


default search action
13th ICISS 2017: Mumbai, India
- Rudrapatna K. Shyamasundar, Virendra Singh, Jaideep Vaidya:

Information Systems Security - 13th International Conference, ICISS 2017, Mumbai, India, December 16-20, 2017, Proceedings. Lecture Notes in Computer Science 10717, Springer 2017, ISBN 978-3-319-72597-0
Invited Papers
- Stefano Zatti:

The Protection of Space Missions: Threats and Cyber Threats. 3-8 - Luigi V. Mancini, Andrea Monti, Agostino Panico:

SOF on Trial. The Technical and Legal Value of Battlefield Digital Forensics in Court. 9-26
Privacy/Cryptography
- Mahender Kumar, Chittaranjan Padmanabha Katti, Prem Chandra Saxena:

A Secure Anonymous E-Voting System Using Identity-Based Blind Signature Scheme. 29-49 - Sanjeet Kumar Nayak

, Somanath Tripathy:
SEMFS: Secure and Efficient Multi-keyword Fuzzy Search for Cloud Storage. 50-67 - Dileep Kumar Koshley, Sapana Rani, Raju Halder

:
Towards Generalization of Privacy Policy Specification and Property-Based Information Leakage. 68-87 - Payal Chaudhari

, Manik Lal Das, Dipankar Dasgupta:
Privacy-Preserving Proxy Re-encryption with Fine-Grained Access Control. 88-103
Systems Security
- Amrita Milind Honap, Wonjun Lee:

Hiding Kernel Level Rootkits Using Buffer Overflow and Return Oriented Programming. 107-126 - Anis Bkakria, Mariem Graa, Nora Cuppens-Boulahia, Frédéric Cuppens, Jean-Louis Lanet:

Experimenting Similarity-Based Hijacking Attacks Detection and Response in Android Systems. 127-145 - Mamoru Mimura

, Hidema Tanaka:
Heavy Log Reader: Learning the Context of Cyber Attacks Automatically with Paragraph Vector. 146-163 - Jay Dave, Shweta Saharan, Parvez Faruki, Vijay Laxmi

, Manoj Singh Gaur:
Secure Random Encryption for Deduplicated Storage. 164-176
Security Analysis
- Varun Garg, Anish Mathuria:

On Automated Detection of Multi-Protocol Attacks Using AVISPA. 179-193 - Sandeep Rai, Rushang Dhanesha, Sreyans Nahata, Bernard Menezes:

Malicious Application Detection on Android Smartphones with Enhanced Static-Dynamic Analysis. 194-208 - Ganesh Ram Santhanam, Benjamin Holland, Suresh C. Kothari, Nikhil Ranade:

Human-on-the-Loop Automation for Detecting Software Side-Channel Vulnerabilities. 209-230 - Nachiket Trivedi

, Manik Lal Das:
MalDetec: A Non-root Approach for Dynamic Malware Detection in Android. 231-240
Identity Management and Access Control
- Marco Lobe Kome, Mariem Graa, Nora Cuppens-Boulahia, Frédéric Cuppens, Vincent Frey:

DIscovery and REgistration Protocol - For Device and Person Identity Management in IoT. 243-262 - Akash Agrawall, Shubh Maheshwari, Projit Bandyopadhyay, Venkatesh Choppella:

Modelling and Mitigation of Cross-Origin Request Attacks on Federated Identity Management Using Cross Origin Request Policy. 263-282 - Ajinkya Rajput, K. Gopinath:

Towards a More Secure Aadhaar. 283-300
Security Attacks and Detection
- Vineet Kumar

, Aneek Roy, Sourya Sengupta, Sourav Sen Gupta:
Parallelized Common Factor Attack on RSA. 303-312 - Moumita Das, Ansuman Banerjee, Nitesh K. Singh, Bhaskar Sardar:

Performance Attacks on Branch Predictors in Embedded Processors with SMT Support. 313-322 - Routhu Srinivasa Rao

, Alwyn Roshan Pais
:
An Enhanced Blacklist Method to Detect Phishing Websites. 323-333 - Mayukh Rath, Shivali Agarwal, R. K. Shyamasundar:

Semi Supervised NLP Based Classification of Malware Documents. 334-344
Network Security
- Mohsin Khan, Kimmo Järvinen, Philip Ginzboorg

, Valtteri Niemi:
On De-synchronization of User Pseudonyms in Mobile Networks. 347-366 - Son Duc Nguyen, Mamoru Mimura

, Hidema Tanaka:
Leveraging Man-in-the-middle DoS Attack with Internal TCP Retransmissions in Virtual Network. 367-386 - Lyes Bayou, David Espes

, Nora Cuppens-Boulahia, Frédéric Cuppens:
wIDS: A Multilayer IDS for Wireless-Based SCADA Systems. 387-404 - Bold Munkhbaatar, Mamoru Mimura

, Hidema Tanaka:
Dark Domain Name Attack: A New Threat to Domain Name System. 405-414

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














