Search dblp for Publications

export results for "toc:db/conf/iccst/iccst2019.bht:"

 download as .bib file

@inproceedings{DBLP:conf/iccst/AhmedTMANU19,
  author       = {Sabbir Ahmed and
                  Tamkin Mahmud Tan and
                  Anna Mary Mondol and
                  Zawad Alam and
                  Noshin Nawal and
                  Jia Uddin},
  editor       = {Gordon L. Thomas and
                  Mala John},
  title        = {Automated Toll Collection System Based on {RFID} Sensor},
  booktitle    = {2019 International Carnahan Conference on Security Technology, {ICCST}
                  2019, Chennai, India, October 1-3, 2019},
  pages        = {1--3},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CCST.2019.8888429},
  doi          = {10.1109/CCST.2019.8888429},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccst/AhmedTMANU19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccst/AttfieldSKPD19,
  author       = {Simon Attfield and
                  Nallini Selveraj and
                  Neesha Kodagoda and
                  Peter J. Passmore and
                  Elke Dunke},
  editor       = {Gordon L. Thomas and
                  Mala John},
  title        = {Patterns of Life Visualiations for Intelligence Analysis: Exploring
                  Animation with {POLAR}},
  booktitle    = {2019 International Carnahan Conference on Security Technology, {ICCST}
                  2019, Chennai, India, October 1-3, 2019},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CCST.2019.8888410},
  doi          = {10.1109/CCST.2019.8888410},
  timestamp    = {Thu, 10 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccst/AttfieldSKPD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccst/Boakye-BoatengL19,
  author       = {Kwasi Boakye{-}Boateng and
                  Arash Habibi Lashkari},
  editor       = {Gordon L. Thomas and
                  Mala John},
  title        = {Securing {GOOSE:} The Return of One-Time Pads},
  booktitle    = {2019 International Carnahan Conference on Security Technology, {ICCST}
                  2019, Chennai, India, October 1-3, 2019},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CCST.2019.8888435},
  doi          = {10.1109/CCST.2019.8888435},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccst/Boakye-BoatengL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccst/BuserSS19,
  author       = {Daniela Buser and
                  Yanik Sterchi and
                  Adrian Schwaninger},
  editor       = {Gordon L. Thomas and
                  Mala John},
  title        = {Effects of Time on Task, Breaks, and Target Prevalence on Screener
                  Performance in an X-ray Image Inspection Task},
  booktitle    = {2019 International Carnahan Conference on Security Technology, {ICCST}
                  2019, Chennai, India, October 1-3, 2019},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CCST.2019.8888408},
  doi          = {10.1109/CCST.2019.8888408},
  timestamp    = {Thu, 10 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccst/BuserSS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccst/CorsettiSGS19,
  author       = {Barbara Corsetti and
                  Raul S{\'{a}}nchez{-}Reillo and
                  Richard M. Guest and
                  Marco Santopietro},
  editor       = {Gordon L. Thomas and
                  Mala John},
  title        = {Face Image Analysis in Mobile Biometric Accessibility Evaluations},
  booktitle    = {2019 International Carnahan Conference on Security Technology, {ICCST}
                  2019, Chennai, India, October 1-3, 2019},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CCST.2019.8888437},
  doi          = {10.1109/CCST.2019.8888437},
  timestamp    = {Thu, 10 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccst/CorsettiSGS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccst/Divya19,
  author       = {N. Divya},
  editor       = {Gordon L. Thomas and
                  Mala John},
  title        = {Image Specific Similar Target Detection in Aerial Images Using Gaussian
                  Mixture Model},
  booktitle    = {2019 International Carnahan Conference on Security Technology, {ICCST}
                  2019, Chennai, India, October 1-3, 2019},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CCST.2019.8888422},
  doi          = {10.1109/CCST.2019.8888422},
  timestamp    = {Thu, 10 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccst/Divya19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccst/DupakB19,
  author       = {Lucindia Dupak and
                  Subhasish Banerjee},
  editor       = {Gordon L. Thomas and
                  Mala John},
  title        = {Role of Bio-Inspired Algorithms for Designing Protocols in MANET-Review},
