Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Dmitry P. Zegzhda, Peter D. Zegzhda, Alexander I. Pechenkin, Maria A. Poltavtseva |
Modeling of information systems to their security evaluation. |
SIN |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Alexander S. Basan, Elena Basan, Oleg B. Makarevich |
Analysis of ways to secure group control for autonomous mobile robots. |
SIN |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Vishnu Prasad C, Arun Raj Kumar P |
Secret sharing scheme based on Cauchy matrix for data outsourcing. |
SIN |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Valeriy O. Osipyan, Valeriy S. Tlusten, Nina V. Laktionova, Nadezhda V. Vakhrusheva |
The duality principle in the theory of development generalized A-M knapsack cryptosystems. |
SIN |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Jimmy Bondu, Anupal Mishra, Vijay Laxmi, Manoj Singh Gaur |
Flooding in secure wireless sensor networks: Student contribution. |
SIN |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Fedor Novikov, Ludmila N. Fedorchenko, Vladimir I. Vorobiev, Roza R. Fatkieva, Dmitriy K. Levonevskiy |
Attribute-based approach of defining the secure behavior of automata objects. |
SIN |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Upasana T. Nagar, Priyadarsi Nanda, Xiangjian He, Zhiyuan Thomas Tan |
A framework for data security in cloud using collaborative intrusion detection scheme. |
SIN |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Gaurav Pareek, B. R. Purushothama |
Proxy visible re-encryption scheme with application to e-mail forwarding. |
SIN |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Sampsa Rauti, Ville Leppänen |
Internal interface diversification with multiple fake interfaces. |
SIN |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Ronak Odhaviya, Anamika Modi, Rahi Sheth, Anish Mathuria |
Feasibility of idle port scanning using RST rate-limit. |
SIN |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Maxim O. Kalinin, Vasiliy M. Krundyshev, Peter D. Zegzhda, Viacheslav Belenko |
Network security architectures for VANET. |
SIN |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Nivindar Kaur, Ashutosh Kumar Singh 0002, Naveen Kumar 0013, Shashank Srivastava |
Performance impact of topology poisoning attack in SDN and its countermeasure. |
SIN |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Ankit Bansal, Sudipta Mahapatra |
A comparative analysis of machine learning techniques for botnet detection. |
SIN |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Durbadal Chattaraj, Monalisa Sarma, Debasis Samanta |
Privacy preserving two-server Diffie-Hellman key exchange protocol. |
SIN |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Antonina Komarova, Alexander Menshchikov, Tatyana Klyaus, Anatoly Korobeynikov, Yurij A. Gatchin, Nina Tishukova |
Analysis and comparison of electronic digital signature state standards GOST R 34.10-1994, GOST R 34.10-2001 and GOST R 34.10-2012. |
SIN |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Peter D. Zegzhda, Dmitry P. Zegzhda, Evgeny Pavlenko, Andrew Dremov |
Detecting Android application malicious behaviors based on the analysis of control flows and data flows. |
SIN |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Rajveer Singh Shekhawat, Manoj Singh Gaur, Atilla Elçi, Jaideep Vaidya, Oleg B. Makarevich, Ron Poet, Mehmet A. Orgun, Vijaypal S. Dhaka, Manoj Kumar Bohra, Virender Singh, Ludmila K. Babenko, Naghmeh Moradpoor Sheykhkanloo, Behnam Rahnama (eds.) |
Proceedings of the 10th International Conference on Security of Information and Networks, SIN 2017, Jaipur, IN, India, October 13-15, 2017. |
SIN |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Ludmila K. Babenko, Alexey Kirillov |
Malware detection by meta-information of used system functions. |
SIN |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Naghmeh Moradpoor, Martyn Brown, Gordon Russell 0001 |
Insider threat detection using principal component analysis and self-organising map. |
SIN |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Evgeniya Ishchukova, Ekaterina Tolomanenko, Ludmila K. Babenko |
Differential ananlysis of 3 round Kuznyechik. |
SIN |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Raksha Nawal, Rajbir Kaur |
Abnormal leakage of energy in battery-based IoT-devices. |
SIN |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Nazatul Haque Sultan, Ferdous Ahmed Barbhuiya, Nityananda Sarma |
A universal cloud user revocation scheme with key-escrow resistance for ciphertext-policy attribute-based access control. |
SIN |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Rachana Yogesh Patil, Satish R. Devane |
Unmasking of source identity, a step beyond in cyber forensic. |
SIN |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Ankur Shukla, Divya Vikash, Bharavi Mishra, Poonam Gera |
Permission recommender system for Android. |
