default search action
ICCST 2023: Pune, India
- IEEE International Carnahan Conference on Security Technology, ICCST 2023, Pune, India, October 11-15, 2023. IEEE 2023, ISBN 979-8-3503-1587-5
- Yasir Umair Mulla, Amey Chavekar, Sushant Mane, Faruk Kazi:
Threat Modeling of Cube Orange Based Unmanned Aerial Vehicle System. 1-6 - Akshat Jain, Prasanna Shete:
Accounting for the Unaccounted Vulnerabilities Found in Endpoint ISP SOHO Router. 1-4 - Medha Wyawahare, M. Selva Balan, Akshay Aadarsh, Anish Patil, Utkarsh Anuse:
Jal-Tarang: Smart Buoy for Wave Height Measurement. 1-6 - Apeksha Arun Wadhe, Shraddha Suratkar:
Tourist Place Classification Using Topic Modeling Algorithms. 1-10 - Arya Patil, Digvijay Machale, Dipanshu Goswami, Parimal Muley, Prachi Rajarapollu:
Anomaly-Based Intrusion Detection System for IoT Environment Using Machine Learning. 1-4 - Aniket Singh, Amitesh Patra, Arjun Tyagi, Shivali Amit Wagle, Pooja Kamat:
Comparative Analysis of Algorithms for Cotton Plant Leaf Disease Classification from an Image. 1-5 - Kurmi Sandeep Kumar S, Manisha J. Nene:
Detection and Mitigation Mechanisms for Covert Channel Attack. 1-7 - Ashwin Kumar:
Enhancing Sentiment Analysis Accuracy in IMDb Movie Reviews with Deep Learning Models: A Comparative Study of RNN and CNN Models. 1-9 - Sanyam Jain, I. Sumaiya Thaseen:
Revolutionizing Malware Detection: Feature-Based Approach for Targeting Diverse Malware Categories. 1-5 - Tomás Lovecek, Erika Skýpalová, Martin Boros, Radoslav Kuffa:
Locating People in a Confined Space Using iBeacon Technology. 1-9 - Anupama Arjun Pandit, Arun Mishra:
Pseudo Random Binary Sequence using Lattice-based Hard Problem for Quantum Key Distribution. 1-7 - Swapna Tekale, Krishna Kumar Singh:
A Survey of Disease Detection in Cauliflower Using Machine Learning and Deep Learning Techniques. 1-6 - Cynara Justine, Sathyanarayanan Manamohan, Jiji Charangatt Victor:
SL-Defender: Decentralized Defense for Adversarial Robustness in Federated Learning. 1-7 - Aziz Makandar, Shilpa Kaman:
Transform Domain Techniques combined with LBP for Tampered Image Detection using Machine Learning. 1-7 - Kanhaiya Sharma, Deepak Parashar, Akshay Sangwan, Abhinav Vengali, Gouransh Agrawal:
Enhancing Online Job Posting Security: A Big Data Approach to Fraud Detection. 1-6 - Sachin Upadhye, Nilesh M. Shelke:
A Recent Study of Security Techniques for IoT. 1-5 - Shambhavi Patil, Om Nankar, Manish Goyal, Shivali Amit Wagle:
Enhancing Traffic Sign Detection and Classification through Multi-Task Learning Using CNNs. 1-6 - Shruti Tyagi, Shriya Pingulkar, Amaan Shaikh:
Multi-Class Network Intrusion Detection Using Deep Neural Networks Tuned on Imbalanced Data. 1-5 - Alberto Bruni, Fabio Garzia:
The New Communication Network for an Internet of Things/Everything Based Security/Safety/General Management/Visitor's Services Integrated System of the Pompeii Archeological Park, Italy. 1-6 - Harshit Gupta, Pratyush Pareek, Anirudh Arora, Muskan Deep Kaur Maini, Ramesh Kumar Bhukya, O. P. Vyas, Antonio Puliafito:
Fed-Trace: An Efficient Model to Traceback Data Poisoning Attacks in Federated Learning. 1-6 - Suraj Patil, Manik Hendre, Aditya Abhyankar:
Alignment Free Fingerprint Template Security Using Minutia Neighbors. 1-4 - Shruti Tyagi, Shriya Pingulkar, Aryaman Tiwary:
Detecting Diabetic Retinopathy using ResNet50 and Explainable AI. 1-6 - Kalyan Banerjee, Jasleen Kaur, Nilesh Tiwari:
Torsion Point Cryptography: Enhancing Data Security with Elliptic Curves. 1-6 - Jose Juan Quintana, Miguel A. Ferrer, Moisés Díaz, Cristina Carmona-Duarte:
Physical Biometric Spoofing of 3D Dynamic On-Air Signature. 1-6 - Akarsh Ramachandra Hegde, Akash S, Adarsh Ishwar Hegde, Adarsh Nayak S. R, Mamatha H. R.:
Statistical and Deep Learning Approach for Kannada Parts of Speech Tagger. 1-7 - Sree Harsha Prada Peesapaty:
KILLS-1: An Analysis on the Present Security Trends and Proposal of a Multilingual Encryption Algorithm. 1-5 - Sagar Mohite, Swati Jadhav, Aayush Aggarwal, Ananya Shukla, Devashish Jain, Simran Jaiswal:
Insight Now: A Cross-Platform News Application for Real-Time and Personalized News Aggregation. 1-7 - Inakollu Shanmukha Srinu, Deepti Vidyarthi:
Classification of Malware Using Deep Learning: A Study. 1-6 - Sangita Patil, Shakti Mishra, Surendra Singh Kachhwaha:
Comparative Analysis of Nature Inspired Optimization Algorithms for Biodiesel Yield Prediction using Extreme Learning Machine. 1-5 - Yogesh Kisan Mali, Seema Arvind Darekar, Shravil Sopal, Mansi Kale, Vishakha Kshatriya, Atharva Palaskar:
Fault Detection of Underwater Cables by Using Robotic Operating System. 1-6 - Shivam Sharma, Rishi Raj Sharma:
Biometric Authentication from sEMG: Assessing the Potential of Adaptive Chirp Mode Decomposition. 1-6 - Nishad Khare, Sonali Bhutad:
Intrusion Detection System for Live Anomaly-Based Network Packets. 1-6 - Fabio Garzia, Francesco Borghini, Giorgia Modeo, Mario Epifani, Soodamani Ramalingam, Alberto Bruni:
Understanding Twitter Emojis for Sentiment Analysis and Risk Perception on Royal Palace of Naples, Italy. 1-6 - Kavitha J. C, D. Nagarajan:
Real Time Automated Sign Language Recognition and Transcription with Audio Feedback. 1-6 - Anubhav Yadav, Gaurav Baranwal:
A Study on Privacy-Preserving Auctions Considering Possible Collusions. 1-6 - Raju Patel, Manoj Singh Adhikari, Manoj Kumar Shukla, Mohit Payal, Palvai Manoj Kumar, Yogesh Kumar Verma:
Automatic Saline Monitoring System Using IoT. 1-4 - Miguel A. Ferrer, Moisés Díaz, Cristina Carmona-Duarte, Jose Juan Quintana:
3D Synthetic On-Air Signatures for Biometric Attack. 1-6 - Shreyas Thombare, Pankai Kumar, Raiashree Bhokare, Sachin Jadhav:
Intelligent IOT-based BMS for Integrated Solar with AC grid Fast Charging Systems in Electric Vehicles. 1-6 - Nidhi Jain, Prasadu Peddi:
Gender Classification Model based on the Resnet 152 Architecture. 1-7 - Aziz Makandar, Syeda Bibi Javeriya:
A Comparative Analysis of Image Enhancement Techniques For Improving Blurry Identity Images. 1-6 - Ashvini Chaudhari, Sweta Dargad, Yogesh Kisan Mali, Prasad Satish Dhend, Vaishnavi Adinath Hande, Shivanjali Surendra Bhilare:
A Technique for Maintaining Attribute-based Privacy Implementing Blockchain and Machine Learning. 1-4 - Yogesh Kisan Mali, Sweta Dargad, Asheesh Dixit, Nalini Tiwari, Sneha Narkhede, Ashvini Chaudhari:
The Utilization of Block-chain Innovation to Confirm KYC Records. 1-5 - Seema Arvind Darekar, Girish Patil, Nakul Pawar, Smita Jagdale, Nalini Tiwari, Akshada Padale:
A Protection Approach For Coal Miners Safety Helmet Using IoT. 1-5 - Amey Chavekar, Yasir Umair Mulla, Sushant Mane, Sunny Kumar, Faruk Kazi:
A Review of Drone Communication Protocols: Current Trends and Future Perspectives. 1-6 - Rohi Bindal, Aniruddha Yadav, Prajjwal Dewanzan, Aditya Shinde, Yuvraj Salaria, Shubhangi Deokar:
NodeMCU Based Weather Monitoring System. 1-6 - Mohanaprakash T. A, Kalaiyarasi R, Ramya. M, Vyshnavi K, Madhura Deventhiran, I. Jaichitra:
Evaluating Machine Learning Classifiers for Breast Cancer Diagnosis: A Comparative Study Using Accuracy Metrics. 1-6 - Yogesh Kisan Mali, Lakshmi Sharma, Krishnal Mahajan, Faizan Kazi, Probal Kar, Aman Bhogle:
Application of CNN Algorithm on X-Ray Images in COVID-19 Disease Prediction. 1-6 - Anas Husseis, Jose Luis Flores, Andrej Bregar, Giovanni Mazzeo, Luigi Coppolino:
Enhancing Cybersecurity Proactive Decision-Making Through Attack Tree Analysis and MITRE Framework. 1-5 - Kyle D'souza, Sia Viji Puthusseri, Aiden Gigi Samuel:
Scalable Federated Learning for Privacy-Preserving Credit Card Fraud Detection. 1-6 - R. V. Rohinth Ram, R. Meena Kaveri, P. Bhuvanesh, K. Mariammal:
FPGA Acceleration of Authenticated Encryption with PUF-Key. 1-8 - Sathishkannan P., Nikita Sarode, Sakshi Nimbalkar, Sanket S. Kalamkar, Rajesh K. Singh:
Null Broadening in A Wide Frequency Range Using Non-Uniform Amplitudes Antenna Array for Radar Applications. 1-5 - K. Sathyamoorthy, Mohanaprakash T. A, V. Vijayashanthi, S. M. Keerthana, Kanimozhi S, R. Vasanthi:
Comprehensive Review of Historical Analogies and Challenges in Lung Cancer Detection. 1-8 - Shravan Singh, Amey Chavekar, Sushant Mane, Faruk Kazi:
Exploring Chip-Off Firmware Extraction Techniques and Challenges: Case Studies in Smart Plugs. 1-6 - Shruti Tyagi, Shriya Pingulkar, Amaan Shaikh:
Comparative Evaluation of Machine Learning Models for Malicious URL Detection. 1-6 - Siddharth Bhorge, Harshal Daigavhane, Swarali Damle, Arya Chopda, Paras Buva:
3D Printed Terrain-Adaptive Wheels Based Rpi Surveillance Bot. 1-5 - Sahil Dhumale, Dhairya Ameria, Surendra Shukla:
Blockchain-Based Personalized Federated Learning Leveraging the SMPC protocol. 1-6 - Yash Watarkar, Avi Jain, Dipesh Shah, Aliasgar Thanawala, Aparna Kamble:
A New Wave in HDFS Data Security: Merging AES & MapReduce for Efficient Data Encryption. 1-5 - Anas Husseis, Jose Luis Flores:
A Practical Framework for Evaluating Cybersecurity Tools Leveraging the IEC62443 Standard. 1-5 - Marián Magdolen, Tomás Lovecek:
Legal Aspects of Monitoring and Tracking the Movement of Individuals Using Modern Technologies. 1-6 - Ankesh Khare, Manisha J. Nene:
A Comprehensive Survey on Artificial Intelligence Based Methods and Technologies Used to Detect Nutrition Level (Malnourishment). 1-6
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.