


default search action
14th ATIS 2024: Tamil Nadu, India
- V. S. Shankar Sriram
, Anila Glory H.
, Gang Li
, Shiva Raj Pokhrel
:
Applications and Techniques in Information Security - 14th International Conference, ATIS 2024, Tamil Nadu, India, November 22-24, 2024, Proceedings. Communications in Computer and Information Science 2306, Springer 2025, ISBN 978-981-97-9742-4
Introduction
- Kannan Balasubramanian
:
Security of Emerging Technologies in Computer Networks. 3-19
Advancing Quantum Computing and Cryptography
- K. Pradheep Kumar:
Optical Neural Networks - A Strategy for Secure Quantum Computing. 23-32 - Aditya Joshi
, Pritam Bhalgat, Pratibha Pramod Chavan
, Tejaram Chaudhari
, Sumit Patil:
Guarding Against Quantum Threats: A Survey of Post-Quantum Cryptography Standardization, Techniques, and Current Implementations. 33-46 - Amrita Bose
, Debranjan Pal
, Dipanwita Roy Chowdhury:
Cryptographic Distinguishers Through Deep Learning for Lightweight Block Ciphers. 47-63 - Kishan Mishra, Tapadyoti Banerjee, Dipanwita Roy Chowdhury:
Detection and Mitigation of Email Phishing. 64-76 - B. Ramneshkar, Veeramuthu Venkatesh
, R. Anushiadevi
:
Securing Digital Forensic Data Using Neural Networks, Elephant Herd Optimization and Complex Sequence Techniques. 77-94 - C. Manikandan
, A. Prince Rabinson, A. Devibala, M. Sivanesh, S. Karunyaa, A. Rajesh
:
Design of Image Encryption Technique Using MSE Approach. 95-106 - J. Adline Vidhya, V. R. Venkatasubramani, S. Rajaram, V. Vinoth Thyagarajan, M. S. K. Manikandan:
Low Latency Binary Edward Curve Crypto Processor for FPGA Platforms. 107-118 - B. Sri Yugenther, Anila Glory H., H. Naresh Kumar
, R. Sivaraman, V. S. Shankar Sriram:
Augmenting Security in Edge Devices: FPGA-Based Enhanced LEA Algorithm with S-Box and Chaotic Functions. 119-131
AI-Driven Cybersecurity: The Role of Machine Learning
- S. P. Ramesh
, S. Raj Anand
, V Ganesh Karthikeyan
:
Machine Learning Approach for Malware Detection Using Malware Memory Analysis Data. 135-145 - K. Lokeshwar, M. Sumathi:
DDOS Attack Detection in Virtual Machine Using Machine Learning Algorithms. 146-157 - A. Joy Christy
, M. J. Jeyasheela Rakkini
, S. Sri Laxmi Narasimhan:
An Unsupervised Method for Intrusion Detection Using Novel Percentage Split Clustering. 158-170 - S. Abinash, V. S. Shankar Sriram, Kannan Krithivasan, S. Priyanga
:
HATT-MLPNN: A Hybrid Approach for Cyber-Attack Detection in Industrial Control Systems Using MLPNN and Attention Mechanisms. 171-182 - P. Lavanya, V. S. Venkata Raman, S. Srinath Gosakan, Anila Glory H., V. S. Shankar Sriram:
Silent Threats: Monitoring Insider Risks in Healthcare Sector. 183-198
Advancing Cybersecurity with Deep Learning Techniques
- M. K. Vishnu Priya, H. Anila Glory, V. S. Shankar Sriram:
Enhanced Deep Learning for IIoT Threat Intelligence: Revealing Advanced Persistent Threat Attack Patterns. 201-217 - S. Abisheg, M. R. Gauthama Raman
, Aditya P. Mathur
:
Adaptive Data-Driven LSTM Model for Sensor Drift Detection in Water Utilities. 218-228 - P. Hemashree
, G. Padmavathi
:
Enhancing FGSM Attacks with Genetic Algorithms for Robust Adversarial Examples in Remote Sensing Image Classification Systems. 229-243 - Rishiraj Biswas, Thirumurugan Shanmugam
, Rajiv Vincent
, Arun Kumar Sivaraman
, Janakiraman Nithiyanantham
, Priya Ravindran
:
GAN-Enhanced Multiclass Malware Classification with Deep Convolutional Networks. 244-255
Securing Connected Systems: IoT, Cloud, and Web Security Strategies
- T. N. Prabakar, K. Vignesh, V. Balaji, M. S. Digeesh:
IOT Based Locker Access System with MFA & Remote Authentication. 259-268 - S. Ramya, Karthik Mohan, Kannan Krithivasan, Manivannan Doraipandian:
A Secure Authentication Scheme between Edge Devices Using Hypergraph Hashing Technique in Iot Environment. 269-287 - V. Rajkumar, D. Devi, N. Khadirkumar, P. Jeevitha, T. Suganya:
Enhancing Access Control and Information Sharing in Cloud IoT with an Effective Blockchain-Based Authority System. 288-299 - M. Karthick Roshan, M. Keerthana, M. Sivagami:
Securing Data in MongoDB: A Framework Using Encryption. 300-312 - T. Suriya Praba, S. Reka, V. Meena, Bharath Reddy Gudibandi, Sai Surya Akella, Jaya Nikhita Gudiseva:
Handling Sensitive Medical Data - A Differential Privacy Enabled Federated Learning Approach. 313-326

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.