


default search action
Josyula R. Rao
Person information
Other persons with a similar name
SPARQL queries 
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [c21]Ian M. Molloy, Josyula R. Rao, Marc Ph. Stoecklin:
AI vs. AI: Exploring the Intersections of AI and Cybersecurity. IWSPA@CODASPY 2021: 1
2010 – 2019
- 2018
- [c20]Xiaokui Shu, Frederico Araujo, Douglas Lee Schales, Marc Ph. Stoecklin, Jiyong Jang, Heqing Huang, Josyula R. Rao:
Threat Intelligence Computing. CCS 2018: 1883-1898 - 2016
- [j14]Josyula R. Rao, Suresh Chari, Dimitrios E. Pendarakis, Reiner Sailer, Marc Ph. Stoecklin, Wilfried Teiken, Andreas Wespi:
Security 360°: Enterprise security for the cognitive era. IBM J. Res. Dev. 60(4): 1 (2016) - [j13]Youngja Park, Wilfried Teiken, Josyula R. Rao, Suresh Chari:
Data classification and sensitivity estimation for critical asset discovery. IBM J. Res. Dev. 60(4): 2 (2016) - [j12]Suresh Chari, Ted Habeck, Ian M. Molloy, Youngja Park, Josyula R. Rao, Wilfried Teiken:
A platform and analytics for usage and entitlement analytics. IBM J. Res. Dev. 60(4): 7 (2016) - [j11]Marc Ph. Stoecklin, Kapil Singh, Larry Koved, Xin Hu, Suresh N. Chari, Josyula R. Rao, Pau-Chen Cheng, Mihai Christodorescu, Reiner Sailer, Douglas Lee Schales:
Passive security intelligence to analyze the security risks of mobile/BYOD activities. IBM J. Res. Dev. 60(4): 9 (2016) - [j10]Stefan Berger, Yangyi Chen, Xin Hu, Dimitrios E. Pendarakis, Josyula R. Rao, Reiner Sailer, Douglas Lee Schales, Marc Ph. Stoecklin:
Closing the loop: Network and in-host monitoring tandem for comprehensive cloud security visibility. IBM J. Res. Dev. 60(4): 10 (2016) - [j9]Stefan Berger, Shelly Garion, Yosef Moatti, Dalit Naor, Dimitrios E. Pendarakis, Alexandra Shulman-Peleg, Josyula R. Rao, Enriquillo Valdez, Yaron Weinsberg:
Security intelligence for cloud management infrastructures. IBM J. Res. Dev. 60(4): 11 (2016) - [c19]Xin Hu, Jiyong Jang, Marc Ph. Stoecklin, Ting Wang, Douglas Lee Schales, Dhilung Kirat, Josyula R. Rao:
BAYWATCH: Robust Beaconing Detection to Identify Infected Hosts in Large-Scale Enterprise Networks. DSN 2016: 479-490 - 2014
- [c18]Douglas Lee Schales, Mihai Christodorescu, Xin Hu, Jiyong Jang, Josyula R. Rao, Reiner Sailer, Marc Ph. Stoecklin, Wietse Z. Venema, Ting Wang:
Stream computing for large-scale, multi-channel cyber threat analytics. IRI 2014: 8-15 - 2013
- [c17]Vern Paxson, Mihai Christodorescu, Mobin Javed, Josyula R. Rao, Reiner Sailer, Douglas Lee Schales, Marc Ph. Stoecklin, Kurt Thomas, Wietse Z. Venema, Nicholas Weaver:
Practical Comprehensive Bounds on Surreptitious Communication over DNS. USENIX Security Symposium 2013: 17-32 - 2011
- [j8]Cynthia E. Irvine, Josyula R. Rao:
Guest Editors' Introduction: Engineering Secure Systems. IEEE Secur. Priv. 9(1): 18-21 (2011) - 2010
- [c16]Suresh Chari, Vincenzo V. Diluoffo, Paul A. Karger, Elaine R. Palmer, Tal Rabin, Josyula R. Rao, Pankaj Rohatgi, Helmut Scherzer, Michael Steiner, David C. Toll:
Designing a Side Channel Resistant Random Number Generator. CARDIS 2010: 49-64
2000 – 2009
- 2009
- [j7]Stefan Berger, Ramón Cáceres, Kenneth A. Goldman, Dimitrios E. Pendarakis, Ronald Perez, Josyula R. Rao, Eran Rom, Reiner Sailer, Wayne Schildhauer, Deepa Srinivasan, Sivan Tal, Enriquillo Valdez:
Security for the cloud infrastructure: Trusted virtual data center implementation. IBM J. Res. Dev. 53(4): 6 (2009) - 2005
- [c15]Dakshi Agrawal, Josyula R. Rao, Pankaj Rohatgi, Kai Schramm:
Templates as Master Keys. CHES 2005: 15-29 - [e1]Josyula R. Rao, Berk Sunar:
Cryptographic Hardware and Embedded Systems - CHES 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings. Lecture Notes in Computer Science 3659, Springer 2005, ISBN 3-540-28474-5 [contents] - 2003
- [c14]Dakshi Agrawal, Josyula R. Rao, Pankaj Rohatgi:
Multi-channel Attacks. CHES 2003: 2-16 - 2002
- [c13]Suresh Chari, Josyula R. Rao, Pankaj Rohatgi:
Template Attacks. CHES 2002: 13-28 - [c12]Dakshi Agrawal, Bruce Archambeault, Josyula R. Rao, Pankaj Rohatgi:
The EM Side-Channel(s). CHES 2002: 29-45 - [c11]Josyula R. Rao, Pankaj Rohatgi, Helmut Scherzer, Stéphane Tinguely:
Partitioning Attacks: Or How to Rapidly Clone Some GSM Cards. S&P 2002: 31-41 - 2001
- [j6]Josyula R. Rao:
On the role of formal methods in security. Inf. Process. Lett. 77(2-4): 209-212 (2001) - [c10]Atri Rudra, Pradeep K. Dubey, Charanjit S. Jutla, Vijay Kumar, Josyula R. Rao, Pankaj Rohatgi:
Efficient Rijndael Encryption Implementation with Composite Field Arithmetic. CHES 2001: 171-184 - [i1]Josyula R. Rao, Pankaj Rohatgi:
EMpowering Side-Channel Attacks. IACR Cryptol. ePrint Arch. 2001: 37 (2001) - 2000
- [c9]Ran Canetti, Pau-Chen Cheng, Frederique Giraud, Dimitrios E. Pendarakis, Josyula R. Rao, Pankaj Rohatgi, Debanjan Saha:
An IPSec-based Host Architecture for Secure Internet Multicast. NDSS 2000 - [c8]Josyula R. Rao, Pankaj Rohatgi:
Can Pseudonymity Really Guarantee Privacy? USENIX Security Symposium 2000
1990 – 1999
- 1999
- [j5]Matthew J. Moyer, Josyula R. Rao, Pankaj Rohatgi:
A survey of security issues in multicast communications. IEEE Netw. 13(6): 12-23 (1999) - [c7]Suresh Chari, Charanjit S. Jutla, Josyula R. Rao, Pankaj Rohatgi:
Towards Sound Approaches to Counteract Power-Analysis Attacks. CRYPTO 1999: 398-412 - 1997
- [j4]Charanjit S. Jutla, Josyula R. Rao:
A Methodology for Designing Proof Rules for Fair Parallel Programs. Formal Aspects Comput. 9(4): 359-378 (1997) - [j3]Nayeem Islam, Rangachari Anand, Trent Jaeger, Josyula R. Rao:
A Flexible Security System for Using Internet Content. IEEE Softw. 14(5): 52-59 (1997) - [c6]Rangachari Anand, Nayeem Islam, Trent Jaeger, Josyula R. Rao:
A Flexible Security Model for Using Internet Content. SRDS 1997: 89-96 - 1996
- [j2]Josyula R. Rao:
Eventual Determinism: Using Probabilistic Means to Achieve Deterministic Ends. Parallel Algorithms Appl. 8(1): 3-19 (1996) - [c5]Michael S. Meier, Kevan L. Miller, Donald P. Pazel, Josyula R. Rao, James R. Russell:
Experiences with building distributed debuggers. SPDT 1996: 70-79 - 1995
- [b1]Josyula R. Rao:
Extensions of the UNITY Methodology - Compositionality, Fairness and Probability in Parallelism. Lecture Notes in Computer Science 908, Springer 1995, ISBN 3-540-59173-7 - [c4]Josyula R. Rao:
Eventual determinism: using probabilistic means to achieve deterministic ends. HICSS (2) 1995: 29-38 - 1994
- [j1]Josyula R. Rao:
Reasoning about Probabilistic Parallel Programs. ACM Trans. Program. Lang. Syst. 16(3): 798-842 (1994) - [c3]Joshua S. Auerbach, Arthur P. Goldberg, Germán S. Goldszmidt, Ajei S. Gopal, Mark T. Kennedy, Josyula R. Rao, James R. Russell:
Concert/C: A Language for Distributed Programming. USENIX Winter 1994: 79-96 - 1990
- [c2]Josyula R. Rao:
Reasoning About Probabilistic Algorithms. PODC 1990: 247-264
1980 – 1989
- 1989
- [c1]Charanjit S. Jutla, Edgar Knapp, Josyula R. Rao:
A Predicate Transformer Approach to Semantics of Parallel Programs. PODC 1989: 249-263
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 13:18 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint