


default search action
Search dblp for Publications
export results for "toc:db/conf/iciss/iciss2020.bht:"
@inproceedings{DBLP:conf/iciss/BuiS20, author = {Thang Bui and Scott D. Stoller}, editor = {Salil S. Kanhere and Vishwas T. Patil and Shamik Sural and Manoj Singh Gaur}, title = {Learning Attribute-Based and Relationship-Based Access Control Policies with Unknown Values}, booktitle = {Information Systems Security - 16th International Conference, {ICISS} 2020, Jammu, India, December 16-20, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12553}, pages = {23--44}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-65610-2\_2}, doi = {10.1007/978-3-030-65610-2\_2}, timestamp = {Wed, 09 Dec 2020 17:00:36 +0100}, biburl = {https://dblp.org/rec/conf/iciss/BuiS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/ChouguleTL20, author = {Abhijeet Chougule and Harshal Tupsamudre and Sachin Lodha}, editor = {Salil S. Kanhere and Vishwas T. Patil and Shamik Sural and Manoj Singh Gaur}, title = {Revelio: {A} Lightweight Captcha Solver Using a Dictionary Based Approach}, booktitle = {Information Systems Security - 16th International Conference, {ICISS} 2020, Jammu, India, December 16-20, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12553}, pages = {97--116}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-65610-2\_7}, doi = {10.1007/978-3-030-65610-2\_7}, timestamp = {Wed, 09 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iciss/ChouguleTL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/DuttaK20, author = {Abir Dutta and Shri Kant}, editor = {Salil S. Kanhere and Vishwas T. Patil and Shamik Sural and Manoj Singh Gaur}, title = {An Overview of Cyber Threat Intelligence Platform and Role of Artificial Intelligence and Machine Learning}, booktitle = {Information Systems Security - 16th International Conference, {ICISS} 2020, Jammu, India, December 16-20, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12553}, pages = {81--86}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-65610-2\_5}, doi = {10.1007/978-3-030-65610-2\_5}, timestamp = {Wed, 09 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iciss/DuttaK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/DuttaSARS20, author = {Sabyasachi Dutta and Md Kutubuddin Sardar and Avishek Adhikari and Sushmita Ruj and Kouichi Sakurai}, editor = {Salil S. Kanhere and Vishwas T. Patil and Shamik Sural and Manoj Singh Gaur}, title = {Color Visual Cryptography Schemes Using Linear Algebraic Techniques over Rings}, booktitle = {Information Systems Security - 16th International Conference, {ICISS} 2020, Jammu, India, December 16-20, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12553}, pages = {198--217}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-65610-2\_13}, doi = {10.1007/978-3-030-65610-2\_13}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iciss/DuttaSARS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/GaoN20, author = {Yansong Gao and Surya Nepal}, editor = {Salil S. Kanhere and Vishwas T. Patil and Shamik Sural and Manoj Singh Gaur}, title = {A Defence Against Input-Agnostic Backdoor Attacks on Deep Neural Networks}, booktitle = {Information Systems Security - 16th International Conference, {ICISS} 2020, Jammu, India, December 16-20, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12553}, pages = {69--80}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-65610-2\_4}, doi = {10.1007/978-3-030-65610-2\_4}, timestamp = {Wed, 07 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iciss/GaoN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/GargB20, author = {Shivi Garg and Niyati Baliyan}, editor = {Salil S. Kanhere and Vishwas T. Patil and Shamik Sural and Manoj Singh Gaur}, title = {Machine Learning Based Android Vulnerability Detection: {A} Roadmap}, booktitle = {Information Systems Security - 16th International Conference, {ICISS} 2020, Jammu, India, December 16-20, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12553}, pages = {87--93}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-65610-2\_6}, doi = {10.1007/978-3-030-65610-2\_6}, timestamp = {Wed, 09 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iciss/GargB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/KumarKP20, author = {Sudesh Kumar and Lakshmi Jayant Kittur and Alwyn Roshan Pais}, editor = {Salil S. Kanhere and Vishwas T. Patil and Shamik Sural and Manoj Singh Gaur}, title = {Attacks on Android-Based Smartphones and Impact of Vendor Customization on Android {OS} Security}, booktitle = {Information Systems Security - 16th International Conference, {ICISS} 2020, Jammu, India, December 16-20, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12553}, pages = {241--252}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-65610-2\_15}, doi = {10.1007/978-3-030-65610-2\_15}, timestamp = {Thu, 17 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iciss/KumarKP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/LeszczynaL20, author = {Rafal Leszczyna and Adrian Litwin}, editor = {Salil S. Kanhere and Vishwas T. Patil and Shamik Sural and Manoj Singh Gaur}, title = {Estimating the Cost of Cybersecurity Activities with CAsPeA: {A} Case Study and Comparative Analysis}, booktitle = {Information Systems Security - 16th International Conference, {ICISS} 2020, Jammu, India, December 16-20, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12553}, pages = {267--287}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-65610-2\_17}, doi = {10.1007/978-3-030-65610-2\_17}, timestamp = {Thu, 17 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iciss/LeszczynaL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/MishraS20, author = {Saurabh Mishra and Debanjan Sadhya}, editor = {Salil S. Kanhere and Vishwas T. Patil and Shamik Sural and Manoj Singh Gaur}, title = {LiARX: {A} Lightweight Cipher Based on the {LTS} Design Strategy of {ARX}}, booktitle = {Information Systems Security - 16th International Conference, {ICISS} 2020, Jammu, India, December 16-20, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12553}, pages = {185--197}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-65610-2\_12}, doi = {10.1007/978-3-030-65610-2\_12}, timestamp = {Thu, 17 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iciss/MishraS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/MondalPKN20, author = {Sobhan Mondal and Deependra Pushkar and Mrinali Kumari and Ruchira Naskar}, editor = {Salil S. Kanhere and Vishwas T. Patil and Shamik Sural and Manoj Singh Gaur}, title = {Forensic Source Identification of {OSN} Compressed Images}, booktitle = {Information Systems Security - 16th International Conference, {ICISS} 2020, Jammu, India, December 16-20, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12553}, pages = {160--166}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-65610-2\_10}, doi = {10.1007/978-3-030-65610-2\_10}, timestamp = {Wed, 09 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iciss/MondalPKN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/PiroccaAZ20, author = {Simone Pirocca and Luca Allodi and Nicola Zannone}, editor = {Salil S. Kanhere and Vishwas T. Patil and Shamik Sural and Manoj Singh Gaur}, title = {A Toolkit for Security Awareness Training Against Targeted Phishing}, booktitle = {Information Systems Security - 16th International Conference, {ICISS} 2020, Jammu, India, December 16-20, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12553}, pages = {137--159}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-65610-2\_9}, doi = {10.1007/978-3-030-65610-2\_9}, timestamp = {Thu, 17 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iciss/PiroccaAZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/PramanikD0A20, author = {Jyotirmoy Pramanik and Sabyasachi Dutta and Partha Sarathi Roy and Avishek Adhikari}, editor = {Salil S. Kanhere and Vishwas T. Patil and Shamik Sural and Manoj Singh Gaur}, title = {Cheating Detectable Ramp Secret Sharing with Optimal Cheating Resiliency}, booktitle = {Information Systems Security - 16th International Conference, {ICISS} 2020, Jammu, India, December 16-20, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12553}, pages = {169--184}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-65610-2\_11}, doi = {10.1007/978-3-030-65610-2\_11}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iciss/PramanikD0A20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/ShahN20, author = {Ryan Shah and Shishir Nagaraja}, editor = {Salil S. Kanhere and Vishwas T. Patil and Shamik Sural and Manoj Singh Gaur}, title = {A Unified Access Control Model for Calibration Traceability in Safety-Critical IoT}, booktitle = {Information Systems Security - 16th International Conference, {ICISS} 2020, Jammu, India, December 16-20, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12553}, pages = {3--22}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-65610-2\_1}, doi = {10.1007/978-3-030-65610-2\_1}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iciss/ShahN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/TanakaF20, author = {Hidema Tanaka and Keisuke Fukushima}, editor = {Salil S. Kanhere and Vishwas T. Patil and Shamik Sural and Manoj Singh Gaur}, title = {Secure Calculation for Position Information of IoT Device with Few Communication and Small Secret Information}, booktitle = {Information Systems Security - 16th International Conference, {ICISS} 2020, Jammu, India, December 16-20, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12553}, pages = {221--240}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-65610-2\_14}, doi = {10.1007/978-3-030-65610-2\_14}, timestamp = {Wed, 09 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iciss/TanakaF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/Theuermann20, author = {Kevin Theuermann}, editor = {Salil S. Kanhere and Vishwas T. Patil and Shamik Sural and Manoj Singh Gaur}, title = {Reliability and Security for Safety-Critical Service Compositions}, booktitle = {Information Systems Security - 16th International Conference, {ICISS} 2020, Jammu, India, December 16-20, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12553}, pages = {45--65}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-65610-2\_3}, doi = {10.1007/978-3-030-65610-2\_3}, timestamp = {Wed, 09 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iciss/Theuermann20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/UplavikarV0J20, author = {Nitish M. Uplavikar and Jaideep Vaidya and Dan Lin and Wei Jiang}, editor = {Salil S. Kanhere and Vishwas T. Patil and Shamik Sural and Manoj Singh Gaur}, title = {Privacy-Preserving Friend Recommendation in an Integrated Social Environment}, booktitle = {Information Systems Security - 16th International Conference, {ICISS} 2020, Jammu, India, December 16-20, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12553}, pages = {117--136}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-65610-2\_8}, doi = {10.1007/978-3-030-65610-2\_8}, timestamp = {Wed, 09 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iciss/UplavikarV0J20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/VermaMS20, author = {Vinita Verma and Sunil Kumar Muttoo and V. B. Singh}, editor = {Salil S. Kanhere and Vishwas T. Patil and Shamik Sural and Manoj Singh Gaur}, title = {Detection of Malign and Benign {PE} Files Using Texture Analysis}, booktitle = {Information Systems Security - 16th International Conference, {ICISS} 2020, Jammu, India, December 16-20, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12553}, pages = {253--266}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-65610-2\_16}, doi = {10.1007/978-3-030-65610-2\_16}, timestamp = {Tue, 03 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iciss/VermaMS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/iciss/2020, editor = {Salil S. Kanhere and Vishwas T. Patil and Shamik Sural and Manoj Singh Gaur}, title = {Information Systems Security - 16th International Conference, {ICISS} 2020, Jammu, India, December 16-20, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12553}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-65610-2}, doi = {10.1007/978-3-030-65610-2}, isbn = {978-3-030-65609-6}, timestamp = {Wed, 09 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iciss/2020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.