  booktitle    = {2019 International Carnahan Conference on Security Technology, {ICCST}
                  2019, Chennai, India, October 1-3, 2019},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CCST.2019.8888407},
  doi          = {10.1109/CCST.2019.8888407},
  timestamp    = {Thu, 10 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccst/DupakB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccst/FerrerDCP19,
  author       = {Miguel A. Ferrer and
                  Mois{\'{e}}s D{\'{\i}}az and
                  Cristina Carmona{-}Duarte and
                  R{\'{e}}jean Plamondon},
  editor       = {Gordon L. Thomas and
                  Mala John},
  title        = {Generating Off-line and On-line Forgeries from On-line Genuine Signatures},
  booktitle    = {2019 International Carnahan Conference on Security Technology, {ICCST}
                  2019, Chennai, India, October 1-3, 2019},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CCST.2019.8888418},
  doi          = {10.1109/CCST.2019.8888418},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccst/FerrerDCP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccst/Garcia-MartinSP19,
  author       = {Raul Garcia{-}Martin and
                  Raul S{\'{a}}nchez{-}Reillo and
                  J. Enrique Suarez Pascual},
  editor       = {Gordon L. Thomas and
                  Mala John},
  title        = {Wrist Vascular Biometric Capture Using a Portable Contactless System},
  booktitle    = {2019 International Carnahan Conference on Security Technology, {ICCST}
                  2019, Chennai, India, October 1-3, 2019},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CCST.2019.8888424},
  doi          = {10.1109/CCST.2019.8888424},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccst/Garcia-MartinSP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccst/Goicoechea-Telleria19,
  author       = {Ines Goicoechea{-}Telleria and
                  Kiyoshi Kiyokawa and
                  Anas Husseis and
                  Judith Liu{-}Jimenez and
                  Raul S{\'{a}}nchez{-}Reillo},
  editor       = {Gordon L. Thomas and
                  Mala John},
  title        = {Fingerprint Presentation Attack Detection: Multispectral imaging with
                  a narrow-band camera using Bag of Features},
  booktitle    = {2019 International Carnahan Conference on Security Technology, {ICCST}
                  2019, Chennai, India, October 1-3, 2019},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CCST.2019.8888404},
  doi          = {10.1109/CCST.2019.8888404},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccst/Goicoechea-Telleria19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccst/HertleinAJR19,
  author       = {Heinz Hertlein and
                  Aladdin M. Ariyaeeinia and
                  Zoe Jeffrey and
                  Soodamani Ramalingam},
  editor       = {Gordon L. Thomas and
                  Mala John},
  title        = {Effectiveness in the Realisation of Speaker Authentication},
  booktitle    = {2019 International Carnahan Conference on Security Technology, {ICCST}
                  2019, Chennai, India, October 1-3, 2019},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CCST.2019.8888434},
  doi          = {10.1109/CCST.2019.8888434},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccst/HertleinAJR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccst/HusseisLGS19,
  author       = {Anas Husseis and
                  Judith Liu{-}Jimenez and
                  Ines Goicoechea{-}Telleria and
                  Raul S{\'{a}}nchez{-}Reillo},
  editor       = {Gordon L. Thomas and
                  Mala John},
  title        = {A Survey in Presentation Attack and Presentation Attack Detection},
  booktitle    = {2019 International Carnahan Conference on Security Technology, {ICCST}
                  2019, Chennai, India, October 1-3, 2019},
  pages        = {1--13},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CCST.2019.8888436},
  doi          = {10.1109/CCST.2019.8888436},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccst/HusseisLGS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccst/JosephB19,
  author       = {Justin Joseph and
                  Saumya Bhadauria},
  editor       = {Gordon L. Thomas and
                  Mala John},
  title        = {Cookie Based Protocol to Defend Malicious Browser Extensions},
  booktitle    = {2019 International Carnahan Conference on Security Technology, {ICCST}
                  2019, Chennai, India, October 1-3, 2019},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CCST.2019.8888425},
  doi          = {10.1109/CCST.2019.8888425},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccst/JosephB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccst/KirutikaSPR19,
  author       = {K. Kirutika and
                  V. Vetri Selvi and
                  Ranjani Parthasarathi and
                  G. Subrahmanya V. R. K. Rao},
  editor       = {Gordon L. Thomas and
                  Mala John},
  title        = {Controller Monitoring System In Software Defined Networks Using Random
                  Forest Algorithm},
  booktitle    = {2019 International Carnahan Conference on Security Technology, {ICCST}
                  2019, Chennai, India, October 1-3, 2019},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CCST.2019.8888369},
  doi          = {10.1109/CCST.2019.8888369},
  timestamp    = {Thu, 10 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccst/KirutikaSPR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccst/LavanyaT19,
  author       = {Balaraja Lavanya and
                  V. ThamizhThendral},
  editor       = {Gordon L. Thomas and
                  Mala John},
  title        = {A novel data ciphering method for secure cloud storage},
  booktitle    = {2019 International Carnahan Conference on Security Technology, {ICCST}
                  2019, Chennai, India, October 1-3, 2019},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CCST.2019.8888439},
  doi          = {10.1109/CCST.2019.8888439},
  timestamp    = {Sun, 19 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccst/LavanyaT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccst/MahansariaR19,
  author       = {Divyans Mahansaria and
                  Uttam Kumar Roy},
  editor       = {Gordon L. Thomas and
                  Mala John},
  title        = {Secure Authentication for {ATM} transactions using {NFC} technology},
  booktitle    = {2019 International Carnahan Conference on Security Technology, {ICCST}
                  2019, Chennai, India, October 1-3, 2019},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CCST.2019.8888427},
  doi          = {10.1109/CCST.2019.8888427},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccst/MahansariaR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccst/MohanaprakashA19,
  author       = {T. A. Mohanaprakash and
                  J. Andrews},
  editor       = {Gordon L. Thomas and
                  Mala John},
  title        = {Novel privacy preserving system for Cloud Data security using Signature
                  Hashing Algorithm},
  booktitle    = {2019 International Carnahan Conference on Security Technology, {ICCST}
                  2019, Chennai, India, October 1-3, 2019},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CCST.2019.8888420},
  doi          = {10.1109/CCST.2019.8888420},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccst/MohanaprakashA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccst/NathezhthaDV19,
  author       = {T. Nathezhtha and
                  Sangeetha Dhamodaran and
                  Vaidehi V.},
  editor       = {Gordon L. Thomas and
                  Mala John},
  title        = {{WC-PAD:} Web Crawling based Phishing Attack Detection},
  booktitle    = {2019 International Carnahan Conference on Security Technology, {ICCST}
                  2019, Chennai, India, October 1-3, 2019},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CCST.2019.8888416},
  doi          = {10.1109/CCST.2019.8888416},
  timestamp    = {Fri, 29 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccst/NathezhthaDV19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccst/NejadaslC19,
  author       = {Atieh Merikh Nejadasl and
                  Mahmoud Chizari},
  editor       = {Gordon L. Thomas and
                  Mala John},
  title        = {Using finger for touchscreen devices; is it safe?},
  booktitle    = {2019 International Carnahan Conference on Security Technology, {ICCST}
                  2019, Chennai, India, October 1-3, 2019},
  pages        = {1--3},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CCST.2019.8888433},
  doi          = {10.1109/CCST.2019.8888433},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccst/NejadaslC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccst/PadmashreeA019,
  author       = {M. G. Padmashree and
                  J. S. Arunalatha and
                  K. R. Venugopal},
  editor       = {Gordon L. Thomas and
                  Mala John},
  title        = {{HPAKE:} Hybrid Precocious Authentication and Key Establishment in
                  IoT},
  booktitle    = {2019 International Carnahan Conference on Security Technology, {ICCST}
                  2019, Chennai, India, October 1-3, 2019},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CCST.2019.8888423},
  doi          = {10.1109/CCST.2019.8888423},
