Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Kanako Konno, Naoya Kitagawa, Nariyoshi Yamai |
False Positive Detection in Sender Domain Authentication by DMARC Report Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: ICISS 2020: The 3rd International Conference on Information Science and System, Cambridge, UK, March 19-22, 2020, pp. 38-42, 2020, ACM, 978-1-4503-7725-6. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Kevin Theuermann |
Reliability and Security for Safety-Critical Service Compositions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 16th International Conference, ICISS 2020, Jammu, India, December 16-20, 2020, Proceedings, pp. 45-65, 2020, Springer, 978-3-030-65609-6. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Hidema Tanaka, Keisuke Fukushima |
Secure Calculation for Position Information of IoT Device with Few Communication and Small Secret Information. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 16th International Conference, ICISS 2020, Jammu, India, December 16-20, 2020, Proceedings, pp. 221-240, 2020, Springer, 978-3-030-65609-6. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Yansong Gao, Surya Nepal |
A Defence Against Input-Agnostic Backdoor Attacks on Deep Neural Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 16th International Conference, ICISS 2020, Jammu, India, December 16-20, 2020, Proceedings, pp. 69-80, 2020, Springer, 978-3-030-65609-6. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Abir Dutta, Shri Kant |
An Overview of Cyber Threat Intelligence Platform and Role of Artificial Intelligence and Machine Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 16th International Conference, ICISS 2020, Jammu, India, December 16-20, 2020, Proceedings, pp. 81-86, 2020, Springer, 978-3-030-65609-6. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Shivi Garg, Niyati Baliyan |
Machine Learning Based Android Vulnerability Detection: A Roadmap. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 16th International Conference, ICISS 2020, Jammu, India, December 16-20, 2020, Proceedings, pp. 87-93, 2020, Springer, 978-3-030-65609-6. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Thang Bui, Scott D. Stoller |
Learning Attribute-Based and Relationship-Based Access Control Policies with Unknown Values. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 16th International Conference, ICISS 2020, Jammu, India, December 16-20, 2020, Proceedings, pp. 23-44, 2020, Springer, 978-3-030-65609-6. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Sudesh Kumar, Lakshmi Jayant Kittur, Alwyn Roshan Pais |
Attacks on Android-Based Smartphones and Impact of Vendor Customization on Android OS Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 16th International Conference, ICISS 2020, Jammu, India, December 16-20, 2020, Proceedings, pp. 241-252, 2020, Springer, 978-3-030-65609-6. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Abhijeet Chougule, Harshal Tupsamudre, Sachin Lodha |
Revelio: A Lightweight Captcha Solver Using a Dictionary Based Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 16th International Conference, ICISS 2020, Jammu, India, December 16-20, 2020, Proceedings, pp. 97-116, 2020, Springer, 978-3-030-65609-6. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Rafal Leszczyna, Adrian Litwin |
Estimating the Cost of Cybersecurity Activities with CAsPeA: A Case Study and Comparative Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 16th International Conference, ICISS 2020, Jammu, India, December 16-20, 2020, Proceedings, pp. 267-287, 2020, Springer, 978-3-030-65609-6. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Salil S. Kanhere, Vishwas T. Patil, Shamik Sural, Manoj Singh Gaur (eds.) |
Information Systems Security - 16th International Conference, ICISS 2020, Jammu, India, December 16-20, 2020, Proceedings ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![Springer, 978-3-030-65609-6 The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Nitish M. Uplavikar, Jaideep Vaidya, Dan Lin 0001, Wei Jiang |
Privacy-Preserving Friend Recommendation in an Integrated Social Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 16th International Conference, ICISS 2020, Jammu, India, December 16-20, 2020, Proceedings, pp. 117-136, 2020, Springer, 978-3-030-65609-6. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Simone Pirocca, Luca Allodi, Nicola Zannone |
A Toolkit for Security Awareness Training Against Targeted Phishing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 16th International Conference, ICISS 2020, Jammu, India, December 16-20, 2020, Proceedings, pp. 137-159, 2020, Springer, 978-3-030-65609-6. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Ryan Shah, Shishir Nagaraja |
A Unified Access Control Model for Calibration Traceability in Safety-Critical IoT. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 16th International Conference, ICISS 2020, Jammu, India, December 16-20, 2020, Proceedings, pp. 3-22, 2020, Springer, 978-3-030-65609-6. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Sabyasachi Dutta, Md Kutubuddin Sardar, Avishek Adhikari, Sushmita Ruj, Kouichi Sakurai |
Color Visual Cryptography Schemes Using Linear Algebraic Techniques over Rings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 16th International Conference, ICISS 2020, Jammu, India, December 16-20, 2020, Proceedings, pp. 198-217, 2020, Springer, 978-3-030-65609-6. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Vinita Verma, Sunil Kumar Muttoo, V. B. Singh |
Detection of Malign and Benign PE Files Using Texture Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 16th International Conference, ICISS 2020, Jammu, India, December 16-20, 2020, Proceedings, pp. 253-266, 2020, Springer, 978-3-030-65609-6. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Jyotirmoy Pramanik, Sabyasachi Dutta, Partha Sarathi Roy 0001, Avishek Adhikari |
Cheating Detectable Ramp Secret Sharing with Optimal Cheating Resiliency. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 16th International Conference, ICISS 2020, Jammu, India, December 16-20, 2020, Proceedings, pp. 169-184, 2020, Springer, 978-3-030-65609-6. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Saurabh Mishra, Debanjan Sadhya |
LiARX: A Lightweight Cipher Based on the LTS Design Strategy of ARX. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 16th International Conference, ICISS 2020, Jammu, India, December 16-20, 2020, Proceedings, pp. 185-197, 2020, Springer, 978-3-030-65609-6. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Sobhan Mondal, Deependra Pushkar, Mrinali Kumari, Ruchira Naskar |
Forensic Source Identification of OSN Compressed Images. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 16th International Conference, ICISS 2020, Jammu, India, December 16-20, 2020, Proceedings, pp. 160-166, 2020, Springer, 978-3-030-65609-6. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Lucas M. Palma, Fernanda Oliveira Gomes, Martín A. Gagliotti Vigil, Jean Everson Martina |
A Transparent and Privacy-Aware Approach Using Smart Contracts for Car Insurance Reward Programs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 15th International Conference, ICISS 2019, Hyderabad, India, December 16-20, 2019, Proceedings, pp. 3-20, 2019, Springer, 978-3-030-36944-6. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Aditya Dubey, Uttara Ravi, Somya Sharma, Barsha Mitra |
Toward Implementing Spatio-Temporal RBAC Extensions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 15th International Conference, ICISS 2019, Hyderabad, India, December 16-20, 2019, Proceedings, pp. 59-78, 2019, Springer, 978-3-030-36944-6. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Gunjan Batra, Vijayalakshmi Atluri, Jaideep Vaidya, Shamik Sural |
Policy Reconciliation and Migration in Attribute Based Access Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 15th International Conference, ICISS 2019, Hyderabad, India, December 16-20, 2019, Proceedings, pp. 99-120, 2019, Springer, 978-3-030-36944-6. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Deepak Garg 0001, N. V. Narendra Kumar, Rudrapatna K. Shyamasundar (eds.) |
Information Systems Security - 15th International Conference, ICISS 2019, Hyderabad, India, December 16-20, 2019, Proceedings ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![Springer, 978-3-030-36944-6 The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Felix Hörandner, Sebastian Ramacher, Simon Roth 0001 |
Selective End-To-End Data-Sharing in the Cloud. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 15th International Conference, ICISS 2019, Hyderabad, India, December 16-20, 2019, Proceedings, pp. 175-195, 2019, Springer, 978-3-030-36944-6. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Eram Fatima, Saiful Islam |
A New High Capacity and Reversible Data Hiding Technique for Images. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 15th International Conference, ICISS 2019, Hyderabad, India, December 16-20, 2019, Proceedings, pp. 290-304, 2019, Springer, 978-3-030-36944-6. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Saptarshi Das, Shamik Sural, Jaideep Vaidya, Vijayalakshmi Atluri, Gerhard Rigoll |
