


default search action
16th ICISS 2020: Jammu, India
- Salil S. Kanhere, Vishwas T. Patil, Shamik Sural, Manoj Singh Gaur:

Information Systems Security - 16th International Conference, ICISS 2020, Jammu, India, December 16-20, 2020, Proceedings. Lecture Notes in Computer Science 12553, Springer 2020, ISBN 978-3-030-65609-6
Access Control
- Ryan Shah

, Shishir Nagaraja:
A Unified Access Control Model for Calibration Traceability in Safety-Critical IoT. 3-22 - Thang Bui, Scott D. Stoller:

Learning Attribute-Based and Relationship-Based Access Control Policies with Unknown Values. 23-44 - Kevin Theuermann:

Reliability and Security for Safety-Critical Service Compositions. 45-65
AI/ML in Security
- Yansong Gao

, Surya Nepal
:
A Defence Against Input-Agnostic Backdoor Attacks on Deep Neural Networks. 69-80 - Abir Dutta, Shri Kant:

An Overview of Cyber Threat Intelligence Platform and Role of Artificial Intelligence and Machine Learning. 81-86 - Shivi Garg, Niyati Baliyan

:
Machine Learning Based Android Vulnerability Detection: A Roadmap. 87-93
Privacy and Web Security
- Abhijeet Chougule, Harshal Tupsamudre, Sachin Lodha:

Revelio: A Lightweight Captcha Solver Using a Dictionary Based Approach. 97-116 - Nitish M. Uplavikar, Jaideep Vaidya, Dan Lin, Wei Jiang:

Privacy-Preserving Friend Recommendation in an Integrated Social Environment. 117-136 - Simone Pirocca, Luca Allodi, Nicola Zannone

:
A Toolkit for Security Awareness Training Against Targeted Phishing. 137-159 - Sobhan Mondal, Deependra Pushkar, Mrinali Kumari, Ruchira Naskar

:
Forensic Source Identification of OSN Compressed Images. 160-166
Cryptography
- Jyotirmoy Pramanik

, Sabyasachi Dutta
, Partha Sarathi Roy
, Avishek Adhikari
:
Cheating Detectable Ramp Secret Sharing with Optimal Cheating Resiliency. 169-184 - Saurabh Mishra

, Debanjan Sadhya
:
LiARX: A Lightweight Cipher Based on the LTS Design Strategy of ARX. 185-197 - Sabyasachi Dutta

, Md Kutubuddin Sardar, Avishek Adhikari, Sushmita Ruj
, Kouichi Sakurai:
Color Visual Cryptography Schemes Using Linear Algebraic Techniques over Rings. 198-217
Systems Security
- Hidema Tanaka, Keisuke Fukushima:

Secure Calculation for Position Information of IoT Device with Few Communication and Small Secret Information. 221-240 - Sudesh Kumar

, Lakshmi Jayant Kittur
, Alwyn Roshan Pais
:
Attacks on Android-Based Smartphones and Impact of Vendor Customization on Android OS Security. 241-252 - Vinita Verma

, Sunil Kumar Muttoo
, V. B. Singh
:
Detection of Malign and Benign PE Files Using Texture Analysis. 253-266 - Rafal Leszczyna

, Adrian Litwin:
Estimating the Cost of Cybersecurity Activities with CAsPeA: A Case Study and Comparative Analysis. 267-287

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














