Alina Oprea
Title
Cited by
Cited by
Year
HAIL: A high-availability and integrity layer for cloud storage
KD Bowers, A Juels, A Oprea
Proceedings of the 16th ACM conference on Computer and communications …, 2009
12182009
Proofs of retrievability: Theory and implementation
KD Bowers, A Juels, A Oprea
Proceedings of the 2009 ACM workshop on Cloud computing security, 43-54, 2009
6902009
Homealone: Co-residency detection in the cloud via side-channel analysis
Y Zhang, A Juels, A Oprea, MK Reiter
2011 IEEE symposium on security and privacy, 313-328, 2011
3742011
Beehive: Large-scale log analysis for detecting suspicious activity in enterprise networks
TF Yen, A Oprea, K Onarlioglu, T Leetham, W Robertson, A Juels, E Kirda
Proceedings of the 29th Annual Computer Security Applications Conference …, 2013
2302013
FlipIt: The game of “stealthy takeover”
M Van Dijk, A Juels, A Oprea, RL Rivest
Journal of Cryptology 26 (4), 655-713, 2013
2102013
Iris: A scalable cloud file system with efficient integrity checks
E Stefanov, M van Dijk, A Juels, A Oprea
Proceedings of the 28th Annual Computer Security Applications Conference …, 2012
2022012
Manipulating machine learning: Poisoning attacks and countermeasures for regression learning
M Jagielski, A Oprea, B Biggio, C Liu, C Nita-Rotaru, B Li
2018 IEEE Symposium on Security and Privacy (SP), 19-35, 2018
1942018
New approaches to security and availability for cloud data
A Juels, A Oprea
Communications of the ACM 56 (2), 64-73, 2013
1742013
Space-Efficient Block Storage Integrity.
A Oprea, MK Reiter, K Yang
NDSS, 2005
1162005
Detection of early-stage enterprise infection by mining large-scale log data
A Oprea, Z Li, TF Yen, SH Chin, S Alrwais
2015 45th Annual IEEE/IFIP International Conference on Dependable Systems …, 2015
1102015
Detection of malicious web activity in enterprise computer networks
AM Oprea, Z Li, R Norris, KD Bowers
US Patent 9,838,407, 2017
1082017
How to tell if your cloud files are vulnerable to drive crashes
KD Bowers, M Van Dijk, A Juels, A Oprea, RL Rivest
Proceedings of the 18th ACM conference on Computer and communications …, 2011
1062011
Secure key-updating for lazy revocation
M Backes, C Cachin, A Oprea
European Symposium on Research in Computer Security, 327-346, 2006
792006
Hourglass schemes: how to prove that cloud files are encrypted
M Van Dijk, A Juels, A Oprea, RL Rivest, E Stefanov, N Triandopoulos
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
772012
Securing a remote terminal application with a mobile trusted device
A Oprea, D Balfanz, G Durfee, DK Smetters
20th Annual Computer Security Applications Conference, 438-447, 2004
742004
Scalable cloud file system with efficient integrity checks
EP Stefanov, ME Van Dijk, AM Oprea, A Juels
US Patent 8,706,701, 2014
702014
Defending against the Unknown Enemy: Applying FlipIt to System Security
KD Bowers, M Van Dijk, R Griffin, A Juels, A Oprea, RL Rivest, ...
International Conference on Decision and Game Theory for Security, 248-263, 2012
622012
An epidemiological study of malware encounters in a large enterprise
TF Yen, V Heorhiadi, A Oprea, MK Reiter, A Juels
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
582014
Why do adversarial attacks transfer? explaining transferability of evasion and poisoning attacks
A Demontis, M Melis, M Pintor, M Jagielski, B Biggio, A Oprea, ...
28th {USENIX} Security Symposium ({USENIX} Security 19), 321-338, 2019
532019
Lazy revocation in cryptographic file systems
M Backes, C Cachin, A Oprea
Third IEEE International Security in Storage Workshop (SISW'05), 11 pp.-11, 2005
512005
The system can't perform the operation now. Try again later.
Articles 1–20