default search action
Csilla Farkas
Person information
- affiliation: University of South Carolina, Columbia, SC, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c48]Tieming Geng, Chin-Tser Huang, Csilla Farkas:
SCORD: Shuffling Column-Oriented Relational Database to Enhance Security. UbiSec 2023: 163-176 - 2022
- [j21]John Ravan, Shankar M. Banik, Csilla Farkas:
Ensuring Consistent Transactions in a Web Service Environment With Prediction-Based Performance Metrics. IEEE Trans. Serv. Comput. 15(2): 1045-1058 (2022) - [c47]Theppatorn Rhujittawiwat, Ahmed Saaudi, Csilla Farkas:
Stream Data Access Control Model: The Need for Data Semantics. KDIR 2022: 19-30 - 2021
- [j20]Xianshan Qu, Xiaopeng Li, Csilla Farkas, John R. Rose:
Review helpfulness evaluation and recommendation based on an attention model of customer expectation. Inf. Retr. J. 24(1): 55-83 (2021) - [j19]Qiang Zeng, Lannan Luo, Zhiyun Qian, Xiaojiang Du, Zhoujun Li, Chin-Tser Huang, Csilla Farkas:
Resilient User-Side Android Application Repackaging and Tampering Detection Using Cryptographically Obfuscated Logic Bombs. IEEE Trans. Dependable Secur. Comput. 18(6): 2582-2600 (2021) - [c46]Theppatorn Rhujittawiwat, John Ravan, Ahmed Saaudi, Shankar M. Banik, Csilla Farkas:
Database Recovery from Malicious Transactions: A Use of Provenance Information. DATA 2021: 39-48 - 2020
- [j18]Emad Alsuwat, Hatim Alsuwat, Marco Valtorta, Csilla Farkas:
Adversarial data poisoning attacks against the PC learning algorithm. Int. J. Gen. Syst. 49(1): 3-31 (2020) - [c45]Xianshan Qu, Xiaopeng Li, Csilla Farkas, John R. Rose:
An Attention Model of Customer Expectation to Improve Review Helpfulness Prediction. ECIR (1) 2020: 836-851
2010 – 2019
- 2019
- [c44]Emad Alsuwat, Hatim Alsuwat, John R. Rose, Marco Valtorta, Csilla Farkas:
Detecting Adversarial Attacks in the Context of Bayesian Networks. DBSec 2019: 3-22 - [c43]Tieming Geng, Hatim Alsuwat, Chin-Tser Huang, Csilla Farkas:
Securing Relational Database Storage with Attribute Association Aware Shuffling. DSC 2019: 1-8 - [c42]Hatim Alsuwat, Emad Alsuwat, Marco Valtorta, John R. Rose, Csilla Farkas:
Modeling Concept Drift in the Context of Discrete Bayesian Networks. KDIR 2019: 214-224 - [c41]Hatim Alsuwat, Emad Alsuwat, Tieming Geng, Chin-Tser Huang, Csilla Farkas:
Data Dependencies Preserving Shuffle in Relational Database. ICDIS 2019: 180-187 - [c40]Mouiad Al-Wahah, Ahmed Saaudi, Csilla Farkas:
Semantic-based Obligation for Context-Based Access Control. ICETE (2) 2019: 535-540 - [c39]Mouiad Al-Wahah, Csilla Farkas:
Monotonic and Non-monotonic Context Delegation. ICISSP 2019: 449-460 - [c38]Ahmed Saaudi, Yan Tong, Csilla Farkas:
Probabilistic Graphical Model on Detecting Insiders: Modeling with SGD-HMM. ICISSP 2019: 461-470 - 2018
- [c37]Mark Daniels, John R. Rose, Csilla Farkas:
Protecting Patients' Data: An Efficient Method for Health Data Privacy. ARES 2018: 9:1-9:10 - [c36]Mark Daniels, Csilla Farkas:
Health data privacy: A case of undesired inferences. BHI 2018: 291-294 - [c35]Emad Alsuwat, Hatim Alsuwat, Marco Valtorta, Csilla Farkas:
Cyber Attacks Against the PC Learning Algorithm. Nemesis/UrbReas/SoGood/IWAISe/GDM@PKDD/ECML 2018: 159-176 - [c34]Mouiad Al-Wahah, Csilla Farkas:
Context Delegation for Context-Based Access Control. Nemesis/UrbReas/SoGood/IWAISe/GDM@PKDD/ECML 2018: 201-210 - 2015
- [j17]Ousmane Amadou Dia, Csilla Farkas:
Risk Aware Query Replacement Approach for Secure Databases Performance Management. IEEE Trans. Dependable Secur. Comput. 12(2): 217-229 (2015) - 2013
- [j16]Ousmane Amadou Dia, Csilla Farkas:
