The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "ICISS"( http://dblp.L3S.de/Venues/ICISS )

URL (DBLP): http://dblp.uni-trier.de/db/conf/iciss

Publication years (Num. hits)
2005 (29) 2006 (33) 2007 (28) 2008 (26) 2009 (26) 2010 (19) 2011 (29) 2012 (25) 2013 (30) 2014 (28) 2015 (37) 2016 (33) 2017 (26) 2018 (25) 2019 (19) 2020 (59) 2021 (43) 2022 (46) 2023 (71)
Publication types (Num. hits)
inproceedings(609) proceedings(23)
Venues (Conferences, Journals, ...)
ICISS(632)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 150 occurrences of 130 keywords

Results
Found 632 publication records. Showing 632 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Kanako Konno, Naoya Kitagawa, Nariyoshi Yamai False Positive Detection in Sender Domain Authentication by DMARC Report Analysis. Search on Bibsonomy ICISS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Kevin Theuermann Reliability and Security for Safety-Critical Service Compositions. Search on Bibsonomy ICISS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Hidema Tanaka, Keisuke Fukushima Secure Calculation for Position Information of IoT Device with Few Communication and Small Secret Information. Search on Bibsonomy ICISS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Yansong Gao, Surya Nepal A Defence Against Input-Agnostic Backdoor Attacks on Deep Neural Networks. Search on Bibsonomy ICISS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Abir Dutta, Shri Kant An Overview of Cyber Threat Intelligence Platform and Role of Artificial Intelligence and Machine Learning. Search on Bibsonomy ICISS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Shivi Garg, Niyati Baliyan Machine Learning Based Android Vulnerability Detection: A Roadmap. Search on Bibsonomy ICISS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Thang Bui, Scott D. Stoller Learning Attribute-Based and Relationship-Based Access Control Policies with Unknown Values. Search on Bibsonomy ICISS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Sudesh Kumar, Lakshmi Jayant Kittur, Alwyn Roshan Pais Attacks on Android-Based Smartphones and Impact of Vendor Customization on Android OS Security. Search on Bibsonomy ICISS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Abhijeet Chougule, Harshal Tupsamudre, Sachin Lodha Revelio: A Lightweight Captcha Solver Using a Dictionary Based Approach. Search on Bibsonomy ICISS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Rafal Leszczyna, Adrian Litwin Estimating the Cost of Cybersecurity Activities with CAsPeA: A Case Study and Comparative Analysis. Search on Bibsonomy ICISS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Salil S. Kanhere, Vishwas T. Patil, Shamik Sural, Manoj Singh Gaur (eds.) Information Systems Security - 16th International Conference, ICISS 2020, Jammu, India, December 16-20, 2020, Proceedings Search on Bibsonomy ICISS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Nitish M. Uplavikar, Jaideep Vaidya, Dan Lin 0001, Wei Jiang Privacy-Preserving Friend Recommendation in an Integrated Social Environment. Search on Bibsonomy ICISS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Simone Pirocca, Luca Allodi, Nicola Zannone A Toolkit for Security Awareness Training Against Targeted Phishing. Search on Bibsonomy ICISS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Ryan Shah, Shishir Nagaraja A Unified Access Control Model for Calibration Traceability in Safety-Critical IoT. Search on Bibsonomy ICISS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Sabyasachi Dutta, Md Kutubuddin Sardar, Avishek Adhikari, Sushmita Ruj, Kouichi Sakurai Color Visual Cryptography Schemes Using Linear Algebraic Techniques over Rings. Search on Bibsonomy ICISS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Vinita Verma, Sunil Kumar Muttoo, V. B. Singh Detection of Malign and Benign PE Files Using Texture Analysis. Search on Bibsonomy ICISS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Jyotirmoy Pramanik, Sabyasachi Dutta, Partha Sarathi Roy 0001, Avishek Adhikari Cheating Detectable Ramp Secret Sharing with Optimal Cheating Resiliency. Search on Bibsonomy ICISS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Saurabh Mishra, Debanjan Sadhya LiARX: A Lightweight Cipher