Rinku Dewri
Title
Cited by
Cited by
Year
Dynamic security risk management using Bayesian attack graphs
N Poolsappasit, R Dewri, I Ray
IEEE Transactions on Dependable and Secure Computing 9 (1), 61-74, 2012
5852012
Optimal security hardening using multi-objective optimization on attack tree models of networks
R Dewri, N Poolsappasit, I Ray, D Whitley
Proceedings of the 14th ACM conference on Computer and communications …, 2007
2132007
Local Differential Perturbations: Location Privacy Under Approximate Knowledge Attackers
R Dewri
IEEE Transactions on Mobile Computing 12 (12), 2360-2372, 2013
1232013
Optimal security hardening on attack tree models of networks: a cost-benefit analysis
R Dewri, I Ray, N Poolsappasit, D Whitley
International Journal of Information Security 11 (3), 167-188, 2012
892012
Query m-invariance: Preventing query disclosures in continuous location-based services
R Dewri, I Ray, I Ray, D Whitley
2010 Eleventh International Conference on Mobile Data Management, 95-104, 2010
772010
Simulating recrystallization through cellular automata and genetic algorithms
R Dewri, N Chakraborti
Modelling and Simulation in Materials Science and Engineering 13 (2), 173, 2004
692004
Towards a better understanding of the epoxy-polymerization process using multi-objective evolutionary computation
K Deb, K Mitra, R Dewri, S Majumdar
Chemical engineering science 59 (20), 4261-4277, 2004
642004
Exploiting service similarity for privacy in location-based search queries
R Dewri, R Thurimella
IEEE Transactions on Parallel and Distributed Systems 25 (2), 374-383, 2014
552014
Towards optimal multi-level tiling for stencil computations
L Renganarayana, M Harthikote-Matha, R Dewri, S Rajopadhye
2007 IEEE International Parallel and Distributed Processing Symposium, 1-10, 2007
542007
Inferring trip destinations from driving habits data
R Dewri, P Annadata, W Eltarjaman, R Thurimella
Proceedings of the 12th ACM workshop on Workshop on privacy in the …, 2013
492013
On the Optimal Selection of k in the k-Anonymity Problem
R Dewri, I Ray, I Ray, D Whitley
2008 IEEE 24th International Conference on Data Engineering, 1364-1366, 2008
372008
Measuring the robustness of resource allocations in a stochastic dynamic environment
J Smith, LD Briceno, AA Maciejewski, HJ Siegel, T Renner, V Shestak, ...
2007 IEEE International Parallel and Distributed Processing Symposium, 1-10, 2007
332007
Stochastic-based robust dynamic resource allocation for independent tasks in a heterogeneous computing system
MA Salehi, J Smith, AA Maciejewski, HJ Siegel, EKP Chong, J Apodaca, ...
Journal of Parallel and Distributed Computing 97, 96-111, 2016
322016
Optimizing on-demand data broadcast scheduling in pervasive environments
R Dewri, I Ray, I Ray, D Whitley
Proceedings of the 11th international conference on Extending database …, 2008
282008
Modeling the recrystallization process using inverse cellular automata and genetic algorithms: studies using differential evolution
TD Rane, R Dewri, S Ghosh, N Chakraborti, K Mitra
Journal of phase equilibria and diffusion 26 (4), 311-321, 2005
242005
Driving habits data: Location privacy implications and solutions
J Bellatti, A Brunner, J Lewis, P Annadata, W Eltarjaman, R Dewri, ...
IEEE Security & Privacy 15 (1), 12-20, 2017
172017
Location privacy and attacker knowledge: who are we fighting against?
R Dewri
International Conference on Security and Privacy in Communication Systems …, 2011
172011
Utility driven optimization of real time data broadcast schedules
R Dewri, I Ray, I Ray, D Whitley
Applied Soft Computing 12 (7), 1832-1846, 2012
152012
On the formation of historically k-anonymous anonymity sets in a continuous LBS
R Dewri, I Ray, I Ray, D Whitley
International Conference on Security and Privacy in Communication Systems, 71-88, 2010
132010
Security provisioning in pervasive environments using multi-objective optimization
R Dewri, I Ray, I Ray, D Whitley
European Symposium on Research in Computer Security, 349-363, 2008
132008
The system can't perform the operation now. Try again later.
Articles 1–20