Publications
1. P. Iyer and A. Masoumzadeh, "Active Learning of Relationship-Based Access Control Policies," in Proceedings of the 25th ACM Symposium on Access Control Models and Technologies, 2020, pp. 155–166. [Best Paper]
2. P. Iyer and A. Masoumzadeh, “Generalized Mining of Relationship-Based Access Control Policies in Evolving Systems,” in Proceedings of the 24th ACM Symposium on Access Control Models and Technologies, 2019, pp. 135–140.
3. P. Iyer and A. Masoumzadeh, “Mining Positive and Negative Attribute-Based Access Control Policy Rules,” in Proceedings of the 23rd ACM Symposium on Access Control Models and Technologies, 2018, pp. 161–172.
4. R. P. Iyer, P. K. Atrey, G. Varshney, and M. Misra, "Email spoofing detection using volatile memory forensics," in 2017 IEEE Conference on Communications and Network Security (CNS), 2017, pp. 619-625.