Amanote Research
Register
Sign In
Discover open access scientific publications
Search, annotate, share and cite publications
Publications by Ashish Gehani
Analytical Models for Risk-Based Intrusion Response
Computer Networks
Computer Networks
Communications
Ensuring Security and Availability Through Model-Based Cross-Layer Adaptation
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Policy-Based Data Downgrading: Toward a Semantic Framework and Automated Tools to Balance Need-To-Protect and Need-To-Share Policies
Tracking and Sketching Distributed Data Provenance
ICEMAN: A System for Efficient, Robust and Secure Situational Awareness at the Network Edge
VEIL: A System for Certifying Video Provenance