default search action
Anoop Singhal
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j27]Qingtian Zou, Lan Zhang, Xiaoyan Sun, Anoop Singhal, Peng Liu:
Using Explainable AI for Neural Network-Based Network Attack Detection. Computer 57(5): 78-85 (2024) - [j26]Qingtian Zou, Lan Zhang, Anoop Singhal, Xiaoyan Sun, Peng Liu:
Analysis of neural network detectors for network attacks. J. Comput. Secur. 32(3): 193-220 (2024) - [j25]Yi-Fan Li, Yang Gao, Gbadebo Ayoade, Latifur Khan, Anoop Singhal, Bhavani Thuraisingham:
Heterogeneous Domain Adaptation for Multistream Classification on Cyber Threat Data. IEEE Trans. Dependable Secur. Comput. 21(1): 1-11 (2024) - [c75]Anoop Singhal:
Modeling and Security Analysis of Attacks on Machine Learning Systems. IWSPA@CODASPY 2024: 1-2 - [c74]Lan Zhang, Qingtian Zou, Anoop Singhal, Xiaoyan Sun, Peng Liu:
Evaluating Large Language Models for Real-World Vulnerability Repair in C/C++ Code. IWSPA@CODASPY 2024: 49-58 - [c73]Fariha Ishrat Rahman, Sadaf Md. Halim, Anoop Singhal, Latifur Khan:
ALERT: A Framework for Efficient Extraction of Attack Techniques from Cyber Threat Intelligence Reports Using Active Learning. DBSec 2024: 203-220 - [i3]Wenqi Wei, Tiansheng Huang, Zachary Yahn, Anoop Singhal, Margaret Loper, Ling Liu:
Data Poisoning and Leakage Analysis in Federated Learning. CoRR abs/2409.13004 (2024) - 2023
- [j24]Haizhou Wang, Anoop Singhal, Peng Liu:
Tackling imbalanced data in cybersecurity with transfer learning: a case with ROP payload detection. Cybersecur. 6(1): 2 (2023) - [j23]Khandakar Ashrafi Akbar, Yigong Wang, Gbadebo Ayoade, Yang Gao, Anoop Singhal, Latifur Khan, Bhavani Thuraisingham, Kangkook Jee:
Advanced Persistent Threat Detection Using Data Provenance and Metric Learning. IEEE Trans. Dependable Secur. Comput. 20(5): 3957-3969 (2023) - [c72]Shashwat Kumar, Francis Hahn, Xinming Ou, Anoop Singhal:
Security Analysis of Trust on the Controller in the Matter Protocol Specification. CNS 2023: 1-6 - [c71]Khandakar Ashrafi Akbar, Sadaf Md. Halim, Anoop Singhal, Basel Abdeen, Latifur Khan, Bhavani Thuraisingham:
The Design of an Ontology for ATT&CK and its Application to Cybersecurity. CODASPY 2023: 295-297 - [c70]Basel Abdeen, Ehab Al-Shaer, Anoop Singhal, Latifur Khan, Kevin W. Hamlen:
SMET: Semantic Mapping of CVE to ATT&CK and Its Application to Cybersecurity. DBSec 2023: 243-260 - [c69]Sadaf Md. Halim, Md Delwar Hossain, Latifur Khan, Anoop Singhal, Hiroyuki Inoue, Hideya Ochiai, Kevin W. Hamlen, Youki Kadobayashi:
Securing Smart Vehicles Through Federated Learning. FPS (1) 2023: 18-35 - [c68]Khandakar Ashrafi Akbar, Fariha Ishrat Rahman, Anoop Singhal, Latifur Khan, Bhavani Thuraisingham:
The Design and Application of a Unified Ontology for Cyber Security. ICISS 2023: 23-41 - [c67]Armin Ziaie Tabari, Guojun Liu, Xinming Ou, Anoop Singhal:
Revealing Human Attacker Behaviors Using an Adaptive Internet of Things Honeypot Ecosystem. IFIP Int. Conf. Digital Forensics 2023: 73-90 - 2022