  timestamp    = {Thu, 10 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccst/PadmashreeA019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccst/ParthyR19,
  author       = {Purushotham Parthiban Parthy and
                  Gowthamaraj Rajendran},
  editor       = {Gordon L. Thomas and
                  Mala John},
  title        = {Identification and prevention of social engineering attacks on an
                  enterprise},
  booktitle    = {2019 International Carnahan Conference on Security Technology, {ICCST}
                  2019, Chennai, India, October 1-3, 2019},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CCST.2019.8888441},
  doi          = {10.1109/CCST.2019.8888441},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccst/ParthyR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccst/Ponce-Hernandez19,
  author       = {Wendy Ponce{-}Hernandez and
                  Ramon Blanco{-}Gonzalo and
                  Raul S{\'{a}}nchez{-}Reillo and
                  Judith Liu{-}Jimenez},
  editor       = {Gordon L. Thomas and
                  Mala John},
  title        = {Template protection approaches: Fuzzy Vault scheme},
  booktitle    = {2019 International Carnahan Conference on Security Technology, {ICCST}
                  2019, Chennai, India, October 1-3, 2019},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CCST.2019.8888405},
  doi          = {10.1109/CCST.2019.8888405},
  timestamp    = {Thu, 10 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccst/Ponce-Hernandez19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccst/PrajapatiD19,
  author       = {Manthan Prajapati and
                  Dharmesh Dave},
  editor       = {Gordon L. Thomas and
                  Mala John},
  title        = {Host-based Forensic Artefacts of Botnet Infection},
  booktitle    = {2019 International Carnahan Conference on Security Technology, {ICCST}
                  2019, Chennai, India, October 1-3, 2019},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CCST.2019.8888438},
  doi          = {10.1109/CCST.2019.8888438},
  timestamp    = {Thu, 10 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccst/PrajapatiD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccst/RajMF19,
  author       = {Rishu Raj and
                  Soumya Michael and
                  D. Femi},
  editor       = {Gordon L. Thomas and
                  Mala John},
  title        = {Forest Monitoring System through {RFID} and Tensorflow Object Detection},
  booktitle    = {2019 International Carnahan Conference on Security Technology, {ICCST}
                  2019, Chennai, India, October 1-3, 2019},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CCST.2019.8888428},
  doi          = {10.1109/CCST.2019.8888428},
  timestamp    = {Thu, 10 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccst/RajMF19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccst/RajendranNP019,
  author       = {Gowthamaraj Rajendran and
                  R. S. Ragul Nivash and
                  Purushotham Parthiban Parthy and
                  S. Balamurugan},
  editor       = {Gordon L. Thomas and
                  Mala John},
  title        = {Modern security threats in the Internet of Things (IoT): Attacks and
                  Countermeasures},
  booktitle    = {2019 International Carnahan Conference on Security Technology, {ICCST}
                  2019, Chennai, India, October 1-3, 2019},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CCST.2019.8888399},
  doi          = {10.1109/CCST.2019.8888399},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccst/RajendranNP019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccst/RaoBKC19,
  author       = {Bobba Basaveswara Rao and
                  Suneetha Bulla and
                  Gangadhara Rao Kancherla and
                  K. Chandan},
  editor       = {Gordon L. Thomas and
                  Mala John},
  title        = {{HRF} {(HTTP} Request Filtering): {A} New Detection Mechanism of EDoS
                  Attack on Cloud},
  booktitle    = {2019 International Carnahan Conference on Security Technology, {ICCST}
                  2019, Chennai, India, October 1-3, 2019},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CCST.2019.8888431},
  doi          = {10.1109/CCST.2019.8888431},
  timestamp    = {Thu, 10 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccst/RaoBKC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccst/RavishGNKR19,
  author       = {Roopa Ravish and
                  Varun R. Gupta and
                  K. J. Nagesh and
                  Amruth Karnam and
                  Shanta Rangaswamy},
  editor       = {Gordon L. Thomas and
                  Mala John},
  title        = {Software Implementation of an Automatic Movable Road Barrier},
  booktitle    = {2019 International Carnahan Conference on Security Technology, {ICCST}
                  2019, Chennai, India, October 1-3, 2019},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CCST.2019.8888417},
  doi          = {10.1109/CCST.2019.8888417},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccst/RavishGNKR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccst/RheadRGMJ19,
  author       = {Michael Rhead and
                  Soodamani Ramalingam and
                  Robert Gurney and
                  William E. Martin and
                  Andrew Jones},
  editor       = {Gordon L. Thomas and
                  Mala John},
  title        = {Implications of the Method of Construction of {UK} Number Plates for
                  Infrared Reflectance and Camera Settings on {ANPR} System},
  booktitle    = {2019 International Carnahan Conference on Security Technology, {ICCST}
                  2019, Chennai, India, October 1-3, 2019},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CCST.2019.8888400},
  doi          = {10.1109/CCST.2019.8888400},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccst/RheadRGMJ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccst/RoselineS0B19,
  author       = {S. Abijah Roseline and
                  A. D. Sasisri and
                  S. Geetha and
                  C. Balasubramanian},
  editor       = {Gordon L. Thomas and
                  Mala John},
  title        = {Towards Efficient Malware Detection and Classification using Multilayered
                  Random Forest Ensemble Technique},
  booktitle    = {2019 International Carnahan Conference on Security Technology, {ICCST}
                  2019, Chennai, India, October 1-3, 2019},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CCST.2019.8888406},
  doi          = {10.1109/CCST.2019.8888406},
  timestamp    = {Mon, 01 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccst/RoselineS0B19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccst/SarmilaM19,
  author       = {K. B. Sarmila and
                  S. V. Manisekaran},
  editor       = {Gordon L. Thomas and
                  Mala John},
  title        = {A Study on Security Considerations in IoT Environment and Data Protection
                  Methodologies for Communication in Cloud Computing},
  booktitle    = {2019 International Carnahan Conference on Security Technology, {ICCST}
                  2019, Chennai, India, October 1-3, 2019},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CCST.2019.8888414},
  doi          = {10.1109/CCST.2019.8888414},
  timestamp    = {Thu, 10 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccst/SarmilaM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccst/SethiaJ19,
  author       = {Vasu Sethia and
                  A. Jeyasekar},
  editor       = {Gordon L. Thomas and
                  Mala John},
  title        = {Malware Capturing and Analysis using Dionaea Honeypot},
  booktitle    = {2019 International Carnahan Conference on Security Technology, {ICCST}
                  2019, Chennai, India, October 1-3, 2019},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CCST.2019.8888409},
  doi          = {10.1109/CCST.2019.8888409},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccst/SethiaJ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccst/ShanmugamAVP19,
  author       = {Dillibabu Shanmugam and
                  Suganya Annadurai and
                  Rajagopalan Vijayasarathy and
                  T. Venkatesh Prasad},
  editor       = {Gordon L. Thomas and
                  Mala John},
  title        = {Denial of Service Detection System on various platforms},
  booktitle    = {2019 International Carnahan Conference on Security Technology, {ICCST}
                  2019, Chennai, India, October 1-3, 2019},
  pages        = {1--12},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CCST.2019.8888402},
  doi          = {10.1109/CCST.2019.8888402},
  timestamp    = {Thu, 10 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccst/ShanmugamAVP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccst/SharafaldinLH019,
  author       = {Iman Sharafaldin and
                  Arash Habibi Lashkari and
                  Saqib Hakak and
                  Ali A. Ghorbani},
  editor       = {Gordon L. Thomas and
                  Mala John},
  title        = {Developing Realistic Distributed Denial of Service (DDoS) Attack Dataset
                  and Taxonomy},
  booktitle    = {2019 International Carnahan Conference on Security Technology, {ICCST}
                  2019, Chennai, India, October 1-3, 2019},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CCST.2019.8888419},
