default search action
Alwyn Roshan Pais
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j37]Cheemaladinne Kondaiah, Alwyn Roshan Pais, Routhu Srinivasa Rao:
Enhanced Malicious Traffic Detection in Encrypted Communication Using TLS Features and a Multi-class Classifier Ensemble. J. Netw. Syst. Manag. 32(4): 76 (2024) - [j36]M. Raviraja Holla, Suma D., Alwyn R. Pais:
Accelerating randomized image secret sharing with GPU: contrast enhancement and secure reconstruction using progressive and convolutional approaches. Multim. Tools Appl. 83(15): 43761-43776 (2024) - [j35]Swati Singh, Alwyn Roshan Pais, Lavina Jean Crasta:
Transfer Learning-Hierarchical Segmentation on COVID CT Scans. New Gener. Comput. 42(4): 551-577 (2024) - 2023
- [j34]Lakshmana Rao Kalabarige, Routhu Srinivasa Rao, Alwyn R. Pais, Lubna Abdel Kareim Gabralla:
A Boosting-Based Hybrid Feature Selection and Multi-Layer Stacked Ensemble Learning Model to Detect Phishing Websites. IEEE Access 11: 71180-71193 (2023) - [j33]Munish Kumar, Cheemaladinne Kondaiah, Alwyn Roshan Pais, Routhu Srinivasa Rao:
Machine learning models for phishing detection from TLS traffic. Clust. Comput. 26(5): 3263-3277 (2023) - [j32]Ajnas Muhammed, Alwyn Roshan Pais:
A secure fingerprint template generation mechanism using visual secret sharing with inverse halftoning. J. Vis. Commun. Image Represent. 94: 103854 (2023) - [j31]Ajnas Muhammed, Alwyn Roshan Pais:
Secure latent fingerprint storage and self-recovered reconstruction using POB number system. Pattern Recognit. Lett. 167: 107-114 (2023) - [j30]Lakshmi Jayant Kittur, Alwyn Roshan Pais:
Combinatorial Design Based Key Pre-distribution Scheme with High Scalability and Minimal Storage for Wireless Sensor Networks. Wirel. Pers. Commun. 128(2): 855-873 (2023) - 2022
- [j29]M. Raviraja Holla, Alwyn R. Pais:
High-performance medical image secret sharing using super-resolution for CAD systems. Appl. Intell. 52(14): 16852-16868 (2022) - [j28]Zubair Ahmad Lone, Alwyn Roshan Pais:
Object detection in hyperspectral images. Digit. Signal Process. 131: 103752 (2022) - [j27]Somesha M., Alwyn R. Pais:
Classification of Phishing Email Using Word Embedding and Machine Learning Techniques. J. Cyber Secur. Mobil. 11(3): 279-320 (2022) - [j26]Sagar Gujjunoori, Madhu Oruganti, Alwyn Roshan Pais:
Enhanced optical flow-based full reference video quality assessment algorithm. Multim. Tools Appl. 81(27): 39491-39505 (2022) - [j25]Routhu Srinivasa Rao, Amey Umarekar, Alwyn Roshan Pais:
Application of word embedding and machine learning in detecting phishing websites. Telecommun. Syst. 79(1): 33-45 (2022) - [j24]M. Raviraja Holla, Alwyn R. Pais:
An Effective GPGPU Visual Secret Sharing by Contrast-Adaptive ConvNet Super-Resolution. Wirel. Pers. Commun. 123(3): 2367-2391 (2022) - 2021
- [j23]Alok Kumar, Neha Bansal, Alwyn Roshan Pais:
A partial key pre-distribution based en-route filtering scheme for wireless sensor networks. J. Ambient Intell. Humaniz. Comput. 12(1): 1471-1486 (2021) - [j22]M. Raviraja Holla, Alwyn R. Pais, Suma D.:
An Accelerator-based Logistic Map Image Cryptosystems for Grayscale Images. J. Cyber Secur. Mobil. 10(3): 487-510 (2021) - [j21]Ajnas Muhammed, Nikhil C. Mhala, Alwyn R. Pais:
A novel fingerprint template protection and fingerprint authentication scheme using visual secret sharing and super-resolution. Multim. Tools Appl. 80(7): 10255-10284 (2021) - [j20]Routhu Srinivasa Rao, Alwyn Roshan Pais, Pritam Anand:
A heuristic technique to detect phishing websites using TWSVM classifier. Neural Comput. Appl. 33(11): 5733-5752 (2021) - [j19]Nikhil C. Mhala, Alwyn R. Pais:
A secure visual secret sharing (VSS) scheme with CNN-based image enhancement for underwater images. Vis. Comput. 37(8): 2097-2111 (2021) - [c39]Ajnas Muhammed, Alwyn Roshan Pais:
A Novel Cancelable Fingerprint Template Generation Mechanism Using Visual Secret Sharing. PReMI 2021: 357-365 - [c38]Zubair Ahmad Lone, Alwyn Roshan Pais:
Salient Object Detection in Hyperspectral Images Using Felzenswalb's Segmentation Algorithm. PReMI 2021: 451-458 - 2020
- [j18]Apurva S. Kittur, Alwyn Roshan Pais:
A trust model based batch verification of digital signatures in IoT. J. Ambient Intell. Humaniz. Comput. 11(1): 313-327 (2020) - [j17]Routhu Srinivasa Rao, Tatti Vaishnavi, Alwyn Roshan Pais:
CatchPhish: detection of phishing websites by inspecting URLs. J. Ambient Intell. Humaniz. Comput. 11(2): 813-825 (2020) - [j16]Routhu Srinivasa Rao, Alwyn Roshan Pais:
Two level filtering mechanism to detect phishing sites using lightweight visual similarity approach. J. Ambient Intell. Humaniz. Comput. 11(9): 3853-3872 (2020) - [c37]Nishant Raj, Alwyn Roshan Pais:
CP-ABE Scheme Satisfying Constant-size Keys based on ECC. ICETE (2) 2020: 535-540 - [c36]Sudesh Kumar, Lakshmi Jayant Kittur, Alwyn Roshan Pais:
Attacks on Android-Based Smartphones and Impact of Vendor Customization on Android OS Security. ICISS 2020: 241-252
2010 – 2019
- 2019
- [j15]Routhu Srinivasa Rao, Alwyn Roshan Pais:
Jail-Phish: An improved search engine based phishing detection system. Comput. Secur. 83: 246-267 (2019) - [j14]Alok Kumar, Neha Bansal, Alwyn R. Pais:
New key pre-distribution scheme based on combinatorial design for wireless sensor networks. IET Commun. 13(7): 892-897 (2019) - [j13]Alok Kumar, Alwyn Roshan Pais:
A new combinatorial design based key pre-distribution scheme for wireless sensor networks. J. Ambient Intell. Humaniz. Comput. 10(6): 2401-2416 (2019) - [j12]Routhu Srinivasa Rao, Alwyn Roshan Pais:
Detection of phishing websites using an efficient feature-based machine learning framework. Neural Comput. Appl. 31(8): 3851-3873 (2019) - [j11]Routhu Srinivasa Rao, Tatti Vaishnavi, Alwyn Roshan Pais:
PhishDump: A multi-model ensemble based technique for the detection of phishing sites in mobile devices. Pervasive Mob. Comput. 60 (2019) - [j10]Nikhil C. Mhala, Alwyn R. Pais:
Contrast enhancement of Progressive Visual Secret Sharing (PVSS) scheme for gray-scale and color images using super-resolution. Signal Process. 162: 253-267 (2019) - [j9]Alok Kumar, Alwyn Roshan Pais:
A new hybrid key pre-distribution scheme for wireless sensor networks. Wirel. Networks 25(3): 1185-1199 (2019) - [c35]Alok Kumar, Alwyn Roshan Pais:
Blockchain based En-Route Filtering of False Data in Wireless Sensor Networks. COMSNETS 2019: 1-6 - [c34]Nikhil C. Mhala, Alwyn R. Pais:
An Improved and Secure Visual Secret Sharing (VSS) scheme for Medical Images. COMSNETS 2019: 823-828 - [i2]Dhaval Khandla, Het Shahy, Manish Kumar Bz, Alwyn Roshan Pais, Nishant Raj:
Expressive CP-ABE Scheme Satisfying Constant-Size Keys and Ciphertexts. IACR Cryptol. ePrint Arch. 2019: 1257 (2019) - 2018
- [j8]Alok Kumar, Alwyn R. Pais:
Deterministic En-Route Filtering of False Reports: A Combinatorial Design Based Approach. IEEE Access 6: 74494-74505 (2018) - [j7]Nikhil C. Mhala, Rashid Jamal, Alwyn R. Pais:
Randomised visual secret sharing scheme for grey-scale and colour images. IET Image Process. 12(3): 422-431 (2018) - [j6]G. Deepa, P. Santhi Thilagam, Furqan Ahmed Khan, Amit Praseed, Alwyn R. Pais, Nushafreen Palsetia:
Black-box detection of XQuery injection and parameter tampering vulnerabilities in web applications. Int. J. Inf. Sec. 17(1): 105-120 (2018) - [j5]G. Deepa, P. Santhi Thilagam, Amit Praseed, Alwyn R. Pais:
DetLogic: A black-box approach for detecting logic vulnerabilities in web applications. J. Netw. Comput. Appl. 109: 89-109 (2018) - [c33]Sayali Sudhir Bhusare, Alwyn Roshan Pais:
A Fine Grain Attribute Enabled Access Control. ICCCNT 2018: 1-7 - [c32]Apurva S. Kittur, Swapnil Kauthale, Alwyn R. Pais:
Bad Signature Identification in a Batch Using Error Detection Codes. ISEA-ISAP 2018: 53-66 - [c31]Alok Kumar, Maninder Singh, Alwyn Roshan Pais:
Fuzzy String Matching Algorithm for Spam Detection in Twitter. ISEA-ISAP 2018: 289-301 - 2017
- [j4]Apurva S. Kittur, Alwyn Roshan Pais:
Batch verification of Digital Signatures: Approaches and challenges. J. Inf. Secur. Appl. 37: 15-27 (2017) - [j3]Alok Kumar, Alwyn Roshan Pais:
En-Route Filtering Techniques in Wireless Sensor Networks: A Survey. Wirel. Pers. Commun. 96(1): 697-739 (2017) - [c30]Routhu Srinivasa Rao, Alwyn R. Pais:
Detecting Phishing Websites using Automation of Human Behavior. CPSS@AsiaCCS 2017: 33-42 - [c29]Routhu Srinivasa Rao, Alwyn Roshan Pais:
An Enhanced Blacklist Method to Detect Phishing Websites. ICISS 2017: 323-333 - [c28]Mahaveer Prasad Soni, Alwyn R. Pais:
Light-weight hash algorithms using GRP instruction. SIN 2017: 206-211 - [c27]Apurva S. Kittur, Ashu Jain, Alwyn Roshan Pais:
Fast Verification of Digital Signatures in IoT. SSCC 2017: 16-27 - [c26]Alok Kumar, Alwyn Roshan Pais:
Multi-sink En-Route Filtering Mechanism for Wireless Sensor Networks. SSCC 2017: 122-133 - [c25]Ajay Anto, Routhu Srinivasa Rao, Alwyn Roshan Pais:
Kernel Modification APT Attack Detection in Android. SSCC 2017: 236-249 - 2016
- [j2]Nushafreen Palsetia, G. Deepa, Furqan Ahmed Khan, P. Santhi Thilagam, Alwyn R. Pais:
Securing native XML database-driven web applications from XQuery injection vulnerabilities. J. Syst. Softw. 122: 93-109 (2016) - [c24]Sumanta Chatterjee, Alwyn R. Pais, Sumit Saurabh:
Distributed Data Aggregation in Wireless Sensor Network - with Peer Verification. SECRYPT 2016: 440-445 - [c23]Inderjeet Singh, Alwyn R. Pais:
A Random Key Generation Scheme Using Primitive Polynomials over GF(2). SSCC 2016: 42-51 - [c22]Sumit Saurabh, Alwyn R. Pais, Sumanta Chatterjee:
Efficient Key Management in IoT Using Mobile Aggregator. SSCC 2016: 161-172 - 2015
- [c21]Pranave Kumar Bhaskar, Alwyn R. Pais:
A Chinese Remainder Theorem Based Key Management Algorithm for Hierarchical Wireless Sensor Network. ICDCIT 2015: 311-317 - [c20]D. Arun, Alwyn R. Pais:
Optimal placement of sensor nodes for water quality measurement. WOCN 2015: 1-9 - 2013
- [c19]Anil Gopalakrishna, Alwyn Roshan Pais:
Emulating a High Interaction Honeypot to Monitor Intrusion Activity. SSCC 2013: 70-76 - 2012
- [c18]D. Bapat Ameya, Alwyn Roshan Pais:
Restraining add-on's behavior in private browsing. SECURIT 2012: 194-199 - [c17]Priyanka Loya, Alwyn Roshan Pais:
SIRIS: secure IRIS authentication system. SIN 2012: 148-152 - [c16]Adapa Tataram, Alwyn Roshan Pais:
Location Estimation of Mobile in GSM and CDMA Networks. SNDS 2012: 456-465 - [e1]P. Santhi Thilagam, Alwyn Roshan Pais, K. Chandrasekaran, N. Balakrishnan:
Advanced Computing, Networking and Security - International Conference, ADCONS 2011, Surathkal, India, December 16-18, 2011, Revised Selected Papers. Lecture Notes in Computer Science 7135, Springer 2012, ISBN 978-3-642-29279-8 [contents] - 2011
- [c15]Kalpa Vishnani, Alwyn Roshan Pais, Radhesh Mohandas:
An In-Depth Analysis of the Epitome of Online Stealth: Keyloggers; and Their Countermeasures. ACC (3) 2011: 10-19 - [c14]Vishal M. Karande, Alwyn R. Pais:
A Framework for Intrusion Tolerance in Cloud Computing. ACC (4) 2011: 386-395 - [c13]Tanusha S. Nadkarni, Radhesh Mohandas, Alwyn R. Pais:
A Novel Technique for Defeating Virtual Keyboards - Exploiting Insecure Features of Modern Browsers. ACC (2) 2011: 685-692 - [c12]Tanusha S. Nadkarni, Radhesh Mohandas, Alwyn R. Pais:
IFrandbox - Client Side Protection from Malicious Injected Iframes. ICISS 2011: 383-386 - [c11]Kunal Sadalkar, Radhesh Mohandas, Alwyn R. Pais:
Model Based Hybrid Approach to Prevent SQL Injection Attacks in PHP. InfoSecHiComNet 2011: 3-15 - [i1]T. R. Srinath, Mahendra Pratap Singh, Alwyn Roshan Pais:
Anonymity and verifiability in multi-attribute reverse auction. CoRR abs/1109.0359 (2011) - 2010
- [j1]Alwyn Roshan Pais, Shankar Joshi:
A new probabilistic rekeying method for secure multicast groups. Int. J. Inf. Sec. 9(4): 275-286 (2010) - [c10]Avinash Darapureddi, Radhesh Mohandas, Alwyn Roshan Pais:
Throttling DDoS Attacks using Discrete Logarithm Problem. SECRYPT 2010: 263-269 - [c9]Vipul Patel, Radhesh Mohandas, Alwyn R. Pais:
Attacks on Web Services and Mitigation Schemes. SECRYPT 2010: 499-504
2000 – 2009
- 2009
- [c8]B. R. Purushothama, Alwyn R. Pais:
Design and Implementation of Secure Internet Based Voting System with User Anonymity Using Identity Based Encryption System. IEEE SCC 2009: 474-481 - [c7]Alwyn Roshan Pais, John D'Souza, Ram Mohana Reddy, Sandip Patil:
Super Resolution of Video with Sharpened Edges Using Multiple Frames -- A Novel Approach. ARTCom 2009: 98-102 - [c6]Rajesh Kumar Singh, Alwyn R. Pais:
Secure Web Based Single Sign-On (SSO) Framework Using Identity Based Encryption System. ARTCom 2009: 430-432 - [c5]Alwyn R. Pais, Naveen Pasupuleti, Rajashekhar Gidnavar, John D'Souza:
Automatic Video Object Plane Segmentation and Super resolution: A Novel Approach. IICAI 2009: 2007-2021 - [c4]Saraiah Gujjunoori, Taqi Ali Syed, Madhu Babu J., Avinash Darapureddi, Radhesh Mohandas, Alwyn R. Pais:
Throttling DDoS Attacks. SECRYPT 2009: 121-126 - 2008
- [c3]Rahul M. Godbole, Alwyn R. Pais:
Secure and efficient protocol for mobile payments. ICEC 2008: 25:1-25:10 - [c2]Shankar Joshi, Alwyn R. Pais:
A New Probabilistic Rekeying Method for Secure Dynamic Groups. SECRYPT 2008: 325-330 - 2007
- [c1]Sumanth Kaditham, Alwyn R. Pais:
Model Based Tracking. ICIC (3) 2007: 1018-1025
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-02 22:28 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint