![](https://dblp.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
8th SKM 2019: Goa, India
- Sanjay K. Sahay, Nihita Goel, Vishwas Patil, Murtuza Jadliwala:
Secure Knowledge Management In Artificial Intelligence Era - 8th International Conference, SKM 2019, Goa, India, December 21-22, 2019, Proceedings. Communications in Computer and Information Science 1186, Springer 2020, ISBN 978-981-15-3816-2
Cyber Security
- Rajesh Kumar Shrivastava, Chittaranjan Hota
, Govind Mittal, Zahid Akhtar
:
UnderTracker: Binary Hardening Through Execution Flow Verification. 3-20 - Md. Farhan Haque, Ram Krishnan:
Toward Relationship Based Access Control for Secure Sharing of Structured Cyber Threat Intelligence. 21-37 - Rudra Prasad Baksi, Shambhu J. Upadhyaya:
Decepticon: A Hidden Markov Model Approach to Counter Advanced Persistent Threats. 38-54 - C. V. Bijitha
, Rohit Sukumaran, Hiran V. Nath
:
A Survey on Ransomware Detection Techniques. 55-68
Security and Artificial Intelligence
- Padma Vasavi Kalluru
:
Indian New Currency Denomination Identification System with Audio Feedback Using Convolution Neural Networks for Visually Challenged and Elderly People. 71-81 - Trupil Limbasiya, Sanjay K. Sahay:
Secure and Energy-Efficient Key-Agreement Protocol for Multi-server Architecture. 82-97
Access Control Models
- Samir Talegaon
, Ram Krishnan:
A Formal Specification of Access Control in Android. 101-125 - Mahendra Pratap Singh, Shamik Sural
, Vijayalakshmi Atluri
, Jaideep Vaidya:
Security Analysis of Unified Access Control Policies. 126-146 - Shuvra Chakraborty, Ravi S. Sandhu, Ram Krishnan:
On the Feasibility of RBAC to ABAC Policy Mining: A Formal Analysis. 147-163
Social Networks
- Thi Tran, Rohit Valecha, Paul Rad, H. Raghav Rao:
An Investigation of Misinformation Harms Related to Social Media During Humanitarian Crises. 167-181 - Rohit Valecha, Tejaswi Volety, Kyounghee Hazel Kwon, H. Raghav Rao:
The Effect of Threat and Proximity on Cyber-Rumor Sharing. 182-193 - Vishnu S. Pendyala
:
Securing Trust in Online Social Networks. 194-201
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.