default search action
Deepak Subramanian
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2017
- [b1]Deepak Subramanian:
Information Flow Control for the Web Browser through a Mechanism of Split Addresses. (Contrôle du flux d'informations pour le navigateur Web via un mécanisme de séparation d'adressage). CentraleSupélec, Châtenay-Malabry, France, 2017 - 2016
- [c10]Deepak Subramanian, Guillaume Hiet, Christophe Bidan:
A Self-correcting Information Flow Control Model for the Web-Browser. FPS 2016: 285-301 - [c9]Willem De Groef, Deepak Subramanian, Martin Johns, Frank Piessens, Lieven Desmet:
Ensuring endpoint authenticity in WebRTC peer-to-peer communication. SAC 2016: 2103-2110 - [c8]Deepak Subramanian, Guillaume Hiet, Christophe Bidan:
Preventive information flow control through a mechanism of split addresses. SIN 2016: 1-8 - 2014
- [i1]Rajesh Sharma, Deepak Subramanian, Satish Narayana Srirama:
DAPriv: Decentralized architecture for preserving the privacy of medical data. CoRR abs/1410.5696 (2014) - 2012
- [c7]Kimiko Ryokai, Deepak Subramanian, Leslie Tom:
Mobile augmented reality learning tool to simulate experts' perspectives in the field. UbiComp 2012: 609-610 - 2011
- [j3]K. N. Magdoom, Deepak Subramanian, V. Srinivasa Chakravarthy, Balaraman Ravindran, Shun-ichi Amari, N. Meenakshisundaram:
Modeling Basal Ganglia for Understanding Parkinsonian Reaching Movements. Neural Comput. 23(2): 477-516 (2011) - [j2]Ravi Krishnan, Shivakesavan Ratnadurai, Deepak Subramanian, V. Srinivasa Chakravarthy, Maithreye Rengaswamy:
Modeling the role of basal ganglia in saccade generation: Is the indirect pathway the explorer? Neural Networks 24(8): 801-813 (2011) - 2010
- [j1]Peter K. K. Loh, Deepak Subramanian:
Fuzzy Classification Metrics for Scanner Assessment and Vulnerability Reporting. IEEE Trans. Inf. Forensics Secur. 5(4): 613-624 (2010) - [c6]Ha-Thanh Le, Deepak Subramanian, Wen-Jing Hsu, Peter Kok Keong Loh:
Scoring Web-Based Vulnerability Impact Using Property-Based Vulnerability Model. AINA Workshops 2010: 431-436 - [c5]Ravi Krishnan, Shivakesavan Ratnadurai, Deepak Subramanian, V. Srinivasa Chakravarthy:
A Model of Basal Ganglia in Saccade Generation. ICANN (1) 2010: 282-290 - [c4]Deepak Subramanian, Ha-Thanh Le, Peter Kok Keong Loh, Annamalai Benjamin Premkumar:
Quantitative Evaluation of Related Web-Based Vulnerabilities. SSIRI (Companion) 2010: 118-125 - [c3]Deepak Subramanian, Ha-Thanh Le, Peter Kok Keong Loh, Annamalai Benjamin Premkumar:
An empirical vulnerability remediation model. WCNIS 2010: 376-380
2000 – 2009
- 2009
- [c2]Ha-Thanh Le, Deepak Subramanian, Wen-Jing Hsu, Peter Kok Keong Loh:
An empirical property-based model for vulnerability analysis and evaluation. APSCC 2009: 40-45 - 2007
- [c1]Deepak Subramanian, V. Bharath Kumar:
"NetPhone"-Reintegrating the net phone. CrownCom 2007: 545-548
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:05 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint