Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Kanako Konno, Naoya Kitagawa, Nariyoshi Yamai |
False Positive Detection in Sender Domain Authentication by DMARC Report Analysis. |
ICISS |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Kevin Theuermann |
Reliability and Security for Safety-Critical Service Compositions. |
ICISS |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Hidema Tanaka, Keisuke Fukushima |
Secure Calculation for Position Information of IoT Device with Few Communication and Small Secret Information. |
ICISS |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Yansong Gao, Surya Nepal |
A Defence Against Input-Agnostic Backdoor Attacks on Deep Neural Networks. |
ICISS |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Abir Dutta, Shri Kant |
An Overview of Cyber Threat Intelligence Platform and Role of Artificial Intelligence and Machine Learning. |
ICISS |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Shivi Garg, Niyati Baliyan |
Machine Learning Based Android Vulnerability Detection: A Roadmap. |
ICISS |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Thang Bui, Scott D. Stoller |
Learning Attribute-Based and Relationship-Based Access Control Policies with Unknown Values. |
ICISS |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Sudesh Kumar, Lakshmi Jayant Kittur, Alwyn Roshan Pais |
Attacks on Android-Based Smartphones and Impact of Vendor Customization on Android OS Security. |
ICISS |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Abhijeet Chougule, Harshal Tupsamudre, Sachin Lodha |
Revelio: A Lightweight Captcha Solver Using a Dictionary Based Approach. |
ICISS |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Rafal Leszczyna, Adrian Litwin |
Estimating the Cost of Cybersecurity Activities with CAsPeA: A Case Study and Comparative Analysis. |
ICISS |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Salil S. Kanhere, Vishwas T. Patil, Shamik Sural, Manoj Singh Gaur (eds.) |
Information Systems Security - 16th International Conference, ICISS 2020, Jammu, India, December 16-20, 2020, Proceedings |
ICISS |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Nitish M. Uplavikar, Jaideep Vaidya, Dan Lin 0001, Wei Jiang |
Privacy-Preserving Friend Recommendation in an Integrated Social Environment. |
ICISS |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Simone Pirocca, Luca Allodi, Nicola Zannone |
A Toolkit for Security Awareness Training Against Targeted Phishing. |
ICISS |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Ryan Shah, Shishir Nagaraja |
A Unified Access Control Model for Calibration Traceability in Safety-Critical IoT. |
ICISS |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Sabyasachi Dutta, Md Kutubuddin Sardar, Avishek Adhikari, Sushmita Ruj, Kouichi Sakurai |
Color Visual Cryptography Schemes Using Linear Algebraic Techniques over Rings. |
ICISS |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Vinita Verma, Sunil Kumar Muttoo, V. B. Singh |
Detection of Malign and Benign PE Files Using Texture Analysis. |
ICISS |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Jyotirmoy Pramanik, Sabyasachi Dutta, Partha Sarathi Roy 0001, Avishek Adhikari |
Cheating Detectable Ramp Secret Sharing with Optimal Cheating Resiliency. |
ICISS |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Saurabh Mishra, Debanjan Sadhya |
LiARX: A Lightweight Cipher Based on the LTS Design Strategy of ARX. |
ICISS |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Sobhan Mondal, Deependra Pushkar, Mrinali Kumari, Ruchira Naskar |
Forensic Source Identification of OSN Compressed Images. |
ICISS |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Lucas M. Palma, Fernanda Oliveira Gomes, Martín A. Gagliotti Vigil, Jean Everson Martina |
A Transparent and Privacy-Aware Approach Using Smart Contracts for Car Insurance Reward Programs. |
ICISS |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Aditya Dubey, Uttara Ravi, Somya Sharma, Barsha Mitra |
Toward Implementing Spatio-Temporal RBAC Extensions. |
ICISS |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Gunjan Batra, Vijayalakshmi Atluri, Jaideep Vaidya, Shamik Sural |
Policy Reconciliation and Migration in Attribute Based Access Control. |
ICISS |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Deepak Garg 0001, N. V. Narendra Kumar, Rudrapatna K. Shyamasundar (eds.) |
Information Systems Security - 15th International Conference, ICISS 2019, Hyderabad, India, December 16-20, 2019, Proceedings |
ICISS |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Felix Hörandner, Sebastian Ramacher, Simon Roth 0001 |
Selective End-To-End Data-Sharing in the Cloud. |
ICISS |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Eram Fatima, Saiful Islam |
A New High Capacity and Reversible Data Hiding Technique for Images. |
ICISS |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Saptarshi Das, Shamik Sural, Jaideep Vaidya, Vijayalakshmi Atluri, Gerhard Rigoll |
VisMAP: Visual Mining of Attribute-Based Access Control Policies. |
ICISS |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Pranav Verma, Anish Mathuria, Sourish Dasgupta |
Item-Based Privacy-Preserving Recommender System with Offline Users and Reduced Trust Requirements. |
ICISS |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Jonas Haglund, Roberto Guanciale |
Trustworthy Isolation of DMA Enabled Devices. |
ICISS |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Deepak Kumar Dalai, Santu Pal |
Wip: Degree Evaluation of Grain-v1. |
ICISS |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Priyanka Pal, Sudharsana K. J. L., Rohith Balaji S. |
WiP: Criminal Smart Contract for Private Key Theft in End to End Encrypted Applications. |
ICISS |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Bintu Kadhiwala, Sankita J. Patel |
A Novel k-Anonymization Approach to Prevent Insider Attack in Collaborative Social Network Data Publishing. |
ICISS |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Ali A. Noroozi, Khayyam Salehi, Jaber Karimpour, Ayaz Isazadeh |
Secure Information Flow Analysis Using the PRISM Model Checker. |
ICISS |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Felix Hörandner, Franco Nieddu |
Cloud Data Sharing and Device-Loss Recovery with Hardware-Bound Keys. |
ICISS |
2019 |
DBLP DOI BibTeX RDF |
|
1 | T. E. Jisha, Thomas Monoth |
WiP: Security Enhanced Size Invariant Visual Cryptography with Perfect Reconstruction of White Pixels. |
ICISS |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Arkaprava Bhaduri Mandal, Tanmoy Kanti Das |
Anti-forensics of a NAD-JPEG Detection Scheme Using Estimation of DC Coefficients. |
ICISS |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Ghanshyam S. Bopche, Gopal N. Rai, B. Ramachandra Reddy, Babu M. Mehtre |
Differential Attack Graph-Based Approach for Assessing Change in the Network Attack Surface. |
ICISS |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Anasuya Acharya, Manoj Prabhakaran 0001, Akash Trehan |
An Introduction to the CellTree Paradigm (Invited Paper). |
ICISS |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Akhilesh Gangwar, Vadlamani Ravi |
WiP: Generative Adversarial Network for Oversampling Data in Credit Card Fraud Detection. |
ICISS |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Amit Pathania, B. S. Radhika, Rudrapatna K. Shyamasundar |
MySecPol: A Client-Side Policy Language for Safe and Secure Browsing. |
ICISS |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Gaurav Pareek, B. R. Purushothama |
Proxy Re-Encryption Scheme for Access Control Enforcement Delegation on Outsourced Data in Public Cloud. |
ICISS |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Jamimamul Bakas, Praneta Rawat, Kalyan Kokkalla, Ruchira Naskar |
Re-compression Based JPEG Tamper Detection and Localization Using Deep Neural Network, Eliminating Compression Factor Dependency. |
ICISS |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Venkata Udaya Sameer, Ishaan Dali, Ruchira Naskar |
A Deep Learning Based Digital Forensic Solution to Blind Source Identification of Facebook Images. |
ICISS |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Ghanshyam S. Bopche, Gopal N. Rai, Babu M. Mehtre, G. R. Gangadharan |
Modeling and Analyzing Multistage Attacks Using Recursive Composition Algebra. |
ICISS |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Bhagyesh V. Patil, Parjanya Vyas, R. K. Shyamasundar |
SecSmartLock: An Architecture and Protocol for Designing Secure Smart Locks. |
ICISS |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Alexandre Kabil, Thierry Duval, Nora Cuppens, Gérard Le Comte, Yoran Halgand, Christophe Ponchel |
From Cyber Security Activities to Collaborative Virtual Environments Practices Through the 3D CyberCOP Platform. |
ICISS |
2018 |
DBLP DOI BibTeX RDF |
|
1 | K. Aditya, Slawomir Grzonkowski, Nhien-An Le-Khac |
RiskWriter: Predicting Cyber Risk of an Enterprise. |
ICISS |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Sreesh Kishore, Renuka Kumar, Sreeranga Rajan |
Towards Accuracy in Similarity Analysis of Android Applications. |
ICISS |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Sadegh M. Milajerdi, Birhanu Eshete, Rigel Gjomemo, Venkat N. Venkatakrishnan |
ProPatrol: Attack Investigation via Extracted High-Level Tasks. |
ICISS |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Alexander Marsalek, Bernd Prünster, Bojan Suzic, Thomas Zefferer |
SeDiCom: A Secure Distributed Privacy-Preserving Communication Platform. |
ICISS |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Suryakanta Panda, Madhu Kumari, Samrat Mondal |
SGP: A Safe Graphical Password System Resisting Shoulder-Surfing Attack on Smartphones. |
ICISS |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Khaoula Es-Salhi, David Espes, Nora Cuppens |
SONICS: A Segmentation Method for Integrated ICS and Corporate System. |
ICISS |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Vishwas T. Patil, R. K. Shyamasundar |
Efficacy of GDPR's Right-to-be-Forgotten on Facebook. |
ICISS |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Kirk Boyer, Hao Chen, Jingwei Chen, Jian Qiu, Rinku Dewri |
A Characterization of the Mass Surveillance Potential of Road Traffic Monitors. |
ICISS |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Sourav Das, Aashish Kolluri, Prateek Saxena, Haifeng Yu |
(Invited Paper) on the Security of Blockchain Consensus Protocols. |
ICISS |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Jamimamul Bakas, Ruchira Naskar |
A Digital Forensic Technique for Inter-Frame Video Forgery Detection Based on 3D CNN. |
ICISS |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Vinod Ganapathy, Trent Jaeger, R. K. Shyamasundar (eds.) |
Information Systems Security - 14th International Conference, ICISS 2018, Bangalore, India, December 17-19, 2018, Proceedings |
ICISS |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Ajinkya Rajput, K. Gopinath |
Analysis of Newer Aadhaar Privacy Models. |
ICISS |
2018 |
DBLP DOI BibTeX RDF |
|
1 | K. Nimmy, Sriram Sankaran, Krishnashree Achuthan |
A Novel Multi-factor Authentication Protocol for Smart Home Environments. |
ICISS |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Suryakanta Panda, Samrat Mondal |
drPass: A Dynamic and Reusable Password Generator Protocol. |
ICISS |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Sumanta Chatterjee |
Secure Moderated Bargaining Game. |
ICISS |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Abhishek Tiwari, Rajarshi Pal |
Gaze-Based Graphical Password Using Webcam. |
ICISS |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Riddhi Ghosal, Sanjit Chatterjee |
Privacy Preserving Multi-server k-means Computation over Horizontally Partitioned Data. |
ICISS |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Jyotirmoy Pramanik, Partha Sarathi Roy 0001, Sabyasachi Dutta, Avishek Adhikari, Kouichi Sakurai |
Secret Sharing Schemes on Compartmental Access Structure in Presence of Cheaters. |
ICISS |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Sandeep Rai, Rushang Dhanesha, Sreyans Nahata, Bernard Menezes |
Malicious Application Detection on Android Smartphones with Enhanced Static-Dynamic Analysis. |
ICISS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Mahender Kumar, Chittaranjan Padmanabha Katti, Prem Chandra Saxena |
A Secure Anonymous E-Voting System Using Identity-Based Blind Signature Scheme. |
ICISS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Ajinkya Rajput, K. Gopinath |
Towards a More Secure Aadhaar. |
ICISS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Routhu Srinivasa Rao, Alwyn Roshan Pais |
An Enhanced Blacklist Method to Detect Phishing Websites. |
ICISS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Amrita Milind Honap, Wonjun Lee 0003 |
Hiding Kernel Level Rootkits Using Buffer Overflow and Return Oriented Programming. |
ICISS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Luigi V. Mancini, Andrea Monti, Agostino Panico |
SOF on Trial. The Technical and Legal Value of Battlefield Digital Forensics in Court. |
ICISS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Vineet Kumar 0005, Aneek Roy, Sourya Sengupta, Sourav Sen Gupta 0001 |
Parallelized Common Factor Attack on RSA. |
ICISS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Sanjeet Kumar Nayak, Somanath Tripathy |
SEMFS: Secure and Efficient Multi-keyword Fuzzy Search for Cloud Storage. |
ICISS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Dileep Kumar Koshley, Sapana Rani, Raju Halder |
Towards Generalization of Privacy Policy Specification and Property-Based Information Leakage. |
ICISS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Stefano Zatti |
The Protection of Space Missions: Threats and Cyber Threats. |
ICISS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Bold Munkhbaatar, Mamoru Mimura, Hidema Tanaka |
Dark Domain Name Attack: A New Threat to Domain Name System. |
ICISS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Akash Agrawall, Shubh Maheshwari, Projit Bandyopadhyay, Venkatesh Choppella |
Modelling and Mitigation of Cross-Origin Request Attacks on Federated Identity Management Using Cross Origin Request Policy. |
ICISS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Rudrapatna K. Shyamasundar, Virendra Singh, Jaideep Vaidya (eds.) |
Information Systems Security - 13th International Conference, ICISS 2017, Mumbai, India, December 16-20, 2017, Proceedings |
ICISS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Moumita Das, Ansuman Banerjee, Nitesh K. Singh, Bhaskar Sardar |
Performance Attacks on Branch Predictors in Embedded Processors with SMT Support. |
ICISS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Nachiket Trivedi, Manik Lal Das |
MalDetec: A Non-root Approach for Dynamic Malware Detection in Android. |
ICISS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Mayukh Rath, Shivali Agarwal, R. K. Shyamasundar |
Semi Supervised NLP Based Classification of Malware Documents. |
ICISS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Varun Garg, Anish Mathuria |
On Automated Detection of Multi-Protocol Attacks Using AVISPA. |
ICISS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Mohsin Khan, Kimmo Järvinen 0001, Philip Ginzboorg, Valtteri Niemi |
On De-synchronization of User Pseudonyms in Mobile Networks. |
ICISS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Son Duc Nguyen, Mamoru Mimura, Hidema Tanaka |
Leveraging Man-in-the-middle DoS Attack with Internal TCP Retransmissions in Virtual Network. |
ICISS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Marco Lobe Kome, Mariem Graa, Nora Cuppens-Boulahia, Frédéric Cuppens, Vincent Frey |
DIscovery and REgistration Protocol - For Device and Person Identity Management in IoT. |
ICISS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Mamoru Mimura, Hidema Tanaka |
Heavy Log Reader: Learning the Context of Cyber Attacks Automatically with Paragraph Vector. |
ICISS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Anis Bkakria, Mariem Graa, Nora Cuppens-Boulahia, Frédéric Cuppens, Jean-Louis Lanet |
Experimenting Similarity-Based Hijacking Attacks Detection and Response in Android Systems. |
ICISS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Lyes Bayou, David Espes, Nora Cuppens-Boulahia, Frédéric Cuppens |
wIDS: A Multilayer IDS for Wireless-Based SCADA Systems. |
ICISS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Payal Chaudhari, Manik Lal Das, Dipankar Dasgupta |
Privacy-Preserving Proxy Re-encryption with Fine-Grained Access Control. |
ICISS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Jay Dave, Shweta Saharan, Parvez Faruki, Vijay Laxmi, Manoj Singh Gaur |
Secure Random Encryption for Deduplicated Storage. |
ICISS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Ganesh Ram Santhanam, Benjamin Holland, Suresh C. Kothari, Nikhil Ranade |
Human-on-the-Loop Automation for Detecting Software Side-Channel Vulnerabilities. |
ICISS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Varsharani Hawanna, Vrushali Y. Kulkarni, Rashmi Rane, Pooja Joshi |
Risk Evaluation of X.509 Certificates - A Machine Learning Application. |
ICISS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Hidema Tanaka |
Network Counter-Attack Strategy by Topology Map Analysis. |
ICISS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Subhojeet Mukherjee, Hossein Shirazi, Indrakshi Ray, Jeremy Daily, Rose F. Gamble |
Practical DoS Attacks on Embedded Networks in Commercial Vehicles. |
ICISS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Venkata Udaya Sameer, S. Sugumaran, Ruchira Naskar |
Digital Forensic Source Camera Identification with Efficient Feature Selection Using Filter, Wrapper and Hybrid Approaches. |
ICISS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Ömer Yüksel, Jerry den Hartog, Sandro Etalle |
Towards Useful Anomaly Detection for Back Office Networks. |
ICISS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Surendra Singh, Sachin Tripathi, Suvadip Batabyal |
Secured Dynamic Scheduling Algorithm for Real-Time Applications on Grid. |
ICISS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Saurabh Chamotra, Rakesh Kumar Sehgal, Sanjeev Ror, Bhupendra Singh |
Honeypot Deployment in Broadband Networks. |
ICISS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | T. Harsha, S. Asha, B. Soniya |
Feature Selection for Effective Botnet Detection Based on Periodicity of Traffic. |
ICISS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Sanat Ghoshal, Goutam Paul 0001 |
Exploiting Block-Chain Data Structure for Auditorless Auditing on Cloud Data. |
ICISS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Jayaprakash Kar, Kshirasagar Naik |
Generic Construction of Certificateless Signcryption Scheme. |
ICISS |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Angshuman Jana, Raju Halder |
Defining Abstract Semantics for Static Dependence Analysis of Relational Database Applications. |
ICISS |
2016 |
DBLP DOI BibTeX RDF |
|