Projects per year
Fingerprint
- 1 Similar Profiles
Collaborations and top research areas from the last five years
-
CyberCorps Scholarship for Service (Renewal): Secure Computing Initiative
Mili, A. (CoPI), Oria, V. (PI), Curtmola, R. (CoPI) & Borcea, C. (CoPI)
8/1/21 → 7/31/26
Project: Research project
-
Satc: Ttp: Medium: Collaborative: Securing The Software Supply Chain
Curtmola, R. (PI)
7/1/18 → 6/30/21
Project: Research project
-
Career: Secure And Reliable Outsourced Storage Systems Using Remote Data Checking
Curtmola, R. (PI)
7/1/11 → 6/30/16
Project: Research project
-
Multi-faceted e-health interventions for primary health care
Curtmola, R. (PI) & Peiris, D. D. (PI)
7/1/11 → 12/31/17
Project: Research project
-
Bootstrapping Trust in Community Repository Projects
Vaidya, S., Torres-Arias, S., Cappos, J. & Curtmola, R., 2023, Security and Privacy in Communication Networks - 18th EAI International Conference, SecureComm 2022, Proceedings. Li, F., Liang, K., Lin, Z. & Katsikas, S. K. (eds.). Springer Science and Business Media Deutschland GmbH, p. 450-469 20 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 462 LNICST).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
Towards verifiable web-based code review systems
Afzali, H., Torres-Arias, S., Curtmola, R. & Cappos, J., 2023, In: Journal of Computer Security. 31, 2, p. 153-184 32 p.Research output: Contribution to journal › Article › peer-review
-
DFPS: A Distributed Mobile System for Free Parking Assignment
Hakeem, A., Curtmola, R., Ding, X. & Borcea, C., Dec 1 2022, In: IEEE Transactions on Mobile Computing. 21, 12, p. 4279-4295 17 p.Research output: Contribution to journal › Article › peer-review
2 Scopus citations -
Targeted Deanonymization via the Cache Side Channel: Attacks and Defenses
Zaheri, M., Oren, Y. & Curtmola, R., 2022, Proceedings of the 31st USENIX Security Symposium, Security 2022. USENIX Association, p. 1505-1523 19 p. (Proceedings of the 31st USENIX Security Symposium, Security 2022).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
4 Scopus citations -
Leakuidator: Leaky Resource Attacks and Countermeasures
Zaheri, M. & Curtmola, R., 2021, Security and Privacy in Communication Networks - 17th EAI International Conference, SecureComm 2021, Proceedings. Garcia-Alfaro, J., Li, S., Poovendran, R., Debar, H. & Yung, M. (eds.). Springer Science and Business Media Deutschland GmbH, p. 143-163 21 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 399 LNICST).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
1 Scopus citations
Press/Media
-
EXPERTS AT NJIT'S DATA SCIENCE SUMMIT PROPOSE NEW PATHS IN HARDWARE AND AI
Basu Roy, S., Curtmola, R., Bader, D. & Angizi, S.
11/14/22
1 item of Media coverage
Press/Media: Press / Media
-
STUDENTS WILL DESIGN HACKING APPS, HARDWARE EXPLOITS TO GAIN EXPERIENCE
10/6/22
1 item of Media coverage
Press/Media: Press / Media
-
-
New attack can reveal identities of anonymous users on any major browser
7/18/22
1 item of Media coverage
Press/Media: Press / Media
-
A new attack can unmask anonymous users on any major browser
7/15/22
1 item of Media coverage
Press/Media: Press / Media