  doi          = {10.1109/CCST.2019.8888419},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccst/SharafaldinLH019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccst/ShruthiC19,
  author       = {K. Shruthi and
                  P. S. Chinmayi},
  editor       = {Gordon L. Thomas and
                  Mala John},
  title        = {Android Device or a Privacy Compromise?},
  booktitle    = {2019 International Carnahan Conference on Security Technology, {ICCST}
                  2019, Chennai, India, October 1-3, 2019},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CCST.2019.8888411},
  doi          = {10.1109/CCST.2019.8888411},
  timestamp    = {Thu, 10 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccst/ShruthiC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccst/SmejkalOKT19,
  author       = {Vladimir Smejkal and
                  Boris Oniscenko and
                  Jindrich Kodl and
                  Petr Tesar},
  editor       = {Gordon L. Thomas and
                  Mala John},
  title        = {Influence of hypoxia on the stability of the dynamic biometric signature},
  booktitle    = {2019 International Carnahan Conference on Security Technology, {ICCST}
                  2019, Chennai, India, October 1-3, 2019},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CCST.2019.8888403},
  doi          = {10.1109/CCST.2019.8888403},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccst/SmejkalOKT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccst/TaheriKL19,
  author       = {Laya Taheri and
                  Andi Fitriah Abdul Kadir and
                  Arash Habibi Lashkari},
  editor       = {Gordon L. Thomas and
                  Mala John},
  title        = {Extensible Android Malware Detection and Family Classification Using
                  Network-Flows and API-Calls},
  booktitle    = {2019 International Carnahan Conference on Security Technology, {ICCST}
                  2019, Chennai, India, October 1-3, 2019},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CCST.2019.8888430},
  doi          = {10.1109/CCST.2019.8888430},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccst/TaheriKL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccst/ThakurS19,
  author       = {Shilpa Thakur and
                  Ajay Singh},
  editor       = {Gordon L. Thomas and
                  Mala John},
  title        = {Ergodic Secrecy Capacity in Nakagami-m Fading Channels},
  booktitle    = {2019 International Carnahan Conference on Security Technology, {ICCST}
                  2019, Chennai, India, October 1-3, 2019},
  pages        = {1--3},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CCST.2019.8888440},
  doi          = {10.1109/CCST.2019.8888440},
  timestamp    = {Thu, 22 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccst/ThakurS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccst/VenkateshPAK19,
  author       = {K. Venkatesh and
                  K. Pratibha and
                  Suganya Annadurai and
                  Lakshmi Kuppusamy},
  editor       = {Gordon L. Thomas and
                  Mala John},
  title        = {Reconfigurable Architecture to Speed-up Modular Exponentiation},
  booktitle    = {2019 International Carnahan Conference on Security Technology, {ICCST}
                  2019, Chennai, India, October 1-3, 2019},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CCST.2019.8888401},
  doi          = {10.1109/CCST.2019.8888401},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccst/VenkateshPAK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccst/VincentAR19,
  author       = {M. Vincent and
                  P. Arumugam and
                  G. Prabhakara Rao},
  editor       = {Gordon L. Thomas and
                  Mala John},
  title        = {Interior Intrusion Detection System},
  booktitle    = {2019 International Carnahan Conference on Security Technology, {ICCST}
                  2019, Chennai, India, October 1-3, 2019},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CCST.2019.8888412},
  doi          = {10.1109/CCST.2019.8888412},
  timestamp    = {Thu, 10 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccst/VincentAR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iccst/2019,
  editor       = {Gordon L. Thomas and
                  Mala John},
  title        = {2019 International Carnahan Conference on Security Technology, {ICCST}
                  2019, Chennai, India, October 1-3, 2019},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICCST45897.2019},
  doi          = {10.1109/ICCST45897.2019},
  isbn         = {978-1-7281-1577-1},
  timestamp    = {Thu, 10 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccst/2019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}