Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/iciss/iciss2022.bht:"
@inproceedings{DBLP:conf/iciss/AmmaV22, author = {N. G. Bhuvaneswari Amma and P. Valarmathi}, editor = {Venkata Ramana Badarla and Surya Nepal and Rudrapatna K. Shyamasundar}, title = {IoTInDet: Detecting Internet of Things Intrusions with Class Scatter Ratio and Hellinger Distance Statistics}, booktitle = {Information Systems Security - 18th International Conference, {ICISS} 2022, Tirupati, India, December 16-20, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13784}, pages = {155--168}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-23690-7\_9}, doi = {10.1007/978-3-031-23690-7\_9}, timestamp = {Sun, 25 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iciss/AmmaV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/BansalGB22, author = {Vidhi Bansal and Mohona Ghosh and Niyati Baliyan}, editor = {Venkata Ramana Badarla and Surya Nepal and Rudrapatna K. Shyamasundar}, title = {Efficient and Effective Static Android Malware Detection Using Machine Learning}, booktitle = {Information Systems Security - 18th International Conference, {ICISS} 2022, Tirupati, India, December 16-20, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13784}, pages = {103--118}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-23690-7\_6}, doi = {10.1007/978-3-031-23690-7\_6}, timestamp = {Sun, 25 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iciss/BansalGB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/DavariZ22, author = {Maryam Davari and Mohammad Zulkernine}, editor = {Venkata Ramana Badarla and Surya Nepal and Rudrapatna K. Shyamasundar}, title = {Mining Attribute-Based Access Control Policies}, booktitle = {Information Systems Security - 18th International Conference, {ICISS} 2022, Tirupati, India, December 16-20, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13784}, pages = {186--201}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-23690-7\_11}, doi = {10.1007/978-3-031-23690-7\_11}, timestamp = {Fri, 23 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iciss/DavariZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/FaisalZ22, author = {Abu Faisal and Mohammad Zulkernine}, editor = {Venkata Ramana Badarla and Surya Nepal and Rudrapatna K. Shyamasundar}, title = {{DKS-PKI:} {A} Distributed Key Server Architecture for Public Key Infrastructure}, booktitle = {Information Systems Security - 18th International Conference, {ICISS} 2022, Tirupati, India, December 16-20, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13784}, pages = {23--43}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-23690-7\_2}, doi = {10.1007/978-3-031-23690-7\_2}, timestamp = {Fri, 23 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iciss/FaisalZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/GhosalS22, author = {Sandip Ghosal and R. K. Shyamasundar}, editor = {Venkata Ramana Badarla and Surya Nepal and Rudrapatna K. Shyamasundar}, title = {Preventing Privacy-Violating Information Flows in JavaScript Applications Using Dynamic Labelling}, booktitle = {Information Systems Security - 18th International Conference, {ICISS} 2022, Tirupati, India, December 16-20, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13784}, pages = {202--219}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-23690-7\_12}, doi = {10.1007/978-3-031-23690-7\_12}, timestamp = {Sun, 25 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iciss/GhosalS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/GhoshSGV22, author = {Sutanu Kumar Ghosh and Kiavash Satvat and Rigel Gjomemo and V. N. Venkatakrishnan}, editor = {Venkata Ramana Badarla and Surya Nepal and Rudrapatna K. Shyamasundar}, title = {Ostinato: Cross-host Attack Correlation Through Attack Activity Similarity Detection}, booktitle = {Information Systems Security - 18th International Conference, {ICISS} 2022, Tirupati, India, December 16-20, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13784}, pages = {1--22}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-23690-7\_1}, doi = {10.1007/978-3-031-23690-7\_1}, timestamp = {Fri, 23 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iciss/GhoshSGV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/HubballiP22, author = {Neminath Hubballi and Kanishk Patel}, editor = {Venkata Ramana Badarla and Surya Nepal and Rudrapatna K. Shyamasundar}, title = {WiP: Control Plane Saturation Attack Mitigation in Software Defined Networks}, booktitle = {Information Systems Security - 18th International Conference, {ICISS} 2022, Tirupati, India, December 16-20, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13784}, pages = {235--246}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-23690-7\_14}, doi = {10.1007/978-3-031-23690-7\_14}, timestamp = {Fri, 23 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iciss/HubballiP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/MadabhushiD22, author = {Srinidhi Madabhushi and Rinku Dewri}, editor = {Venkata Ramana Badarla and Surya Nepal and Rudrapatna K. Shyamasundar}, title = {On the Impact of Model Tolerance in Power Grid Anomaly Detection Systems}, booktitle = {Information Systems Security - 18th International Conference, {ICISS} 2022, Tirupati, India, December 16-20, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13784}, pages = {220--234}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-23690-7\_13}, doi = {10.1007/978-3-031-23690-7\_13}, timestamp = {Fri, 23 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iciss/MadabhushiD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/MannaKT22, author = {Debasmita Manna and Harsh Kasyap and Somanath Tripathy}, editor = {Venkata Ramana Badarla and Surya Nepal and Rudrapatna K. Shyamasundar}, title = {{MILSA:} Model Interpretation Based Label Sniffing Attack in Federated Learning}, booktitle = {Information Systems Security - 18th International Conference, {ICISS} 2022, Tirupati, India, December 16-20, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13784}, pages = {139--154}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-23690-7\_8}, doi = {10.1007/978-3-031-23690-7\_8}, timestamp = {Fri, 23 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iciss/MannaKT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/MortlD22, author = {Karin Mortl and Rinku Dewri}, editor = {Venkata Ramana Badarla and Surya Nepal and Rudrapatna K. Shyamasundar}, title = {Generating-Set Evaluation of Bloom Filter Hardening Techniques in Private Record Linkage}, booktitle = {Information Systems Security - 18th International Conference, {ICISS} 2022, Tirupati, India, December 16-20, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13784}, pages = {44--63}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-23690-7\_3}, doi = {10.1007/978-3-031-23690-7\_3}, timestamp = {Fri, 23 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iciss/MortlD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/RadhikaKS22, author = {B. S. Radhika and N. V. Narendra Kumar and R. K. Shyamasundar}, editor = {Venkata Ramana Badarla and Surya Nepal and Rudrapatna K. Shyamasundar}, title = {Samyukta: {A} Unified Access Control Model using Roles, Labels, and Attributes}, booktitle = {Information Systems Security - 18th International Conference, {ICISS} 2022, Tirupati, India, December 16-20, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13784}, pages = {84--102}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-23690-7\_5}, doi = {10.1007/978-3-031-23690-7\_5}, timestamp = {Sun, 25 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iciss/RadhikaKS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/SangwanJH22, author = {Aniket Sangwan and Sarthak Jain and Neminath Hubballi}, editor = {Venkata Ramana Badarla and Surya Nepal and Rudrapatna K. Shyamasundar}, title = {WiP: EventTracker-Event Driven Evidence Collection for Digital Forensics}, booktitle = {Information Systems Security - 18th International Conference, {ICISS} 2022, Tirupati, India, December 16-20, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13784}, pages = {247--259}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-23690-7\_15}, doi = {10.1007/978-3-031-23690-7\_15}, timestamp = {Fri, 23 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iciss/SangwanJH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/SinghS22, author = {Gulshan Kumar Singh and Gaurav Somani}, editor = {Venkata Ramana Badarla and Surya Nepal and Rudrapatna K. Shyamasundar}, title = {Detecting Cloud Originated DDoS Attacks at the Source Using Out-Cloud Attack Detection {(OCAD)}}, booktitle = {Information Systems Security - 18th International Conference, {ICISS} 2022, Tirupati, India, December 16-20, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13784}, pages = {169--185}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-23690-7\_10}, doi = {10.1007/978-3-031-23690-7\_10}, timestamp = {Fri, 23 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iciss/SinghS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/SinghTB22, author = {Narendra Singh and Somanath Tripathy and Bruhadeshwar Bezawada}, editor = {Venkata Ramana Badarla and Surya Nepal and Rudrapatna K. Shyamasundar}, title = {{SHIELD:} {A} Multimodal Deep Learning Framework for Android Malware Detection}, booktitle = {Information Systems Security - 18th International Conference, {ICISS} 2022, Tirupati, India, December 16-20, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13784}, pages = {64--83}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-23690-7\_4}, doi = {10.1007/978-3-031-23690-7\_4}, timestamp = {Fri, 23 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iciss/SinghTB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/SoodPH22, author = {Shaurya Sood and Pritesh Palod and Neminath Hubballi}, editor = {Venkata Ramana Badarla and Surya Nepal and Rudrapatna K. Shyamasundar}, title = {WiP: Characterizing the Impact of Multiplexed DoS Attacks on {HTTP} and Detection}, booktitle = {Information Systems Security - 18th International Conference, {ICISS} 2022, Tirupati, India, December 16-20, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13784}, pages = {260--271}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-23690-7\_16}, doi = {10.1007/978-3-031-23690-7\_16}, timestamp = {Fri, 23 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iciss/SoodPH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/ZouZSSL22, author = {Qingtian Zou and Lan Zhang and Anoop Singhal and Xiaoyan Sun and Peng Liu}, editor = {Venkata Ramana Badarla and Surya Nepal and Rudrapatna K. Shyamasundar}, title = {Attacks on {ML} Systems: From Security Analysis to Attack Mitigation}, booktitle = {Information Systems Security - 18th International Conference, {ICISS} 2022, Tirupati, India, December 16-20, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13784}, pages = {119--138}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-23690-7\_7}, doi = {10.1007/978-3-031-23690-7\_7}, timestamp = {Fri, 23 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iciss/ZouZSSL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/iciss/2022, editor = {Venkata Ramana Badarla and Surya Nepal and Rudrapatna K. Shyamasundar}, title = {Information Systems Security - 18th International Conference, {ICISS} 2022, Tirupati, India, December 16-20, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13784}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-23690-7}, doi = {10.1007/978-3-031-23690-7}, isbn = {978-3-031-23689-1}, timestamp = {Fri, 23 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iciss/2022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.