default search action
SSCC 2017: Manipal, India
- Sabu M. Thampi, Gregorio Martínez Pérez, Carlos Becker Westphall, Jiankun Hu, Chun I. Fan, Félix Gómez Mármol:
Security in Computing and Communications - 5th International Symposium, SSCC 2017, Manipal, India, September 13-16, 2017, Proceedings. Communications in Computer and Information Science 746, Springer 2017, ISBN 978-981-10-6897-3 - M. Akhil Jabbar, Ghanshyam S. Bopche, Bulusu Lakshmana Deekshatulu, Babu M. Mehtre:
Diversity-aware, Cost-effective Network Security Hardening Using Attack Graph. 1-15 - Apurva S. Kittur, Ashu Jain, Alwyn Roshan Pais:
Fast Verification of Digital Signatures in IoT. 16-27 - N. B. Gayathri, R. R. V. Krishna Rao, Punugu Vasudeva Reddy:
Efficient and Provably Secure Pairing Free ID-Based Directed Signature Scheme. 28-38 - Anup Kumar Maurya, V. N. Sastry:
User Authentication Scheme for Wireless Sensor Networks and Internet of Things Using LU Decomposition. 39-53 - Ramesh Kalpika, A. R. Vasudevan:
Detection of Zeus Bot Based on Host and Network Activities. 54-64 - Sandipan Biswas, Pampa Sadhukhan, Sarmistha Neogy:
An Asymmetric Key Based Efficient Authentication Mechanism for Proxy Mobile IPv6 Networks. 65-78 - Anup Kumar Maurya, V. N. Sastry:
User Authentication Scheme for Wireless Sensor Networks and Internet of Things Using Chinese Remainder Theorem. 79-94 - Sarvesh V. Sawant, Gaurav Pareek, B. R. Purushothama:
A Ringer-Based Throttling Approach to Mitigate DDoS Attacks. 95-108 - Divya Chaudhary, Bijendra Kumar, Rahul Khanna:
NPSO Based Cost Optimization for Load Scheduling in Cloud Computing. 109-121 - Alok Kumar, Alwyn Roshan Pais:
Multi-sink En-Route Filtering Mechanism for Wireless Sensor Networks. 122-133 - Amit Mali, Anant V. Nimkar:
Security Schemes for Constrained Application Protocol in IoT: A Precise Survey. 134-145 - R. Krithika, Ashok Kumar Mohan, M. Sethumadhavan:
Jordan Center Segregation: Rumors in Social Media Networks. 146-158 - T. Nathezhtha, Vaidehi V.:
Honeyword with Salt-Chlorine Generator to Enhance Security of Cloud User Credentials. 159-169 - Manjula C. Belavagi, Balachandra Muniyal:
Multi Class Machine Learning Algorithms for Intrusion Detection - A Performance Study. 170-178 - Bruhadeshwar Bezawada, Kishore Kothapalli, Raman Dugyala, Rui Li:
Symmetric Key Based Secure Resource Sharing. 179-194 - K. R. Atul, K. P. Jevitha:
Prevention of PAC File Based Attack Using DHCP Snooping. 195-204 - S. Lakshmi, Chungath Srinivasan, K. V. Lakshmy, M. Sindhu:
A Quasigroup Based Synchronous Stream Cipher for Lightweight Applications. 205-214 - B. R. Purushothama, Arun Prakash Verma, Abhilash Kumar:
Security Analysis of Key Management Schemes Based on Chinese Remainder Theorem Under Strong Active Outsider Adversary Model. 215-225 - R. K. Rahul, Anjali T, Vijay Krishna Menon, K. P. Soman:
Deep Learning for Network Flow Analysis and Malware Classification. 226-235 - Ajay Anto, Routhu Srinivasa Rao, Alwyn Roshan Pais:
Kernel Modification APT Attack Detection in Android. 236-249 - R. Krishna Ram Prakash, P. P. Amritha, M. Sethumadhavan:
Opaque Predicate Detection by Static Analysis of Binary Executables. 250-258 - Yassine Lemmou, El Mamoun Souidi:
An Overview on Spora Ransomware. 259-275 - Annu Roy, J. P. Anita:
Pattern Generation and Test Compression Using PRESTO Generator. 276-285 - Sudip Hazra, Prabhaker Mateti:
Challenges in Android Forensics. 286-299 - William P. Maia, Edward D. Moreno:
Current Consumption Analysis of AES and PRESENT Encryption Algorithms in FPGA Using the Welch Method. 300-311 - Suvarna Kothari, Hitesh Hasija:
Spiral Model for Digital Forensics Investigation. 312-324 - Chaitanya Bapat, Ganesh Baleri, Shivani Inamdar, Anant V. Nimkar:
Smart-Lock Security Re-engineered Using Cryptography and Steganography. 325-336 - Karthik M. Rao, P. S. Aiyyappan, Prabhaker Mateti:
Adding Continuous Proactive Forensics to Android. 337-349 - Vivek Parikh, Prabhaker Mateti:
ASLR and ROP Attack Mitigations for ARM-Based Android Devices. 350-363 - Sudakshina Singha Roy, K. P. Jevitha:
CBEAT: Chrome Browser Extension Analysis Tool. 364-378 - K. Atchuta Sashank, Hari Sivarami Reddy, P. Pavithran, M. S. Akash, M. Nirmala Devi:
Hardware Trojan Detection Using Effective Test Patterns and Selective Segmentation. 379-386 - J. Ramnarayan, J. P. Anita, P. Sudheesh:
Estimation and Tracking of a Ballistic Target Using Sequential Importance Sampling Method. 387-398 - Kanakkath Praveen, G. Indu, R. Santhya, M. Sethumadhavan:
An Android Application for Secret Image Sharing with Cloud Storage. 399-410 - M. Nishanth, J. P. Anita, P. Sudheesh:
Tracking of GPS Parameters Using Particle Filter. 411-421
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.