- [j22]Alina Oprea, Anoop Singhal, Apostol Vassilev:
Poisoning Attacks Against Machine Learning: Can Machine Learning Be Trustworthy? Computer 55(11): 94-99 (2022) - [j21]Qingtian Zou, Anoop Singhal, Xiaoyan Sun, Peng Liu:
Deep learning for detecting logic-flaw-exploiting network attacks: An end-to-end approach. J. Comput. Secur. 30(4): 541-570 (2022) - [c66]Matthew Jablonski, Duminda Wijesekera, Anoop Singhal:
Generating Cyber-Physical System Risk Overlays for Attack and Fault Trees using Systems Theory. SAT-CPS@CODASPY 2022: 13-20 - [c65]Khandakar Ashrafi Akbar, Sadaf Md. Halim, Yibo Hu, Anoop Singhal, Latifur Khan, Bhavani Thuraisingham:
Knowledge Mining in Cybersecurity: From Attack to Defense. DBSec 2022: 110-122 - [c64]Qingtian Zou, Lan Zhang, Anoop Singhal, Xiaoyan Sun, Peng Liu:
Attacks on ML Systems: From Security Analysis to Attack Mitigation. ICISS 2022: 119-138 - 2021
- [j20]Mengyuan Zhang, Lingyu Wang, Sushil Jajodia, Anoop Singhal:
Network Attack Surface: Lifting the Concept of Attack Surface to the Network Level for Evaluating Networks' Resilience Against Zero-Day Attacks. IEEE Trans. Dependable Secur. Comput. 18(1): 310-324 (2021) - [c63]Qingtian Zou, Anoop Singhal, Xiaoyan Sun, Peng Liu:
Deep Learning for Detecting Network Attacks: An End-to-End Approach. DBSec 2021: 221-234 - [c62]Khandakar Ashrafi Akbar, Yigong Wang, Md Shihabul Islam, Anoop Singhal, Latifur Khan, Bhavani Thuraisingham:
Identifying Tactics of Advanced Persistent Threats with Limited Attack Traces. ICISS 2021: 3-25 - [c61]Suryadipta Majumdar, Daniel Bastos, Anoop Singhal:
Security Auditing of Internet of Things Devices in a Smart Home. IFIP Int. Conf. Digital Forensics 2021: 213-234 - [i2]Armin Ziaie Tabari, Xinming Ou, Anoop Singhal:
What are Attackers after on IoT Devices? An approach based on a multi-phased multi-faceted IoT honeypot ecosystem and data clustering. CoRR abs/2112.10974 (2021) - 2020
- [j19]Qingtian Zou, Xiaoyan Sun, Peng Liu, Anoop Singhal:
An Approach for Detection of Advanced Persistent Threat Attacks. Computer 53(12): 92-96 (2020) - [c60]Gbadebo Ayoade, Khandakar Ashrafi Akbar, Pracheta Sahoo, Yang Gao, Anmol Agarwal, Kangkook Jee, Latifur Khan, Anoop Singhal:
Evolving Advanced Persistent Threat Detection using Provenance Graph and Metric Learning. CNS 2020: 1-9 - [c59]Anoop Singhal:
Security Metrics and Risk Analysis for Enterprise Systems. IWSPA@CODASPY 2020: 1 - [c58]Qingtian Zou, Anoop Singhal, Xiaoyan Sun, Peng Liu:
Automatic Recognition of Advanced Persistent Threat Tactics for Enterprise Security. IWSPA@CODASPY 2020: 43-52 - [c57]Elisa Bertino, Anoop Singhal, Srivathsan Srinivasagopalan, Rakesh M. Verma:
Developing A Compelling Vision for Winning the Cybersecurity Arms Race. CODASPY 2020: 220-222 - [c56]Changwei Liu, Anoop Singhal, Duminda Wijesekera:
Forensic Analysis of Advanced Persistent Threat Attacks in Cloud Environments. IFIP Int. Conf. Digital Forensics 2020: 161-180 - [e5]Anoop Singhal, Jaideep Vaidya:
Data and Applications Security and Privacy XXXIV - 34th Annual IFIP WG 11.3 Conference, DBSec 2020, Regensburg, Germany, June 25-26, 2020, Proceedings. Lecture Notes in Computer Science 12122, Springer 2020, ISBN 978-3-030-49668-5 [contents] - [i1]Qingtian Zou, Anoop Singhal, Xiaoyan Sun, Peng Liu:
Generating Comprehensive Data with Protocol Fuzzing for Applying Deep Learning to Detect Network Attacks. CoRR abs/2012.12743 (2020)
2010 – 2019
- 2019
- [j18]Daniel Borbor, Lingyu Wang, Sushil Jajodia, Anoop Singhal:
Optimizing the network diversity to improve the resilience of networks against unknown attacks. Comput. Commun. 145: 96-112 (2019) - [j17]Nawaf Alhebaishi, Lingyu Wang, Sushil Jajodia, Anoop Singhal:
Mitigating the insider threat of remote administrators in clouds through maintenance task assignments. J. Comput. Secur. 27(4): 427-458 (2019) - [j16]Nawaf Alhebaishi, Lingyu Wang, Anoop Singhal:
Threat Modeling for Cloud Infrastructures. EAI Endorsed Trans. Security Safety 5(17): e5 (2019) - [c55]Mengyuan Zhang, Yue Xin, Lingyu Wang, Sushil Jajodia, Anoop Singhal:
CASFinder: Detecting Common Attack Surface. DBSec 2019: 338-358 - [c54]Changwei Liu, Anoop Singhal, Ramaswamy Chandramouli, Duminda Wijesekera:
DETERMINING THE FORENSIC DATA REQUIREMENTS FOR INVESTIGATING HYPERVISOR ATTACKS. IFIP Int. Conf. Digital Forensics 2019: 253-272 - 2018
- [j15]Xiaoyan Sun, Peng Liu, Anoop Singhal:
Toward Cyberresiliency in the Context of Cloud Computing [Resilient Security]. IEEE Secur. Priv. 16(6): 71-75 (2018) - [j14]Daniel Borbor, Lingyu Wang, Sushil Jajodia, Anoop Singhal:
Surviving unpatchable vulnerabilities through heterogeneous network hardening options. J. Comput. Secur. 26(6): 761-789 (2018) - [j13]Xiaoyan Sun, Jun Dai, Anoop Singhal, Peng Liu:
Probabilistic Inference of the Stealthy Bridges between Enterprise Networks in Cloud. EAI Endorsed Trans. Security Safety 4(13): e3 (2018) - [j12]Xiaoyan Sun, Jun Dai, Peng Liu, Anoop Singhal, John Yen:
Using Bayesian Networks for Probabilistic Identification of Zero-Day Attack Paths. IEEE Trans. Inf. Forensics Secur. 13(10): 2506-2521 (2018) - [c53]Lingyu Wang, Mengyuan Zhang, Anoop Singhal:
Network Security Metrics: From Known Vulnerabilities to Zero Day Attacks. From Database to Cyber Security 2018: 450-469 - [c52]Nawaf Alhebaishi, Lingyu Wang, Sushil Jajodia, Anoop Singhal:
Modeling and Mitigating the Insider Threat of Remote Administrators in Clouds. DBSec 2018: 3-20 - [c51]Chen Cao, Lun-Pin Yuan, Anoop Singhal, Peng Liu, Xiaoyan Sun, Sencun Zhu:
Assessing Attack Impact on Business Processes by Interconnecting Attack Graphs and Entity Dependency Graphs. DBSec 2018: 330-348 - [c50]Changwei Liu, Anoop Singhal, Duminda Wijesekera:
A Layered Graphical Model for Cloud Forensic Mission Attack Impact Analysis. IFIP Int. Conf. Digital Forensics 2018: 263-289 - 2017
- [b3]Lingyu Wang, Sushil Jajodia, Anoop Singhal:
Network Security Metrics. Springer 2017, ISBN 978-3-319-66504-7, pp. 1-207 - [c49]Nicholas J. Multari, Anoop Singhal, Erin Miller:
