Search dblp for Publications

export results for "toc:db/conf/iciss/iciss2020.bht:"

 download as .bib file

@inproceedings{DBLP:conf/iciss/BuiS20,
  author       = {Thang Bui and
                  Scott D. Stoller},
  editor       = {Salil S. Kanhere and
                  Vishwas T. Patil and
                  Shamik Sural and
                  Manoj Singh Gaur},
  title        = {Learning Attribute-Based and Relationship-Based Access Control Policies
                  with Unknown Values},
  booktitle    = {Information Systems Security - 16th International Conference, {ICISS}
                  2020, Jammu, India, December 16-20, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12553},
  pages        = {23--44},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-65610-2\_2},
  doi          = {10.1007/978-3-030-65610-2\_2},
  timestamp    = {Wed, 09 Dec 2020 17:00:36 +0100},
  biburl       = {https://dblp.org/rec/conf/iciss/BuiS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/ChouguleTL20,
  author       = {Abhijeet Chougule and
                  Harshal Tupsamudre and
                  Sachin Lodha},
  editor       = {Salil S. Kanhere and
                  Vishwas T. Patil and
                  Shamik Sural and
                  Manoj Singh Gaur},
  title        = {Revelio: {A} Lightweight Captcha Solver Using a Dictionary Based Approach},
  booktitle    = {Information Systems Security - 16th International Conference, {ICISS}
                  2020, Jammu, India, December 16-20, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12553},
  pages        = {97--116},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-65610-2\_7},
  doi          = {10.1007/978-3-030-65610-2\_7},
  timestamp    = {Wed, 09 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iciss/ChouguleTL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/DuttaK20,
  author       = {Abir Dutta and
                  Shri Kant},
  editor       = {Salil S. Kanhere and
                  Vishwas T. Patil and
                  Shamik Sural and
                  Manoj Singh Gaur},
  title        = {An Overview of Cyber Threat Intelligence Platform and Role of Artificial
                  Intelligence and Machine Learning},
  booktitle    = {Information Systems Security - 16th International Conference, {ICISS}
                  2020, Jammu, India, December 16-20, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12553},
  pages        = {81--86},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-65610-2\_5},
  doi          = {10.1007/978-3-030-65610-2\_5},
  timestamp    = {Wed, 09 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iciss/DuttaK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/DuttaSARS20,
  author       = {Sabyasachi Dutta and
                  Md Kutubuddin Sardar and
                  Avishek Adhikari and
                  Sushmita Ruj and
                  Kouichi Sakurai},
  editor       = {Salil S. Kanhere and
                  Vishwas T. Patil and
                  Shamik Sural and
                  Manoj Singh Gaur},
  title        = {Color Visual Cryptography Schemes Using Linear Algebraic Techniques
                  over Rings},
  booktitle    = {Information Systems Security - 16th International Conference, {ICISS}
                  2020, Jammu, India, December 16-20, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12553},
  pages        = {198--217},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-65610-2\_13},
  doi          = {10.1007/978-3-030-65610-2\_13},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iciss/DuttaSARS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/GaoN20,
  author       = {Yansong Gao and
                  Surya Nepal},
  editor       = {Salil S. Kanhere and
                  Vishwas T. Patil and
                  Shamik Sural and
                  Manoj Singh Gaur},
  title        = {A Defence Against Input-Agnostic Backdoor Attacks on Deep Neural Networks},
  booktitle    = {Information Systems Security - 16th International Conference, {ICISS}
                  2020, Jammu, India, December 16-20, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12553},
  pages        = {69--80},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-65610-2\_4},
  doi          = {10.1007/978-3-030-65610-2\_4},
  timestamp    = {Wed, 07 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iciss/GaoN20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/GargB20,
  author       = {Shivi Garg and
                  Niyati Baliyan},
  editor       = {Salil S. Kanhere and
                  Vishwas T. Patil and
                  Shamik Sural and
                  Manoj Singh Gaur},
  title        = {Machine Learning Based Android Vulnerability Detection: {A} Roadmap},
  booktitle    = {Information Systems Security - 16th International Conference, {ICISS}
                  2020, Jammu, India, December 16-20, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12553},
  pages        = {87--93},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-65610-2\_6},
  doi          = {10.1007/978-3-030-65610-2\_6},
  timestamp    = {Wed, 09 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iciss/GargB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/KumarKP20,
  author       = {Sudesh Kumar and
                  Lakshmi Jayant Kittur and
                  Alwyn Roshan Pais},
  editor       = {Salil S. Kanhere and
                  Vishwas T. Patil and
                  Shamik Sural and
                  Manoj Singh Gaur},
  title        = {Attacks on Android-Based Smartphones and Impact of Vendor Customization
                  on Android {OS} Security},
  booktitle    = {Information Systems Security - 16th International Conference, {ICISS}
                  2020, Jammu, India, December 16-20, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12553},
  pages        = {241--252},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-65610-2\_15},
  doi          = {10.1007/978-3-030-65610-2\_15},
  timestamp    = {Thu, 17 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iciss/KumarKP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/LeszczynaL20,
  author       = {Rafal Leszczyna and
                  Adrian Litwin},
  editor       = {Salil S. Kanhere and
                  Vishwas T. Patil and
                  Shamik Sural and
                  Manoj Singh Gaur},
  title        = {Estimating the Cost of Cybersecurity Activities with CAsPeA: {A} Case
                  Study and Comparative Analysis},
  booktitle    = {Information Systems Security - 16th International Conference, {ICISS}
                  2020, Jammu, India, December 16-20, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12553},
  pages        = {267--287},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-65610-2\_17},
  doi          = {10.1007/978-3-030-65610-2\_17},
  timestamp    = {Thu, 17 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iciss/LeszczynaL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/MishraS20,
  author       = {Saurabh Mishra and
                  Debanjan Sadhya},
  editor       = {Salil S. Kanhere and
                  Vishwas T. Patil and
                  Shamik Sural and
                  Manoj Singh Gaur},
  title        = {LiARX: {A} Lightweight Cipher Based on the {LTS} Design Strategy of
                  {ARX}},
  booktitle    = {Information Systems Security - 16th International Conference, {ICISS}
                  2020, Jammu, India, December 16-20, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12553},
  pages        = {185--197},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-65610-2\_12},
  doi          = {10.1007/978-3-030-65610-2\_12},
  timestamp    = {Thu, 17 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iciss/MishraS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/MondalPKN20,
  author       = {Sobhan Mondal and
                  Deependra Pushkar and
                  Mrinali Kumari and
                  Ruchira Naskar},
  editor       = {Salil S. Kanhere and
                  Vishwas T. Patil and
                  Shamik Sural and
                  Manoj Singh Gaur},
  title        = {Forensic Source Identification of {OSN} Compressed Images},
  booktitle    = {Information Systems Security - 16th International Conference, {ICISS}
                  2020, Jammu, India, December 16-20, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12553},
  pages        = {160--166},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-65610-2\_10},
  doi          = {10.1007/978-3-030-65610-2\_10},
  timestamp    = {Wed, 09 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iciss/MondalPKN20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/PiroccaAZ20,
  author       = {Simone Pirocca and
                  Luca Allodi and
                  Nicola Zannone},
  editor       = {Salil S. Kanhere and
                  Vishwas T. Patil and
                  Shamik Sural and
                  Manoj Singh Gaur},
  title        = {A Toolkit for Security Awareness Training Against Targeted Phishing},
  booktitle    = {Information Systems Security - 16th International Conference, {ICISS}
                  2020, Jammu, India, December 16-20, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12553},
  pages        = {137--159},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-65610-2\_9},
  doi          = {10.1007/978-3-030-65610-2\_9},
  timestamp    = {Thu, 17 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iciss/PiroccaAZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/PramanikD0A20,
  author       = {Jyotirmoy Pramanik and
                  Sabyasachi Dutta and
                  Partha Sarathi Roy and
                  Avishek Adhikari},
  editor       = {Salil S. Kanhere and
                  Vishwas T. Patil and
                  Shamik Sural and
                  Manoj Singh Gaur},
  title        = {Cheating Detectable Ramp Secret Sharing with Optimal Cheating Resiliency},
  booktitle    = {Information Systems Security - 16th International Conference, {ICISS}
                  2020, Jammu, India, December 16-20, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12553},
  pages        = {169--184},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-65610-2\_11},
  doi          = {10.1007/978-3-030-65610-2\_11},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iciss/PramanikD0A20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/ShahN20,
  author       = {Ryan Shah and
                  Shishir Nagaraja},
  editor       = {Salil S. Kanhere and
                  Vishwas T. Patil and
                  Shamik Sural and
                  Manoj Singh Gaur},
  title        = {A Unified Access Control Model for Calibration Traceability in Safety-Critical
                  IoT},
  booktitle    = {Information Systems Security - 16th International Conference, {ICISS}
                  2020, Jammu, India, December 16-20, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12553},
  pages        = {3--22},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-65610-2\_1},
  doi          = {10.1007/978-3-030-65610-2\_1},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iciss/ShahN20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/TanakaF20,
  author       = {Hidema Tanaka and
                  Keisuke Fukushima},
  editor       = {Salil S. Kanhere and
                  Vishwas T. Patil and
                  Shamik Sural and
                  Manoj Singh Gaur},
  title        = {Secure Calculation for Position Information of IoT Device with Few
                  Communication and Small Secret Information},
  booktitle    = {Information Systems Security - 16th International Conference, {ICISS}
                  2020, Jammu, India, December 16-20, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12553},
  pages        = {221--240},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-65610-2\_14},
  doi          = {10.1007/978-3-030-65610-2\_14},
  timestamp    = {Wed, 09 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iciss/TanakaF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/Theuermann20,
  author       = {Kevin Theuermann},
  editor       = {Salil S. Kanhere and
                  Vishwas T. Patil and
                  Shamik Sural and
                  Manoj Singh Gaur},
  title        = {Reliability and Security for Safety-Critical Service Compositions},
  booktitle    = {Information Systems Security - 16th International Conference, {ICISS}
                  2020, Jammu, India, December 16-20, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12553},
  pages        = {45--65},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-65610-2\_3},
  doi          = {10.1007/978-3-030-65610-2\_3},
  timestamp    = {Wed, 09 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iciss/Theuermann20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/UplavikarV0J20,
  author       = {Nitish M. Uplavikar and
                  Jaideep Vaidya and
                  Dan Lin and
                  Wei Jiang},
  editor       = {Salil S. Kanhere and
                  Vishwas T. Patil and
                  Shamik Sural and
                  Manoj Singh Gaur},
  title        = {Privacy-Preserving Friend Recommendation in an Integrated Social Environment},
  booktitle    = {Information Systems Security - 16th International Conference, {ICISS}
                  2020, Jammu, India, December 16-20, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12553},
  pages        = {117--136},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-65610-2\_8},
  doi          = {10.1007/978-3-030-65610-2\_8},
  timestamp    = {Wed, 09 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iciss/UplavikarV0J20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/VermaMS20,
  author       = {Vinita Verma and
                  Sunil Kumar Muttoo and
                  V. B. Singh},
  editor       = {Salil S. Kanhere and
                  Vishwas T. Patil and
                  Shamik Sural and
                  Manoj Singh Gaur},
  title        = {Detection of Malign and Benign {PE} Files Using Texture Analysis},
  booktitle    = {Information Systems Security - 16th International Conference, {ICISS}
                  2020, Jammu, India, December 16-20, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12553},
  pages        = {253--266},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-65610-2\_16},
  doi          = {10.1007/978-3-030-65610-2\_16},
  timestamp    = {Tue, 03 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iciss/VermaMS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iciss/2020,
  editor       = {Salil S. Kanhere and
                  Vishwas T. Patil and
                  Shamik Sural and
                  Manoj Singh Gaur},
  title        = {Information Systems Security - 16th International Conference, {ICISS}
                  2020, Jammu, India, December 16-20, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12553},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-65610-2},
  doi          = {10.1007/978-3-030-65610-2},
  isbn         = {978-3-030-65609-6},
  timestamp    = {Wed, 09 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iciss/2020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}