Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Maxim Anikeev, Felix C. Freiling |
Preventing malicious data harvesting from deallocated memory areas. |
SIN |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Herman Isa, Norziana Jamil, Muhammad Reza Z'aba |
S-box construction from non-permutation power functions. |
SIN |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Mohammad A. AlAhmad, Imad Fakhri Alshaikhli, Mridul Nandi |
Joux multicollisions attack in sponge construction. |
SIN |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Erkay Savas |
Attacks on implementations of cryptographic algorithms: side-channel and fault attacks. |
SIN |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Guy Guemkam, Jonathan Blangenois, Christophe Feltus, Djamel Khadraoui |
Metamodel for reputation based agents system: case study for electrical distribution SCADA design. |
SIN |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Ramachandra Raghavendra, Kiran B. Raja, Bian Yang, Christoph Busch 0001 |
Improved face recognition at a distance using light field camera & super resolution schemes. |
SIN |
2013 |
DBLP DOI BibTeX RDF |
|
1 | T. Mekhaznia |
Nature inspired heuristics for attack of simplified DES algorithm. |
SIN |
2013 |
DBLP DOI BibTeX RDF |
|
1 | N. Rajamanickam, R. Nadarajan |
Implementing real-time transactional security property using timed edit automata. |
SIN |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Lihui Hu, Jean Mayo, Charles Wallace 0001 |
An empirical study of three access control systems. |
SIN |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Romdhane Ben Younes, Guy Tremblay |
A possibilistic approach to intrusion detection under imperfect logging protocol. |
SIN |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Ziyad Tariq Mustafa Al-Ta'l, Omar Younis Abdulhameed |
Features extraction of fingerprints using firefly algorithm. |
SIN |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Evgeny Sergeevich Abramov, Maxim Kobilev, Oleg B. Makarevich |
Using quadrocopter as a pentest tool. |
SIN |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Georges Ataya |
Information security, risk governance and management frameworks: an overview of COBIT 5. |
SIN |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Nikolay Sergeev, Alexey A. Tselykh, Alexander N. Tselykh |
Generalized approach to modeling user activity graphs for network security and public safety monitoring. |
SIN |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Ludmila K. Babenko, Evgeniya Ishchukova |
Influence of S-Boxes to the resistance of GOST algorithm against linear cryptanalysis. |
SIN |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Parvez Faruki, Vijay Laxmi, Manoj Singh Gaur, P. Vinod 0001 |
Mining control flow graph as API call-grams to detect portable executable malware. |
SIN |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Pawan Kumar, Virendra Singh |
Efficient regular expression pattern matching for network intrusion detection systems using modified word-based automata. |
SIN |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Luís Mendonça, Henrique Santos 0001 |
Botnets: a heuristic-based detection framework. |
SIN |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Valeriy O. Osipyan |
Building of alphabetic data protection cryptosystems on the base of equal power knapsacks with Diophantine problems. |
SIN |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Priyanka Singh, Suneeta Agarwal |
A region specific robust watermarking scheme based on singular value decomposition. |
SIN |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Debojit Boro, Bernard Nongpoh, Dhruba K. Bhattacharyya |
Anomaly based intrusion detection using meta ensemble classifier. |
SIN |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Jyoti Grover, Manoj Singh Gaur, Vijay Laxmi, Rakesh Kumar Tiwari |
Detection of incorrect position information using speed and time span verification in VANET. |
SIN |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Christophe Feltus, Eric Dubois 0001, Erik Proper, Iver Band, Michaël Petit |
Enhancing the ArchiMate® standard with a responsibility modeling language for access rights management. |
SIN |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Ajay Chaudhary, Manoj Misra, Anjali Sardana |
An efficient fuzzy controller based technique for network traffic classification to improve QoS. |
SIN |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Herman Isa, Muhammad Reza Z'aba |
Randomness analysis on LED block ciphers. |
