Kapil Singh
Kapil Singh
IBM T.J. Watson Research Center
Verified email at us.ibm.com - Homepage
Title
Cited by
Cited by
Year
Biometric authentication on a mobile device: a study of user effort, error and task disruption
S Trewin, C Swart, L Koved, J Martino, K Singh, S Ben-David
Proceedings of the 28th Annual Computer Security Applications Conference …, 2012
1632012
Evaluating bluetooth as a medium for botnet command and control
K Singh, S Sangal, N Jain, P Traynor, W Lee
International Conference on Detection of Intrusions and Malware, and …, 2010
1122010
xBook: Redesigning Privacy Control in Social Networking Platforms.
K Singh, S Bhola, W Lee
USENIX Security Symposium, 249-266, 2009
1112009
On the incoherencies in web browser access control policies
K Singh, A Moshchuk, HJ Wang, W Lee
2010 IEEE Symposium on Security and Privacy, 463-478, 2010
922010
Protection of user data in hosted application environments
M Christodorescu, D Pendarakis, KK Singh
US Patent 9,245,126, 2016
872016
APHIDS: A mobile agent-based programmable hybrid intrusion detection system
K Deeter, K Singh, S Wilson, L Filipozzi, S Vuong
International Workshop on Mobile Agents for Telecommunication Applications …, 2004
502004
Mobile telephone featuring accelerated ambient temperature measurement module
S Soini, M Simonen, T Tammi
US Patent 7,027,834, 2006
422006
Evaluating email’s feasibility for botnet command and control
K Singh, A Srivastava, J Giffin, W Lee
2008 IEEE International Conference on Dependable Systems and Networks With …, 2008
412008
Practical context-aware permission control for hybrid mobile applications
K Singh
International Workshop on Recent Advances in Intrusion Detection, 307-327, 2013
382013
Understanding precision in host based intrusion detection
M Sharif, K Singh, J Giffin, W Lee
International Workshop on Recent Advances in Intrusion Detection, 21-41, 2007
332007
Trust/value/risk-based access control policy
PC Cheng, L Koved, KK Singh
US Patent 9,432,375, 2016
312016
VulnerableMe: Measuring systemic weaknesses in mobile browser security
C Amrutkar, K Singh, A Verma, P Traynor
International Conference on Information Systems Security, 16-34, 2012
302012
Practical end-to-end web content integrity
K Singh, HJ Wang, A Moshchuk, C Jackson, W Lee
Proceedings of the 21st international conference on World Wide Web, 659-668, 2012
242012
Adaptive behavior profiling and anomaly scoring through continuous learning
PC Cheng, L Koved, KK Singh
US Patent 9,807,105, 2017
222017
UiRef: analysis of sensitive user inputs in Android applications
B Andow, A Acharya, D Li, W Enck, K Singh, T Xie
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless …, 2017
192017
Webcapsule: Towards a lightweight forensic engine for web browsers
C Neasbitt, B Li, R Perdisci, L Lu, K Singh, K Li
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
172015
Perceived security risks in mobile interaction
L Koved, S Trewin, C Swart, K Singh, PC Cheng, S Chari
Symposium on usable privacy and security (SOUPS), 24-26, 2013
142013
Policylint: investigating internal privacy policy contradictions on Google play
B Andow, SY Mahmud, W Wang, J Whitaker, W Enck, B Reaves, K Singh, ...
28th {USENIX} Security Symposium ({USENIX} Security 19), 585-602, 2019
132019
Method and apparatus for server-side authentication and authorization for mobile clients without client-side application modification
L Koved, KK Singh
US Patent 9,088,555, 2015
132015
Owner-centric protection of unstructured data on smartphones
Y Zhou, K Singh, X Jiang
International Conference on Trust and Trustworthy Computing, 55-73, 2014
132014
The system can't perform the operation now. Try again later.
Articles 1–20