk: Using markets to improve access control
I Molloy, PC Cheng, P Rohatgi
Proceedings of the 2008 New Security Paradigms Workshop, 107-125, 2009
552009
Ensuring continuous compliance through reconciling policy with usage
S Chari, I Molloy, Y Park, W Teiken
Proceedings of the 18th ACM symposium on Access control models andá…, 2013
482013
On the (in) security and (im) practicality of outsourcing precise association rule mining
I Molloy, N Li, T Li
2009 Ninth IEEE International Conference on Data Mining, 872-877, 2009
482009
Risk-based security decisions under uncertainty
I Molloy, L Dickens, C Morisset, PC Cheng, J Lobo, A Russo
Proceedings of the second ACM conference on Data and Application Securityá…, 2012
462012
Generating summary risk scores for mobile applications
CS Gates, N Li, H Peng, B Sarma, Y Qi, R Potharaju, C Nita-Rotaru, ...
IEEE Transactions on dependable and secure computing 11 (3), 238-251, 2014
442014
Generative models for access control policies: applications to role mining over logs with attribution
I Molloy, Y Park, S Chari
Proceedings of the 17th ACM symposium on Access Control Models andá…, 2012
432012
Pipelined parallel processing of feedback loops in a digital circuit
KK Parhi
US Patent 7,333,580, 2008
352008
Atomizer and inhalator using same
S Tanaka, T Terada
US Patent 6,676,034, 2004
352004
Dynamic virtual credit card numbers
I Molloy, J Li, N Li
International Conference on Financial Cryptography and Data Security, 208-223, 2007
312007
Detecting backdoor attacks on deep neural networks by activation clustering
B Chen, W Carvalho, N Baracaldo, H Ludwig, B Edwards, T Lee, I Molloy, ...
arXiv preprint arXiv:1811.03728, 2018
292018
Il sistema al momento non pu˛ eseguire l'operazione. Riprova pi¨ tardi.
Articoli 1–20