Based on the LTS Design Strategy of ARX. Search on Bibsonomy ICISS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Sobhan Mondal, Deependra Pushkar, Mrinali Kumari, Ruchira Naskar Forensic Source Identification of OSN Compressed Images. Search on Bibsonomy ICISS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Lucas M. Palma, Fernanda Oliveira Gomes, Martín A. Gagliotti Vigil, Jean Everson Martina A Transparent and Privacy-Aware Approach Using Smart Contracts for Car Insurance Reward Programs. Search on Bibsonomy ICISS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Aditya Dubey, Uttara Ravi, Somya Sharma, Barsha Mitra Toward Implementing Spatio-Temporal RBAC Extensions. Search on Bibsonomy ICISS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Gunjan Batra, Vijayalakshmi Atluri, Jaideep Vaidya, Shamik Sural Policy Reconciliation and Migration in Attribute Based Access Control. Search on Bibsonomy ICISS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Deepak Garg 0001, N. V. Narendra Kumar, Rudrapatna K. Shyamasundar (eds.) Information Systems Security - 15th International Conference, ICISS 2019, Hyderabad, India, December 16-20, 2019, Proceedings Search on Bibsonomy ICISS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Felix Hörandner, Sebastian Ramacher, Simon Roth 0001 Selective End-To-End Data-Sharing in the Cloud. Search on Bibsonomy ICISS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Eram Fatima, Saiful Islam A New High Capacity and Reversible Data Hiding Technique for Images. Search on Bibsonomy ICISS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Saptarshi Das, Shamik Sural, Jaideep Vaidya, Vijayalakshmi Atluri, Gerhard Rigoll VisMAP: Visual Mining of Attribute-Based Access Control Policies. Search on Bibsonomy ICISS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Pranav Verma, Anish Mathuria, Sourish Dasgupta Item-Based Privacy-Preserving Recommender System with Offline Users and Reduced Trust Requirements. Search on Bibsonomy ICISS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Jonas Haglund, Roberto Guanciale Trustworthy Isolation of DMA Enabled Devices. Search on Bibsonomy ICISS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Deepak Kumar Dalai, Santu Pal Wip: Degree Evaluation of Grain-v1. Search on Bibsonomy ICISS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Priyanka Pal, Sudharsana K. J. L., Rohith Balaji S. WiP: Criminal Smart Contract for Private Key Theft in End to End Encrypted Applications. Search on Bibsonomy ICISS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Bintu Kadhiwala, Sankita J. Patel A Novel k-Anonymization Approach to Prevent Insider Attack in Collaborative Social Network Data Publishing. Search on Bibsonomy ICISS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Ali A. Noroozi, Khayyam Salehi, Jaber Karimpour, Ayaz Isazadeh Secure Information Flow Analysis Using the PRISM Model Checker. Search on Bibsonomy ICISS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Felix Hörandner, Franco Nieddu Cloud Data Sharing and Device-Loss Recovery with Hardware-Bound Keys. Search on Bibsonomy ICISS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1T. E. Jisha, Thomas Monoth WiP: Security Enhanced Size Invariant Visual Cryptography with Perfect Reconstruction of White Pixels. Search on Bibsonomy ICISS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Arkaprava Bhaduri Mandal, Tanmoy Kanti Das Anti-forensics of a NAD-JPEG Detection Scheme Using Estimation of DC Coefficients. Search on Bibsonomy ICISS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Ghanshyam S. Bopche, Gopal N. Rai, B. Ramachandra Reddy, Babu M. Mehtre Differential Attack Graph-Based Approach for Assessing Change in the Network Attack Surface. Search on Bibsonomy ICISS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Anasuya Acharya, Manoj Prabhakaran 0001, Akash Trehan An Introduction to the CellTree Paradigm (Invited Paper). Search on Bibsonomy ICISS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Akhilesh Gangwar, Vadlamani Ravi WiP: Generative Adversarial Network for Oversampling Data in Credit Card Fraud Detection. Search on Bibsonomy ICISS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Amit Pathania, B. S. Radhika, Rudrapatna K. Shyamasundar MySecPol: A Client-Side Policy Language for Safe and Secure Browsing. Search on Bibsonomy ICISS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Gaurav Pareek, B. R. Purushothama Proxy Re-Encryption Scheme for Access Control Enforcement Delegation on Outsourced Data in Public Cloud. Search on Bibsonomy ICISS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Jamimamul Bakas, Praneta Rawat, Kalyan Kokkalla, Ruchira Naskar Re-compression Based JPEG Tamper Detection and Localization Using Deep Neural Network, Eliminating Compression Factor Dependency. Search on Bibsonomy ICISS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Venkata Udaya Sameer, Ishaan Dali, Ruchira Naskar A Deep Learning Based Digital Forensic Solution to Blind Source Identification of Facebook Images. Search on Bibsonomy ICISS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Ghanshyam S. Bopche, Gopal N. Rai, Babu M. Mehtre, G. R. Gangadharan Modeling and Analyzing Multistage Attacks Using Recursive Composition Algebra. Search on Bibsonomy ICISS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Bhagyesh V. Patil, Parjanya Vyas, R. K. Shyamasundar SecSmartLock: An Architecture and Protocol for Designing Secure Smart Locks. Search on Bibsonomy ICISS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Alexandre Kabil, Thierry Duval, Nora Cuppens, Gérard Le Comte, Yoran Halgand, Christophe Ponchel From Cyber Security Activities to Collaborative Virtual Environments Practices Through the 3D CyberCOP Platform. Search on Bibsonomy ICISS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1K. Aditya, Slawomir Grzonkowski, Nhien-An Le-Khac RiskWriter: Predicting Cyber Risk of an Enterprise. Search on Bibsonomy ICISS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Sreesh Kishore, Renuka Kumar, Sreeranga Rajan Towards Accuracy in Similarity Analysis of Android Applications. Search on Bibsonomy ICISS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Sadegh M. Milajerdi, Birhanu Eshete, Rigel Gjomemo, Venkat N. Venkatakrishnan ProPatrol: Attack Investigation via Extracted High-Level Tasks. Search on Bibsonomy ICISS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Alexander Marsalek, Bernd Prünster, Bojan Suzic, Thomas Zefferer SeDiCom: A Secure Distributed Privacy-Preserving Communication Platform. Search on Bibsonomy ICISS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Suryakanta Panda, Madhu Kumari, Samrat Mondal SGP: A Safe Graphical Password System Resisting Shoulder-Surfing Attack on Smartphones. Search on Bibsonomy ICISS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Khaoula Es-Salhi, David Espes, Nora Cuppens SONICS: A Segmentation Method for Integrated ICS and Corporate System. Search on Bibsonomy ICISS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Vishwas T. Patil, R. K. Shyamasundar Efficacy of GDPR's Right-to-be-Forgotten on Facebook. Search on Bibsonomy ICISS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Kirk Boyer, Hao Chen, Jingwei Chen, Jian Qiu, Rinku Dewri A Characterization of the Mass Surveillance Potential of Road Traffic Monitors. Search on Bibsonomy ICISS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Sourav Das, Aashish Kolluri, Prateek Saxena, Haifeng Yu (Invited Paper) on the Security of Blockchain Consensus Protocols. Search on Bibsonomy ICISS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Jamimamul Bakas, Ruchira Naskar A Digital Forensic Technique for Inter-Frame Video Forgery Detection Based on 3D CNN. Search on Bibsonomy ICISS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Vinod Ganapathy, Trent Jaeger, R. K. Shyamasundar (eds.) Information Systems Security - 14th International Conference, ICISS 2018, Bangalore, India, December 17-19, 2018, Proceedings Search on Bibsonomy ICISS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Ajinkya Rajput, K. Gopinath Analysis of Newer Aadhaar Privacy Models. Search on Bibsonomy ICISS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1K. Nimmy, Sriram Sankaran, Krishnashree Achuthan A Novel Multi-factor Authentication Protocol for Smart Home Environments. Search on Bibsonomy ICISS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Suryakanta Panda, Samrat Mondal drPass: A Dynamic