default search action
SSCC 2019: Trivandrum, India
- Sabu M. Thampi, Gregorio Martínez Pérez, Ryan K. L. Ko, Danda B. Rawat:
Security in Computing and Communications - 7th International Symposium, SSCC 2019, Trivandrum, India, December 18-21, 2019, Revised Selected Papers. Communications in Computer and Information Science 1208, Springer 2020, ISBN 978-981-15-4824-6 - A. S. Ajeena Beegom, Gayatri Ashok:
Malware Detection in Android Applications Using Integrated Static Features. 1-10 - Gaurav Sarraf, M. S. Swetha:
Intrusion Prediction and Detection with Deep Sequence Modeling. 11-25 - Divyans Mahansaria, Uttam Kumar Roy:
Secure Authentication Using One Time Contextual QR Code. 26-40 - Ghanshyam S. Bopche, Gopal N. Rai, D. R. Denslin Brabin, Babu M. Mehtre:
A Proximity-Based Measure for Quantifying the Risk of Vulnerabilities. 41-59 - Sampsa Rauti:
Man-in-the-browser Attack: A Case Study on Malicious Browser Extensions. 60-71 - Saeed Ibrahim, Nawwaf Al Herami, Ebrahim Al Naqbi, Monther Aldwairi:
Detection and Analysis of Drive-by Downloads and Malicious Websites. 72-86 - Faisal Alsakran, Gueltoum Bendiab, Stavros Shiaeles, Nicholas Kolokotronis:
Intrusion Detection Systems for Smart Home IoT Devices: Experimental Comparison Study. 87-98 - Houssem Mansouri, Al-Sakib Khan Pathan:
A Resilient Hierarchical Checkpointing Algorithm for Distributed Systems Running on Cluster Federation. 99-110 - S. Sriram, K. Simran, R. Vinayakumar, S. Akarsh, K. P. Soman:
Towards Evaluating the Robustness of Deep Intrusion Detection Models in Adversarial Environment. 111-120 - Rohini Bhosale, Madhumita Chatterjee:
Privacy Preserving Profile Matching in Mobile Social Networks: A Comprehensive Survey. 121-134 - K. Simran, Prathiksha Balakrishna, R. Vinayakumar, K. P. Soman:
Deep Learning Approach for Enhanced Cyber Threat Indicators in Twitter Stream. 135-145 - Abdulrahman Alruban, Muhammed Abduallah, Gueltoum Bendiab, Stavros Shiaeles, Marco Palomino:
Improving Sentiment Analysis of Arabic Tweets. 146-158 - Marco Castaldo, Aniello Castiglione, Barbara Masucci, Michele Nappi, Chiara Pero:
Energy Awareness and Secure Communication Protocols: The Era of Green Cybersecurity. 159-173 - Myriam Massardier-Meca, Antonio Ruiz-Martínez:
Towards a Privacy Web Scanner for End-Users. 174-185 - Anindita Banerjee:
Security of Quantum Cryptography. 186-197 - Nhlakanipho C. Fakude, Paul Tarwireyi, Matthew O. Adigun:
The Impact of a Security Model in a Fog Computing Environment. 198-212 - Paola Barra, Carmen Bisogni, Michele Nappi, David Freire-Obregón, Modesto Castrillón Santana:
Gotcha-I: A Multiview Human Videos Dataset. 213-224 - Tanja Hanauer, Wolfgang Hommel:
Enhancing Enterprise IT Security with a Visualization-Based Process Framework. 225-236 - Qasem Abu Al-Haija, Ibrahim Marouf, Mohammad M. Asad, Pankaj Mishra:
Pipelined Implementation of Millar-Rabin Primality Tester Using Altera FPGA Kit. 237-246 - M. Priyatharishini, M. Nirmala Devi:
Realization of Re-configurable True Random Number Generator on FPGA. 247-256 - Shailendra Kumar Tripathi, Bhupendra Gupta, K. K. Soundra Pandian, Yumnam Jayanta Singh:
Secret Image Sharing Scheme for Gray-Level Images Using Toeplitz Matrix Based Stream Cipher. 257-271 - Maria Pantopoulou, Nicolas Sklavos, Ivana Ognjanovic:
On the Hardware Implementation Performance, of Face Recognition Techniques, for Digital Forensics. 272-285 - Mohamed Ali Kazi, Steve Woodhead, Diane Gan:
Detecting the Zeus Banking Malware Using the Random Forest Binary Classification Algorithm and a Manual Feature Selection Process. 286-297 - Meenakshi Suresh, V. Anil Kumar, M. Sethumadhavan, P. P. Amritha:
Exploitation of HTTP/2 Proxies for Cryptojacking. 298-308 - Khaled A. Al-Thelaya, El-Sayed M. El-Alfy:
Android Malware Detector Based on Sequences of System Calls and Bidirectional Recurrent Networks. 309-321 - Abhishek Kumar, P. Syam Kumar:
Efficient Ciphertext Policy Attribute Based Encryption (ECP-ABE) for Data Deduplication in Cloud Storage. 322-334 - Sampsa Rauti:
Controlling Uncertainty with Proactive Cyber Defense: A Clausewitzian Perspective. 335-347 - Sampsa Rauti:
Protecting Computer Systems from Cyber Attacks with Internal Interface Diversification. 348-359 - Shreyas Sriram, Susheel Polani Sathishkumar, J. Bhuvana:
Braille Based Steganography System Using Dynamic Key Exchange. 360-373
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.