VisMAP: Visual Mining of Attribute-Based Access Control Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 15th International Conference, ICISS 2019, Hyderabad, India, December 16-20, 2019, Proceedings, pp. 79-98, 2019, Springer, 978-3-030-36944-6. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Pranav Verma, Anish Mathuria, Sourish Dasgupta |
Item-Based Privacy-Preserving Recommender System with Offline Users and Reduced Trust Requirements. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 15th International Conference, ICISS 2019, Hyderabad, India, December 16-20, 2019, Proceedings, pp. 218-238, 2019, Springer, 978-3-030-36944-6. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Jonas Haglund, Roberto Guanciale |
Trustworthy Isolation of DMA Enabled Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 15th International Conference, ICISS 2019, Hyderabad, India, December 16-20, 2019, Proceedings, pp. 35-55, 2019, Springer, 978-3-030-36944-6. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Deepak Kumar Dalai, Santu Pal |
Wip: Degree Evaluation of Grain-v1. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 15th International Conference, ICISS 2019, Hyderabad, India, December 16-20, 2019, Proceedings, pp. 239-251, 2019, Springer, 978-3-030-36944-6. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Priyanka Pal, Sudharsana K. J. L., Rohith Balaji S. |
WiP: Criminal Smart Contract for Private Key Theft in End to End Encrypted Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 15th International Conference, ICISS 2019, Hyderabad, India, December 16-20, 2019, Proceedings, pp. 21-32, 2019, Springer, 978-3-030-36944-6. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Bintu Kadhiwala, Sankita J. Patel |
A Novel k-Anonymization Approach to Prevent Insider Attack in Collaborative Social Network Data Publishing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 15th International Conference, ICISS 2019, Hyderabad, India, December 16-20, 2019, Proceedings, pp. 255-275, 2019, Springer, 978-3-030-36944-6. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Ali A. Noroozi, Khayyam Salehi, Jaber Karimpour, Ayaz Isazadeh |
Secure Information Flow Analysis Using the PRISM Model Checker. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 15th International Conference, ICISS 2019, Hyderabad, India, December 16-20, 2019, Proceedings, pp. 154-172, 2019, Springer, 978-3-030-36944-6. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Felix Hörandner, Franco Nieddu |
Cloud Data Sharing and Device-Loss Recovery with Hardware-Bound Keys. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 15th International Conference, ICISS 2019, Hyderabad, India, December 16-20, 2019, Proceedings, pp. 196-217, 2019, Springer, 978-3-030-36944-6. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | T. E. Jisha, Thomas Monoth |
WiP: Security Enhanced Size Invariant Visual Cryptography with Perfect Reconstruction of White Pixels. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 15th International Conference, ICISS 2019, Hyderabad, India, December 16-20, 2019, Proceedings, pp. 279-289, 2019, Springer, 978-3-030-36944-6. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Arkaprava Bhaduri Mandal, Tanmoy Kanti Das |
Anti-forensics of a NAD-JPEG Detection Scheme Using Estimation of DC Coefficients. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 15th International Conference, ICISS 2019, Hyderabad, India, December 16-20, 2019, Proceedings, pp. 307-323, 2019, Springer, 978-3-030-36944-6. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Ghanshyam S. Bopche, Gopal N. Rai, B. Ramachandra Reddy, Babu M. Mehtre |
Differential Attack Graph-Based Approach for Assessing Change in the Network Attack Surface. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 15th International Conference, ICISS 2019, Hyderabad, India, December 16-20, 2019, Proceedings, pp. 324-344, 2019, Springer, 978-3-030-36944-6. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Anasuya Acharya, Manoj Prabhakaran 0001, Akash Trehan |
An Introduction to the CellTree Paradigm (Invited Paper). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 15th International Conference, ICISS 2019, Hyderabad, India, December 16-20, 2019, Proceedings, pp. 137-153, 2019, Springer, 978-3-030-36944-6. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Akhilesh Gangwar, Vadlamani Ravi |
