


default search action
SSCC 2018: Bangalore, India
- Sabu M. Thampi, Sanjay Madria, Guojun Wang, Danda B. Rawat, José M. Alcaraz Calero

:
Security in Computing and Communications - 6th International Symposium, SSCC 2018, Bangalore, India, September 19-22, 2018, Revised Selected Papers. Communications in Computer and Information Science 969, Springer 2019, ISBN 978-981-13-5825-8 - Gemini George, Sabu M. Thampi

:
A Graph-Based Decision Support Model for Vulnerability Analysis in IoT Networks. 1-23 - R. Rashmi, D. V. N. Siva Kumar

, P. Santhi Thilagam
:
Privacy-Preserving Searchable Encryption Scheme over Encrypted Data Supporting Dynamic Update. 24-38 - Sumith Maniath, Prabaharan Poornachandran

, V. G. Sujadevi:
Survey on Prevention, Mitigation and Containment of Ransomware Attacks. 39-52 - Ghanshyam S. Bopche, Gopal N. Rai, Babu M. Mehtre:

Inter-path Diversity Metrics for Increasing Networks Robustness Against Zero-Day Attacks. 53-66 - Kritika Kumari, Sayantani Saha, Sarmistha Neogy:

Cost Based Model for Secure Health Care Data Retrieval. 67-75 - R. Madhusudhan, Shashidhara

:
Mitigation of Cross-Site Scripting Attacks in Mobile Cloud Environments. 76-87 - Prabhakar Krishnan

, Krishnashree Achuthan:
Managing Network Functions in Stateful Application Aware SDN. 88-103 - Anjani Barhanpure, Paaras Belandor, Bhaskarjyoti Das

:
Proof of Stack Consensus for Blockchain Networks. 104-116 - Kamel Saddiki, Sofiane Boukli Hacene

, Marc Gilg
, Pascal Lorenz
:
Trust-Neighbors-Based to Mitigate the Cooperative Black Hole Attack in OLSR Protocol. 117-131 - Mehran Alidoost Nia

, Antonio Ruiz-Martínez
:
Workload Distribution for Supporting Anonymous Communications in Automotive Network. 132-144 - Michael Grabatin, Wolfgang Hommel, Michael Steinke:

Policy-Based Network and Security Management in Federated Service Infrastructures with Permissioned Blockchains. 145-156 - El-Sayed M. El-Alfy

, Sadam Al-Azani
:
Statistical Comparison of Opinion Spam Detectors in Social Media with Imbalanced Datasets. 157-167 - Haroon Elahi, Guojun Wang:

A Participatory Privacy Protection Framework for Smart-Phone Application Default Settings. 168-182 - Chris Drake, Praveen Gauravaram

:
Designing a User-Experience-First, Privacy-Respectful, High-Security Mutual-Multifactor Authentication Solution. 183-210 - Mohiuddin Ahmed

, Al-Sakib Khan Pathan
:
Investigating Deep Learning for Collective Anomaly Detection - An Experimental Study. 211-219 - S. V. Aswathy, K. V. Lakshmy

:
BVD - A Blockchain Based Vehicle Database System. 220-230 - V. Srinidhi, K. V. Lakshmy

, Madathil Sethumadhavan:
HGKA: Hierarchical Dynamic Group Key Agreement Protocol for Machine Type Communication in LTE Networks. 231-241 - Khyati Vachhani:

Security Threats Against LTE Networks: A Survey. 242-256 - K. Rithesh, Adwaith V. Gautham

, K. Chandrasekaran:
Network Anomaly Detection Using Artificial Neural Networks Optimised with PSO-DE Hybrid. 257-270 - A. P. Nandhini, M. Sai Bhavani, S. Dharani Dharan, N. Harish, M. Priyatharishini:

Effective Hardware Trojan Detection Using Front-End Compressive Sensing. 271-277 - Sourav Saha

, Vanga Odelu, Rajendra Prasath
:
Enhanced Session Initiation Protocols for Emergency Healthcare Applications. 278-289 - Dhenuka H. Kasukurti, Suchitra Patil:

Wearable Device Forensic: Probable Case Studies and Proposed Methodology. 290-300 - Gaurav Mitra, Souradeep Barua, Srijan Chattopadhyay, Sukalyan Sen, Sarmistha Neogy:

Accessing Data in Healthcare Application. 301-312 - Divya Chaudhary, Bijendra Kumar

, Shaksham Garg:
Diversity and Progress Controlled Gravitational Search Algorithm for Balancing Load in Cloud. 313-323 - K. Hemantha, Nidhi Desai, Manik Lal Das:

On Minimality Attack for Privacy-Preserving Data Publishing. 324-335 - Siddharth Srinivasan, Akshay Kumar, Manik Mahajan, Dinkar Sitaram, Sanchika Gupta:

Probabilistic Real-Time Intrusion Detection System for Docker Containers. 336-347 - Tarun Yadav

, Koustav Sadhukhan:
Identification of Bugs and Vulnerabilities in TLS Implementation for Windows Operating System Using State Machine Learning. 348-362 - Masayoshi Hayashi, Hiroaki Higaki:

Security Improvement of Common-Key Cryptographic Communication by Mixture of Fake Plain-Texts. 363-376 - Vyshak Suresh, R. Manimegalai

:
SPIC - SRAM PUF Intergrated Chip Based Software Licensing Model. 377-388 - Pallavi Kumari Jha, Prem Shankar, V. G. Sujadevi, P. Prabhaharan:

DeepMal4J: Java Malware Detection Employing Deep Learning. 389-402 - Sarvesh V. Sawant

, Gaurav Pareek, B. R. Purushothama:
Group Key Management Schemes Under Strong Active Adversary Model: A Security Analysis. 403-418 - Harmeet Kaur Khanuja, Dattatraya S. Adane:

Detection of Suspicious Transactions with Database Forensics and Theory of Evidence. 419-430 - Govind Mittal, Vishal Gupta:

KarmaNet: SDN Solution to DNS-Based Denial-of-Service. 431-442 - Yang Li, Jing-Ping Qiu, Qing Xie:

FinSec 3.0: Theory and Practices in Financial Enterprise. 443-454 - Naila Bushra, Naresh Adhikari, Mahalingam Ramkumar:

A TCB Minimizing Model of Computation. 455-470 - Hardik Gajera, Shruti Naik, Manik Lal Das:

MedCop: Verifiable Computation for Mobile Healthcare System. 471-482 - Sivappriya Manivannan

, N. Nalla Anandakumar
, M. Nirmala Devi
:
Key Retrieval from AES Architecture Through Hardware Trojan Horse. 483-494 - Aniq Ur Rahman, Mayukh Bhattacharyya:

Hiding in Plain Sight - Symmetric Key Chaotic Image Encryption by Sequential Pixel Shuffling. 495-503 - Yassine Lemmou

, El Mamoun Souidi
:
Overinfection in Ransomware. 504-519 - Bandarupalli Chandini, M. Nirmala Devi

:
Analysis of Circuits for Security Using Logic Encryption. 520-528 - Amol P. Pande, Satish R. Devane

:
Extensive Simulation Analysis of TCP Variants for Wireless Communication. 529-542 - Musheer Ahmad

, Mohammad Najam Doja, M. M. Sufyan Beg:
A New Chaotic Map Based Secure and Efficient Pseudo-Random Bit Sequence Generation. 543-553 - Manju S. Nair, M. S. Rajasree:

Inverted Index Based Ranked Keyword Search in Multi-user Searchable Encryption. 554-562 - Josy Elsa Varghese

, Balachandra Muniyal:
A Comparative Analysis of Different Soft Computing Techniques for Intrusion Detection System. 563-577 - Krishna Prakasha

, Rachana Kalkur, Vasundhara Acharya
, Balachandra Muniyal, Mayank Khandelwal:
A Novel Secret Key Exchange Mechanism for Secure Communication and Data Transfer in Symmetric Cryptosystems. 578-590 - Mimi Cherian

, Madhumita Chatterjee:
Survey of Security Threats in IoT and Emerging Countermeasures. 591-604 - Yash Mahajan, Shobhit Srivastava:

Holistic Credit Rating System for Online Microlending Platforms with Blockchain Technology. 605-616 - Akshay K. C.

, Balachandra Muniyal:
Analysis of Execution Time for Encryption During Data Integrity Check in Cloud Environment. 617-627 - A. S. Joseph Charles

, Kalavathi Palanisamy:
Attunement of Trickle Algorithm for Optimum Reliability of RPL over IoT. 628-639 - Chhaya Choudhary, Raaghavi Sivaguru, Mayana Pereira, Bin Yu, Anderson C. A. Nascimento

, Martine De Cock
:
Algorithmically Generated Domain Detection and Malware Family Classification. 640-655 - Ratnavel Rajalakshmi

, S. Ramraj
, R. Ramesh Kannan:
Transfer Learning Approach for Identification of Malicious Domain Names. 656-666 - Falaah Arif Khan, Sajin Kunhambu, K. Chakravarthy G:

Behavioral Biometrics and Machine Learning to Secure Website Logins. 667-677 - B. Bharathi

, J. Bhuvana
:
Domain Name Detection and Classification Using Deep Neural Networks. 678-686 - Giuseppe Attardi, Daniele Sartiano

:
Bidirectional LSTM Models for DGA Classification. 687-694 - P. V. Jyothsna, Greeshma Prabha, K. K. Shahina, Anu Vazhayil:

Detecting DGA Using Deep Neural Networks (DNNs). 695-706

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














