![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
10th ATIS 2019: Thanjavur, India
- V. S. Shankar Sriram, V. Subramaniyaswamy, N. Sasikaladevi
, Leo Zhang, Lynn Batten, Gang Li:
Applications and Techniques in Information Security - 10th International Conference, ATIS 2019, Thanjavur, India, November 22-24, 2019, Proceedings. Communications in Computer and Information Science 1116, Springer 2019, ISBN 978-981-15-0870-7
Information Security
- Yuhai Lu, Yanbing Liu, Gongxin Sun, Jianlong Tan:
A Memory-Efficient Multiple String Matching Algorithm Based on Charset Transformation. 3-15 - R. Anushiadevi
, Veeramuthu Venkatesh, Rengarajan Amirtharajan
:
An Image Mathcrypt - A Flawless Security via Flawed Image. 16-31 - Hisao Ogata, Tomoyoshi Ishikawa, Norichika Miyamoto, Tsutomu Matsumoto:
Secure ATM Device Design by Control Command Verification. 32-50 - Sujarani Rajendran
, Manivannan Doraipandian
:
Construction of Two Dimensional Cubic-Tent-Sine Map for Secure Image Transmission. 51-61 - Vinoth Raj, Siva Janakiraman
, Sundararaman Rajagopalan, Amirtharajan Rengarajan
:
Confused Memory Read Attracts Synthetic Diffusion on the Fly - A Lightweight Image Encryption for IoT Platform. 62-73
Network Security
- Waqas Ahmad Piracha, Morshed U. Chowdhury, Biplob Ray
, Sutharshan Rajasegarar
, Robin Doss
:
Insider Attacks on Zigbee Based IoT Networks by Exploiting AT Commands. 77-91 - S. Milton Ganesh, S. P. Manikandan:
A Survey on Various Integrity Verification Schemes on the Data Outsourced to Cloud Storage. 92-99 - Antony Taurshia
, G. Jaspher W. Kathrine
, Shibin David:
Prognostic Views on Software Defined Networks Based Security for Internet of Things. 100-116 - T. Suriya Praba
, V. Meena
:
Integrity Checking of Cloud Data with an Auditing Mechanism Using ECC and Merkle Hash Tree. 117-128 - M. R. Gauthama Raman, Nivethitha Somu
, Aditya P. Mathur:
Anomaly Detection in Critical Infrastructure Using Probabilistic Neural Network. 129-141 - C. Manikandan
, S. Rakesh Kumar
, Kopparthi Nikhith, M. Sai Gayathri, P. Neelamegam
:
Chaotic Map Based Key Generation and Realistic Power Allocation Technique for Secure MU-MIMO Wireless System. 142-155
Intrusion Detection System
- Rajalakshmi Elangovan
, N. Asik Ibrahim, V. Subramaniyaswamy
:
A Survey of Machine Learning Techniques Used to Combat Against the Advanced Persistent Threat. 159-172 - Sujeet S. Jagtap
, V. S. Shankar Sriram
:
Subtree Hypergraph-Based Attack Detection Model for Signature Matching over SCADA HMI. 173-184 - Tina Manghnani, T. Thirumaran:
Computational CBGSA - SVM Model for Network Based Intrusion Detection System. 185-191 - Fangfang Yuan, Yanmin Shang, Yanbing Liu, Yanan Cao, Jianlong Tan:
Attention-Based LSTM for Insider Threat Detection. 192-201 - P. Mohana Priya
, K. R. Manjula
:
Cog-SDN: Mitigation Mechanism for Distributed Denial of Service Attacks in Software Defined Networks. 202-215
Authentication and Key Management System
- Cameron R. Schafer, Lei Pan
:
Password Strength Estimators Trained on the Leaked Password Lists. 219-231 - Sundararaman Rajagopalan, Nikhil Krishnaa Sriram, Veerappan Manikandan
, Sivaraman Rethinam
, Sridevi Arumugham
, Siva Janakiraman
, Amirtharajan Rengarajan
:
Cellular Automata Based Key Stream Generator - A Reconfigurable Hardware Approach. 232-242 - Sivappriya Manivannan
, K. K. Soundra Pandian
:
Hardware Trojan on SIMON Architecture for Key Retrieval. 243-253 - S. Sharon, T. Suriya Praba
, R. Anushiadevi
, Veeramuthu Venkatesh:
Privacy-Preserving Authentication Scheme Using Reduced-Advanced Encryption Standard for Vehicular Ad Hoc Network. 254-265 - Tapadyoti Banerjee, Dipanwita Roy Chowdhury:
On the Security of the Double-Block-Length Hash Function NCASH. 266-278
Security Centric Applications
- Monish Ram K, Ananya Sairaj, Ramya Lakshmi Srinivasan, Raajan N. R, Girish Ganesan R:
Tele-Transmission of Secured Prefrontal Cortex Information Records for Remote Health Care. 281-289 - Tarun Kumar D, Ramya Lakshmi Srinivasan, Raajan N. R:
Encryption by Heart (EbH) for Secured Data Transmission and CNN Based EKG Signal Classification of Arrhythmia with Normal Data. 290-299 - Ahaan Dabholkar, Vishal Saraswat
:
Ripping the Fabric: Attacks and Mitigations on Hyperledger Fabric. 300-311
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.