WiP: Generative Adversarial Network for Oversampling Data in Credit Card Fraud Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 15th International Conference, ICISS 2019, Hyderabad, India, December 16-20, 2019, Proceedings, pp. 123-134, 2019, Springer, 978-3-030-36944-6. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Amit Pathania, B. S. Radhika, Rudrapatna K. Shyamasundar |
MySecPol: A Client-Side Policy Language for Safe and Secure Browsing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 14th International Conference, ICISS 2018, Bangalore, India, December 17-19, 2018, Proceedings, pp. 427-447, 2018, Springer, 978-3-030-05170-9. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Gaurav Pareek, B. R. Purushothama |
Proxy Re-Encryption Scheme for Access Control Enforcement Delegation on Outsourced Data in Public Cloud. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 14th International Conference, ICISS 2018, Bangalore, India, December 17-19, 2018, Proceedings, pp. 251-271, 2018, Springer, 978-3-030-05170-9. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Jamimamul Bakas, Praneta Rawat, Kalyan Kokkalla, Ruchira Naskar |
Re-compression Based JPEG Tamper Detection and Localization Using Deep Neural Network, Eliminating Compression Factor Dependency. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 14th International Conference, ICISS 2018, Bangalore, India, December 17-19, 2018, Proceedings, pp. 318-341, 2018, Springer, 978-3-030-05170-9. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Venkata Udaya Sameer, Ishaan Dali, Ruchira Naskar |
A Deep Learning Based Digital Forensic Solution to Blind Source Identification of Facebook Images. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 14th International Conference, ICISS 2018, Bangalore, India, December 17-19, 2018, Proceedings, pp. 291-303, 2018, Springer, 978-3-030-05170-9. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Ghanshyam S. Bopche, Gopal N. Rai, Babu M. Mehtre, G. R. Gangadharan |
Modeling and Analyzing Multistage Attacks Using Recursive Composition Algebra. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 14th International Conference, ICISS 2018, Bangalore, India, December 17-19, 2018, Proceedings, pp. 67-87, 2018, Springer, 978-3-030-05170-9. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Bhagyesh V. Patil, Parjanya Vyas, R. K. Shyamasundar |
SecSmartLock: An Architecture and Protocol for Designing Secure Smart Locks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 14th International Conference, ICISS 2018, Bangalore, India, December 17-19, 2018, Proceedings, pp. 24-43, 2018, Springer, 978-3-030-05170-9. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Alexandre Kabil, Thierry Duval, Nora Cuppens, Gérard Le Comte, Yoran Halgand, Christophe Ponchel |
From Cyber Security Activities to Collaborative Virtual Environments Practices Through the 3D CyberCOP Platform. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 14th International Conference, ICISS 2018, Bangalore, India, December 17-19, 2018, Proceedings, pp. 272-287, 2018, Springer, 978-3-030-05170-9. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | K. Aditya, Slawomir Grzonkowski, Nhien-An Le-Khac |
RiskWriter: Predicting Cyber Risk of an Enterprise. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 14th International Conference, ICISS 2018, Bangalore, India, December 17-19, 2018, Proceedings, pp. 88-106, 2018, Springer, 978-3-030-05170-9. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Sreesh Kishore, Renuka Kumar, Sreeranga Rajan |
Towards Accuracy in Similarity Analysis of Android Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 14th International Conference, ICISS 2018, Bangalore, India, December 17-19, 2018, Proceedings, pp. 146-167, 2018, Springer, 978-3-030-05170-9. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Sadegh M. Milajerdi, Birhanu Eshete, Rigel Gjomemo, Venkat N. Venkatakrishnan |
ProPatrol: Attack Investigation via Extracted High-Level Tasks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 14th International Conference, ICISS 2018, Bangalore, India, December 17-19, 2018, Proceedings, pp. 107-126, 2018, Springer, 978-3-030-05170-9. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Alexander Marsalek, Bernd Prünster, Bojan Suzic, Thomas Zefferer |
SeDiCom: A Secure Distributed Privacy-Preserving Communication Platform. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 14th International Conference, ICISS 2018, Bangalore, India, December 17-19, 2018, Proceedings, pp. 345-363, 2018, Springer, 978-3-030-05170-9. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Suryakanta Panda, Madhu Kumari, Samrat Mondal |
