default search action
16th ICISS 2020: Jammu, India
- Salil S. Kanhere, Vishwas T. Patil, Shamik Sural, Manoj Singh Gaur:
Information Systems Security - 16th International Conference, ICISS 2020, Jammu, India, December 16-20, 2020, Proceedings. Lecture Notes in Computer Science 12553, Springer 2020, ISBN 978-3-030-65609-6
Access Control
- Ryan Shah, Shishir Nagaraja:
A Unified Access Control Model for Calibration Traceability in Safety-Critical IoT. 3-22 - Thang Bui, Scott D. Stoller:
Learning Attribute-Based and Relationship-Based Access Control Policies with Unknown Values. 23-44 - Kevin Theuermann:
Reliability and Security for Safety-Critical Service Compositions. 45-65
AI/ML in Security
- Yansong Gao, Surya Nepal:
A Defence Against Input-Agnostic Backdoor Attacks on Deep Neural Networks. 69-80 - Abir Dutta, Shri Kant:
An Overview of Cyber Threat Intelligence Platform and Role of Artificial Intelligence and Machine Learning. 81-86 - Shivi Garg, Niyati Baliyan:
Machine Learning Based Android Vulnerability Detection: A Roadmap. 87-93
Privacy and Web Security
- Abhijeet Chougule, Harshal Tupsamudre, Sachin Lodha:
Revelio: A Lightweight Captcha Solver Using a Dictionary Based Approach. 97-116 - Nitish M. Uplavikar, Jaideep Vaidya, Dan Lin, Wei Jiang:
Privacy-Preserving Friend Recommendation in an Integrated Social Environment. 117-136 - Simone Pirocca, Luca Allodi, Nicola Zannone:
A Toolkit for Security Awareness Training Against Targeted Phishing. 137-159 - Sobhan Mondal, Deependra Pushkar, Mrinali Kumari, Ruchira Naskar:
Forensic Source Identification of OSN Compressed Images. 160-166
Cryptography
- Jyotirmoy Pramanik, Sabyasachi Dutta, Partha Sarathi Roy, Avishek Adhikari:
Cheating Detectable Ramp Secret Sharing with Optimal Cheating Resiliency. 169-184 - Saurabh Mishra, Debanjan Sadhya:
LiARX: A Lightweight Cipher Based on the LTS Design Strategy of ARX. 185-197 - Sabyasachi Dutta, Md Kutubuddin Sardar, Avishek Adhikari, Sushmita Ruj, Kouichi Sakurai:
Color Visual Cryptography Schemes Using Linear Algebraic Techniques over Rings. 198-217
Systems Security
- Hidema Tanaka, Keisuke Fukushima:
Secure Calculation for Position Information of IoT Device with Few Communication and Small Secret Information. 221-240 - Sudesh Kumar, Lakshmi Jayant Kittur, Alwyn Roshan Pais:
Attacks on Android-Based Smartphones and Impact of Vendor Customization on Android OS Security. 241-252 - Vinita Verma, Sunil Kumar Muttoo, V. B. Singh:
Detection of Malign and Benign PE Files Using Texture Analysis. 253-266 - Rafal Leszczyna, Adrian Litwin:
Estimating the Cost of Cybersecurity Activities with CAsPeA: A Case Study and Comparative Analysis. 267-287
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.