and Reusable Password Generator Protocol. Search on Bibsonomy ICISS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Sumanta Chatterjee Secure Moderated Bargaining Game. Search on Bibsonomy ICISS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Abhishek Tiwari, Rajarshi Pal Gaze-Based Graphical Password Using Webcam. Search on Bibsonomy ICISS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Riddhi Ghosal, Sanjit Chatterjee Privacy Preserving Multi-server k-means Computation over Horizontally Partitioned Data. Search on Bibsonomy ICISS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Jyotirmoy Pramanik, Partha Sarathi Roy 0001, Sabyasachi Dutta, Avishek Adhikari, Kouichi Sakurai Secret Sharing Schemes on Compartmental Access Structure in Presence of Cheaters. Search on Bibsonomy ICISS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Sandeep Rai, Rushang Dhanesha, Sreyans Nahata, Bernard Menezes Malicious Application Detection on Android Smartphones with Enhanced Static-Dynamic Analysis. Search on Bibsonomy ICISS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Mahender Kumar, Chittaranjan Padmanabha Katti, Prem Chandra Saxena A Secure Anonymous E-Voting System Using Identity-Based Blind Signature Scheme. Search on Bibsonomy ICISS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Ajinkya Rajput, K. Gopinath Towards a More Secure Aadhaar. Search on Bibsonomy ICISS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Routhu Srinivasa Rao, Alwyn Roshan Pais An Enhanced Blacklist Method to Detect Phishing Websites. Search on Bibsonomy ICISS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Amrita Milind Honap, Wonjun Lee 0003 Hiding Kernel Level Rootkits Using Buffer Overflow and Return Oriented Programming. Search on Bibsonomy ICISS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Luigi V. Mancini, Andrea Monti, Agostino Panico SOF on Trial. The Technical and Legal Value of Battlefield Digital Forensics in Court. Search on Bibsonomy ICISS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Vineet Kumar 0005, Aneek Roy, Sourya Sengupta, Sourav Sen Gupta 0001 Parallelized Common Factor Attack on RSA. Search on Bibsonomy ICISS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Sanjeet Kumar Nayak, Somanath Tripathy SEMFS: Secure and Efficient Multi-keyword Fuzzy Search for Cloud Storage. Search on Bibsonomy ICISS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Dileep Kumar Koshley, Sapana Rani, Raju Halder Towards Generalization of Privacy Policy Specification and Property-Based Information Leakage. Search on Bibsonomy ICISS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Stefano Zatti The Protection of Space Missions: Threats and Cyber Threats. Search on Bibsonomy ICISS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Bold Munkhbaatar, Mamoru Mimura, Hidema Tanaka Dark Domain Name Attack: A New Threat to Domain Name System. Search on Bibsonomy ICISS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Akash Agrawall, Shubh Maheshwari, Projit Bandyopadhyay, Venkatesh Choppella Modelling and Mitigation of Cross-Origin Request Attacks on Federated Identity Management Using Cross Origin Request Policy. Search on Bibsonomy ICISS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Rudrapatna K. Shyamasundar, Virendra Singh, Jaideep Vaidya (eds.) Information Systems Security - 13th International Conference, ICISS 2017, Mumbai, India, December 16-20, 2017, Proceedings Search on Bibsonomy ICISS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Moumita Das, Ansuman Banerjee, Nitesh K. Singh, Bhaskar Sardar Performance Attacks on Branch Predictors in Embedded Processors with SMT Support. Search on Bibsonomy ICISS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Nachiket Trivedi, Manik Lal Das MalDetec: A Non-root Approach for Dynamic Malware Detection in Android. Search on Bibsonomy ICISS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Mayukh Rath, Shivali Agarwal, R. K. Shyamasundar Semi Supervised NLP Based Classification of Malware Documents. Search on Bibsonomy ICISS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Varun Garg, Anish Mathuria On Automated Detection of Multi-Protocol Attacks Using AVISPA. Search on Bibsonomy