SafeConfig'17: Applying the Scientific Method to Active Cyber Defense Research. CCS 2017: 2641-2642 - [c48]Changwei Liu, Anoop Singhal, Duminda Wijesekera:
A layered graphical model for mission attack impact analysis. CNS 2017: 602-609 - [c47]Xiaoyan Sun, Anoop Singhal, Peng Liu:
Towards Actionable Mission Impact Assessment in the Context of Cloud Computing. DBSec 2017: 259-274 - [c46]Daniel Borbor, Lingyu Wang, Sushil Jajodia, Anoop Singhal:
Securing Networks Against Unpatchable and Unknown Vulnerabilities Using Heterogeneous Hardening Options. DBSec 2017: 509-528 - [c45]Changwei Liu, Anoop Singhal, Duminda Wijesekera:
Identifying Evidence for Cloud Forensic Analysis. IFIP Int. Conf. Digital Forensics 2017: 111-130 - [p6]Changwei Liu, Anoop Singhal, Duminda Wijesekera:
Identifying Evidence for Cloud Forensic Analysis. Research Advances in Cloud Computing 2017: 371-391 - [p5]Xiaoyan Sun, Jun Dai, Anoop Singhal, Peng Liu:
Enterprise-Level Cyber Situation Awareness. Theory and Models for Cyber Situation Awareness 2017: 66-109 - [e4]Nicholas J. Multari, Anoop Singhal, Erin Miller:
Proceedings of the 2017 Workshop on Automated Decision Making for Active Cyber Defense, SafeConfig@CCS 2017, Dallas, TX, USA, October 30 - November 03, 2017. ACM 2017, ISBN 978-1-4503-5203-1 [contents] - 2016
- [j11]Mengyuan Zhang, Lingyu Wang, Sushil Jajodia, Anoop Singhal, Massimiliano Albanese:
Network Diversity: A Security Metric for Evaluating the Resilience of Networks Against Zero-Day Attacks. IEEE Trans. Inf. Forensics Secur. 11(5): 1071-1086 (2016) - [c44]Nicholas J. Multari, Anoop Singhal, David O. Manz:
SafeConfig'16: Testing and Evaluation for Active and Resilient Cyber Systems. CCS 2016: 1871-1872 - [c43]Xiaoyan Sun, Jun Dai, Peng Liu, Anoop Singhal, John Yen:
Towards probabilistic identification of zero-day attack paths. CNS 2016: 64-72 - [c42]Daniel Borbor, Lingyu Wang, Sushil Jajodia, Anoop Singhal:
Diversifying Network Services Under Cost Constraints for Better Resilience Against Unknown Attacks. DBSec 2016: 295-312 - [c41]Nawaf Alhebaishi, Lingyu Wang, Sushil Jajodia, Anoop Singhal:
Threat Modeling for Cloud Data Center Infrastructures. FPS 2016: 302-319 - [c40]Changwei Liu, Anoop Singhal, Duminda Wijesekera:
A Probabilistic Network Forensic Model for Evidence Analysis. IFIP Int. Conf. Digital Forensics 2016: 189-210 - [c39]Nicholas J. Multari, Anoop Singhal, David O. Manz, Robert Cowles, Jorge Cuéllar, Christopher S. Oehmen, Gregory E. Shannon:
SafeConfig'16: Testing and Evaluation for Active & Resilient Cyber Systems Panel Verification of Active and Resilient Systems: Practical or Utopian? SafeConfig@CCS 2016: 53 - [e3]Nicholas J. Multari, Anoop Singhal, David O. Manz:
Proceedings of the 2016 ACM Workshop on Automated Decision Making for Active Cyber Defense, SafeConfig@CCS 2016, Vienna, Austria, October 24, 2016. ACM 2016, ISBN 978-1-4503-4566-8 [contents] - 2015
- [c38]Anoop Singhal, Changwei Liu, Duminda Wijesekera:
POSTER: A Logic Based Network Forensics Model for Evidence Analysis. CCS 2015: 1677 - [c37]Changwei Liu, Anoop Singhal, Duminda Wijesekera:
A Logic-Based Network Forensic Model for Evidence Analysis. IFIP Int. Conf. Digital Forensics 2015: 129-145 - [c36]Xiaoyan Sun, Anoop Singhal, Peng Liu:
Who Touched My Mission: Towards Probabilistic Mission Impact Assessment. SafeConfig@CCS 2015: 21-26 - 2014
- [j10]Changwei Liu, Anoop Singhal, Duminda Wijesekera:
Relating Admissibility Standards for Digital Evidence to Attack Scenario Reconstruction. J. Digit. Forensics Secur. Law 9(2): 181-196 (2014) - [j9]Lingyu Wang, Sushil Jajodia, Anoop Singhal, Pengsu Cheng, Steven Noel:
k-Zero Day Safety: A Network Security Metric for Measuring the Risk of Unknown Vulnerabilities. IEEE Trans. Dependable Secur. Comput. 11(1): 30-44 (2014) - [c35]Lingyu Wang, Mengyuan Zhang, Sushil Jajodia, Anoop Singhal, Massimiliano Albanese:
Modeling Network Diversity for Evaluating the Robustness of Networks against Zero-Day Attacks. ESORICS (2) 2014: 494-511 - [c34]Xiaoyan Sun, Jun Dai, Anoop Singhal, Peng Liu:
Inferring the Stealthy Bridges Between Enterprise Network Islands in Cloud Using Cross-Layer Bayesian Networks. SecureComm (1) 2014: 3-23 - [c33]Changwei Liu, Anoop Singhal, Duminda Wijesekera:
A Model Towards Using Evidence from Security Events for Network Attack Analysis. WOSIS 2014: 83-95 - [p4]Kerim Yasin Oktay, Mahadevan Gomathisankaran, Murat Kantarcioglu, Sharad Mehrotra, Anoop Singhal:
Towards Data Confidentiality and a Vulnerability Analysis Framework for Cloud Computing. Secure Cloud Computing 2014: 213-238 - [p3]Yi Cheng, Julia Deng, Jason H. Li, Scott A. DeLoach, Anoop Singhal, Xinming Ou:
Metrics of Security. Cyber Defense and Situational Awareness 2014: 263-295 - [e2]Sushil Jajodia, Krishna Kant, Pierangela Samarati, Anoop Singhal, Vipin Swarup, Cliff Wang:
Secure Cloud Computing. Springer 2014, ISBN 978-1-4614-9277-1 [contents] - 2013
- [j8]John Homer, Su Zhang, Xinming Ou, David Schmidt, Yanhui Du, S. Raj Rajagopalan, Anoop Singhal:
Aggregating vulnerability metrics in enterprise networks using attack graphs. J. Comput. Secur. 21(4): 561-597 (2013) - [c32]Massimiliano Albanese, Sushil Jajodia, Anoop Singhal, Lingyu Wang:
An Efficient Framework for Evaluating the Risk of Zero-Day Vulnerabilities. ICETE (Selected Papers) 2013: 322-340 - [c31]Changwei Liu, Anoop Singhal, Duminda Wijesekera:
Creating Integrated Evidence Graphs for Network Forensics. IFIP Int. Conf. Digital Forensics 2013: 227-241 - [c30]Massimiliano Albanese, Sushil Jajodia, Anoop Singhal, Lingyu Wang:
An Efficient Approach to Assessing the Risk of Zero-Day Vulnerabilities. SECRYPT 2013: 207-218 - [c29]William Nzoukou, Lingyu Wang, Sushil Jajodia, Anoop Singhal:
A Unified Framework for Measuring a Network's Mean Time-to-Compromise. SRDS 2013: 215-224 - [c28]Patrick Kamongi, Srujan Kotikela, Krishna Kavi, Mahadevan Gomathisankaran, Anoop Singhal:
VULCAN: Vulnerability Assessment Framework for Cloud Computing. SERE 2013: 218-226 - 2012
- [c27]Changwei Liu, Anoop Singhal, Duminda Wijesekera:
Using Attack Graphs in Forensic Examinations. ARES 2012: 596-603 - [c26]Pengsu Cheng, Lingyu Wang, Sushil Jajodia, Anoop Singhal:
Aggregating CVSS Base Scores for Semantics-Rich Network Security Metrics. SRDS 2012: 31-40 - [c25]Changwei Liu, Anoop Singhal, Duminda Wijesekera:
Mapping evidence graphs to attack graphs. WIFS 2012: 121-126 - 2011
- [b2]Xinming Ou, Anoop Singhal:
Quantitative Security Risk Assessment of Enterprise Networks. Springer Briefs in Computer Science, Springer 2011, ISBN 978-1-4614-1859-7, pp. i-xiii, 1-28 - [j7]Murat Gunestas, Murad Mehmet, Duminda Wijesekera, Anoop Singhal:
Forensic Web Services Framework. IT Prof. 13(3): 31-37 (2011) - [j6]Ernesto Damiani, Seth Proctor, Anoop Singhal:
Guest Editorial: Security and Dependability in SOA and Business Processes. IEEE Trans. Serv. Comput. 4(4): 255-256 (2011) - [c24]Bo Yu, J. Varga, Duminda Wijesekera, Angelos Stavrou, Anoop Singhal:
Specifying Time-Out Points in Surgical EMRs-Work in Progress. CENTERIS (3) 2011: 165-174 - [c23]Kun Sun, Sushil Jajodia, Jason H. Li, Yi Cheng, Wei Tang, Anoop Singhal:
Automatic security analysis using security metrics. MILCOM 2011: 1207-1212 - 2010
- [j5]Steven Noel, Lingyu Wang, Anoop Singhal, Sushil Jajodia:
Measuring Security Risk of Networks Using Attack Graphs. Int. J. Next Gener. Comput. 1(1) (2010) - [c22]Anoop Singhal, Duminda Wijesekera:
Ontologies for modeling enterprise level security metrics. CSIIRW 2010: 58 - [c21]Lingyu Wang, Sushil Jajodia, Anoop Singhal, Steven Noel:
k-Zero Day Safety: Measuring the Security Risk of Networks against Unknown Attacks. ESORICS 2010: 573-587 - [c20]Ahmed A. L. Faresi, Bo Yu, Khalid Moidu, Angelos Stavrou, Duminda Wijesekera, Anoop Singhal:
Fine-grained Sharing of Health Records using XSPA Profile for XACML - An Extended Abstract. HealthSec 2010 - [p2]Anoop Singhal, Sushil Jajodia:
Data Mining for Intrusion Detection. Data Mining and Knowledge Discovery Handbook 2010: 1171-1180
2000 – 2009
- 2009
- [c19]Anoop Singhal, Xinming Ou:
Techniques for enterprise network security metrics. CSIIRW 2009: 25 - [e1]Ernesto Damiani, Seth Proctor, Anoop Singhal:
Proceedings of the 6th ACM Workshop On Secure Web Services, SWS 2009, Chicago, Illinois, USA, November 13, 2009. ACM 2009, ISBN 978-1-60558-789-9 [contents] - 2008
- [j4]Lingyu Wang, Chao Yao, Anoop Singhal, Sushil Jajodia:
Implementing interactive analysis of attack graphs using relational databases. J. Comput. Secur. 16(4): 419-437 (2008) - [c18]Marcel Frigault, Lingyu Wang, Anoop Singhal, Sushil Jajodia:
Measuring network security using dynamic bayesian network. QoP 2008: 23-30 - [c17]Anoop Singhal:
Web Services Security: Techniques and Challenges (Extended Abstract). DBSec 2008: 158 - [c16]Lingyu Wang, Tania Islam, Tao Long, Anoop Singhal, Sushil Jajodia:
An Attack Graph-Based Probabilistic Security Metric. DBSec 2008: 283-296 - [c15]Murat Gunestas, Duminda Wijesekera, Anoop Singhal:
