• Bhat W and Quadri S. POSTER: Dr. Watson provides data for post-breach analysis. Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security. (1445-1448).

    https://doi.org/10.1145/2508859.2512522

  • Ansari M, Chattopadhayay A and Das S. A Kernel Level VFS Logger for Building Efficient File System Intrusion Detection System. Proceedings of the 2010 Second International Conference on Computer and Network Technology. (273-279).

    https://doi.org/10.1109/ICCNT.2010.47