SIN |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Mahaveer Prasad Soni, Alwyn R. Pais |
Light-weight hash algorithms using GRP instruction. |
SIN |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Evgeniya Ishchukova, Ludmila K. Babenko, Maxim Anikeev |
Two simplified versions of Kuznyechik cipher (GOST R 34.12-2015). |
SIN |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Jaina P. Bhoiwala, Rutvij H. Jhaveri |
Cooperation based defense mechanism against selfish nodes in DTNs. |
SIN |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Ajay Nehra, Meenakshi Tripathi, Manoj Singh Gaur |
'Global view' in SDN: existing implementation, vulnerabilities & threats. |
SIN |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Anubha Parashar, Apoorva Parashar, Somya Goyal |
Identification of gait data using machine learning technique to categories human locomotion. |
SIN |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Konstantin E. Rumyantsev, Evgeny Rudinsky |
Parameters of the two-stage synchronization algorithm for the quantum key distribution system. |
SIN |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Rahul Saxena, Monika Jain, Dushyant Singh, Ashutosh Kushwah |
An enhanced parallel version of RSA public key crypto based algorithm using openMP. |
SIN |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Liudmila Babenko, Ilya Pisarev, Oleg B. Makarevich |
A model of a secure electronic voting system based on blind intermediaries using russian cryptographic algorithms. |
SIN |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Abdulaziz Almehmadi, Zeinab Joudaki, Roozbeh Jalali |
Language usage on Twitter predicts crime rates. |
SIN |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Kamalakanta Sethi, Anish Chopra, Padmalochan Bera, Bata Krishna Tripathy |
Integration of role based access control with homomorphic cryptosystem for secure and controlled access of data in cloud. |
SIN |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Srikanta Pradhan, Somanath Tripathy |
CAP: collaborative attack on pastry. |
SIN |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Swati Gaur, Sudhanshu Gaur |
Component-centric application-driven framework: towards taming privilege separation in Android. |
SIN |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Sunil Dutt, Bikram Paul, Anshu Chauhan, Sukumar Nandi, Gaurav Trivedi |
Approxhash: delay, power and area optimized approximate hash functions for cryptography applications. |
SIN |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Muhammad I. H. Sukmana, Kennedy A. Torkura, Christoph Meinel, Hendrik Graupner |
Redesign cloudRAID for flexible and secure enterprise file sharing over public cloud storage. |
SIN |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Narayan Vetrekar, Ramachandra Raghavendra, Kiran B. Raja, Rajendra S. Gad, Christoph Busch 0001 |
Extended multi-spectral imaging for gender classification based on image set. |
SIN |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Pynbianglut Hadem, Dilip Kumar Saikia |
SMITE: an SDN and MPLS integrated traceback mechanism. |
SIN |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Narayan Vetrekar, Kiran B. Raja, Ramachandra Raghavendra, Rajendra S. Gad, Christoph Busch 0001 |
Collaborative representation of Grassmann manifold projection metric for robust multi-spectral face recognition. |
SIN |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Kamalakanta Sethi, Shankar Kumar Chaudhary, Bata Krishna Tripathy, Padmalochan Bera |
A novel malware analysis for malware detection and classification using machine learning algorithms. |
SIN |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Naveen Kumar 0013, Ashutosh Kumar Singh 0002, Shashank Srivastava |
Evaluating machine learning algorithms for detection of interest flooding attack in named data networking. |
SIN |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Shailja Dahiya, Manoj Kumar Bohra |
Element-key table based complex key generation (E-CKG) for IoT based health care networks. |
SIN |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Harsurinder Kaur, Husanbir Singh Pannu |
Anomaly detection survey for information security. |
SIN |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Ludmila K. Babenko, Ekaterina Maro, Maxim Anikeev |
Modeling of Algebraic Analysis of GOST+ Cipher in SageMath. |
SIN |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Jagjot Kaur, Dale Lindskog |
An Algorithm to Facilitate Intrusion Response in Mobile Ad Hoc Networks. |
SIN |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Yong-pyo Hong, Youngjun Kim |
A Study on Unified Security Mechanism and Platform for Centralized Business Contents. |
SIN |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Vladimir Eliseev, Anastasiya Gurina |
Algorithms for network server anomaly behavior detection without traffic content inspection. |
SIN |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Mohammadreza Soltan Aghaei, Elham Zamani |
The Improved Protocols Based on AODV in terms of Quality and Security in MANET Network. |
SIN |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Sonam Chauhan, Ajay Sharma |
Fuzzy Commitment Scheme based on Reed Solomon Codes. |
SIN |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Peter D. Zegzhda, Dmitry P. Zegzhda, Maxim O. Kalinin, Alexander I. Pechenkin, Alexander Minin, Daria S. Lavrova |
Safe Integration of SIEM Systems with Internet of Things: Data Aggregation, Integrity Control, and Bioinspired Safe Routing. |
SIN |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Martin Stokkenes, Ramachandra Raghavendra, Christoph Busch 0001 |
Biometric Authentication Protocols on Smartphones: An Overview. |
SIN |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Andrey Yu. Chernov, Artem S. Konoplev, Dmitry P. Zegzhda |
Applying Virtualization Technology for the Construction of Trusted Executable Environment. |
SIN |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Evgeniya Ishchukova, Ludmila K. Babenko, Maxim Anikeev |
Fast Implementation and Cryptanalysis of GOST R 34.12-2015 Block Ciphers. |
SIN |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Alexandr S. Basan, Elena Basan, Oleg B. Makarevich |
Development of the Hierarchal Trust management System for Mobile Cluster-based Wireless Sensor Network. |
SIN |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Mouna Jouini, Latifa Ben Arfa Rabai |
A Scalable Threats Classification Model in Information Systems. |
SIN |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Salem Benferhat, Mouslim Tolba, Karim Tabia, Abdelkader Belkhir |
Integrating non elementary actions in access control models. |
SIN |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Manel Elleuchi, Omar Cheikhrouhou, Abdulfattah Mohammad Obeid, Mohamed Abid |
An Efficient Secure scheme for Wireless Sensor Networks. |
SIN |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Hao Jiang, Ahmed Bouabdallah, Amin Aflatoonian, Jean-Marie Bonnin, Karine Guillouard |
A Secure Multi-Tenant Framework for SDN. |
SIN |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Robert Bronte, Hossain Shahriar, Hisham M. Haddad |
A Signature-Based Intrusion Detection System for Web Applications based on Genetic Algorithm. |
SIN |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Kiran B. Raja, Ramachandra Raghavendra, Christoph Busch 0001 |
Color Adaptive Quantized Patterns for Presentation Attack Detection in Ocular Biometric Systems. |
SIN |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Xavier J. A. Bellekens, Greig Paul, Christos Tachtatzis, James Irvine 0001, Robert C. Atkinson |
Strategies for Protecting Intellectual Property when Using CUDA Applications on Graphics Processing Units. |
SIN |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Sardar Hussain, Richard O. Sinnott, Ron Poet |
Security-enabled Enactment of Decentralized Workflows. |
SIN |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Kun He 0006, Christophe Bidan, Gaëtan Le Guelvouit |
Experimentation of Privacy Protection for JPEG Contents on Image-Sharing Platforms. |
SIN |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Deepak Subramanian, Guillaume Hiet, Christophe Bidan |
Preventive information flow control through a mechanism of split addresses. |
SIN |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Goutham Reddy Alavalapati, Eun-Jun Yoon, Ashok Kumar Das, Kee-Young Yoo |
An Enhanced Anonymous Two-factor Mutual Authentication with Key-agreement Scheme for Session Initiation Protocol. |
SIN |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Alexander G. Chefranov, Amir Narimani |
Participant Authenticating, Error Detecting, and 100% Multiple Errors Repairing Chang-Chen-Wang's Secret Sharing Method Enhancement. |
SIN |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Safwan Alam, Khalil El-Khatib |
Phishing Susceptibility Detection through Social Media Analytics. |
SIN |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Alexey A. Tselykh, Margarita Knyazeva, Elena Popkova, Antonina Durfee, Alexander N. Tselykh |
An Attributed Graph Mining Approach to Detect Transfer Pricing Fraud. |
SIN |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Roger Jardí-Cedó, Macià Mut Puigserver, Jordi Castellà-Roca, Magdalena Payeras-Capellà, Alexandre Viejo |
Privacy-preserving Electronic Road Pricing System for Multifare Low Emission Zones. |
SIN |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Ramachandra Raghavendra, Kiran B. Raja, Christoph Busch 0001 |
Impact of Drug Abuse on Face Recognition Systems: A Preliminary Study. |
SIN |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Myria Bouhaddi, Kamel Adi, Mohammed Said Radjef |
Evolutionary Game-Based Defense Mechanism in the MANETs. |
SIN |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Ussama Yakub, Vijayalakshmi Atluri, Jaideep Vaidya |
Efficient Evaluation of Authorizations for Video Data. |
SIN |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Vladimir I. Vorobiev, Elena L. Evnevich, Roza R. Fatkieva, Ludmila N. Fedorchenko, Dmitriy K. Levonevskiy |
Criteria and Indices of Computer Network Protection. |
SIN |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Hye-Young Kim |
A Study of a Smart IT Convergence Framework in IoT. |
SIN |
2016 |
DBLP DOI BibTeX RDF |
|
1 | |
Proceedings of the 9th International Conference on Security of Information and Networks, Newark, NJ, USA, July 20-22, 2016 |
SIN |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Manel Medhioub, Mohamed Hamdi, Tai-Hoon Kim |
A New Authentication Scheme for Cloud-based Storage Applications. |
SIN |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Giovanni Bottazzi, Giuseppe F. Italiano, Giuseppe Giulio Rutigliano |
Frequency Domain Analysis of Large-Scale Proxy Logs for Botnet Traffic Detection. |
SIN |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Anil Saini, Manoj Singh Gaur, Vijay Laxmi, Priyadarsi Nanda |
sandFOX: secure sandboxed and isolated environment for firefox browser. |
SIN |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Zainab Saud, M. Hasan Islam |
Towards proactive detection of advanced persistent threat (APT) attacks using honeypots. |
SIN |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Jyoti Gajrani, Jitendra Sarswat, Meenakshi Tripathi, Vijay Laxmi, Manoj Singh Gaur, Mauro Conti |
A robust dynamic analysis system preventing SandBox detection by Android malware. |
SIN |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Marian Gawron, Aragats Amirkhanyan, Feng Cheng 0002, Christoph Meinel |
Automatic vulnerability detection for weakness visualization and advisory creation. |
SIN |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Meenu Mary John, P. Vinod 0001, K. A. Dhanya |
Hartley's test ranked opcodes for Android malware analysis. |
SIN |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Andrei Petrovski 0001, Prapa Rattadilok, Sergey Petrovski |
Designing a context-aware cyber physical system for detecting security threats in motor vehicles. |
SIN |
2015 |
DBLP DOI BibTeX RDF |
|
1 | S. S. Alkhasov, Alexander N. Tselykh, Alexey A. Tselykh |
Application of cluster analysis for the assessment of the share of fraud victims among bank card holders. |
SIN |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Hamid Hanifi, Leemon C. Baird III, Ramakrishna Thurimella |
A new algorithm for unkeyed jam resistance. |
SIN |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Nezar Nassr, Eric Steegmans |
Mitigating conflicts of interest by authorization policies. |
SIN |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Alexander Minin, Maxim O. Kalinin |
Information security in computer networks with dynamic topology. |
SIN |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Aragats Amirkhanyan, Andrey Sapegin, Marian Gawron, Feng Cheng 0002, Christoph Meinel |
Simulation user behavior on a security testbed using user behavior states graph. |
SIN |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Princy George, P. Vinod 0001 |
Machine learning approach for filtering spam emails. |
SIN |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Igor Anikin, Lilia Yu. Emaletdinova |
Information security risk management in computer networks based on fuzzy logic and cost/benefit ratio estimation. |
SIN |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Dmitry V. Moskvin, Denis Ivanov |
Cybersecurity of ad-hoc distributed systems. |
SIN |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Philipp Burtyka, Oleg B. Makarevich |
Execution of data-dependent programs over encrypted data. |
SIN |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Xuefei Wang, Hengtai Ma, Lisha Jing |
A dynamic marking method for implicit information flow in dynamic taint analysis. |
SIN |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Evgeny Shcherba |
Two formal problems of network security and a theory of boolean-valued flow networks. |
SIN |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Shweta Bhandari, Rishabh Gupta, Vijay Laxmi, Manoj Singh Gaur, Akka Zemmari, Maxim Anikeev |
DRACO: DRoid analyst combo an android malware analysis framework. |
SIN |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Artem S. Konoplev, Alexey G. Busygin |
Steganographic methods of communications in distributed computing networks. |
SIN |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Artem Garkusha |
Building data in motion DLP system from scratch using opensource software and confirming its effectiveness within "capture the flag" competitions. |
SIN |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Elvia León, Brayan S. Reyes Daza, Octavio J. Salcedo Parra |
Comparison between safety and efficient security of the ARP protocol. |
SIN |
2015 |
DBLP DOI BibTeX RDF |
|