Business Driven User Role Assignment: Nimble Adaptation of RBAC to Organizational Changes. Int. J. Inf. Secur. Priv. 7(1): 45-62 (2013) - [c33]Aspen Olmsted, Csilla Farkas:
Web Service constraint optimization. ICITST 2013: 270-275 - [c32]Aspen Olmsted, Csilla Farkas:
Coarse Grained Web Service Availability, Consistency, and Durability. ICWS 2013: 619-620 - [c31]Csilla Farkas, Sidney Valentine:
Software Safety and Security for Programmable Logic Controllers. ITNG 2013: 639 - 2012
- [j15]Ousmane Amadou Dia, Csilla Farkas:
A Practical Framework for Policy Composition and Conflict Resolution. Int. J. Secur. Softw. Eng. 3(4): 1-26 (2012) - [c30]Aspen Olmsted, Csilla Farkas:
High volume web service resource consumption. ICITST 2012: 275-280 - [c29]Aspen Olmsted, Csilla Farkas:
The cost of increased transactional correctness and durability in distributed databases. IRI 2012: 441-448 - [c28]RoxAnn H. Stalvey, Csilla Farkas, Caroline M. Eastman:
First use: Introducing information security in high school oracle academy courses. IRI 2012: 653-658 - 2011
- [c27]Yuliya Kopylova, Csilla Farkas, Wenyuan Xu:
Accurate Accident Reconstruction in VANET. DBSec 2011: 271-279 - [c26]Sidney Valentine, Csilla Farkas:
Software security: Application-level vulnerabilities in SCADA systems. IRI 2011: 498-499 - 2010
- [j14]Tyrone S. Toland, Csilla Farkas, Caroline M. Eastman:
The inference problem: Maintaining maximal availability in the presence of database updates. Comput. Secur. 29(1): 88-103 (2010)
2000 – 2009
- 2009
- [c25]Maryam Jafari-lafti, Chin-Tser Huang, Csilla Farkas:
P2F: A User-Centric Privacy Protection Framework. ARES 2009: 386-391 - 2008
- [c24]Csilla Farkas, Michael N. Huhns:
Securing Enterprise Applications: Service-Oriented Security (SOS). CEC/EEE 2008: 428-431 - [i2]Vaibhav Gowadia, Csilla Farkas, Michiharu Kudo:
Checking Security Policy Compliance. CoRR abs/0809.5266 (2008) - 2007
- [c23]Hasika Pamunuwa, Duminda Wijesekera, Csilla Farkas:
An Intrusion Detection System for Detecting Phishing Attacks. Secure Data Management 2007: 181-192 - [c22]Katalin Anna Lázá, Csilla Farkas:
Security in TciNMP Systems. WOSIS 2007: 95-104 - [c21]Mark Hartong, Rajni Goel, Csilla Farkas, Duminda Wijesekera:
PTC-VANET Interactions to Prevent Highway Rail Intersection Crossing Accidents. VTC Spring 2007: 2550-2554 - 2006
- [j13]Khaled Alghathbar, Csilla Farkas, Duminda Wijesekera:
Securing UML Information Flow Using FlowUML. J. Res. Pract. Inf. Technol. 38(1) (2006) - [j12]Vaibhav Gowadia, Csilla Farkas:
Tree Automata for Schema-Level Filtering of XML Associations. J. Res. Pract. Inf. Technol. 38(1) (2006) - [j11]Naren Kodali, Csilla Farkas, Duminda Wijesekera:
uSMIL: Towards secure unbreakable semantics in multimedia web services. Comput. Syst. Sci. Eng. 21(5) (2006) - [j10]Gábor Ziegler, Csilla Farkas, András Lörincz:
A framework for anonymous but accountable self-organizing communities. Inf. Softw. Technol. 48(8): 726-744 (2006) - [j9]Csilla Farkas, Alexander Brodsky, Sushil Jajodia:
Unauthorized inferences in semistructured databases. Inf. Sci. 176(22): 3269-3299 (2006) - [c20]Saket Kaushik, Csilla Farkas, Duminda Wijesekera, Paul Ammann:
An Algebra for Composing Ontologies. FOIS 2006: 265-276 - [c19]John B. Bowles, Caroline M. Eastman, Csilla Farkas:
Engaging undergraduates in computer security research. InfoSecCD 2006: 184-190 - [c18]Amit Jain, Csilla Farkas:
Secure resource description framework: an access control model. SACMAT 2006: 121-129 - 2005
- [j8]Vaibhav Gowadia, Csilla Farkas, Marco Valtorta:
PAID: A Probabilistic Agent-Based Intrusion Detection system. Comput. Secur. 24(7): 529-545 (2005) - [j7]Naren Kodali, Csilla Farkas, Duminda Wijesekera:
