default search action
Avinash Srinivasan
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j15]Avinash Srinivasan, Christian Rose, Jie Wu:
slackFS - resilient and persistent information hiding framework. Int. J. Secur. Networks 19(2): 77-91 (2024) - [j14]Nadia Niknami, Avinash Srinivasan, Jie Wu:
Cyber-AnDe: Cybersecurity Framework With Adaptive Distributed Sampling for Anomaly Detection on SDNs. IEEE Trans. Inf. Forensics Secur. 19: 9245-9257 (2024) - [c24]Avinash Srinivasan, Gordon Morewood, Kellie Simmons-Massey, Yanhua Li:
SAFE-CARE: Reversible Privacy-preserving Physician Feedback Framework to Improve Patient Care Quality. CyberC 2024: 131-138 - 2023
- [j13]Nadia Niknami, Avinash Srinivasan, Ken St. Germain, Jie Wu:
Maritime Communications - Current State and the Future Potential with SDN and SDR. Network 3(4): 563-584 (2023) - 2022
- [c23]Avinash Srinivasan, Brenton Pieper:
Steganography With FileSystem-in-SlackSpace. NAS 2022: 1-4
2010 – 2019
- 2019
- [j12]Avinash Srinivasan, Hatoon Aldharrab:
XTRA - eXtended bit-Torrent pRotocol for Authenticated covert peer communication - Authenticated covert P2P communication. Peer-to-Peer Netw. Appl. 12(1): 143-157 (2019) - 2018
- [j11]Avinash Srinivasan, Jie Wu:
VOUCH-AP: privacy preserving open-access 802.11 public hotspot AP authentication mechanism with co-located evil-twins. Int. J. Secur. Networks 13(3): 153-168 (2018) - 2017
- [j10]Qin Liu, Avinash Srinivasan, Jiankun Hu, Guojun Wang:
Preface: Security and privacy in big data clouds. Future Gener. Comput. Syst. 72: 206-207 (2017) - [j9]Avinash Srinivasan, Jie Wu, Justin Y. Shi:
Secure android covert channel with robust survivability to service provider restrictions. Int. J. Secur. Networks 12(1): 27-39 (2017) - [j8]Avinash Srinivasan, Hunter Dong:
SURE-FIT - SecURE and AdaptiveFramework for Information Hidingwith Fault-Tolerance. J. Cyber Secur. Mobil. 6(4): 427-456 (2017) - [c22]Avinash Srinivasan, Hunter Dong, Angelos Stavrou:
FROST: Anti-Forensics Digital-Dead-DROp Information Hiding RobuST to Detection & Data Loss with Fault tolerance. ARES 2017: 82:1-82:8 - [c21]Bander Alsulami, Avinash Srinivasan, Hunter Dong, Spiros Mancoridis:
Lightweight behavioral malware detection for windows platforms. MALWARE 2017: 75-81 - 2016
- [c20]Wei Zhang, Siwang Zhou, Avinash Srinivasan, Jie Wu, Yaping Lin:
Detecting Attacks Smartly in Vehicle Cloud Computing. UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld 2016: 245-252 - 2015
- [j7]Avinash Srinivasan, Jie Wu, Justin Y. Shi:
Android-Stego: A Novel Service Provider Imperceptible MMS Steganography Technique Robust to Message Loss. EAI Endorsed Trans. Ambient Syst. 2(5): e2 (2015) - [c19]Avinash Srinivasan, Anthony Nguyen, Robert Tarlecki:
STUMP - STalling offline password attacks Using pre-hash ManiPulations. ICPADS 2015: 306-313 - 2014
- [c18]Avinash Srinivasan, Jie Wu, Wen Zhu:
SAFE: Secure and Big Data-Adaptive Framework for Efficient Cross-Domain Communication. PSBD@CIKM 2014: 19-28 - [c17]Wen Zhu, Lowell Vizenor, Avinash Srinivasan:
Towards a Reference Architecture for Service-Oriented Cross Domain Security Infrastructures. IDCS 2014: 275-284 - 2013
- [j6]Avinash Srinivasan, Satish Kolli, Jie Wu:
Steganographic information hiding that exploits a novel file system vulnerability. Int. J. Secur. Networks 8(2): 82-93 (2013) - [c16]Avinash Srinivasan, Srinath Thirthahalli Nazaraj, Angelos Stavrou:
HIDEINSIDE - A novel randomized & encrypted antiforensic information hiding. ICNC 2013: 626-631 - [c15]Hari Kalva, Anish Parikh, Avinash Srinivasan:
Accelerating video carving from unallocated space. Media Watermarking, Security, and Forensics 2013: 86650H - 2012
- [j5]Feng Li, Jie Wu, Avinash Srinivasan:
Uncertainty Mitigation for Trustworthiness-Oriented Applications in Wireless Ad Hoc Networks. IEICE Trans. Inf. Syst. 95-D(1): 12-19 (2012) - [c14]Avinash Srinivasan, Jie Wu:
SafeCode - Safeguarding Security and Privacy of User Data on Stolen iOS Devices. CSS 2012: 11-20 - [c13]Avinash Srinivasan, Lashidhar Chennupati:
Robust Authentication of Public Access Points Using Digital Certificates - A Novel Approach. CSS 2012: 153-164 - [c12]Mohammed Alhussein, Avinash Srinivasan, Duminda Wijesekera:
Forensics filesystem with cluster-level identifiers for efficient data recovery. ICITST 2012: 411-415 - [c11]Jeffrey Medsger, Avinash Srinivasan:
ERASE- entropy-based sanitization of sensitive data for privacy preservation. ICITST 2012: 427-432 - [c10]John Spaulding, Alyssa Krauss, Avinash Srinivasan:
Exploring an open WiFi detection vulnerability as a malware attack vector on iOS devices. MALWARE 2012: 87-93 - 2011
- [j4]Avinash Srinivasan:
SecLoc - secure localization in WSNs using CDS. Secur. Commun. Networks 4(7): 763-770 (2011) - [c9]Avinash Srinivasan, Jie Wu:
Duplicate File Names-A Novel Steganographic Data Hiding Technique. ACC (4) 2011: 260-268 - 2010
- [c8]Kuldeep Yadav, Avinash Srinivasan:
iTrust: an integrated trust framework for wireless sensor networks. SAC 2010: 1466-1471 - [c7]Telidevara Aditya, Venkatachalam Chandrasekaran, Avinash Srinivasan, Ravi Mukkamala, Sandeep Gampa:
Similarity coefficient generators for network forensics. WIFS 2010: 1-6
2000 – 2009
- 2009
- [j3]Avinash Srinivasan, Jie Wu:
Secure and reliable broadcasting in wireless sensor networks using multi-parent trees. Secur. Commun. Networks 2(3): 239-253 (2009) - [c6]Ravi Thanawala, Jie Wu, Avinash Srinivasan:
Efficient Resource Discovery in Mobile Ad Hoc Networks. ICC 2009: 1-5 - 2008
- [b1]Avinash Srinivasan:
Reputation and trust-based security in wireless sensor networks. Florida Atlantic University, Boca Raton, FL, USA, 2008 - [j2]Feng Li, Avinash Srinivasan, Jie Wu:
PVFS: A Probabilistic Voting-based Filtering Scheme in Wireless Sensor Networks. Int. J. Secur. Networks 3(3): 173-182 (2008) - [j1]Avinash Srinivasan, Feng Li, Jie Wu, Minglu Li:
Clique-based group key assignment in Wireless Sensor Networks. Int. J. Secur. Networks 3(4): 226-239 (2008) - [c5]Avinash Srinivasan, Jie Wu:
TRACK: A Novel Connected Dominating Set based Sink Mobility Model for WSNs. ICCCN 2008: 664-671 - [c4]Avinash Srinivasan, Feng Li, Jie Wu:
A Novel CDS-Based Reputation Monitoring System for Wireless Sensor Networks. ICDCS Workshops 2008: 364-369 - [r1]Avinash Srinivasan, Jie Wu:
Wireless Sensor Networks (WSNs): Secure Localization. Encyclopedia of Wireless and Mobile Communications 2008 - 2007
- [c3]Feng Li, Avinash Srinivasan, Mingming Lu, Jie Wu:
Uncertainty Mitigation for Utility-Oriented Routing in Wireless Ad Hoc Networks. GLOBECOM 2007: 427-431 - [c2]Avinash Srinivasan, Jie Wu:
A Novel k-Parent Flooding Tree for Secure and Reliable Broadcasting in Sensor Networks. ICC 2007: 1497-1502 - 2006
- [c1]Avinash Srinivasan, Joshua Teitelbaum, Jie Wu:
DRBTS: Distributed Reputation-based Beacon Trust System. DASC 2006: 277-283
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 23:59 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint