Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/acss/acss2015-1.bht:"
@proceedings{DBLP:conf/acss/2015-1, editor = {Rituparna Chaki and Agostino Cortesi and Khalid Saeed and Nabendu Chaki}, title = {Advanced Computing and Systems for Security - {ACSS} 2015 - 2nd International Doctoral Symposium on Applied Computation and Security Systems (ACSS), May, 23-25, 2015, Kolkata, India, Proceedings, Volume 1}, series = {Advances in Intelligent Systems and Computing}, volume = {395}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-81-322-2650-5}, doi = {10.1007/978-81-322-2650-5}, isbn = {978-81-322-2648-2}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acss/2015-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/AhujaJSH15, author = {Bharat Kumar Ahuja and Angshuman Jana and Ankit Swarnkar and Raju Halder}, editor = {Rituparna Chaki and Agostino Cortesi and Khalid Saeed and Nabendu Chaki}, title = {On Preventing {SQL} Injection Attacks}, booktitle = {Advanced Computing and Systems for Security - {ACSS} 2015 - 2nd International Doctoral Symposium on Applied Computation and Security Systems (ACSS), May, 23-25, 2015, Kolkata, India, Proceedings, Volume 1}, series = {Advances in Intelligent Systems and Computing}, volume = {395}, pages = {49--64}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-81-322-2650-5\_4}, doi = {10.1007/978-81-322-2650-5\_4}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acss/AhujaJSH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/AkhterTKBK15, author = {Nazneen Akhter and Sumegh Tharewal and Vijay Kale and Ashish Bhalerao and K. V. Kale}, editor = {Rituparna Chaki and Agostino Cortesi and Khalid Saeed and Nabendu Chaki}, title = {Heart-Based Biometrics and Possible Use of Heart Rate Variability in Biometric Recognition Systems}, booktitle = {Advanced Computing and Systems for Security - {ACSS} 2015 - 2nd International Doctoral Symposium on Applied Computation and Security Systems (ACSS), May, 23-25, 2015, Kolkata, India, Proceedings, Volume 1}, series = {Advances in Intelligent Systems and Computing}, volume = {395}, pages = {15--29}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-81-322-2650-5\_2}, doi = {10.1007/978-81-322-2650-5\_2}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acss/AkhterTKBK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/BabuNP15, author = {Erukala Suresh Babu and C. Nagaraju and Munaga H. M. Krishna Prasad}, editor = {Rituparna Chaki and Agostino Cortesi and Khalid Saeed and Nabendu Chaki}, title = {Light-Weighted DNA-Based Cryptographic Mechanism Against Chosen Cipher Text Attacks}, booktitle = {Advanced Computing and Systems for Security - {ACSS} 2015 - 2nd International Doctoral Symposium on Applied Computation and Security Systems (ACSS), May, 23-25, 2015, Kolkata, India, Proceedings, Volume 1}, series = {Advances in Intelligent Systems and Computing}, volume = {395}, pages = {123--144}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-81-322-2650-5\_9}, doi = {10.1007/978-81-322-2650-5\_9}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acss/BabuNP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/BhattasaliCCS15, author = {Tapalina Bhattasali and Rituparna Chaki and Nabendu Chaki and Khalid Saeed}, editor = {Rituparna Chaki and Agostino Cortesi and Khalid Saeed and Nabendu Chaki}, title = {Securing Service in Remote Healthcare}, booktitle = {Advanced Computing and Systems for Security - {ACSS} 2015 - 2nd International Doctoral Symposium on Applied Computation and Security Systems (ACSS), May, 23-25, 2015, Kolkata, India, Proceedings, Volume 1}, series = {Advances in Intelligent Systems and Computing}, volume = {395}, pages = {65--84}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-81-322-2650-5\_5}, doi = {10.1007/978-81-322-2650-5\_5}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acss/BhattasaliCCS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/BinuRM15, author = {Sumitra Binu and Pethuru Raj and Mohammed Misbahuddin}, editor = {Rituparna Chaki and Agostino Cortesi and Khalid Saeed and Nabendu Chaki}, title = {Safe Cloud: Secure and Usable Authentication Framework for Cloud Environment}, booktitle = {Advanced Computing and Systems for Security - {ACSS} 2015 - 2nd International Doctoral Symposium on Applied Computation and Security Systems (ACSS), May, 23-25, 2015, Kolkata, India, Proceedings, Volume 1}, series = {Advances in Intelligent Systems and Computing}, volume = {395}, pages = {183--202}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-81-322-2650-5\_12}, doi = {10.1007/978-81-322-2650-5\_12}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acss/BinuRM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/DasCD15, author = {Ayan Kumar Das and Rituparna Chaki and Kashi Nath Dey}, editor = {Rituparna Chaki and Agostino Cortesi and Khalid Saeed and Nabendu Chaki}, title = {The Design of Hierarchical Routing Protocol for Wireless Sensor Network}, booktitle = {Advanced Computing and Systems for Security - {ACSS} 2015 - 2nd International Doctoral Symposium on Applied Computation and Security Systems (ACSS), May, 23-25, 2015, Kolkata, India, Proceedings, Volume 1}, series = {Advances in Intelligent Systems and Computing}, volume = {395}, pages = {223--233}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-81-322-2650-5\_14}, doi = {10.1007/978-81-322-2650-5\_14}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acss/DasCD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/GhoshDN15, author = {Kaushik Ghosh and Pradip Kumar Das and Sarmistha Neogy}, editor = {Rituparna Chaki and Agostino Cortesi and Khalid Saeed and Nabendu Chaki}, title = {{KPS:} {A} Fermat Point Based Energy Efficient Data Aggregating Routing Protocol for Multi-sink Wireless Sensor Networks}, booktitle = {Advanced Computing and Systems for Security - {ACSS} 2015 - 2nd International Doctoral Symposium on Applied Computation and Security Systems (ACSS), May, 23-25, 2015, Kolkata, India, Proceedings, Volume 1}, series = {Advances in Intelligent Systems and Computing}, volume = {395}, pages = {203--221}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-81-322-2650-5\_13}, doi = {10.1007/978-81-322-2650-5\_13}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acss/GhoshDN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/GoyalK15, author = {Raman Kumar Goyal and Sakshi Kaushal}, editor = {Rituparna Chaki and Agostino Cortesi and Khalid Saeed and Nabendu Chaki}, title = {Network Selection Using {AHP} for Fast Moving Vehicles in Heterogeneous Networks}, booktitle = {Advanced Computing and Systems for Security - {ACSS} 2015 - 2nd International Doctoral Symposium on Applied Computation and Security Systems (ACSS), May, 23-25, 2015, Kolkata, India, Proceedings, Volume 1}, series = {Advances in Intelligent Systems and Computing}, volume = {395}, pages = {235--243}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-81-322-2650-5\_15}, doi = {10.1007/978-81-322-2650-5\_15}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acss/GoyalK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/MandalSP15, author = {Sudip Mandal and Goutam Saha and Rajat Kumar Pal}, editor = {Rituparna Chaki and Agostino Cortesi and Khalid Saeed and Nabendu Chaki}, title = {Inference of Gene Regulatory Networks with Neural-Cuckoo Hybrid}, booktitle = {Advanced Computing and Systems for Security - {ACSS} 2015 - 2nd International Doctoral Symposium on Applied Computation and Security Systems (ACSS), May, 23-25, 2015, Kolkata, India, Proceedings, Volume 1}, series = {Advances in Intelligent Systems and Computing}, volume = {395}, pages = {87--99}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-81-322-2650-5\_6}, doi = {10.1007/978-81-322-2650-5\_6}, timestamp = {Tue, 30 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acss/MandalSP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/MukherjeeSKC15, author = {Jhilam Mukherjee and Soharab Hossain Shaikh and Madhuchanda Kar and Amlan Chakrabarti}, editor = {Rituparna Chaki and Agostino Cortesi and Khalid Saeed and Nabendu Chaki}, title = {A Comparative Analysis of Image Segmentation Techniques Toward Automatic Risk Prediction of Solitary Pulmonary Nodules}, booktitle = {Advanced Computing and Systems for Security - {ACSS} 2015 - 2nd International Doctoral Symposium on Applied Computation and Security Systems (ACSS), May, 23-25, 2015, Kolkata, India, Proceedings, Volume 1}, series = {Advances in Intelligent Systems and Computing}, volume = {395}, pages = {159--179}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-81-322-2650-5\_11}, doi = {10.1007/978-81-322-2650-5\_11}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acss/MukherjeeSKC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/OrczykP15, author = {Tomasz Orczyk and Piotr Porwik}, editor = {Rituparna Chaki and Agostino Cortesi and Khalid Saeed and Nabendu Chaki}, title = {Liver Fibrosis Diagnosis Support System Using Machine Learning Methods}, booktitle = {Advanced Computing and Systems for Security - {ACSS} 2015 - 2nd International Doctoral Symposium on Applied Computation and Security Systems (ACSS), May, 23-25, 2015, Kolkata, India, Proceedings, Volume 1}, series = {Advances in Intelligent Systems and Computing}, volume = {395}, pages = {111--121}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-81-322-2650-5\_8}, doi = {10.1007/978-81-322-2650-5\_8}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acss/OrczykP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/PrasadR15, author = {K. Rajendra Prasad and B. Eswara Reddy}, editor = {Rituparna Chaki and Agostino Cortesi and Khalid Saeed and Nabendu Chaki}, title = {Context-Aware Graph-Based Visualized Clustering Approach {(CAVCA)}}, booktitle = {Advanced Computing and Systems for Security - {ACSS} 2015 - 2nd International Doctoral Symposium on Applied Computation and Security Systems (ACSS), May, 23-25, 2015, Kolkata, India, Proceedings, Volume 1}, series = {Advances in Intelligent Systems and Computing}, volume = {395}, pages = {247--260}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-81-322-2650-5\_16}, doi = {10.1007/978-81-322-2650-5\_16}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acss/PrasadR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/SahaNC15, author = {Manas Saha and Mrinal Kanti Naskar and B. N. Chatterji}, editor = {Rituparna Chaki and Agostino Cortesi and Khalid Saeed and Nabendu Chaki}, title = {Detection of Diabetic Retinopathy Using the Wavelet Transform and Feedforward Neural Network}, booktitle = {Advanced Computing and Systems for Security - {ACSS} 2015 - 2nd International Doctoral Symposium on Applied Computation and Security Systems (ACSS), May, 23-25, 2015, Kolkata, India, Proceedings, Volume 1}, series = {Advances in Intelligent Systems and Computing}, volume = {395}, pages = {101--109}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-81-322-2650-5\_7}, doi = {10.1007/978-81-322-2650-5\_7}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acss/SahaNC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/SenGC15, author = {Soumya Sen and Partha Ghosh and Agostino Cortesi}, editor = {Rituparna Chaki and Agostino Cortesi and Khalid Saeed and Nabendu Chaki}, title = {Materialized View Construction Using Linearizable Nonlinear Regression}, booktitle = {Advanced Computing and Systems for Security - {ACSS} 2015 - 2nd International Doctoral Symposium on Applied Computation and Security Systems (ACSS), May, 23-25, 2015, Kolkata, India, Proceedings, Volume 1}, series = {Advances in Intelligent Systems and Computing}, volume = {395}, pages = {261--276}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-81-322-2650-5\_17}, doi = {10.1007/978-81-322-2650-5\_17}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acss/SenGC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/WesolowskiP15, author = {Tomasz Emanuel Wesolowski and Piotr Porwik}, editor = {Rituparna Chaki and Agostino Cortesi and Khalid Saeed and Nabendu Chaki}, title = {Computer User Profiling Based on Keystroke Analysis}, booktitle = {Advanced Computing and Systems for Security - {ACSS} 2015 - 2nd International Doctoral Symposium on Applied Computation and Security Systems (ACSS), May, 23-25, 2015, Kolkata, India, Proceedings, Volume 1}, series = {Advances in Intelligent Systems and Computing}, volume = {395}, pages = {3--13}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-81-322-2650-5\_1}, doi = {10.1007/978-81-322-2650-5\_1}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acss/WesolowskiP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/YadavB15, author = {Rohit Kumar Yadav and Haider Banka}, editor = {Rituparna Chaki and Agostino Cortesi and Khalid Saeed and Nabendu Chaki}, title = {Genetic Algorithm Using Guide Tree in Mutation Operator for Solving Multiple Sequence Alignment}, booktitle = {Advanced Computing and Systems for Security - {ACSS} 2015 - 2nd International Doctoral Symposium on Applied Computation and Security Systems (ACSS), May, 23-25, 2015, Kolkata, India, Proceedings, Volume 1}, series = {Advances in Intelligent Systems and Computing}, volume = {395}, pages = {145--157}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-81-322-2650-5\_10}, doi = {10.1007/978-81-322-2650-5\_10}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acss/YadavB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acss/ZamanDG15, author = {J. K. M. Sadique Uz Zaman and Sankhanil Dey and Ranjan Ghosh}, editor = {Rituparna Chaki and Agostino Cortesi and Khalid Saeed and Nabendu Chaki}, title = {Dynamic Ciphering-15 Based on Multiplicative Polynomial Inverses Over Galois Field GF(7\({}^{\mbox{3}}\))}, booktitle = {Advanced Computing and Systems for Security - {ACSS} 2015 - 2nd International Doctoral Symposium on Applied Computation and Security Systems (ACSS), May, 23-25, 2015, Kolkata, India, Proceedings, Volume 1}, series = {Advances in Intelligent Systems and Computing}, volume = {395}, pages = {31--48}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-81-322-2650-5\_3}, doi = {10.1007/978-81-322-2650-5\_3}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acss/ZamanDG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.