Enforcing Semantics-Aware Security in Multimedia Surveillance. J. Data Semant. 2: 199-221 (2005) - [c17]Zsolt Palotai, Csilla Farkas, András Lörincz:
Selection in Scale-Free Small World. CEEMAS 2005: 579-582 - [c16]Inja Youn, Csilla Farkas, Bhavani Thuraisingham:
Multilevel Secure Teleconferencing over Public Switched Telephone Network. DBSec 2005: 99-113 - [c15]Tyrone S. Toland, Csilla Farkas, Caroline M. Eastman:
Dynamic Disclosure Monitor (D2Mon): An Improved Query Processing Solution. Secure Data Management 2005: 124-142 - [c14]Vaibhav Gowadia, Csilla Farkas:
Tree Automata for Schema-level Filtering of XML Associations . WOSIS 2005: 136-145 - [c13]Khaled Alghathbar, Duminda Wijesekera, Csilla Farkas:
Secure UML Information Flow using FlowUML. WOSIS 2005: 229-238 - [i1]Zsolt Palotai, Csilla Farkas, András Lörincz:
Selection in Scale-Free Small World. CoRR abs/cs/0504063 (2005) - 2004
- [j6]Naren Kodali, Csilla Farkas, Duminda Wijesekera:
Specifying multimedia access control using RDF. Comput. Syst. Sci. Eng. 19(3) (2004) - [j5]Andrei Stoica, Csilla Farkas:
Ontology Guided XML Security Engine. J. Intell. Inf. Syst. 23(3): 209-223 (2004) - [j4]Naren Kodali, Csilla Farkas, Duminda Wijesekera:
An authorization model for multimedia digital libraries. Int. J. Digit. Libr. 4(3): 139-155 (2004) - [c12]Naren Kodali, Csilla Farkas, Duminda Wijesekera:
SECRETS: A Secure Real-Time Multimedia Surveillance System. ISI 2004: 278-296 - [c11]Csilla Farkas, Thomas C. Wingfield, James Bret Michael, Duminda Wijesekera:
THEMIS: Threat Evaluation Metamodel for Information Systems. ISI 2004: 307-321 - [c10]Naren Kodali, Csilla Farkas, Duminda Wijesekera:
Creating non-decomposable stream bundles in multimedia web services using uSMIL. SWS 2004: 67-76 - [c9]Csilla Farkas, Vaibhav Gowadia, Amit Jain, D. Roy:
From XML to RDF: Syntax, Semantics, Security, and Integrity (Invited Paper). IICIS 2004: 41-55 - [e1]Csilla Farkas, Pierangela Samarati:
Research Directions in Data and Applications Security XVIII, IFIP TC11/WG 11.3 Eighteenth Annual Conference on Data and Applications Security, July 25-28, 2004, Sitges, Catalonia, Spain. IFIP 144, Kluwer/Springer 2004, ISBN 1-4020-8127-8 [contents] - 2003
- [c8]Csilla Farkas, Andrei Stoica:
Correlated Data Inference. DBSec 2003: 119-132 - [c7]Naren Kodali, Csilla Farkas, Duminda Wijesekera:
Multimedia Access Control Using RDF Metadata. OTM Workshops 2003: 718-731 - [c6]Naren Kodali, Csilla Farkas, Duminda Wijesekera:
Enforcing Integrity in Multimedia Surveillance. IICIS 2003: 67-81 - [c5]Vaibhav Gowadia, Csilla Farkas:
RDF metadata for XML access control. XML Security 2003: 39-48 - 2002
- [j3]Csilla Farkas, Michael N. Huhns:
Making Agents Secure on the Semantic Web. IEEE Internet Comput. 6(6): 76-79 (2002) - [j2]Csilla Farkas, Sushil Jajodia:
The Inference Problem: A Survey. SIGKDD Explor. 4(2): 6-11 (2002) - [c4]Andrei Stoica, Csilla Farkas:
Secure XML Views. DBSec 2002: 133-146 - [c3]Csilla Farkas, Gábor Ziegler, Attila Meretei, András Lörincz:
Anonymity and accountability in self-organizing electronic communities. WPES 2002: 81-90 - 2001
- [c2]Csilla Farkas, Tyrone S. Toland, Caroline M. Eastman:
The Inference Problem and Updates in Relational Databases. DBSec 2001: 181-194 - 2000
- [j1]Alexander Brodsky, Csilla Farkas, Sushil Jajodia:
Secure Databases: Constraints, Inference Channels, and Monitoring Disclosures. IEEE Trans. Knowl. Data Eng. 12(6): 900-919 (2000) - [c1]Alexander Brodsky, Csilla Farkas, Duminda Wijesekera, Xiaoyang Sean Wang:
Constraints, Inference Channels and Secure Databases. CP 2000: 98-113
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:23 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint