Follow
Nabil Schear
Nabil Schear
Senior Staff, MIT Lincoln Laboratory
Verified email at ll.mit.edu - Homepage
Title
Cited by
Cited by
Year
Mavmm: Lightweight and purpose built vmm for malware analysis
AM Nguyen, N Schear, HD Jung, A Godiyal, ST King, HD Nguyen
2009 Annual Computer Security Applications Conference, 441-450, 2009
1292009
Computing on masked data: a high performance method for improving big data veracity
J Kepner, V Gadepally, P Michaleas, N Schear, M Varia, A Yerukhimovich, ...
2014 IEEE High Performance Extreme Computing Conference (HPEC), 1-6, 2014
1022014
A survey of cryptographic approaches to securing big-data analytics in the cloud
S Yakoubov, V Gadepally, N Schear, E Shen, A Yerukhimovich
2014 IEEE High Performance Extreme Computing Conference (HPEC), 1-6, 2014
852014
Website Detection Using Remote Traffic Analysis.
X Gong, N Borisov, N Kiyavash, N Schear
Privacy Enhancing Technologies 7384, 58-78, 2012
742012
Neon: system support for derived data management
Q Zhang, J McCullough, J Ma, N Schear, M Vrable, A Vahdat, ...
ACM Sigplan Notices 45 (7), 63-74, 2010
542010
Glavlit: Preventing exfiltration at wire speed
N Schear, C Kintana, Q Zhang, A Vahdat
Irvine Is Burning, 133, 2006
432006
Transparent web service auditing via network provenance functions
A Bates, WU Hassan, K Butler, A Dobra, B Reaves, P Cable, T Moyer, ...
Proceedings of the 26th International Conference on World Wide Web, 887-895, 2017
392017
High-speed matching of vulnerability signatures
N Schear, DR Albrecht, N Borisov
Recent Advances in Intrusion Detection: 11th International Symposium, RAID …, 2008
332008
Bootstrapping and maintaining trust in the cloud
N Schear, PT Cable, TM Moyer, B Richard, R Rudd
Proceedings of the 32Nd Annual Conference on Computer Security Applications …, 2016
292016
Cryptography for Big Data Security.
A Hamlin, N Schear, E Shen, M Varia, S Yakoubov, A Yerukhimovich
IACR Cryptol. ePrint Arch. 2016, 12, 2016
262016
Supporting Security Sensitive Tenants in a Bare-Metal Cloud.
A Mosayyebzadeh, A Mohan, S Tikale, M Abdi, N Schear, T Hudson, ...
USENIX Annual Technical Conference, 587-602, 2019
132019
Cloud computing in tactical environments
W Smith, G Kuperman, M Chan, E Morgan, H Nguyen, N Schear, B Vu, ...
MILCOM 2017-2017 IEEE Military Communications Conference (MILCOM), 882-887, 2017
102017
Models of privacy preserving traffic tunneling
DM Nicol, N Schear
Simulation 85 (9), 589-607, 2009
102009
Performance analysis of real traffic carried with encrypted cover flows
N Schear, DM Nicol
2008 22nd Workshop on Principles of Advanced and Distributed Simulation, 80-87, 2008
102008
Piracy in the digital age
D Dahlstrom, N Farrington, D Gobera, R Roemer, N Schear
History of Computing, 1-24, 2006
102006
Leveraging data provenance to enhance cyber resilience
T Moyer, K Chadha, R Cunningham, N Schear, W Smith, A Bates, K Butler, ...
2016 IEEE Cybersecurity Development (SecDev), 107-114, 2016
92016
Automated Provenance Analytics: A Regular Grammar Based Approach with Applications in Security.
M Lemay, WU Hassan, T Moyer, N Schear, W Smith
TaPP, 2017
82017
A secure cloud with minimal provider trust
A Mosayyebzadeh, G Ravago, A Mohan, A Raza, S Tikale, N Schear, ...
10th {USENIX} Workshop on Hot Topics in Cloud Computing (HotCloud 18), 2018
72018
Secure multiparty computation for cooperative cyber risk assessment
K Hogan, N Luther, N Schear, E Shen, D Stott, S Yakoubov, ...
2016 IEEE Cybersecurity Development (SecDev), 75-76, 2016
72016
Retrofitting applications with provenance-based security monitoring
A Bates, K Butler, A Dobra, B Reaves, P Cable, T Moyer, N Schear
arXiv preprint arXiv:1609.00266, 2016
62016
The system can't perform the operation now. Try again later.
Articles 1–20