Analysis of heuristic based access pattern obfuscation. Ulusoy, H., Kantarcioglu, M., Thuraisingham, B., Cankaya, E. C., & Pattuk, E. In Bertino, E., Georgakopoulos, D., Srivatsa, M., Nepal, S., & Vinciarelli, A., editors, 9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing, Austin, TX, USA, October 20-23, 2013, pages 537–544, 2013. ICST / IEEE. Paper doi bibtex @inproceedings{DBLP:conf/colcom/UlusoyKTCP13,
author = {Huseyin Ulusoy and
Murat Kantarcioglu and
Bhavani Thuraisingham and
Ebru Celikel Cankaya and
Erman Pattuk},
editor = {Elisa Bertino and
Dimitrios Georgakopoulos and
Mudhakar Srivatsa and
Surya Nepal and
Alessandro Vinciarelli},
title = {Analysis of heuristic based access pattern obfuscation},
booktitle = {9th {IEEE} International Conference on Collaborative Computing: Networking,
Applications and Worksharing, Austin, TX, USA, October 20-23, 2013},
pages = {537--544},
publisher = {{ICST} / {IEEE}},
year = {2013},
url = {https://doi.org/10.4108/icst.collaboratecom.2013.254199},
doi = {10.4108/ICST.COLLABORATECOM.2013.254199},
timestamp = {Fri, 15 Mar 2024 12:30:44 +0100},
biburl = {https://dblp.org/rec/conf/colcom/UlusoyKTCP13.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Downloads: 0
{"_id":"PAzueazRPkxSX9ezx","bibbaseid":"ulusoy-kantarcioglu-thuraisingham-cankaya-pattuk-analysisofheuristicbasedaccesspatternobfuscation-2013","authorIDs":[],"author_short":["Ulusoy, H.","Kantarcioglu, M.","Thuraisingham, B.","Cankaya, E. C.","Pattuk, E."],"bibdata":{"bibtype":"inproceedings","type":"inproceedings","author":[{"firstnames":["Huseyin"],"propositions":[],"lastnames":["Ulusoy"],"suffixes":[]},{"firstnames":["Murat"],"propositions":[],"lastnames":["Kantarcioglu"],"suffixes":[]},{"firstnames":["Bhavani"],"propositions":[],"lastnames":["Thuraisingham"],"suffixes":[]},{"firstnames":["Ebru","Celikel"],"propositions":[],"lastnames":["Cankaya"],"suffixes":[]},{"firstnames":["Erman"],"propositions":[],"lastnames":["Pattuk"],"suffixes":[]}],"editor":[{"firstnames":["Elisa"],"propositions":[],"lastnames":["Bertino"],"suffixes":[]},{"firstnames":["Dimitrios"],"propositions":[],"lastnames":["Georgakopoulos"],"suffixes":[]},{"firstnames":["Mudhakar"],"propositions":[],"lastnames":["Srivatsa"],"suffixes":[]},{"firstnames":["Surya"],"propositions":[],"lastnames":["Nepal"],"suffixes":[]},{"firstnames":["Alessandro"],"propositions":[],"lastnames":["Vinciarelli"],"suffixes":[]}],"title":"Analysis of heuristic based access pattern obfuscation","booktitle":"9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing, Austin, TX, USA, October 20-23, 2013","pages":"537–544","publisher":"ICST / IEEE","year":"2013","url":"https://doi.org/10.4108/icst.collaboratecom.2013.254199","doi":"10.4108/ICST.COLLABORATECOM.2013.254199","timestamp":"Fri, 15 Mar 2024 12:30:44 +0100","biburl":"https://dblp.org/rec/conf/colcom/UlusoyKTCP13.bib","bibsource":"dblp computer science bibliography, https://dblp.org","bibtex":"@inproceedings{DBLP:conf/colcom/UlusoyKTCP13,\n author = {Huseyin Ulusoy and\n Murat Kantarcioglu and\n Bhavani Thuraisingham and\n Ebru Celikel Cankaya and\n Erman Pattuk},\n editor = {Elisa Bertino and\n Dimitrios Georgakopoulos and\n Mudhakar Srivatsa and\n Surya Nepal and\n Alessandro Vinciarelli},\n title = {Analysis of heuristic based access pattern obfuscation},\n booktitle = {9th {IEEE} International Conference on Collaborative Computing: Networking,\n Applications and Worksharing, Austin, TX, USA, October 20-23, 2013},\n pages = {537--544},\n publisher = {{ICST} / {IEEE}},\n year = {2013},\n url = {https://doi.org/10.4108/icst.collaboratecom.2013.254199},\n doi = {10.4108/ICST.COLLABORATECOM.2013.254199},\n timestamp = {Fri, 15 Mar 2024 12:30:44 +0100},\n biburl = {https://dblp.org/rec/conf/colcom/UlusoyKTCP13.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n","author_short":["Ulusoy, H.","Kantarcioglu, M.","Thuraisingham, B.","Cankaya, E. C.","Pattuk, E."],"editor_short":["Bertino, E.","Georgakopoulos, D.","Srivatsa, M.","Nepal, S.","Vinciarelli, A."],"key":"DBLP:conf/colcom/UlusoyKTCP13","id":"DBLP:conf/colcom/UlusoyKTCP13","bibbaseid":"ulusoy-kantarcioglu-thuraisingham-cankaya-pattuk-analysisofheuristicbasedaccesspatternobfuscation-2013","role":"author","urls":{"Paper":"https://doi.org/10.4108/icst.collaboratecom.2013.254199"},"metadata":{"authorlinks":{}},"downloads":0},"bibtype":"inproceedings","biburl":"https://dblp.org/pid/36/195.bib","creationDate":"2020-09-11T22:37:02.549Z","downloads":0,"keywords":[],"search_terms":["analysis","heuristic","based","access","pattern","obfuscation","ulusoy","kantarcioglu","thuraisingham","cankaya","pattuk"],"title":"Analysis of heuristic based access pattern obfuscation","year":2013,"dataSources":["28bNN5KFLRLRJ3Swj","p58ogefjcnmT9df9R","akkTAC3Guiza8iv6k"]}