default search action
ISEA-ISAP 2018: Jaipur, India
- Sukumar Nandi, Devesh Jinwala, Virendra Singh, Vijay Laxmi, Manoj Singh Gaur, Parvez Faruki:
Security and Privacy - Second ISEA International Conference, ISEA-ISAP 2018, Jaipur, India, January, 9-11, 2019, Revised Selected Papers. Communications in Computer and Information Science 939, Springer 2019, ISBN 978-981-13-7560-6
Authentication and Access Control
- Sumit Kumar Tetarave, Somanath Tripathy:
Secure Opportunistic Data Exchange Using Smart Devices in 5G/LTE-A Networks. 3-16 - Jay Dave, Vijay Laxmi, Parvez Faruki, Manoj Singh Gaur, Bhavya Shah:
Bloom Filter Based Privacy Preserving Deduplication System. 17-34 - N. V. Narendra Kumar, R. K. Shyamasundar:
A Semantic Notion of Secure Information-Flow. 35-52 - Apurva S. Kittur, Swapnil Kauthale, Alwyn R. Pais:
Bad Signature Identification in a Batch Using Error Detection Codes. 53-66 - Sandip Ghosal, R. K. Shyamasundar:
A Solution to "Confused Deputy" Problem Using RWFM Labels. 67-76 - Sagar Rane, Arati M. Dixit:
BlockSLaaS: Blockchain Assisted Secure Logging-as-a-Service for Cloud Forensics. 77-88 - Nataasha Raul, Royston D'mello, Mandar Bhalerao:
Keystroke Dynamics Authentication Using Small Datasets. 89-96 - Mahendra Pratap Singh, S. Sudharsan, M. Vani:
ARBAC: Attribute-Enabled Role Based Access Control Model. 97-111
Malware Analysis
- Hassan Naderi, P. Vinod, Mauro Conti, Saeed Parsa, Mohammad Hadi Alaeiyan:
Malware Signature Generation Using Locality Sensitive Hashing. 115-124 - Parvez Faruki, Bharat Buddhadev, Bhavya Shah, Akka Zemmari, Vijay Laxmi, Manoj Singh Gaur:
DroidDivesDeep: Android Malware Classification via Low Level Monitorable Features with Deep Neural Networks. 125-139 - Sukanta Dey, Abhishek Kumar, Mehul Sawarkar, Pranav Kumar Singh, Sukumar Nandi:
EvadePDF: Towards Evading Machine Learning Based PDF Malware Classifiers. 140-150
Network Security
- Sangita Roy, Hardik Chawla, Ashok Singh Sairam:
IP Traceback in Dynamic Networks. 153-165 - Pranav Kumar Singh, Shivam Gupta, Ritveeka Vashistha, Sunit Kumar Nandi, Sukumar Nandi:
Machine Learning Based Approach to Detect Position Falsification Attack in VANETs. 166-178 - Mohit Kumar Singh, Vijay Laxmi, Neeta Nain:
Unsupervised Person Re-ID in Surveillance Feed Using Re-ranking. 179-192 - Deeksha Kushwah, Rajni Ranjan Singh, Deepak Singh Tomar:
An Approach to Meta-Alert Generation for Anomalous TCP Traffic. 193-216
Privacy Preservation
- Vineeta Jain, Vijay Laxmi, Manoj Singh Gaur, Mohamed Mosbah:
APPLADroid: Automaton Based Inter-app Privacy Leak Analysis for Android. 219-233 - Dhaneshwar Mardi, Jaydeep Howlader:
Multiparty Evaluation of Finite State Machine. 234-246 - Pranav Verma, Harshul Vaishnav, Anish Mathuria, Sourish Dasgupta:
An Enhanced Privacy-Preserving Recommender System. 247-260 - Swati Rawal, Sahadeo Padhye:
Threshold Ring Signature with Message Block Sharing. 261-271
Secure Software Systems
- Faisal Anwer, Mohd Nazir, Khurram Mustafa:
Testing Program Crash Based on Search Based Testing and Exception Injection. 275-285
Social Network Analytics
- Alok Kumar, Maninder Singh, Alwyn Roshan Pais:
Fuzzy String Matching Algorithm for Spam Detection in Twitter. 289-301
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.