


default search action
2nd ACSS 2015: Kolkata, India - Volume 1
- Rituparna Chaki, Agostino Cortesi

, Khalid Saeed, Nabendu Chaki
:
Advanced Computing and Systems for Security - ACSS 2015 - 2nd International Doctoral Symposium on Applied Computation and Security Systems (ACSS), May, 23-25, 2015, Kolkata, India, Proceedings, Volume 1. Advances in Intelligent Systems and Computing 395, Springer 2016, ISBN 978-81-322-2648-2
Security
- Tomasz Emanuel Wesolowski

, Piotr Porwik
:
Computer User Profiling Based on Keystroke Analysis. 3-13 - Nazneen Akhter, Sumegh Tharewal

, Vijay Kale, Ashish Bhalerao, K. V. Kale
:
Heart-Based Biometrics and Possible Use of Heart Rate Variability in Biometric Recognition Systems. 15-29 - J. K. M. Sadique Uz Zaman, Sankhanil Dey

, Ranjan Ghosh:
Dynamic Ciphering-15 Based on Multiplicative Polynomial Inverses Over Galois Field GF(73). 31-48 - Bharat Kumar Ahuja, Angshuman Jana, Ankit Swarnkar, Raju Halder

:
On Preventing SQL Injection Attacks. 49-64 - Tapalina Bhattasali, Rituparna Chaki, Nabendu Chaki

, Khalid Saeed:
Securing Service in Remote Healthcare. 65-84
Systems Biology
- Sudip Mandal

, Goutam Saha
, Rajat Kumar Pal:
Inference of Gene Regulatory Networks with Neural-Cuckoo Hybrid. 87-99 - Manas Saha, Mrinal Kanti Naskar, B. N. Chatterji:

Detection of Diabetic Retinopathy Using the Wavelet Transform and Feedforward Neural Network. 101-109 - Tomasz Orczyk

, Piotr Porwik
:
Liver Fibrosis Diagnosis Support System Using Machine Learning Methods. 111-121 - Erukala Suresh Babu

, C. Nagaraju
, Munaga H. M. Krishna Prasad
:
Light-Weighted DNA-Based Cryptographic Mechanism Against Chosen Cipher Text Attacks. 123-144 - Rohit Kumar Yadav, Haider Banka:

Genetic Algorithm Using Guide Tree in Mutation Operator for Solving Multiple Sequence Alignment. 145-157 - Jhilam Mukherjee, Soharab Hossain Shaikh

, Madhuchanda Kar, Amlan Chakrabarti
:
A Comparative Analysis of Image Segmentation Techniques Toward Automatic Risk Prediction of Solitary Pulmonary Nodules. 159-179
Networking and Cloud Computing
- Sumitra Binu, Pethuru Raj, Mohammed Misbahuddin

:
Safe Cloud: Secure and Usable Authentication Framework for Cloud Environment. 183-202 - Kaushik Ghosh

, Pradip Kumar Das, Sarmistha Neogy:
KPS: A Fermat Point Based Energy Efficient Data Aggregating Routing Protocol for Multi-sink Wireless Sensor Networks. 203-221 - Ayan Kumar Das, Rituparna Chaki, Kashi Nath Dey:

The Design of Hierarchical Routing Protocol for Wireless Sensor Network. 223-233 - Raman Kumar Goyal, Sakshi Kaushal:

Network Selection Using AHP for Fast Moving Vehicles in Heterogeneous Networks. 235-243
Data Analytics
- K. Rajendra Prasad

, B. Eswara Reddy
:
Context-Aware Graph-Based Visualized Clustering Approach (CAVCA). 247-260 - Soumya Sen, Partha Ghosh

, Agostino Cortesi
:
Materialized View Construction Using Linearizable Nonlinear Regression. 261-276

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














