default search action
Search dblp for Publications
export results for "toc:db/conf/iccst/iccst2019.bht:"
@inproceedings{DBLP:conf/iccst/AhmedTMANU19, author = {Sabbir Ahmed and Tamkin Mahmud Tan and Anna Mary Mondol and Zawad Alam and Noshin Nawal and Jia Uddin}, editor = {Gordon L. Thomas and Mala John}, title = {Automated Toll Collection System Based on {RFID} Sensor}, booktitle = {2019 International Carnahan Conference on Security Technology, {ICCST} 2019, Chennai, India, October 1-3, 2019}, pages = {1--3}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CCST.2019.8888429}, doi = {10.1109/CCST.2019.8888429}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccst/AhmedTMANU19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccst/AttfieldSKPD19, author = {Simon Attfield and Nallini Selveraj and Neesha Kodagoda and Peter J. Passmore and Elke Dunke}, editor = {Gordon L. Thomas and Mala John}, title = {Patterns of Life Visualiations for Intelligence Analysis: Exploring Animation with {POLAR}}, booktitle = {2019 International Carnahan Conference on Security Technology, {ICCST} 2019, Chennai, India, October 1-3, 2019}, pages = {1--6}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CCST.2019.8888410}, doi = {10.1109/CCST.2019.8888410}, timestamp = {Thu, 10 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccst/AttfieldSKPD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccst/Boakye-BoatengL19, author = {Kwasi Boakye{-}Boateng and Arash Habibi Lashkari}, editor = {Gordon L. Thomas and Mala John}, title = {Securing {GOOSE:} The Return of One-Time Pads}, booktitle = {2019 International Carnahan Conference on Security Technology, {ICCST} 2019, Chennai, India, October 1-3, 2019}, pages = {1--8}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CCST.2019.8888435}, doi = {10.1109/CCST.2019.8888435}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccst/Boakye-BoatengL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccst/BuserSS19, author = {Daniela Buser and Yanik Sterchi and Adrian Schwaninger}, editor = {Gordon L. Thomas and Mala John}, title = {Effects of Time on Task, Breaks, and Target Prevalence on Screener Performance in an X-ray Image Inspection Task}, booktitle = {2019 International Carnahan Conference on Security Technology, {ICCST} 2019, Chennai, India, October 1-3, 2019}, pages = {1--6}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CCST.2019.8888408}, doi = {10.1109/CCST.2019.8888408}, timestamp = {Thu, 10 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccst/BuserSS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccst/CorsettiSGS19, author = {Barbara Corsetti and Raul S{\'{a}}nchez{-}Reillo and Richard M. Guest and Marco Santopietro}, editor = {Gordon L. Thomas and Mala John}, title = {Face Image Analysis in Mobile Biometric Accessibility Evaluations}, booktitle = {2019 International Carnahan Conference on Security Technology, {ICCST} 2019, Chennai, India, October 1-3, 2019}, pages = {1--5}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CCST.2019.8888437}, doi = {10.1109/CCST.2019.8888437}, timestamp = {Thu, 10 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccst/CorsettiSGS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccst/Divya19, author = {N. Divya}, editor = {Gordon L. Thomas and Mala John}, title = {Image Specific Similar Target Detection in Aerial Images Using Gaussian Mixture Model}, booktitle = {2019 International Carnahan Conference on Security Technology, {ICCST} 2019, Chennai, India, October 1-3, 2019}, pages = {1--5}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CCST.2019.8888422}, doi = {10.1109/CCST.2019.8888422}, timestamp = {Thu, 10 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccst/Divya19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccst/DupakB19, author = {Lucindia Dupak and Subhasish Banerjee}, editor = {Gordon L. Thomas and Mala John}, title = {Role of Bio-Inspired Algorithms for Designing Protocols in MANET-Review}, booktitle = {2019 International Carnahan Conference on Security Technology, {ICCST} 2019, Chennai, India, October 1-3, 2019}, pages = {1--6}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CCST.2019.8888407}, doi = {10.1109/CCST.2019.8888407}, timestamp = {Thu, 10 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccst/DupakB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccst/FerrerDCP19, author = {Miguel A. Ferrer and Mois{\'{e}}s D{\'{\i}}az and Cristina Carmona{-}Duarte and R{\'{e}}jean Plamondon}, editor = {Gordon L. Thomas and Mala John}, title = {Generating Off-line and On-line Forgeries from On-line Genuine Signatures}, booktitle = {2019 International Carnahan Conference on Security Technology, {ICCST} 2019, Chennai, India, October 1-3, 2019}, pages = {1--6}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CCST.2019.8888418}, doi = {10.1109/CCST.2019.8888418}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccst/FerrerDCP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccst/Garcia-MartinSP19, author = {Raul Garcia{-}Martin and Raul S{\'{a}}nchez{-}Reillo and J. Enrique Suarez Pascual}, editor = {Gordon L. Thomas and Mala John}, title = {Wrist Vascular Biometric Capture Using a Portable Contactless System}, booktitle = {2019 International Carnahan Conference on Security Technology, {ICCST} 2019, Chennai, India, October 1-3, 2019}, pages = {1--6}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CCST.2019.8888424}, doi = {10.1109/CCST.2019.8888424}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccst/Garcia-MartinSP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccst/Goicoechea-Telleria19, author = {Ines Goicoechea{-}Telleria and Kiyoshi Kiyokawa and Anas Husseis and Judith Liu{-}Jimenez and Raul S{\'{a}}nchez{-}Reillo}, editor = {Gordon L. Thomas and Mala John}, title = {Fingerprint Presentation Attack Detection: Multispectral imaging with a narrow-band camera using Bag of Features}, booktitle = {2019 International Carnahan Conference on Security Technology, {ICCST} 2019, Chennai, India, October 1-3, 2019}, pages = {1--6}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CCST.2019.8888404}, doi = {10.1109/CCST.2019.8888404}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccst/Goicoechea-Telleria19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccst/HertleinAJR19, author = {Heinz Hertlein and Aladdin M. Ariyaeeinia and Zoe Jeffrey and Soodamani Ramalingam}, editor = {Gordon L. Thomas and Mala John}, title = {Effectiveness in the Realisation of Speaker Authentication}, booktitle = {2019 International Carnahan Conference on Security Technology, {ICCST} 2019, Chennai, India, October 1-3, 2019}, pages = {1--5}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CCST.2019.8888434}, doi = {10.1109/CCST.2019.8888434}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccst/HertleinAJR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccst/HusseisLGS19, author = {Anas Husseis and Judith Liu{-}Jimenez and Ines Goicoechea{-}Telleria and Raul S{\'{a}}nchez{-}Reillo}, editor = {Gordon L. Thomas and Mala John}, title = {A Survey in Presentation Attack and Presentation Attack Detection}, booktitle = {2019 International Carnahan Conference on Security Technology, {ICCST} 2019, Chennai, India, October 1-3, 2019}, pages = {1--13}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CCST.2019.8888436}, doi = {10.1109/CCST.2019.8888436}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccst/HusseisLGS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccst/JosephB19, author = {Justin Joseph and Saumya Bhadauria}, editor = {Gordon L. Thomas and Mala John}, title = {Cookie Based Protocol to Defend Malicious Browser Extensions}, booktitle = {2019 International Carnahan Conference on Security Technology, {ICCST} 2019, Chennai, India, October 1-3, 2019}, pages = {1--6}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CCST.2019.8888425}, doi = {10.1109/CCST.2019.8888425}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccst/JosephB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccst/KirutikaSPR19, author = {K. Kirutika and V. Vetri Selvi and Ranjani Parthasarathi and G. Subrahmanya V. R. K. Rao}, editor = {Gordon L. Thomas and Mala John}, title = {Controller Monitoring System In Software Defined Networks Using Random Forest Algorithm}, booktitle = {2019 International Carnahan Conference on Security Technology, {ICCST} 2019, Chennai, India, October 1-3, 2019}, pages = {1--6}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CCST.2019.8888369}, doi = {10.1109/CCST.2019.8888369}, timestamp = {Thu, 10 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccst/KirutikaSPR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccst/LavanyaT19, author = {Balaraja Lavanya and V. ThamizhThendral}, editor = {Gordon L. Thomas and Mala John}, title = {A novel data ciphering method for secure cloud storage}, booktitle = {2019 International Carnahan Conference on Security Technology, {ICCST} 2019, Chennai, India, October 1-3, 2019}, pages = {1--6}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CCST.2019.8888439}, doi = {10.1109/CCST.2019.8888439}, timestamp = {Sun, 19 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccst/LavanyaT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccst/MahansariaR19, author = {Divyans Mahansaria and Uttam Kumar Roy}, editor = {Gordon L. Thomas and Mala John}, title = {Secure Authentication for {ATM} transactions using {NFC} technology}, booktitle = {2019 International Carnahan Conference on Security Technology, {ICCST} 2019, Chennai, India, October 1-3, 2019}, pages = {1--5}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CCST.2019.8888427}, doi = {10.1109/CCST.2019.8888427}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccst/MahansariaR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccst/MohanaprakashA19, author = {T. A. Mohanaprakash and J. Andrews}, editor = {Gordon L. Thomas and Mala John}, title = {Novel privacy preserving system for Cloud Data security using Signature Hashing Algorithm}, booktitle = {2019 International Carnahan Conference on Security Technology, {ICCST} 2019, Chennai, India, October 1-3, 2019}, pages = {1--6}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CCST.2019.8888420}, doi = {10.1109/CCST.2019.8888420}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccst/MohanaprakashA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccst/NathezhthaDV19, author = {T. Nathezhtha and Sangeetha Dhamodaran and Vaidehi V.}, editor = {Gordon L. Thomas and Mala John}, title = {{WC-PAD:} Web Crawling based Phishing Attack Detection}, booktitle = {2019 International Carnahan Conference on Security Technology, {ICCST} 2019, Chennai, India, October 1-3, 2019}, pages = {1--6}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CCST.2019.8888416}, doi = {10.1109/CCST.2019.8888416}, timestamp = {Fri, 29 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccst/NathezhthaDV19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccst/NejadaslC19, author = {Atieh Merikh Nejadasl and Mahmoud Chizari}, editor = {Gordon L. Thomas and Mala John}, title = {Using finger for touchscreen devices; is it safe?}, booktitle = {2019 International Carnahan Conference on Security Technology, {ICCST} 2019, Chennai, India, October 1-3, 2019}, pages = {1--3}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CCST.2019.8888433}, doi = {10.1109/CCST.2019.8888433}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccst/NejadaslC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccst/PadmashreeA019, author = {M. G. Padmashree and J. S. Arunalatha and K. R. Venugopal}, editor = {Gordon L. Thomas and Mala John}, title = {{HPAKE:} Hybrid Precocious Authentication and Key Establishment in IoT}, booktitle = {2019 International Carnahan Conference on Security Technology, {ICCST} 2019, Chennai, India, October 1-3, 2019}, pages = {1--6}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CCST.2019.8888423}, doi = {10.1109/CCST.2019.8888423}, timestamp = {Thu, 10 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccst/PadmashreeA019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccst/ParthyR19, author = {Purushotham Parthiban Parthy and Gowthamaraj Rajendran}, editor = {Gordon L. Thomas and Mala John}, title = {Identification and prevention of social engineering attacks on an enterprise}, booktitle = {2019 International Carnahan Conference on Security Technology, {ICCST} 2019, Chennai, India, October 1-3, 2019}, pages = {1--5}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CCST.2019.8888441}, doi = {10.1109/CCST.2019.8888441}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccst/ParthyR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccst/Ponce-Hernandez19, author = {Wendy Ponce{-}Hernandez and Ramon Blanco{-}Gonzalo and Raul S{\'{a}}nchez{-}Reillo and Judith Liu{-}Jimenez}, editor = {Gordon L. Thomas and Mala John}, title = {Template protection approaches: Fuzzy Vault scheme}, booktitle = {2019 International Carnahan Conference on Security Technology, {ICCST} 2019, Chennai, India, October 1-3, 2019}, pages = {1--5}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CCST.2019.8888405}, doi = {10.1109/CCST.2019.8888405}, timestamp = {Thu, 10 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccst/Ponce-Hernandez19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccst/PrajapatiD19, author = {Manthan Prajapati and Dharmesh Dave}, editor = {Gordon L. Thomas and Mala John}, title = {Host-based Forensic Artefacts of Botnet Infection}, booktitle = {2019 International Carnahan Conference on Security Technology, {ICCST} 2019, Chennai, India, October 1-3, 2019}, pages = {1--4}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CCST.2019.8888438}, doi = {10.1109/CCST.2019.8888438}, timestamp = {Thu, 10 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccst/PrajapatiD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccst/RajMF19, author = {Rishu Raj and Soumya Michael and D. Femi}, editor = {Gordon L. Thomas and Mala John}, title = {Forest Monitoring System through {RFID} and Tensorflow Object Detection}, booktitle = {2019 International Carnahan Conference on Security Technology, {ICCST} 2019, Chennai, India, October 1-3, 2019}, pages = {1--4}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CCST.2019.8888428}, doi = {10.1109/CCST.2019.8888428}, timestamp = {Thu, 10 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccst/RajMF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccst/RajendranNP019, author = {Gowthamaraj Rajendran and R. S. Ragul Nivash and Purushotham Parthiban Parthy and S. Balamurugan}, editor = {Gordon L. Thomas and Mala John}, title = {Modern security threats in the Internet of Things (IoT): Attacks and Countermeasures}, booktitle = {2019 International Carnahan Conference on Security Technology, {ICCST} 2019, Chennai, India, October 1-3, 2019}, pages = {1--6}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CCST.2019.8888399}, doi = {10.1109/CCST.2019.8888399}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccst/RajendranNP019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccst/RaoBKC19, author = {Bobba Basaveswara Rao and Suneetha Bulla and Gangadhara Rao Kancherla and K. Chandan}, editor = {Gordon L. Thomas and Mala John}, title = {{HRF} {(HTTP} Request Filtering): {A} New Detection Mechanism of EDoS Attack on Cloud}, booktitle = {2019 International Carnahan Conference on Security Technology, {ICCST} 2019, Chennai, India, October 1-3, 2019}, pages = {1--7}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CCST.2019.8888431}, doi = {10.1109/CCST.2019.8888431}, timestamp = {Thu, 10 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccst/RaoBKC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccst/RavishGNKR19, author = {Roopa Ravish and Varun R. Gupta and K. J. Nagesh and Amruth Karnam and Shanta Rangaswamy}, editor = {Gordon L. Thomas and Mala John}, title = {Software Implementation of an Automatic Movable Road Barrier}, booktitle = {2019 International Carnahan Conference on Security Technology, {ICCST} 2019, Chennai, India, October 1-3, 2019}, pages = {1--6}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CCST.2019.8888417}, doi = {10.1109/CCST.2019.8888417}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccst/RavishGNKR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccst/RheadRGMJ19, author = {Michael Rhead and Soodamani Ramalingam and Robert Gurney and William E. Martin and Andrew Jones}, editor = {Gordon L. Thomas and Mala John}, title = {Implications of the Method of Construction of {UK} Number Plates for Infrared Reflectance and Camera Settings on {ANPR} System}, booktitle = {2019 International Carnahan Conference on Security Technology, {ICCST} 2019, Chennai, India, October 1-3, 2019}, pages = {1--5}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CCST.2019.8888400}, doi = {10.1109/CCST.2019.8888400}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccst/RheadRGMJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccst/RoselineS0B19, author = {S. Abijah Roseline and A. D. Sasisri and S. Geetha and C. Balasubramanian}, editor = {Gordon L. Thomas and Mala John}, title = {Towards Efficient Malware Detection and Classification using Multilayered Random Forest Ensemble Technique}, booktitle = {2019 International Carnahan Conference on Security Technology, {ICCST} 2019, Chennai, India, October 1-3, 2019}, pages = {1--6}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CCST.2019.8888406}, doi = {10.1109/CCST.2019.8888406}, timestamp = {Mon, 01 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccst/RoselineS0B19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccst/SarmilaM19, author = {K. B. Sarmila and S. V. Manisekaran}, editor = {Gordon L. Thomas and Mala John}, title = {A Study on Security Considerations in IoT Environment and Data Protection Methodologies for Communication in Cloud Computing}, booktitle = {2019 International Carnahan Conference on Security Technology, {ICCST} 2019, Chennai, India, October 1-3, 2019}, pages = {1--6}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CCST.2019.8888414}, doi = {10.1109/CCST.2019.8888414}, timestamp = {Thu, 10 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccst/SarmilaM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccst/SethiaJ19, author = {Vasu Sethia and A. Jeyasekar}, editor = {Gordon L. Thomas and Mala John}, title = {Malware Capturing and Analysis using Dionaea Honeypot}, booktitle = {2019 International Carnahan Conference on Security Technology, {ICCST} 2019, Chennai, India, October 1-3, 2019}, pages = {1--4}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CCST.2019.8888409}, doi = {10.1109/CCST.2019.8888409}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccst/SethiaJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccst/ShanmugamAVP19, author = {Dillibabu Shanmugam and Suganya Annadurai and Rajagopalan Vijayasarathy and T. Venkatesh Prasad}, editor = {Gordon L. Thomas and Mala John}, title = {Denial of Service Detection System on various platforms}, booktitle = {2019 International Carnahan Conference on Security Technology, {ICCST} 2019, Chennai, India, October 1-3, 2019}, pages = {1--12}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CCST.2019.8888402}, doi = {10.1109/CCST.2019.8888402}, timestamp = {Thu, 10 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccst/ShanmugamAVP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccst/SharafaldinLH019, author = {Iman Sharafaldin and Arash Habibi Lashkari and Saqib Hakak and Ali A. Ghorbani}, editor = {Gordon L. Thomas and Mala John}, title = {Developing Realistic Distributed Denial of Service (DDoS) Attack Dataset and Taxonomy}, booktitle = {2019 International Carnahan Conference on Security Technology, {ICCST} 2019, Chennai, India, October 1-3, 2019}, pages = {1--8}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CCST.2019.8888419}, doi = {10.1109/CCST.2019.8888419}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccst/SharafaldinLH019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccst/ShruthiC19, author = {K. Shruthi and P. S. Chinmayi}, editor = {Gordon L. Thomas and Mala John}, title = {Android Device or a Privacy Compromise?}, booktitle = {2019 International Carnahan Conference on Security Technology, {ICCST} 2019, Chennai, India, October 1-3, 2019}, pages = {1--6}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CCST.2019.8888411}, doi = {10.1109/CCST.2019.8888411}, timestamp = {Thu, 10 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccst/ShruthiC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccst/SmejkalOKT19, author = {Vladimir Smejkal and Boris Oniscenko and Jindrich Kodl and Petr Tesar}, editor = {Gordon L. Thomas and Mala John}, title = {Influence of hypoxia on the stability of the dynamic biometric signature}, booktitle = {2019 International Carnahan Conference on Security Technology, {ICCST} 2019, Chennai, India, October 1-3, 2019}, pages = {1--6}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CCST.2019.8888403}, doi = {10.1109/CCST.2019.8888403}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccst/SmejkalOKT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccst/TaheriKL19, author = {Laya Taheri and Andi Fitriah Abdul Kadir and Arash Habibi Lashkari}, editor = {Gordon L. Thomas and Mala John}, title = {Extensible Android Malware Detection and Family Classification Using Network-Flows and API-Calls}, booktitle = {2019 International Carnahan Conference on Security Technology, {ICCST} 2019, Chennai, India, October 1-3, 2019}, pages = {1--8}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CCST.2019.8888430}, doi = {10.1109/CCST.2019.8888430}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccst/TaheriKL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccst/ThakurS19, author = {Shilpa Thakur and Ajay Singh}, editor = {Gordon L. Thomas and Mala John}, title = {Ergodic Secrecy Capacity in Nakagami-m Fading Channels}, booktitle = {2019 International Carnahan Conference on Security Technology, {ICCST} 2019, Chennai, India, October 1-3, 2019}, pages = {1--3}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CCST.2019.8888440}, doi = {10.1109/CCST.2019.8888440}, timestamp = {Thu, 22 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccst/ThakurS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccst/VenkateshPAK19, author = {K. Venkatesh and K. Pratibha and Suganya Annadurai and Lakshmi Kuppusamy}, editor = {Gordon L. Thomas and Mala John}, title = {Reconfigurable Architecture to Speed-up Modular Exponentiation}, booktitle = {2019 International Carnahan Conference on Security Technology, {ICCST} 2019, Chennai, India, October 1-3, 2019}, pages = {1--6}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CCST.2019.8888401}, doi = {10.1109/CCST.2019.8888401}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccst/VenkateshPAK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccst/VincentAR19, author = {M. Vincent and P. Arumugam and G. Prabhakara Rao}, editor = {Gordon L. Thomas and Mala John}, title = {Interior Intrusion Detection System}, booktitle = {2019 International Carnahan Conference on Security Technology, {ICCST} 2019, Chennai, India, October 1-3, 2019}, pages = {1--4}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CCST.2019.8888412}, doi = {10.1109/CCST.2019.8888412}, timestamp = {Thu, 10 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccst/VincentAR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/iccst/2019, editor = {Gordon L. Thomas and Mala John}, title = {2019 International Carnahan Conference on Security Technology, {ICCST} 2019, Chennai, India, October 1-3, 2019}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ICCST45897.2019}, doi = {10.1109/ICCST45897.2019}, isbn = {978-1-7281-1577-1}, timestamp = {Thu, 10 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccst/2019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.