Ian M. Molloy, Ph.D. - Publications

Affiliations: 
2010 Computer Sciences Purdue University, West Lafayette, IN, United States 
Area:
Computer Science

7 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2018 Huang H, Zheng C, Zeng J, Zhou W, Zhu S, Liu P, Molloy I, Chari S, Zhang C, Guan Q. A Large-scale Study of Android Malware Development Phenomenon on Public Malware Submission and Scanning Platform Ieee Transactions On Big Data. 1-1. DOI: 10.1109/Tbdata.2018.2790439  0.311
2016 Chari SN, Habeck TA, Molloy I, Park Y, Rao JR, Teiken W. A platform and analytics for usage and entitlement analytics Journal of Reproduction and Development. 60: 7. DOI: 10.1147/Jrd.2016.2560558  0.473
2015 Park Y, Molloy IM, Chari SN, Xu Z, Gates C, Li N. Learning from others: User anomaly detection using anomalous samples from other users Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9327: 396-414. DOI: 10.1007/978-3-319-24177-7_20  0.337
2014 Gates CS, Li N, Peng H, Sarma B, Qi Y, Potharaju R, Nita-Rotaru C, Molloy I. Generating summary risk scores for mobile applications Ieee Transactions On Dependable and Secure Computing. 11: 238-251. DOI: 10.1109/Tdsc.2014.2302293  0.453
2014 Luo W, Li X, Molloy I, Di L, Stepinski T. Web Service for extracting stream networks from DEM data Geojournal. 79: 183-193. DOI: 10.1007/S10708-013-9502-1  0.333
2012 Li T, Li N, Zhang J, Molloy I. Slicing: A New Approach for Privacy Preserving Data Publishing Ieee Transactions On Knowledge and Data Engineering. 24: 561-574. DOI: 10.1109/Tkde.2010.236  0.559
2010 Molloy I, Chen H, Li T, Wang Q, Li N, Bertino E, Calo S, Lobo J. Mining Roles with Multiple Objectives Acm Transactions On Information and System Security. 13: 36. DOI: 10.1145/1880022.1880030  0.569
Show low-probability matches.