SGP: A Safe Graphical Password System Resisting Shoulder-Surfing Attack on Smartphones. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 14th International Conference, ICISS 2018, Bangalore, India, December 17-19, 2018, Proceedings, pp. 129-145, 2018, Springer, 978-3-030-05170-9. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Khaoula Es-Salhi, David Espes, Nora Cuppens |
SONICS: A Segmentation Method for Integrated ICS and Corporate System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 14th International Conference, ICISS 2018, Bangalore, India, December 17-19, 2018, Proceedings, pp. 231-250, 2018, Springer, 978-3-030-05170-9. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Vishwas T. Patil, R. K. Shyamasundar |
Efficacy of GDPR's Right-to-be-Forgotten on Facebook. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 14th International Conference, ICISS 2018, Bangalore, India, December 17-19, 2018, Proceedings, pp. 364-385, 2018, Springer, 978-3-030-05170-9. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Kirk Boyer, Hao Chen, Jingwei Chen, Jian Qiu, Rinku Dewri |
A Characterization of the Mass Surveillance Potential of Road Traffic Monitors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 14th International Conference, ICISS 2018, Bangalore, India, December 17-19, 2018, Proceedings, pp. 3-23, 2018, Springer, 978-3-030-05170-9. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Sourav Das, Aashish Kolluri, Prateek Saxena, Haifeng Yu |
(Invited Paper) on the Security of Blockchain Consensus Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 14th International Conference, ICISS 2018, Bangalore, India, December 17-19, 2018, Proceedings, pp. 465-480, 2018, Springer, 978-3-030-05170-9. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Jamimamul Bakas, Ruchira Naskar |
A Digital Forensic Technique for Inter-Frame Video Forgery Detection Based on 3D CNN. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 14th International Conference, ICISS 2018, Bangalore, India, December 17-19, 2018, Proceedings, pp. 304-317, 2018, Springer, 978-3-030-05170-9. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Vinod Ganapathy, Trent Jaeger, R. K. Shyamasundar (eds.) |
Information Systems Security - 14th International Conference, ICISS 2018, Bangalore, India, December 17-19, 2018, Proceedings ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![Springer, 978-3-030-05170-9 The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Ajinkya Rajput, K. Gopinath |
Analysis of Newer Aadhaar Privacy Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 14th International Conference, ICISS 2018, Bangalore, India, December 17-19, 2018, Proceedings, pp. 386-404, 2018, Springer, 978-3-030-05170-9. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | K. Nimmy, Sriram Sankaran, Krishnashree Achuthan |
A Novel Multi-factor Authentication Protocol for Smart Home Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 14th International Conference, ICISS 2018, Bangalore, India, December 17-19, 2018, Proceedings, pp. 44-63, 2018, Springer, 978-3-030-05170-9. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Suryakanta Panda, Samrat Mondal |
drPass: A Dynamic and Reusable Password Generator Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 14th International Conference, ICISS 2018, Bangalore, India, December 17-19, 2018, Proceedings, pp. 407-426, 2018, Springer, 978-3-030-05170-9. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Sumanta Chatterjee |
Secure Moderated Bargaining Game. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 14th International Conference, ICISS 2018, Bangalore, India, December 17-19, 2018, Proceedings, pp. 209-227, 2018, Springer, 978-3-030-05170-9. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Abhishek Tiwari, Rajarshi Pal |
Gaze-Based Graphical Password Using Webcam. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 14th International Conference, ICISS 2018, Bangalore, India, December 17-19, 2018, Proceedings, pp. 448-461, 2018, Springer, 978-3-030-05170-9. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Riddhi Ghosal, Sanjit Chatterjee |
Privacy Preserving Multi-server k-means Computation over Horizontally Partitioned Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 14th International Conference, ICISS 2018, Bangalore, India, December 17-19, 2018, Proceedings, pp. 189-208, 2018, Springer, 978-3-030-05170-9. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Jyotirmoy Pramanik, Partha Sarathi Roy 0001, Sabyasachi Dutta, Avishek Adhikari, Kouichi Sakurai |
Secret Sharing Schemes on Compartmental Access Structure in Presence of Cheaters. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 14th International Conference, ICISS 2018, Bangalore, India, December 17-19, 2018, Proceedings, pp. 171-188, 2018, Springer, 978-3-030-05170-9. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Sandeep Rai, Rushang Dhanesha, Sreyans Nahata, Bernard Menezes |
Malicious Application Detection on Android Smartphones with Enhanced Static-Dynamic Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 13th International Conference, ICISS 2017, Mumbai, India, December 16-20, 2017, Proceedings, pp. 194-208, 2017, Springer, 978-3-319-72597-0. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Mahender Kumar, Chittaranjan Padmanabha Katti, Prem Chandra Saxena |
A Secure Anonymous E-Voting System Using Identity-Based Blind Signature Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 13th International Conference, ICISS 2017, Mumbai, India, December 16-20, 2017, Proceedings, pp. 29-49, 2017, Springer, 978-3-319-72597-0. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Ajinkya Rajput, K. Gopinath |
Towards a More Secure Aadhaar. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 13th International Conference, ICISS 2017, Mumbai, India, December 16-20, 2017, Proceedings, pp. 283-300, 2017, Springer, 978-3-319-72597-0. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Routhu Srinivasa Rao, Alwyn Roshan Pais |
An Enhanced Blacklist Method to Detect Phishing Websites. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 13th International Conference, ICISS 2017, Mumbai, India, December 16-20, 2017, Proceedings, pp. 323-333, 2017, Springer, 978-3-319-72597-0. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Amrita Milind Honap, Wonjun Lee 0003 |
Hiding Kernel Level Rootkits Using Buffer Overflow and Return Oriented Programming. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 13th International Conference, ICISS 2017, Mumbai, India, December 16-20, 2017, Proceedings, pp. 107-126, 2017, Springer, 978-3-319-72597-0. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Luigi V. Mancini, Andrea Monti, Agostino Panico |
SOF on Trial. The Technical and Legal Value of Battlefield Digital Forensics in Court. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 13th International Conference, ICISS 2017, Mumbai, India, December 16-20, 2017, Proceedings, pp. 9-26, 2017, Springer, 978-3-319-72597-0. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Vineet Kumar 0005, Aneek Roy, Sourya Sengupta, Sourav Sen Gupta 0001 |
Parallelized Common Factor Attack on RSA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 13th International Conference, ICISS 2017, Mumbai, India, December 16-20, 2017, Proceedings, pp. 303-312, 2017, Springer, 978-3-319-72597-0. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Sanjeet Kumar Nayak, Somanath Tripathy |
SEMFS: Secure and Efficient Multi-keyword Fuzzy Search for Cloud Storage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 13th International Conference, ICISS 2017, Mumbai, India, December 16-20, 2017, Proceedings, pp. 50-67, 2017, Springer, 978-3-319-72597-0. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Dileep Kumar Koshley, Sapana Rani, Raju Halder |
Towards Generalization of Privacy Policy Specification and Property-Based Information Leakage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 13th International Conference, ICISS 2017, Mumbai, India, December 16-20, 2017, Proceedings, pp. 68-87, 2017, Springer, 978-3-319-72597-0. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Stefano Zatti |
The Protection of Space Missions: Threats and Cyber Threats. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 13th International Conference, ICISS 2017, Mumbai, India, December 16-20, 2017, Proceedings, pp. 3-8, 2017, Springer, 978-3-319-72597-0. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Bold Munkhbaatar, Mamoru Mimura, Hidema Tanaka |
Dark Domain Name Attack: A New Threat to Domain Name System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 13th International Conference, ICISS 2017, Mumbai, India, December 16-20, 2017, Proceedings, pp. 405-414, 2017, Springer, 978-3-319-72597-0. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Akash Agrawall, Shubh Maheshwari, Projit Bandyopadhyay, Venkatesh Choppella |
Modelling and Mitigation of Cross-Origin Request Attacks on Federated Identity Management Using Cross Origin Request Policy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 13th International Conference, ICISS 2017, Mumbai, India, December 16-20, 2017, Proceedings, pp. 263-282, 2017, Springer, 978-3-319-72597-0. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Rudrapatna K. Shyamasundar, Virendra Singh, Jaideep Vaidya (eds.) |
Information Systems Security - 13th International Conference, ICISS 2017, Mumbai, India, December 16-20, 2017, Proceedings ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![Springer, 978-3-319-72597-0 The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Moumita Das, Ansuman Banerjee, Nitesh K. Singh, Bhaskar Sardar |
Performance Attacks on Branch Predictors in Embedded Processors with SMT Support. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 13th International Conference, ICISS 2017, Mumbai, India, December 16-20, 2017, Proceedings, pp. 313-322, 2017, Springer, 978-3-319-72597-0. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Nachiket Trivedi, Manik Lal Das |
MalDetec: A Non-root Approach for Dynamic Malware Detection in Android. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 13th International Conference, ICISS 2017, Mumbai, India, December 16-20, 2017, Proceedings, pp. 231-240, 2017, Springer, 978-3-319-72597-0. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Mayukh Rath, Shivali Agarwal, R. K. Shyamasundar |
Semi Supervised NLP Based Classification of Malware Documents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 13th International Conference, ICISS 2017, Mumbai, India, December 16-20, 2017, Proceedings, pp. 334-344, 2017, Springer, 978-3-319-72597-0. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Varun Garg, Anish Mathuria |
On Automated Detection of Multi-Protocol Attacks Using AVISPA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 13th International Conference, ICISS 2017, Mumbai, India, December 16-20, 2017, Proceedings, pp. 179-193, 2017, Springer, 978-3-319-72597-0. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Mohsin Khan, Kimmo Järvinen 0001, Philip Ginzboorg, Valtteri Niemi |
On De-synchronization of User Pseudonyms in Mobile Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 13th International Conference, ICISS 2017, Mumbai, India, December 16-20, 2017, Proceedings, pp. 347-366, 2017, Springer, 978-3-319-72597-0. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Son Duc Nguyen, Mamoru Mimura, Hidema Tanaka |
Leveraging Man-in-the-middle DoS Attack with Internal TCP Retransmissions in Virtual Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 13th International Conference, ICISS 2017, Mumbai, India, December 16-20, 2017, Proceedings, pp. 367-386, 2017, Springer, 978-3-319-72597-0. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Marco Lobe Kome, Mariem Graa, Nora Cuppens-Boulahia, Frédéric Cuppens, Vincent Frey |
DIscovery and REgistration Protocol - For Device and Person Identity Management in IoT. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 13th International Conference, ICISS 2017, Mumbai, India, December 16-20, 2017, Proceedings, pp. 243-262, 2017, Springer, 978-3-319-72597-0. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Mamoru Mimura, Hidema Tanaka |
Heavy Log Reader: Learning the Context of Cyber Attacks Automatically with Paragraph Vector. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 13th International Conference, ICISS 2017, Mumbai, India, December 16-20, 2017, Proceedings, pp. 146-163, 2017, Springer, 978-3-319-72597-0. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Anis Bkakria, Mariem Graa, Nora Cuppens-Boulahia, Frédéric Cuppens, Jean-Louis Lanet |
Experimenting Similarity-Based Hijacking Attacks Detection and Response in Android Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 13th International Conference, ICISS 2017, Mumbai, India, December 16-20, 2017, Proceedings, pp. 127-145, 2017, Springer, 978-3-319-72597-0. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Lyes Bayou, David Espes, Nora Cuppens-Boulahia, Frédéric Cuppens |
wIDS: A Multilayer IDS for Wireless-Based SCADA Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 13th International Conference, ICISS 2017, Mumbai, India, December 16-20, 2017, Proceedings, pp. 387-404, 2017, Springer, 978-3-319-72597-0. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Payal Chaudhari, Manik Lal Das, Dipankar Dasgupta |
Privacy-Preserving Proxy Re-encryption with Fine-Grained Access Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 13th International Conference, ICISS 2017, Mumbai, India, December 16-20, 2017, Proceedings, pp. 88-103, 2017, Springer, 978-3-319-72597-0. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Jay Dave, Shweta Saharan, Parvez Faruki, Vijay Laxmi, Manoj Singh Gaur |
Secure Random Encryption for Deduplicated Storage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 13th International Conference, ICISS 2017, Mumbai, India, December 16-20, 2017, Proceedings, pp. 164-176, 2017, Springer, 978-3-319-72597-0. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Ganesh Ram Santhanam, Benjamin Holland, Suresh C. Kothari, Nikhil Ranade |
Human-on-the-Loop Automation for Detecting Software Side-Channel Vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 13th International Conference, ICISS 2017, Mumbai, India, December 16-20, 2017, Proceedings, pp. 209-230, 2017, Springer, 978-3-319-72597-0. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Varsharani Hawanna, Vrushali Y. Kulkarni, Rashmi Rane, Pooja Joshi |
Risk Evaluation of X.509 Certificates - A Machine Learning Application. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 12th International Conference, ICISS 2016, Jaipur, India, December 16-20, 2016, Proceedings, pp. 372-389, 2016, Springer, 978-3-319-49805-8. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Hidema Tanaka |
Network Counter-Attack Strategy by Topology Map Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 12th International Conference, ICISS 2016, Jaipur, India, December 16-20, 2016, Proceedings, pp. 243-262, 2016, Springer, 978-3-319-49805-8. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Subhojeet Mukherjee, Hossein Shirazi, Indrakshi Ray, Jeremy Daily, Rose F. Gamble |
Practical DoS Attacks on Embedded Networks in Commercial Vehicles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 12th International Conference, ICISS 2016, Jaipur, India, December 16-20, 2016, Proceedings, pp. 23-42, 2016, Springer, 978-3-319-49805-8. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Venkata Udaya Sameer, S. Sugumaran, Ruchira Naskar |
Digital Forensic Source Camera Identification with Efficient Feature Selection Using Filter, Wrapper and Hybrid Approaches. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 12th International Conference, ICISS 2016, Jaipur, India, December 16-20, 2016, Proceedings, pp. 409-425, 2016, Springer, 978-3-319-49805-8. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Ömer Yüksel, Jerry den Hartog, Sandro Etalle |
Towards Useful Anomaly Detection for Back Office Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 12th International Conference, ICISS 2016, Jaipur, India, December 16-20, 2016, Proceedings, pp. 509-520, 2016, Springer, 978-3-319-49805-8. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Surendra Singh, Sachin Tripathi, Suvadip Batabyal |
Secured Dynamic Scheduling Algorithm for Real-Time Applications on Grid. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 12th International Conference, ICISS 2016, Jaipur, India, December 16-20, 2016, Proceedings, pp. 283-300, 2016, Springer, 978-3-319-49805-8. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Saurabh Chamotra, Rakesh Kumar Sehgal, Sanjeev Ror, Bhupendra Singh |
Honeypot Deployment in Broadband Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 12th International Conference, ICISS 2016, Jaipur, India, December 16-20, 2016, Proceedings, pp. 479-488, 2016, Springer, 978-3-319-49805-8. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | T. Harsha, S. Asha, B. Soniya |
Feature Selection for Effective Botnet Detection Based on Periodicity of Traffic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 12th International Conference, ICISS 2016, Jaipur, India, December 16-20, 2016, Proceedings, pp. 471-478, 2016, Springer, 978-3-319-49805-8. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Sanat Ghoshal, Goutam Paul 0001 |
Exploiting Block-Chain Data Structure for Auditorless Auditing on Cloud Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 12th International Conference, ICISS 2016, Jaipur, India, December 16-20, 2016, Proceedings, pp. 359-371, 2016, Springer, 978-3-319-49805-8. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Jayaprakash Kar, Kshirasagar Naik |
Generic Construction of Certificateless Signcryption Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 12th International Conference, ICISS 2016, Jaipur, India, December 16-20, 2016, Proceedings, pp. 489-498, 2016, Springer, 978-3-319-49805-8. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Angshuman Jana, Raju Halder |
Defining Abstract Semantics for Static Dependence Analysis of Relational Database Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 12th International Conference, ICISS 2016, Jaipur, India, December 16-20, 2016, Proceedings, pp. 151-171, 2016, Springer, 978-3-319-49805-8. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|