ICISS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Mohsin Khan, Kimmo Järvinen 0001, Philip Ginzboorg, Valtteri Niemi On De-synchronization of User Pseudonyms in Mobile Networks. Search on Bibsonomy ICISS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Son Duc Nguyen, Mamoru Mimura, Hidema Tanaka Leveraging Man-in-the-middle DoS Attack with Internal TCP Retransmissions in Virtual Network. Search on Bibsonomy ICISS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Marco Lobe Kome, Mariem Graa, Nora Cuppens-Boulahia, Frédéric Cuppens, Vincent Frey DIscovery and REgistration Protocol - For Device and Person Identity Management in IoT. Search on Bibsonomy ICISS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Mamoru Mimura, Hidema Tanaka Heavy Log Reader: Learning the Context of Cyber Attacks Automatically with Paragraph Vector. Search on Bibsonomy ICISS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Anis Bkakria, Mariem Graa, Nora Cuppens-Boulahia, Frédéric Cuppens, Jean-Louis Lanet Experimenting Similarity-Based Hijacking Attacks Detection and Response in Android Systems. Search on Bibsonomy ICISS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Lyes Bayou, David Espes, Nora Cuppens-Boulahia, Frédéric Cuppens wIDS: A Multilayer IDS for Wireless-Based SCADA Systems. Search on Bibsonomy ICISS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Payal Chaudhari, Manik Lal Das, Dipankar Dasgupta Privacy-Preserving Proxy Re-encryption with Fine-Grained Access Control. Search on Bibsonomy ICISS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Jay Dave, Shweta Saharan, Parvez Faruki, Vijay Laxmi, Manoj Singh Gaur Secure Random Encryption for Deduplicated Storage. Search on Bibsonomy ICISS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Ganesh Ram Santhanam, Benjamin Holland, Suresh C. Kothari, Nikhil Ranade Human-on-the-Loop Automation for Detecting Software Side-Channel Vulnerabilities. Search on Bibsonomy ICISS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Varsharani Hawanna, Vrushali Y. Kulkarni, Rashmi Rane, Pooja Joshi Risk Evaluation of X.509 Certificates - A Machine Learning Application. Search on Bibsonomy ICISS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Hidema Tanaka Network Counter-Attack Strategy by Topology Map Analysis. Search on Bibsonomy ICISS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Subhojeet Mukherjee, Hossein Shirazi, Indrakshi Ray, Jeremy Daily, Rose F. Gamble Practical DoS Attacks on Embedded Networks in Commercial Vehicles. Search on Bibsonomy ICISS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Venkata Udaya Sameer, S. Sugumaran, Ruchira Naskar Digital Forensic Source Camera Identification with Efficient Feature Selection Using Filter, Wrapper and Hybrid Approaches. Search on Bibsonomy ICISS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Ömer Yüksel, Jerry den Hartog, Sandro Etalle Towards Useful Anomaly Detection for Back Office Networks. Search on Bibsonomy ICISS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Surendra Singh, Sachin Tripathi, Suvadip Batabyal Secured Dynamic Scheduling Algorithm for Real-Time Applications on Grid. Search on Bibsonomy ICISS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Saurabh Chamotra, Rakesh Kumar Sehgal, Sanjeev Ror, Bhupendra Singh Honeypot Deployment in Broadband Networks. Search on Bibsonomy ICISS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1T. Harsha, S. Asha, B. Soniya Feature Selection for Effective Botnet Detection Based on Periodicity of Traffic. Search on Bibsonomy ICISS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Sanat Ghoshal, Goutam Paul 0001 Exploiting Block-Chain Data Structure for Auditorless Auditing on Cloud Data. Search on Bibsonomy ICISS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Jayaprakash Kar, Kshirasagar Naik Generic Construction of Certificateless Signcryption Scheme. Search on Bibsonomy ICISS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Angshuman Jana, Raju Halder Defining Abstract Semantics for Static Dependence Analysis of Relational Database Applications. Search on Bibsonomy ICISS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
Displaying result #201 - #300 of 632 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license