


Остановите войну!
for scientists:


default search action
Nabil Schear
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [j2]Amy Dettmer, Hamed Okhravi
, Kevin Perry, Nabil Schear, Richard Shay, Mary Ellen Zurko, Paula J. Donovan:
Lessons Learned From Designing a Security Architecture for Real-World Government Agencies. IEEE Secur. Priv. 19(4): 28-36 (2021)
2010 – 2019
- 2019
- [c17]Amin Mosayyebzadeh, Apoorve Mohan, Sahil Tikale, Mania Abdi, Nabil Schear, Trammell Hudson, Charles Munson, Larry Rudolph, Gene Cooperman, Peter Desnoyers, Orran Krieger:
Supporting Security Sensitive Tenants in a Bare-Metal Cloud. USENIX Annual Technical Conference 2019: 587-602 - [i6]Amin Mosayyebzadeh, Apoorve Mohan, Sahil Tikale, Mania Abdi, Nabil Schear, Charles Munson
, Trammell Hudson, Larry Rudolph, Gene Cooperman, Peter Desnoyers, Orran Krieger:
Supporting Security Sensitive Tenants in a Bare-Metal Cloud. CoRR abs/1907.06110 (2019) - [i5]Amin Mosayyebzadeh, Gerardo Ravago, Apoorve Mohan, Ali Raza, Sahil Tikale, Nabil Schear, Trammell Hudson, Jason Hennessey, Naved Ansari, Kyle Hogan, Charles Munson
, Larry Rudolph, Gene Cooperman, Peter Desnoyers, Orran Krieger:
A Secure Cloud with Minimal Provider Trust. CoRR abs/1907.07627 (2019) - 2018
- [c16]Amin Mosayyebzadeh, Gerardo Ravago, Apoorve Mohan, Ali Raza, Sahil Tikale, Nabil Schear, Trammell Hudson, Jason Hennessey, Naved Ansari, Kyle Hogan, Charles Munson, Larry Rudolph, Gene Cooperman, Peter Desnoyers, Orran Krieger:
A Secure Cloud with Minimal Provider Trust. HotCloud 2018 - 2017
- [c15]Warren Smith, Greg Kuperman, Michael Chan, Eric Morgan, Huy Nguyen, Nabil Schear, Bich Vu, Andrew J. Weinert
, Matthew Weyant, Daniel Whisman:
Cloud computing in tactical environments. MILCOM 2017: 882-887 - [c14]Mark Lemay, Wajih Ul Hassan, Thomas Moyer, Nabil Schear, Warren Smith:
Automated Provenance Analytics: A Regular Grammar Based Approach with Applications in Security. TaPP 2017 - [c13]Adam Bates, Wajih Ul Hassan, Kevin R. B. Butler
, Alin Dobra
, Bradley Reaves, Patrick T. Cable II, Thomas Moyer, Nabil Schear:
Transparent Web Service Auditing via Network Provenance Functions. WWW 2017: 887-895 - 2016
- [c12]Nabil Schear, Patrick T. Cable II, Thomas M. Moyer, Bryan Richard, Robert Rudd:
Bootstrapping and maintaining trust in the cloud. ACSAC 2016: 65-77 - [c11]Kyle Hogan, Noah Luther, Nabil Schear, Emily Shen, David Stott, Sophia Yakoubov, Arkady Yerukhimovich:
Secure Multiparty Computation for Cooperative Cyber Risk Assessment. SecDev 2016: 75-76 - [c10]Thomas Moyer, Karishma Chadha, Robert K. Cunningham, Nabil Schear, Warren Smith, Adam Bates, Kevin R. B. Butler
, Frank Capobianco, Trent Jaeger, Patrick T. Cable II:
Leveraging Data Provenance to Enhance Cyber Resilience. SecDev 2016: 107-114 - [i4]Adam Bates, Kevin R. B. Butler, Alin Dobra, Bradley Reaves, Patrick T. Cable II, Thomas Moyer, Nabil Schear:
Retrofitting Applications with Provenance-Based Security Monitoring. CoRR abs/1609.00266 (2016) - [i3]Ariel Hamlin, Nabil Schear, Emily Shen, Mayank Varia, Sophia Yakoubov, Arkady Yerukhimovich:
Cryptography for Big Data Security. IACR Cryptol. ePrint Arch. 2016: 12 (2016) - 2015
- [c9]Patrick T. Cable II, Nabil Schear:
Spyglass: Demand-Provisioned Linux Containers for Private Network Access. LISA 2015: 37-48 - 2014
- [c8]Jeremy Kepner, Vijay Gadepally, Peter Michaleas, Nabil Schear, Mayank Varia, Arkady Yerukhimovich, Robert K. Cunningham:
Computing on masked data: a high performance method for improving big data veracity. HPEC 2014: 1-6 - [c7]Sophia Yakoubov, Vijay Gadepally, Nabil Schear, Emily Shen, Arkady Yerukhimovich:
A survey of cryptographic approaches to securing big-data analytics in the cloud. HPEC 2014: 1-6 - [i2]Jeremy Kepner, Vijay Gadepally, Peter Michaleas, Nabil Schear, Mayank Varia, Arkady Yerukhimovich, Robert K. Cunningham:
Computing on Masked Data: a High Performance Method for Improving Big Data Veracity. CoRR abs/1406.5751 (2014) - 2012
- [c6]Xun Gong, Nikita Borisov, Negar Kiyavash, Nabil Schear:
Website Detection Using Remote Traffic Analysis. Privacy Enhancing Technologies 2012: 58-78 - 2011
- [i1]Xun Gong, Negar Kiyavash, Nabil Schear, Nikita Borisov:
Website Detection Using Remote Traffic Analysis. CoRR abs/1109.0097 (2011) - 2010
- [c5]Qing Zhang, John McCullough, Justin Ma, Nabil Schear, Michael Vrable, Amin Vahdat, Alex C. Snoeren, Geoffrey M. Voelker, Stefan Savage:
Neon: system support for derived data management. VEE 2010: 63-74
2000 – 2009
- 2009
- [j1]David M. Nicol, Nabil Schear:
Models of Privacy Preserving Traffic Tunneling. Simul. 85(9): 589-607 (2009) - [c4]Anh M. Nguyen, Nabil Schear, HeeDong Jung, Apeksha Godiyal, Samuel T. King, Hai D. Nguyen:
MAVMM: Lightweight and Purpose Built VMM for Malware Analysis. ACSAC 2009: 441-450 - 2008
- [c3]Nabil Schear, David M. Nicol:
Performance Analysis of Real Traffic Carried with Encrypted Cover Flows. PADS 2008: 80-87 - [c2]Nabil Schear, David R. Albrecht, Nikita Borisov:
High-Speed Matching of Vulnerability Signatures. RAID 2008: 155-174 - 2006
- [c1]Nabil Schear, Carmelo Kintana, Qing Zhang, Amin Vahdat:
Glavlit: Preventing Exfiltration at Wire Speed. HotNets 2006
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2023-03-25 23:48 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint