


default search action
SSCC 2018: Bangalore, India
- Sabu M. Thampi, Sanjay Madria, Guojun Wang, Danda B. Rawat, José M. Alcaraz Calero
:
Security in Computing and Communications - 6th International Symposium, SSCC 2018, Bangalore, India, September 19-22, 2018, Revised Selected Papers. Communications in Computer and Information Science 969, Springer 2019, ISBN 978-981-13-5825-8 - Gemini George, Sabu M. Thampi
:
A Graph-Based Decision Support Model for Vulnerability Analysis in IoT Networks. 1-23 - R. Rashmi, D. V. N. Siva Kumar
, P. Santhi Thilagam
:
Privacy-Preserving Searchable Encryption Scheme over Encrypted Data Supporting Dynamic Update. 24-38 - Sumith Maniath, Prabaharan Poornachandran
, V. G. Sujadevi:
Survey on Prevention, Mitigation and Containment of Ransomware Attacks. 39-52 - Ghanshyam S. Bopche, Gopal N. Rai, Babu M. Mehtre:
Inter-path Diversity Metrics for Increasing Networks Robustness Against Zero-Day Attacks. 53-66 - Kritika Kumari, Sayantani Saha, Sarmistha Neogy:
Cost Based Model for Secure Health Care Data Retrieval. 67-75 - R. Madhusudhan, Shashidhara
:
Mitigation of Cross-Site Scripting Attacks in Mobile Cloud Environments. 76-87 - Prabhakar Krishnan
, Krishnashree Achuthan:
Managing Network Functions in Stateful Application Aware SDN. 88-103 - Anjani Barhanpure, Paaras Belandor, Bhaskarjyoti Das
:
Proof of Stack Consensus for Blockchain Networks. 104-116 - Kamel Saddiki, Sofiane Boukli Hacene
, Marc Gilg
, Pascal Lorenz
:
Trust-Neighbors-Based to Mitigate the Cooperative Black Hole Attack in OLSR Protocol. 117-131 - Mehran Alidoost Nia
, Antonio Ruiz-Martínez
:
Workload Distribution for Supporting Anonymous Communications in Automotive Network. 132-144 - Michael Grabatin, Wolfgang Hommel, Michael Steinke:
Policy-Based Network and Security Management in Federated Service Infrastructures with Permissioned Blockchains. 145-156 - El-Sayed M. El-Alfy
, Sadam Al-Azani
:
Statistical Comparison of Opinion Spam Detectors in Social Media with Imbalanced Datasets. 157-167 - Haroon Elahi, Guojun Wang:
A Participatory Privacy Protection Framework for Smart-Phone Application Default Settings. 168-182 - Chris Drake, Praveen Gauravaram
:
Designing a User-Experience-First, Privacy-Respectful, High-Security Mutual-Multifactor Authentication Solution. 183-210 - Mohiuddin Ahmed
, Al-Sakib Khan Pathan
:
Investigating Deep Learning for Collective Anomaly Detection - An Experimental Study. 211-219 - S. V. Aswathy, K. V. Lakshmy:
BVD - A Blockchain Based Vehicle Database System. 220-230 - V. Srinidhi, K. V. Lakshmy, Madathil Sethumadhavan:
HGKA: Hierarchical Dynamic Group Key Agreement Protocol for Machine Type Communication in LTE Networks. 231-241 - Khyati Vachhani:
Security Threats Against LTE Networks: A Survey. 242-256 - K. Rithesh, Adwaith V. Gautham
, K. Chandrasekaran:
Network Anomaly Detection Using Artificial Neural Networks Optimised with PSO-DE Hybrid. 257-270 - A. P. Nandhini, M. Sai Bhavani, S. Dharani Dharan, N. Harish, M. Priyatharishini:
Effective Hardware Trojan Detection Using Front-End Compressive Sensing. 271-277 - Sourav Saha
, Vanga Odelu, Rajendra Prasath
:
Enhanced Session Initiation Protocols for Emergency Healthcare Applications. 278-289 - Dhenuka H. Kasukurti, Suchitra Patil:
Wearable Device Forensic: Probable Case Studies and Proposed Methodology. 290-300 - Gaurav Mitra, Souradeep Barua, Srijan Chattopadhyay, Sukalyan Sen, Sarmistha Neogy:
Accessing Data in Healthcare Application. 301-312 - Divya Chaudhary, Bijendra Kumar
, Shaksham Garg:
Diversity and Progress Controlled Gravitational Search Algorithm for Balancing Load in Cloud. 313-323 - K. Hemantha, Nidhi Desai, Manik Lal Das:
On Minimality Attack for Privacy-Preserving Data Publishing. 324-335 - Siddharth Srinivasan, Akshay Kumar, Manik Mahajan, Dinkar Sitaram, Sanchika Gupta:
Probabilistic Real-Time Intrusion Detection System for Docker Containers. 336-347 - Tarun Yadav
, Koustav Sadhukhan:
Identification of Bugs and Vulnerabilities in TLS Implementation for Windows Operating System Using State Machine Learning. 348-362 - Masayoshi Hayashi, Hiroaki Higaki:
Security Improvement of Common-Key Cryptographic Communication by Mixture of Fake Plain-Texts. 363-376 - Vyshak Suresh, R. Manimegalai
:
SPIC - SRAM PUF Intergrated Chip Based Software Licensing Model. 377-388 - Pallavi Kumari Jha, Prem Shankar, V. G. Sujadevi, P. Prabhaharan:
DeepMal4J: Java Malware Detection Employing Deep Learning. 389-402 - Sarvesh V. Sawant
, Gaurav Pareek, B. R. Purushothama:
Group Key Management Schemes Under Strong Active Adversary Model: A Security Analysis. 403-418 - Harmeet Kaur Khanuja, Dattatraya S. Adane:
Detection of Suspicious Transactions with Database Forensics and Theory of Evidence. 419-430 - Govind Mittal, Vishal Gupta:
KarmaNet: SDN Solution to DNS-Based Denial-of-Service. 431-442 - Yang Li, Jing-Ping Qiu, Qing Xie:
FinSec 3.0: Theory and Practices in Financial Enterprise. 443-454 - Naila Bushra, Naresh Adhikari, Mahalingam Ramkumar:
A TCB Minimizing Model of Computation. 455-470 - Hardik Gajera, Shruti Naik, Manik Lal Das:
MedCop: Verifiable Computation for Mobile Healthcare System. 471-482 - Sivappriya Manivannan
, N. Nalla Anandakumar
, M. Nirmala Devi
:
Key Retrieval from AES Architecture Through Hardware Trojan Horse. 483-494 - Aniq Ur Rahman, Mayukh Bhattacharyya:
Hiding in Plain Sight - Symmetric Key Chaotic Image Encryption by Sequential Pixel Shuffling. 495-503 - Yassine Lemmou
, El Mamoun Souidi
:
Overinfection in Ransomware. 504-519 - Bandarupalli Chandini, M. Nirmala Devi
:
Analysis of Circuits for Security Using Logic Encryption. 520-528 - Amol P. Pande, Satish R. Devane
:
Extensive Simulation Analysis of TCP Variants for Wireless Communication. 529-542 - Musheer Ahmad
, Mohammad Najam Doja, M. M. Sufyan Beg:
A New Chaotic Map Based Secure and Efficient Pseudo-Random Bit Sequence Generation. 543-553 - Manju S. Nair, M. S. Rajasree:
Inverted Index Based Ranked Keyword Search in Multi-user Searchable Encryption. 554-562 - Josy Elsa Varghese, Balachandra Muniyal:
A Comparative Analysis of Different Soft Computing Techniques for Intrusion Detection System. 563-577 - Krishna Prakasha
, Rachana Kalkur, Vasundhara Acharya
, Balachandra Muniyal, Mayank Khandelwal:
A Novel Secret Key Exchange Mechanism for Secure Communication and Data Transfer in Symmetric Cryptosystems. 578-590 - Mimi Cherian
, Madhumita Chatterjee:
Survey of Security Threats in IoT and Emerging Countermeasures. 591-604 - Yash Mahajan, Shobhit Srivastava:
Holistic Credit Rating System for Online Microlending Platforms with Blockchain Technology. 605-616 - Akshay K. C.
, Balachandra Muniyal:
Analysis of Execution Time for Encryption During Data Integrity Check in Cloud Environment. 617-627 - A. S. Joseph Charles
, Kalavathi Palanisamy:
Attunement of Trickle Algorithm for Optimum Reliability of RPL over IoT. 628-639 - Chhaya Choudhary, Raaghavi Sivaguru, Mayana Pereira, Bin Yu, Anderson C. A. Nascimento
, Martine De Cock
:
Algorithmically Generated Domain Detection and Malware Family Classification. 640-655 - Ratnavel Rajalakshmi
, S. Ramraj
, R. Ramesh Kannan:
Transfer Learning Approach for Identification of Malicious Domain Names. 656-666 - Falaah Arif Khan, Sajin Kunhambu, K. Chakravarthy G:
Behavioral Biometrics and Machine Learning to Secure Website Logins. 667-677 - B. Bharathi
, J. Bhuvana
:
Domain Name Detection and Classification Using Deep Neural Networks. 678-686 - Giuseppe Attardi, Daniele Sartiano
:
Bidirectional LSTM Models for DGA Classification. 687-694 - P. V. Jyothsna, Greeshma Prabha, K. K. Shahina, Anu Vazhayil:
Detecting DGA Using Deep Neural Networks (DNNs). 695-706

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.