default search action
5th SIN 2012: Jaipur, India
- Manoj Singh Gaur, Atilla Elçi, Oleg B. Makarevich, Mehmet A. Orgun, Virendra Singh:
5th International Conference of Security of Information and Networks, SIN '12, Jaipur, India, October 22 - 26, 2012. ACM 2012, ISBN 978-1-4503-1668-2 - Christophe Feltus, Eric Dubois, Erik Proper, Iver Band, Michaël Petit:
Enhancing the ArchiMate® standard with a responsibility modeling language for access rights management. 12-19 - Anjana V. Kumar, Kalpa Vishnani, K. Vinay Kumar:
Split personality malware detection and defeating in popular virtual machines. 20-26 - Dmitry Chernyavskiy, Natalia G. Miloslavskaya:
A concept of unification of network security policies. 27-32 - Luís Mendonça, Henrique Santos:
Botnets: a heuristic-based detection framework. 33-40 - Geong Sen Poh, Kok-Lim Alvin Yau, Mee Hong Ling:
Analysis of a secure cooperative channel sensing protocol for cognitive radio networks. 41-46 - Soumya Maity, Soumya Kanti Ghosh:
Enforcement of access control policy for mobile ad hoc networks. 47-52 - Jyoti Grover, Manoj Singh Gaur, Vijay Laxmi, Rakesh Kumar Tiwari:
Detection of incorrect position information using speed and time span verification in VANET. 53-59 - Herman Isa, Muhammad Reza Z'aba:
Randomness analysis on LED block ciphers. 60-66 - Chirag Modi, Dhiren R. Patel, Bhavesh Borisaniya, Avi Patel, Muttukrishnan Rajarajan:
A novel framework for intrusion detection in cloud. 67-74 - Eugene Tumoyan, Daria Kavchuk:
The method of optimizing the automatic vulnerability validation. 75-78 - Sajal Bhatia, Desmond Allan Schmidt, George M. Mohay:
Ensemble-based DDoS detection and mitigation model. 79-86 - Nilanjan Dey, Poulami Das, Sheli Sinha Chaudhuri, Achintya Das:
Feature analysis for the blind-watermarked electroencephalogram signal in wireless telemonitoring using Alattar's method. 87-94 - Ajay Chaudhary, Manoj Misra, Anjali Sardana:
An efficient fuzzy controller based technique for network traffic classification to improve QoS. 95-102 - Pawan Kumar, Virendra Singh:
Efficient regular expression pattern matching for network intrusion detection systems using modified word-based automata. 103-110 - Ksenia Tsyganok, Evgeny Tumoyan, Ludmila K. Babenko, Maxim Anikeev:
Classification of polymorphic and metamorphic malware samples based on their behavior. 111-116 - Priyanka Singh, Suneeta Agarwal:
A region specific robust watermarking scheme based on singular value decomposition. 117-123 - Valeriy O. Osipyan:
Building of alphabetic data protection cryptosystems on the base of equal power knapsacks with Diophantine problems. 124-129 - Parvez Faruki, Vijay Laxmi, Manoj Singh Gaur, P. Vinod:
Mining control flow graph as API call-grams to detect portable executable malware. 130-137 - Ludmila K. Babenko, Evgeniya Ishchukova, Ekaterina Maro:
Research about strength of GOST 28147-89 encryption algorithm. 138-142 - Debojit Boro, Bernard Nongpoh, Dhruba K. Bhattacharyya:
Anomaly based intrusion detection using meta ensemble classifier. 143-147 - Priyanka Loya, Alwyn Roshan Pais:
SIRIS: secure IRIS authentication system. 148-152 - Prerana Sharma, Devesh Mishra, Ankur Agarwal:
Efficient image encryption and decryption using discrete wavelet transform and fractional Fourier transform. 153-157 - Evgeny Sergeevich Abramov, Elena Barannik, Oleg B. Makarevich:
Methods of automated analysis of vendor specific implementation of stateful-filtration. 158-162 - Gunjan Bansal, Niteesh Kumar, Sukumar Nandi, Santosh Biswas:
Detection of NDP based attacks using MLD. 163-167 - Apurba Das, S. Kavitha:
Hybridization of DCTune and psycho-visual saliency model to improve security and capacity in DCT based image watermarking. 168-172 - Preety Singh, Vijay Laxmi, Manoj Singh Gaur:
Lip peripheral motion for visual surveillance. 173-177 - A. M. Chandrashekar, K. Raghuveer:
Fusion of multiple data mining techniques for effective network intrusion detection: a contemporary approach. 178-182 - Kunal Sain, Mradula Sharma, Suneeta Agarwal:
(Student contribution) ASPS: an authentication scheme using pre-formed visual cryptographic shares. 183-187 - Reena Gunjan, Vijay Laxmi, Manoj Singh Gaur:
Detection attack analysis using partial watermark in DCT domain. 188-192 - K. V. Arya, Hemant Kumar:
A clustering based algorithm for network intrusion detection. 193-196 - Hiroshi Tsunoda, Glenn Mansfield Keeni:
Security by simple network traffic monitoring. 201-204 - Behnam Rahnama, Atilla Elçi, Ibukun Eweoya:
Fine tuning the advanced encryption standard (AES). 205-209
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.