Forensic Web Services. IFIP Int. Conf. Digital Forensics 2008: 163-176 - 2007
- [b1]Anoop Singhal:
Data Warehousing and Data Mining Techniques for Cyber Security. Advances in Information Security 31, Springer 2007, ISBN 978-0-387-26409-7, pp. 1-157 - [c14]Lingyu Wang, Anoop Singhal, Sushil Jajodia:
Toward measuring network security using attack graphs. QoP 2007: 49-54 - [c13]Lingyu Wang, Anoop Singhal, Sushil Jajodia:
Measuring the Overall Security of Network Configurations Using Attack Graphs. DBSec 2007: 98-112 - [c12]Anoop Singhal:
Web Services Security: Challenges and Techniques. POLICY 2007: 282 - 2006
- [j3]Anoop Singhal, Sushil Jajodia:
Data warehousing and data mining techniques for intrusion detection systems. Distributed Parallel Databases 20(2): 149-166 (2006) - [c11]Lingyu Wang, Chao Yao, Anoop Singhal, Sushil Jajodia:
Interactive Analysis of Attack Graphs Using Relational Queries. DBSec 2006: 119-132 - 2005
- [p1]Anoop Singhal, Sushil Jajodia:
Data Mining for Intrusion Detection. The Data Mining and Knowledge Discovery Handbook 2005: 1225-1237 - 2004
- [c10]Anoop Singhal:
Design of a data warehouse system for network/web services. CIKM 2004: 473-476
1990 – 1999
- 1998
- [c9]Gary M. Weiss, Johannes P. Ros, Anoop Singhal:
ANSWER: Network Monitoring Using Object-Oriented Rules. AAAI/IAAI 1998: 1087-1093 - 1996
- [c8]Anoop Singhal, Gary M. Weiss, Johannes P. Ros:
A model based reasoning approach to network monitoring. DART@CIKM 1996: 41-44 - 1995
- [c7]Anoop Singhal, Chi-Yuan Lo:
Object oriented data modeling for VLSI/CAD. VLSI Design 1995: 25-29 - 1993
- [j2]Nishit P. Parikh, Chi-Yuan Lo, Anoop Singhal, Kwok W. Wu:
HS: a hierarchical search package for CAD data. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 12(1): 1-5 (1993) - [c6]Anoop Singhal:
Can OODB Technology Solve CAD Design Data Management Problems? (Panel Abstract). ICDE 1993: 458 - [c5]Anoop Singhal, Robert M. Arlein, Chi-Yuan Lo:
DDB: An Object Oriented Design Data Manager for VLSI CAD. SIGMOD Conference 1993: 467-470 - 1990
- [c4]Nishit P. Parikh, Chi-Yuan Lo, Anoop Singhal, Kwok W. Wu:
HS: A Hierarchical Search Package for CAD Data. ICCAD 1990: 478-481
1980 – 1989
- 1989
- [c3]Anoop Singhal, Nishit P. Parikh, Debaprosad Dutt, Chi-Yuan Lo:
A data model and architecture for VLSI/CAD databases. ICCAD 1989: 276-279 - 1987
- [c2]Amit P. Sheth, Anoop Singhal, Ming T. Liu:
Performance Analysis of Resiliency Mechanisms in Distributed Datbase Systems. ICDE 1987: 419-428 - 1985
- [j1]Amit P. Sheth, Anoop Singhal, Ming T. Liu:
An Analysis of the Effect of Network Parameters on the Performance of Distributed Database Systems. IEEE Trans. Software Eng. 11(10): 1174-1184 (1985) - 1984
- [c1]Amit P. Sheth, Anoop Singhal, Ming T. Liu:
An Adaptive Concurrency Control Strategy for Distributed Database Systems. ICDE 1984: 474-482
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-18 20:29 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint