


default search action
5th SIN 2012: Jaipur, India
- Manoj Singh Gaur, Atilla Elçi, Oleg B. Makarevich, Mehmet A. Orgun, Virendra Singh:

5th International Conference of Security of Information and Networks, SIN '12, Jaipur, India, October 22 - 26, 2012. ACM 2012, ISBN 978-1-4503-1668-2 - Christophe Feltus

, Eric Dubois
, Erik Proper
, Iver Band, Michaël Petit:
Enhancing the ArchiMate® standard with a responsibility modeling language for access rights management. 12-19 - Anjana V. Kumar, Kalpa Vishnani, K. Vinay Kumar:

Split personality malware detection and defeating in popular virtual machines. 20-26 - Dmitry Chernyavskiy, Natalia G. Miloslavskaya

:
A concept of unification of network security policies. 27-32 - Luís Mendonça, Henrique Santos

:
Botnets: a heuristic-based detection framework. 33-40 - Geong Sen Poh, Kok-Lim Alvin Yau, Mee Hong Ling:

Analysis of a secure cooperative channel sensing protocol for cognitive radio networks. 41-46 - Soumya Maity, Soumya Kanti Ghosh:

Enforcement of access control policy for mobile ad hoc networks. 47-52 - Jyoti Grover

, Manoj Singh Gaur, Vijay Laxmi
, Rakesh Kumar Tiwari:
Detection of incorrect position information using speed and time span verification in VANET. 53-59 - Herman Isa, Muhammad Reza Z'aba:

Randomness analysis on LED block ciphers. 60-66 - Chirag Modi

, Dhiren R. Patel, Bhavesh Borisaniya
, Avi Patel, Muttukrishnan Rajarajan:
A novel framework for intrusion detection in cloud. 67-74 - Eugene Tumoyan, Daria Kavchuk:

The method of optimizing the automatic vulnerability validation. 75-78 - Sajal Bhatia, Desmond Allan Schmidt, George M. Mohay:

Ensemble-based DDoS detection and mitigation model. 79-86 - Nilanjan Dey

, Poulami Das
, Sheli Sinha Chaudhuri, Achintya Das:
Feature analysis for the blind-watermarked electroencephalogram signal in wireless telemonitoring using Alattar's method. 87-94 - Ajay Chaudhary

, Manoj Misra, Anjali Sardana:
An efficient fuzzy controller based technique for network traffic classification to improve QoS. 95-102 - Pawan Kumar, Virendra Singh:

Efficient regular expression pattern matching for network intrusion detection systems using modified word-based automata. 103-110 - Ksenia Tsyganok, Evgeny Tumoyan, Ludmila K. Babenko

, Maxim Anikeev
:
Classification of polymorphic and metamorphic malware samples based on their behavior. 111-116 - Priyanka Singh

, Suneeta Agarwal:
A region specific robust watermarking scheme based on singular value decomposition. 117-123 - Valeriy O. Osipyan:

Building of alphabetic data protection cryptosystems on the base of equal power knapsacks with Diophantine problems. 124-129 - Parvez Faruki, Vijay Laxmi

, Manoj Singh Gaur, P. Vinod:
Mining control flow graph as API call-grams to detect portable executable malware. 130-137 - Ludmila K. Babenko

, Evgeniya Ishchukova, Ekaterina Maro
:
Research about strength of GOST 28147-89 encryption algorithm. 138-142 - Debojit Boro

, Bernard Nongpoh, Dhruba K. Bhattacharyya
:
Anomaly based intrusion detection using meta ensemble classifier. 143-147 - Priyanka Loya, Alwyn Roshan Pais

:
SIRIS: secure IRIS authentication system. 148-152 - Prerana Sharma, Devesh Mishra, Ankur Agarwal:

Efficient image encryption and decryption using discrete wavelet transform and fractional Fourier transform. 153-157 - Evgeny Sergeevich Abramov, Elena Barannik, Oleg B. Makarevich

:
Methods of automated analysis of vendor specific implementation of stateful-filtration. 158-162 - Gunjan Bansal, Niteesh Kumar, Sukumar Nandi

, Santosh Biswas:
Detection of NDP based attacks using MLD. 163-167 - Apurba Das, S. Kavitha:

Hybridization of DCTune and psycho-visual saliency model to improve security and capacity in DCT based image watermarking. 168-172 - Preety Singh

, Vijay Laxmi
, Manoj Singh Gaur:
Lip peripheral motion for visual surveillance. 173-177 - A. M. Chandrashekar, K. Raghuveer:

Fusion of multiple data mining techniques for effective network intrusion detection: a contemporary approach. 178-182 - Kunal Sain, Mradula Sharma

, Suneeta Agarwal:
(Student contribution) ASPS: an authentication scheme using pre-formed visual cryptographic shares. 183-187 - Reena Gunjan, Vijay Laxmi

, Manoj Singh Gaur:
Detection attack analysis using partial watermark in DCT domain. 188-192 - K. V. Arya

, Hemant Kumar:
A clustering based algorithm for network intrusion detection. 193-196 - Hiroshi Tsunoda, Glenn Mansfield Keeni:

Security by simple network traffic monitoring. 201-204 - Behnam Rahnama, Atilla Elçi, Ibukun Eweoya:

Fine tuning the advanced encryption standard (AES). 205-209

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