SIN |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Apurba Das, S. Kavitha |
Hybridization of DCTune and psycho-visual saliency model to improve security and capacity in DCT based image watermarking. |
SIN |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Dmitry Chernyavskiy, Natalia G. Miloslavskaya |
A concept of unification of network security policies. |
SIN |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Ksenia Tsyganok, Evgeny Tumoyan, Ludmila K. Babenko, Maxim Anikeev |
Classification of polymorphic and metamorphic malware samples based on their behavior. |
SIN |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Prerana Sharma, Devesh Mishra, Ankur Agarwal |
Efficient image encryption and decryption using discrete wavelet transform and fractional Fourier transform. |
SIN |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Anjana V. Kumar, Kalpa Vishnani, K. Vinay Kumar |
Split personality malware detection and defeating in popular virtual machines. |
SIN |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Smita Naval, Vijay Laxmi, Manoj Singh Gaur, P. Vinod 0001 |
ESCAPE: entropy score analysis of packed executable. |
SIN |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Nilanjan Dey, Poulami Das 0002, Sheli Sinha Chaudhuri, Achintya Das |
Feature analysis for the blind-watermarked electroencephalogram signal in wireless telemonitoring using Alattar's method. |
SIN |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Reena Gunjan, Vijay Laxmi, Manoj Singh Gaur |
Detection attack analysis using partial watermark in DCT domain. |
SIN |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Chirag Modi 0001, Dhiren R. Patel, Bhavesh Borisaniya, Avi Patel, Muttukrishnan Rajarajan |
A novel framework for intrusion detection in cloud. |
SIN |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Kunal Sain, Mradula Sharma, Suneeta Agarwal |
(Student contribution) ASPS: an authentication scheme using pre-formed visual cryptographic shares. |
SIN |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Sajal Bhatia, Desmond Allan Schmidt, George M. Mohay |
Ensemble-based DDoS detection and mitigation model. |
SIN |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Priyanka Loya, Alwyn Roshan Pais |
SIRIS: secure IRIS authentication system. |
SIN |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Soumya Maity, Soumya Kanti Ghosh 0001 |
Enforcement of access control policy for mobile ad hoc networks. |
SIN |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Geong Sen Poh, Kok-Lim Alvin Yau, Mee Hong Ling |
Analysis of a secure cooperative channel sensing protocol for cognitive radio networks. |
SIN |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Evgeny Sergeevich Abramov, Elena Barannik, Oleg B. Makarevich |
Methods of automated analysis of vendor specific implementation of stateful-filtration. |
SIN |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Hiroshi Tsunoda, Glenn Mansfield Keeni |
Security by simple network traffic monitoring. |
SIN |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Manoj Singh Gaur, Atilla Elçi, Oleg B. Makarevich, Mehmet A. Orgun, Virendra Singh (eds.) |
5th International Conference of Security of Information and Networks, SIN '12, Jaipur, India, October 22 - 26, 2012 |
SIN |
2012 |
DBLP BibTeX RDF |
|
1 | Ludmila K. Babenko, Evgeniya Ishchukova, Ekaterina Maro |
Research about strength of GOST 28147-89 encryption algorithm. |
SIN |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Behnam Rahnama, Atilla Elçi, Ibukun Eweoya |
Fine tuning the advanced encryption standard (AES). |
SIN |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Preety Singh, Vijay Laxmi, Manoj Singh Gaur |
Lip peripheral motion for visual surveillance. |
SIN |
2012 |
DBLP DOI BibTeX RDF |
|
1 | K. V. Arya, Hemant Kumar |
A clustering based algorithm for network intrusion detection. |
SIN |
2012 |
DBLP DOI BibTeX RDF |
|
1 | A. M. Chandrashekar, K. Raghuveer |
Fusion of multiple data mining techniques for effective network intrusion detection: a contemporary approach. |
SIN |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Eugene Tumoyan, Daria Kavchuk |
The method of optimizing the automatic vulnerability validation. |
SIN |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Gunjan Bansal, Niteesh Kumar, Sukumar Nandi, Santosh Biswas |
Detection of NDP based attacks using MLD. |
SIN |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Atilla Elçi, Behnam Rahnama, Reza Makvandi |
Microcontroller-based implementation of parsekey+ for limited resources embedded applications. |
SIN |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Haichang Gao, Licheng Ma, Jinhua Qiu, Xiyang Liu |
Exploration of a hand-based graphical password scheme. |
SIN |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Bogdan Korel, Shangping Ren, Kevin A. Kwiat, Arnaud Auguste, Alban Vignaux |
Improving operation time bounded mission critical systems' attack-survivability through controlled source-code transformation. |
SIN |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Mehmet A. Orgun, Atilla Elçi, Oleg B. Makarevich, Sorin A. Huss, Josef Pieprzyk, Lyudmila K. Babenko, Alexander G. Chefranov, Rajan Shankaran (eds.) |
Proceedings of the 4th International Conference on Security of Information and Networks, SIN 2011, Sydney, NSW, Australia, November 14-19, 2011 |
SIN |
2011 |
DBLP BibTeX RDF |
|
1 | Ludmila K. Babenko, Evgeniya Ishchukova, Ekaterina Maro |
Algebraic analysis of GOST encryption algorithm. |
SIN |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Haitham S. Al-Sinani, Chris J. Mitchell |
Extending the Scope of cardspace. |
SIN |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Suleyman Kondakci |
Obscurity of network security course curriculum. |
SIN |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Giuseppe Lo Re, Fabrizio Milazzo, Marco Ortolani |
Secure random number generation in wireless sensor networks. |
SIN |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Manuel Peralta, Supratik Mukhopadhyay, Ramesh Bharadwaj |
Counterfactually reasoning about security. |
SIN |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Boulares Ouchenne, Ousmane Koné |
Formal analysis of usage control policies. |
SIN |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Ravishankar Borgaonkar, Kevin Redon, Jean-Pierre Seifert |
Security analysis of a femtocell device. |
SIN |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Zhaogong Guo, Kouichi Yasaki, Yousuke Nakamura, Kazuaki Nimura, Isamu Yamada |
Proposal and implementation of enhanced HDD authentication that enables self-wipe. |
SIN |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Chun Ruan, Seyed A. Shahrestani |
Logic based authorization program and its implementation. |
SIN |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Kevin A. Kwiat |
Fault tolerance for fight-through: a basis for strategic survival. |
SIN |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Udaya Kiran Tupakula, Vijay Varadharajan, Sunil Kumar Vuppala |
Counteracting DDoS attacks in WLAN. |
SIN |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Alessandro Barenghi, Guido Marco Bertoni, Luca Breveglieri, Gerardo Pelosi, Andrea Palomba |
Fault attack to the elliptic curve digital signature algorithm with multiple bit faults. |
SIN |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Mufeed Juma AlMashrafi, Kenneth Koon-Ho Wong, Leonie Simpson, Harry Bartlett, Ed Dawson |
Algebraic analysis of the SSS stream cipher. |
SIN |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Mahmoud Elkhodr, Seyed A. Shahrestani, Hon Cheung |
An approach to enhance the security of remote health monitoring systems. |
SIN |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Andrew Z. Tirkel, Thomas E. Hall, Charles F. Osborne, Nicholas Meinhold, Oscar Moreno |
Collusion resistant fingerprinting of digital audio. |
SIN |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Shu-guang Dai, Chun-Ming Tang 0003, Yuenai Chen |
The optimal linear multi-secret sharing scheme for non-threshold access structure(student contribution). |
SIN |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Geong Sen Poh, Muhammad Reza Z'aba |
On the security and practicality of a buyer seller watermarking protocol for DRM. |
SIN |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Valeriy O. Osipyan |
Different models of information protection system, based on the functional knapsack. |
SIN |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Martin Ågren, Martin Hell |
Cryptanalysis of the stream cipher BEAN. |
SIN |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Iynkaran Natgunanathan, Yong Xiang 0001 |
Echo hiding based stereo audio watermarking against pitch-scaling attacks. |
SIN |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Wei-Kuo Chiang, Jian-Hao Chen |
TW-KEAP: an efficient four-party key exchange protocol for end-to-end communications. |
SIN |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Jyoti Grover, Manoj Singh Gaur, Vijay Laxmi, Nitesh Kumar Prajapati |
A sybil attack detection approach using neighboring vehicles in VANET. |
SIN |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Mohamed Nassar 0001, Sylvain Martin, Guy Leduc, Olivier Festor |
Using decision trees for generating adaptive SPIT signatures. |
SIN |
2011 |
DBLP DOI BibTeX RDF |
|
1 | William Huba, Bo Yuan 0005, Daryl Johnson, Peter Lutz |
A HTTP cookie covert channel. |
SIN |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Mufeed Juma AlMashrafi |
A different algebraic analysis of the ZUC stream cipher. |
SIN |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Hosnieh Rafiee, Ahmad AlSa'deh, Christoph Meinel |
WinSEND: Windows SEcure Neighbor Discovery. |
SIN |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Manoj Singh Gaur, Vijay Laxmi, Lakshminarayanan V., Kamal Cahndra, Mark Zwolinski |
Acceleration of packet filtering using gpgpu. |
SIN |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Manoj Singh Gaur, Vijay Laxmi, Manish Kumar, Rajbir Kaur |
Detour attack in OLSR. |
SIN |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Anderson Nunes Paiva Morais, Ana R. Cavalli, Eliane Martins |
A model-based attack injection approach for security validation. |
SIN |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Helena Rifà-Pous, Carles Garrigues |
A secure and anonymous cooperative sensing protocol for cognitive radio networks. |
SIN |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Michio Sonoda, Takeshi Matsuda, Daiki Koizumi, Shigeichi Hirasawa |
On automatic detection of SQL injection attacks by the feature extraction of the single character. |
SIN |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Amine Elabidi, Ghazi Ben Ayed, Sonia Mettali Gammar, Farouk Kamoun |
Towards hiding federated digital identity: stop-dissemination mechanism in content-centric networking. |
SIN |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Liang Ming, Minhuan Huang, Dongxia Wang 0001, Xiaohui Kuang, Chunlei Wang, Xuewei Feng |
Research on survivability metrics based on survivable process of network system. |
SIN |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Liang Cheng 0004, Yang Zhang 0021 |
Model checking security policy model using both UML static and dynamic diagrams. |
SIN |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Ferdous A. Barbhuiya, Santosh Biswas, Sukumar Nandi |
Detection of neighbor solicitation and advertisement spoofing in IPv6 neighbor discovery protocol. |
SIN |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Shameek Bhattacharjee, Saptarshi Debroy, Mainak Chatterjee, Kevin A. Kwiat |
Trust based fusion over noisy channels through anomaly detection in cognitive radio networks. |
SIN |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Ahmad Jafarabadi, Mohammad Abdollahi Azgomi |
On the impacts of join and leave on the propagation ratio of topology-aware active worms. |
SIN |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Evgeny Sergeevich Abramov, Artem Viktorovich Andreev, Denis Valerievich Mordvin, Oleg B. Makarevich |
Corporate networks security evaluation based on attack graphs. |
SIN |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Long Hoang Nguyen 0001 |
Rational distance-bounding protocols over noisy channel. |
SIN |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Vijay Varadharajan |
Rethinking cyber security. |
SIN |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Alexander I. Tolstoy, Natalia G. Miloslavskaya |
Bachelor of information security: ("automated systems security profile"). |
SIN |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Kazim Yumbul, Serdar Süer Erdem, Erkay Savas |
Design and implementation of robust embedded processor for cryptographic applications. |
SIN |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Meisam S. A. Najjar, Mohammad Abdollahi Azgomi |
A distributed multi-approach intrusion detection system for web services. |
SIN |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Jyoti Grover, Manoj Singh Gaur, Vijay Laxmi |
A novel defense mechanism against sybil attacks in VANET. |
SIN |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Pedro D. Salgueiro, Salvador Abreu |
A DSL for intrusion detection based on constraint programming. |
SIN |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Takeshi Takahashi 0001, Youki Kadobayashi, Hiroyuki Fujiwara |
Ontological approach toward cybersecurity in cloud computing. |
SIN |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Soumya Maity, Padmalochan Bera, Soumya Kanti Ghosh 0001 |
A mobile IP based WLAN security management framework with reconfigurable hardware acceleration. |
SIN |
2010 |
DBLP DOI BibTeX RDF |
|