Rinku Dewri
Cited by
Cited by
Dynamic security risk management using Bayesian attack graphs
N Poolsappasit, R Dewri, I Ray
IEEE Transactions on Dependable and Secure Computing 9 (1), 61-74, 2012
Optimal security hardening using multi-objective optimization on attack tree models of networks
R Dewri, N Poolsappasit, I Ray, D Whitley
Proceedings of the 14th ACM conference on Computer and communications …, 2007
Local Differential Perturbations: Location Privacy Under Approximate Knowledge Attackers
R Dewri
IEEE Transactions on Mobile Computing 12 (12), 2360-2372, 2013
Optimal security hardening on attack tree models of networks: a cost-benefit analysis
R Dewri, I Ray, N Poolsappasit, D Whitley
International Journal of Information Security 11 (3), 167-188, 2012
Query m-invariance: Preventing query disclosures in continuous location-based services
R Dewri, I Ray, I Ray, D Whitley
2010 Eleventh International Conference on Mobile Data Management, 95-104, 2010
Simulating recrystallization through cellular automata and genetic algorithms
R Dewri, N Chakraborti
Modelling and Simulation in Materials Science and Engineering 13 (2), 173, 2004
Towards a better understanding of the epoxy-polymerization process using multi-objective evolutionary computation
K Deb, K Mitra, R Dewri, S Majumdar
Chemical engineering science 59 (20), 4261-4277, 2004
Exploiting service similarity for privacy in location-based search queries
R Dewri, R Thurimella
IEEE Transactions on Parallel and Distributed Systems 25 (2), 374-383, 2014
Towards optimal multi-level tiling for stencil computations
L Renganarayana, M Harthikote-Matha, R Dewri, S Rajopadhye
2007 IEEE International Parallel and Distributed Processing Symposium, 1-10, 2007
Inferring trip destinations from driving habits data
R Dewri, P Annadata, W Eltarjaman, R Thurimella
Proceedings of the 12th ACM workshop on Workshop on privacy in the …, 2013
On the Optimal Selection of k in the k-Anonymity Problem
R Dewri, I Ray, I Ray, D Whitley
2008 IEEE 24th International Conference on Data Engineering, 1364-1366, 2008
Stochastic-based robust dynamic resource allocation for independent tasks in a heterogeneous computing system
MA Salehi, J Smith, AA Maciejewski, HJ Siegel, EKP Chong, J Apodaca, ...
Journal of Parallel and Distributed Computing 97, 96-111, 2016
Measuring the robustness of resource allocations in a stochastic dynamic environment
J Smith, LD Briceno, AA Maciejewski, HJ Siegel, T Renner, V Shestak, ...
2007 IEEE International Parallel and Distributed Processing Symposium, 1-10, 2007
Optimizing on-demand data broadcast scheduling in pervasive environments
R Dewri, I Ray, I Ray, D Whitley
Proceedings of the 11th international conference on Extending database …, 2008
Modeling the recrystallization process using inverse cellular automata and genetic algorithms: studies using differential evolution
TD Rane, R Dewri, S Ghosh, N Chakraborti, K Mitra
Journal of phase equilibria and diffusion 26 (4), 311-321, 2005
Location privacy and attacker knowledge: who are we fighting against?
R Dewri
International Conference on Security and Privacy in Communication Systems …, 2011
Driving habits data: Location privacy implications and solutions
J Bellatti, A Brunner, J Lewis, P Annadata, W Eltarjaman, R Dewri, ...
IEEE Security & Privacy 15 (1), 12-20, 2017
Utility driven optimization of real time data broadcast schedules
R Dewri, I Ray, I Ray, D Whitley
Applied Soft Computing 12 (7), 1832-1846, 2012
Understanding the power-performance tradeoff through pareto analysis of live performance data
J Michanan, R Dewri, MJ Rutherford
International Green Computing Conference, 1-8, 2014
k-Anonymization in the Presence of Publisher Preferences
R Dewri, I Ray, I Ray, D Whitley
IEEE Transactions on Knowledge and Data Engineering 23 (11), 1678-1690, 2011
The system can't perform the operation now. Try again later.
Articles 1–20