The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "SECURIT"( http://dblp.L3S.de/Venues/SECURIT )

URL (DBLP): http://dblp.uni-trier.de/db/conf/securit

Publication years (Num. hits)
2012 (37)
Publication types (Num. hits)
inproceedings(36) proceedings(1)
Venues (Conferences, Journals, ...)
SECURIT(37)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 37 publication records. Showing 37 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Dhiren, Maulik, Hardik Joshi, Bhadresh K. Patel Towards application classification with vulnerability signatures for IDS/IPS. Search on Bibsonomy SECURIT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Parvez Faruki, Vijay Laxmi, Manoj Singh Gaur, P. Vinod 0001 Behavioural detection with API call-grams to identify malicious PE files. Search on Bibsonomy SECURIT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Hiran V. Nath, K. Gangadharan, M. Sethumadhavan 0001 Reconciliation engine and metric for network vulnerability assessment. Search on Bibsonomy SECURIT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Usha Banerjee, K. V. Arya, Geetika Gupta, Sakshi Sharma Performance evaluation of an ant colony based routing algorithm in the presence of a misbehaving node. Search on Bibsonomy SECURIT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Abdullah Mohammed Almuhaideb, Bala Srinivasan 0002, Phu Dung Le, Campbell Wilson, Vishv Malhotra Analysis of mobile authentication protocols by SVO logic. Search on Bibsonomy SECURIT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Senthil Kumar Mathi, M. L. Valarmathi, G. Ramprasath A secure and efficient registration for IP mobility. Search on Bibsonomy SECURIT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1V. Rajalakshmi, G. S. Anandha Mala Integer partitioning based encryption for privacy preservation in data mining. Search on Bibsonomy SECURIT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Shaik Shakeel Ahamad, V. N. Sastry, Siba K. Udgata A secure and optimized mobile payment framework with formal verification. Search on Bibsonomy SECURIT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Lee W. Lerner, Mohammed M. Farag, Cameron D. Patterson Run-time prediction and preemption of configuration attacks on embedded process controllers. Search on Bibsonomy SECURIT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1B. S. Adiga, P. Balamuralidhar, M. A. Rajan, Ravishankara Shastry, V. L. Shivraj An identity based encryption using elliptic curve cryptography for secure M2M communication. Search on Bibsonomy SECURIT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Annie George, Prabaharan Poornachandran, M. Ramachandra Kaimal adsvm: pre-processor plug-in using support vector machine algorithm for Snort. Search on Bibsonomy SECURIT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Xavier N. Fernando, Kuganeswaran Thambu Cross-layer coding improves quality and security in wireless video sensor networks. Search on Bibsonomy SECURIT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1V. Natarajan, Shina Sheen, R. Anitha 0002 Detection of StegoBot: a covert social network botnet. Search on Bibsonomy SECURIT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1N. Kaleeswari, K. Baskaran Reducing the energy consumption in wireless sensor networks using delay aware dynamic routing protocol. Search on Bibsonomy SECURIT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Simon Burton 0001, Jürgen Likkei, Priyamvadha Vembar, Marko Wolf Automotive functional safety = safety + security. Search on Bibsonomy SECURIT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1I. Praveen, M. Sethumadhavan 0001 A more efficient and faster pairing computation with cryptographic security. Search on Bibsonomy SECURIT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Zhiyuan Tan 0001, Aruna Jamdagni, Priyadarsi Nanda, Xiangjian He, Ren Ping Liu Evaluation on multivariate correlation analysis based denial-of-service attack detection system. Search on Bibsonomy SECURIT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1James Clarke, Rodrigo Roman Castro, Abhishek Sharma, Javier López 0001, Neeraj Suri Trust & security RTD in the internet of things: opportunities for international cooperation. Search on Bibsonomy SECURIT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Susmita Horrow, Anjali Sardana Identity management framework for cloud based internet of things. Search on Bibsonomy SECURIT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Kamalanathan Kandasamy, Krishnashree Achuthan Re-architecture of database software stack with planner module for query optimization in a cloud environment. Search on Bibsonomy SECURIT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1M. Marfa, Subu Surendran, Sabu M. Thampi, T. Radhakrishnan Cache based approach for improving location based query processing in mobile environment. Search on Bibsonomy SECURIT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Smita Naval, Vijay Laxmi, Manoj Singh Gaur, P. Vinod 0001 SPADE: Signature based PAcker DEtection. Search on Bibsonomy SECURIT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Renu Aggarwal, Manik Lal Das RFID security in the context of "internet of things". Search on Bibsonomy SECURIT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Sampreet A. Sharma, Bernard L. Menezes Implementing side-channel attacks on suggest boxes in web applications. Search on Bibsonomy SECURIT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Chinmaya Kumar Patanaik, Ferdous A. Barbhuiya, Sukumar Nandi Obfuscated malware detection using API call dependency. Search on Bibsonomy SECURIT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Meiyuan Zhao, Jesse Walker, Chieh-Chih Wang Security challenges for the intelligent transportation system. Search on Bibsonomy SECURIT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1G. K. Ragesh, K. Baskaran CRYPE: towards cryptographically enforced and privacy enhanced WBANs. Search on Bibsonomy SECURIT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Garima Jain, Yatin Mehandiratta Chronicle security against covert crawling. Search on Bibsonomy SECURIT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1B. Dinesh Reddy, V. Valli Kumari, K. V. S. V. N. Raju Randomized symmetric block encryption. Search on Bibsonomy SECURIT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1D. Bapat Ameya, Alwyn Roshan Pais Restraining add-on's behavior in private browsing. Search on Bibsonomy SECURIT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Parman Sukarno, Nandita Bhattacharjee, Bala Srinivasan 0002 How confident are you to counter uncertainty? Search on Bibsonomy SECURIT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Digambar Powar, G. Geethakumari Digital evidence detection in virtual environment for cloud computing. Search on Bibsonomy SECURIT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Jayaraj Poroor, Bharat Jayaraman Formal analysis of event-driven cyber physical systems. Search on Bibsonomy SECURIT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1R. Chandrasekhar, Andrew S. Tanenbaum, P. Venkat Rangan (eds.) First International Conference on Security of Internet of Things, SECURIT '12, Kollam, India - August 17 - 19, 2012 Search on Bibsonomy SECURIT The full citation details ... 2012 DBLP  BibTeX  RDF
1Mitul Shah, Anjali Sardana Searching in internet of things using VCS. Search on Bibsonomy SECURIT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Arijit Ukil, Soma Bandyopadhyay, Joel Joseph, Vijayanand Banahatti, Sachin Lodha Negotiation-based privacy preservation scheme in internet of things platform. Search on Bibsonomy SECURIT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Dhruwajita Devi, Sukumar Nandi Detection of packed malware. Search on Bibsonomy SECURIT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #37 of 37 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license