Search dblp for Publications

export results for "toc:db/conf/iciss/iciss2022.bht:"

 download as .bib file

@inproceedings{DBLP:conf/iciss/AmmaV22,
  author       = {N. G. Bhuvaneswari Amma and
                  P. Valarmathi},
  editor       = {Venkata Ramana Badarla and
                  Surya Nepal and
                  Rudrapatna K. Shyamasundar},
  title        = {IoTInDet: Detecting Internet of Things Intrusions with Class Scatter
                  Ratio and Hellinger Distance Statistics},
  booktitle    = {Information Systems Security - 18th International Conference, {ICISS}
                  2022, Tirupati, India, December 16-20, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13784},
  pages        = {155--168},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-23690-7\_9},
  doi          = {10.1007/978-3-031-23690-7\_9},
  timestamp    = {Sun, 25 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iciss/AmmaV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/BansalGB22,
  author       = {Vidhi Bansal and
                  Mohona Ghosh and
                  Niyati Baliyan},
  editor       = {Venkata Ramana Badarla and
                  Surya Nepal and
                  Rudrapatna K. Shyamasundar},
  title        = {Efficient and Effective Static Android Malware Detection Using Machine
                  Learning},
  booktitle    = {Information Systems Security - 18th International Conference, {ICISS}
                  2022, Tirupati, India, December 16-20, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13784},
  pages        = {103--118},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-23690-7\_6},
  doi          = {10.1007/978-3-031-23690-7\_6},
  timestamp    = {Sun, 25 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iciss/BansalGB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/DavariZ22,
  author       = {Maryam Davari and
                  Mohammad Zulkernine},
  editor       = {Venkata Ramana Badarla and
                  Surya Nepal and
                  Rudrapatna K. Shyamasundar},
  title        = {Mining Attribute-Based Access Control Policies},
  booktitle    = {Information Systems Security - 18th International Conference, {ICISS}
                  2022, Tirupati, India, December 16-20, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13784},
  pages        = {186--201},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-23690-7\_11},
  doi          = {10.1007/978-3-031-23690-7\_11},
  timestamp    = {Fri, 23 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iciss/DavariZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/FaisalZ22,
  author       = {Abu Faisal and
                  Mohammad Zulkernine},
  editor       = {Venkata Ramana Badarla and
                  Surya Nepal and
                  Rudrapatna K. Shyamasundar},
  title        = {{DKS-PKI:} {A} Distributed Key Server Architecture for Public Key
                  Infrastructure},
  booktitle    = {Information Systems Security - 18th International Conference, {ICISS}
                  2022, Tirupati, India, December 16-20, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13784},
  pages        = {23--43},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-23690-7\_2},
  doi          = {10.1007/978-3-031-23690-7\_2},
  timestamp    = {Fri, 23 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iciss/FaisalZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/GhosalS22,
  author       = {Sandip Ghosal and
                  R. K. Shyamasundar},
  editor       = {Venkata Ramana Badarla and
                  Surya Nepal and
                  Rudrapatna K. Shyamasundar},
  title        = {Preventing Privacy-Violating Information Flows in JavaScript Applications
                  Using Dynamic Labelling},
  booktitle    = {Information Systems Security - 18th International Conference, {ICISS}
                  2022, Tirupati, India, December 16-20, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13784},
  pages        = {202--219},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-23690-7\_12},
  doi          = {10.1007/978-3-031-23690-7\_12},
  timestamp    = {Sun, 25 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iciss/GhosalS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/GhoshSGV22,
  author       = {Sutanu Kumar Ghosh and
                  Kiavash Satvat and
                  Rigel Gjomemo and
                  V. N. Venkatakrishnan},
  editor       = {Venkata Ramana Badarla and
                  Surya Nepal and
                  Rudrapatna K. Shyamasundar},
  title        = {Ostinato: Cross-host Attack Correlation Through Attack Activity Similarity
                  Detection},
  booktitle    = {Information Systems Security - 18th International Conference, {ICISS}
                  2022, Tirupati, India, December 16-20, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13784},
  pages        = {1--22},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-23690-7\_1},
  doi          = {10.1007/978-3-031-23690-7\_1},
  timestamp    = {Fri, 23 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iciss/GhoshSGV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/HubballiP22,
  author       = {Neminath Hubballi and
                  Kanishk Patel},
  editor       = {Venkata Ramana Badarla and
                  Surya Nepal and
                  Rudrapatna K. Shyamasundar},
  title        = {WiP: Control Plane Saturation Attack Mitigation in Software Defined
                  Networks},
  booktitle    = {Information Systems Security - 18th International Conference, {ICISS}
                  2022, Tirupati, India, December 16-20, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13784},
  pages        = {235--246},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-23690-7\_14},
  doi          = {10.1007/978-3-031-23690-7\_14},
  timestamp    = {Fri, 23 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iciss/HubballiP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/MadabhushiD22,
  author       = {Srinidhi Madabhushi and
                  Rinku Dewri},
  editor       = {Venkata Ramana Badarla and
                  Surya Nepal and
                  Rudrapatna K. Shyamasundar},
  title        = {On the Impact of Model Tolerance in Power Grid Anomaly Detection Systems},
  booktitle    = {Information Systems Security - 18th International Conference, {ICISS}
                  2022, Tirupati, India, December 16-20, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13784},
  pages        = {220--234},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-23690-7\_13},
  doi          = {10.1007/978-3-031-23690-7\_13},
  timestamp    = {Fri, 23 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iciss/MadabhushiD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/MannaKT22,
  author       = {Debasmita Manna and
                  Harsh Kasyap and
                  Somanath Tripathy},
  editor       = {Venkata Ramana Badarla and
                  Surya Nepal and
                  Rudrapatna K. Shyamasundar},
  title        = {{MILSA:} Model Interpretation Based Label Sniffing Attack in Federated
                  Learning},
  booktitle    = {Information Systems Security - 18th International Conference, {ICISS}
                  2022, Tirupati, India, December 16-20, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13784},
  pages        = {139--154},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-23690-7\_8},
  doi          = {10.1007/978-3-031-23690-7\_8},
  timestamp    = {Fri, 23 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iciss/MannaKT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/MortlD22,
  author       = {Karin Mortl and
                  Rinku Dewri},
  editor       = {Venkata Ramana Badarla and
                  Surya Nepal and
                  Rudrapatna K. Shyamasundar},
  title        = {Generating-Set Evaluation of Bloom Filter Hardening Techniques in
                  Private Record Linkage},
  booktitle    = {Information Systems Security - 18th International Conference, {ICISS}
                  2022, Tirupati, India, December 16-20, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13784},
  pages        = {44--63},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-23690-7\_3},
  doi          = {10.1007/978-3-031-23690-7\_3},
  timestamp    = {Fri, 23 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iciss/MortlD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/RadhikaKS22,
  author       = {B. S. Radhika and
                  N. V. Narendra Kumar and
                  R. K. Shyamasundar},
  editor       = {Venkata Ramana Badarla and
                  Surya Nepal and
                  Rudrapatna K. Shyamasundar},
  title        = {Samyukta: {A} Unified Access Control Model using Roles, Labels, and
                  Attributes},
  booktitle    = {Information Systems Security - 18th International Conference, {ICISS}
                  2022, Tirupati, India, December 16-20, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13784},
  pages        = {84--102},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-23690-7\_5},
  doi          = {10.1007/978-3-031-23690-7\_5},
  timestamp    = {Sun, 25 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iciss/RadhikaKS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/SangwanJH22,
  author       = {Aniket Sangwan and
                  Sarthak Jain and
                  Neminath Hubballi},
  editor       = {Venkata Ramana Badarla and
                  Surya Nepal and
                  Rudrapatna K. Shyamasundar},
  title        = {WiP: EventTracker-Event Driven Evidence Collection for Digital Forensics},
  booktitle    = {Information Systems Security - 18th International Conference, {ICISS}
                  2022, Tirupati, India, December 16-20, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13784},
  pages        = {247--259},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-23690-7\_15},
  doi          = {10.1007/978-3-031-23690-7\_15},
  timestamp    = {Fri, 23 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iciss/SangwanJH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/SinghS22,
  author       = {Gulshan Kumar Singh and
                  Gaurav Somani},
  editor       = {Venkata Ramana Badarla and
                  Surya Nepal and
                  Rudrapatna K. Shyamasundar},
  title        = {Detecting Cloud Originated DDoS Attacks at the Source Using Out-Cloud
                  Attack Detection {(OCAD)}},
  booktitle    = {Information Systems Security - 18th International Conference, {ICISS}
                  2022, Tirupati, India, December 16-20, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13784},
  pages        = {169--185},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-23690-7\_10},
  doi          = {10.1007/978-3-031-23690-7\_10},
  timestamp    = {Fri, 23 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iciss/SinghS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/SinghTB22,
  author       = {Narendra Singh and
                  Somanath Tripathy and
                  Bruhadeshwar Bezawada},
  editor       = {Venkata Ramana Badarla and
                  Surya Nepal and
                  Rudrapatna K. Shyamasundar},
  title        = {{SHIELD:} {A} Multimodal Deep Learning Framework for Android Malware
                  Detection},
  booktitle    = {Information Systems Security - 18th International Conference, {ICISS}
                  2022, Tirupati, India, December 16-20, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13784},
  pages        = {64--83},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-23690-7\_4},
  doi          = {10.1007/978-3-031-23690-7\_4},
  timestamp    = {Fri, 23 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iciss/SinghTB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/SoodPH22,
  author       = {Shaurya Sood and
                  Pritesh Palod and
                  Neminath Hubballi},
  editor       = {Venkata Ramana Badarla and
                  Surya Nepal and
                  Rudrapatna K. Shyamasundar},
  title        = {WiP: Characterizing the Impact of Multiplexed DoS Attacks on {HTTP}
                  and Detection},
  booktitle    = {Information Systems Security - 18th International Conference, {ICISS}
                  2022, Tirupati, India, December 16-20, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13784},
  pages        = {260--271},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-23690-7\_16},
  doi          = {10.1007/978-3-031-23690-7\_16},
  timestamp    = {Fri, 23 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iciss/SoodPH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/ZouZSSL22,
  author       = {Qingtian Zou and
                  Lan Zhang and
                  Anoop Singhal and
                  Xiaoyan Sun and
                  Peng Liu},
  editor       = {Venkata Ramana Badarla and
                  Surya Nepal and
                  Rudrapatna K. Shyamasundar},
  title        = {Attacks on {ML} Systems: From Security Analysis to Attack Mitigation},
  booktitle    = {Information Systems Security - 18th International Conference, {ICISS}
                  2022, Tirupati, India, December 16-20, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13784},
  pages        = {119--138},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-23690-7\_7},
  doi          = {10.1007/978-3-031-23690-7\_7},
  timestamp    = {Fri, 23 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iciss/ZouZSSL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iciss/2022,
  editor       = {Venkata Ramana Badarla and
                  Surya Nepal and
                  Rudrapatna K. Shyamasundar},
  title        = {Information Systems Security - 18th International Conference, {ICISS}
                  2022, Tirupati, India, December 16-20, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13784},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-23690-7},
  doi          = {10.1007/978-3-031-23690-7},
  isbn         = {978-3-031-23689-1},
  timestamp    = {Fri, 23 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iciss/2022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics