Search dblp for Publications

export results for "toc:db/conf/acss/acss2015-1.bht:"

 download as .bib file

@proceedings{DBLP:conf/acss/2015-1,
  editor       = {Rituparna Chaki and
                  Agostino Cortesi and
                  Khalid Saeed and
                  Nabendu Chaki},
  title        = {Advanced Computing and Systems for Security - {ACSS} 2015 - 2nd International
                  Doctoral Symposium on Applied Computation and Security Systems (ACSS),
                  May, 23-25, 2015, Kolkata, India, Proceedings, Volume 1},
  series       = {Advances in Intelligent Systems and Computing},
  volume       = {395},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-81-322-2650-5},
  doi          = {10.1007/978-81-322-2650-5},
  isbn         = {978-81-322-2648-2},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acss/2015-1.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acss/AhujaJSH15,
  author       = {Bharat Kumar Ahuja and
                  Angshuman Jana and
                  Ankit Swarnkar and
                  Raju Halder},
  editor       = {Rituparna Chaki and
                  Agostino Cortesi and
                  Khalid Saeed and
                  Nabendu Chaki},
  title        = {On Preventing {SQL} Injection Attacks},
  booktitle    = {Advanced Computing and Systems for Security - {ACSS} 2015 - 2nd International
                  Doctoral Symposium on Applied Computation and Security Systems (ACSS),
                  May, 23-25, 2015, Kolkata, India, Proceedings, Volume 1},
  series       = {Advances in Intelligent Systems and Computing},
  volume       = {395},
  pages        = {49--64},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-81-322-2650-5\_4},
  doi          = {10.1007/978-81-322-2650-5\_4},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acss/AhujaJSH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acss/AkhterTKBK15,
  author       = {Nazneen Akhter and
                  Sumegh Tharewal and
                  Vijay Kale and
                  Ashish Bhalerao and
                  K. V. Kale},
  editor       = {Rituparna Chaki and
                  Agostino Cortesi and
                  Khalid Saeed and
                  Nabendu Chaki},
  title        = {Heart-Based Biometrics and Possible Use of Heart Rate Variability
                  in Biometric Recognition Systems},
  booktitle    = {Advanced Computing and Systems for Security - {ACSS} 2015 - 2nd International
                  Doctoral Symposium on Applied Computation and Security Systems (ACSS),
                  May, 23-25, 2015, Kolkata, India, Proceedings, Volume 1},
  series       = {Advances in Intelligent Systems and Computing},
  volume       = {395},
  pages        = {15--29},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-81-322-2650-5\_2},
  doi          = {10.1007/978-81-322-2650-5\_2},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acss/AkhterTKBK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acss/BabuNP15,
  author       = {Erukala Suresh Babu and
                  C. Nagaraju and
                  Munaga H. M. Krishna Prasad},
  editor       = {Rituparna Chaki and
                  Agostino Cortesi and
                  Khalid Saeed and
                  Nabendu Chaki},
  title        = {Light-Weighted DNA-Based Cryptographic Mechanism Against Chosen Cipher
                  Text Attacks},
  booktitle    = {Advanced Computing and Systems for Security - {ACSS} 2015 - 2nd International
                  Doctoral Symposium on Applied Computation and Security Systems (ACSS),
                  May, 23-25, 2015, Kolkata, India, Proceedings, Volume 1},
  series       = {Advances in Intelligent Systems and Computing},
  volume       = {395},
  pages        = {123--144},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-81-322-2650-5\_9},
  doi          = {10.1007/978-81-322-2650-5\_9},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acss/BabuNP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acss/BhattasaliCCS15,
  author       = {Tapalina Bhattasali and
                  Rituparna Chaki and
                  Nabendu Chaki and
                  Khalid Saeed},
  editor       = {Rituparna Chaki and
                  Agostino Cortesi and
                  Khalid Saeed and
                  Nabendu Chaki},
  title        = {Securing Service in Remote Healthcare},
  booktitle    = {Advanced Computing and Systems for Security - {ACSS} 2015 - 2nd International
                  Doctoral Symposium on Applied Computation and Security Systems (ACSS),
                  May, 23-25, 2015, Kolkata, India, Proceedings, Volume 1},
  series       = {Advances in Intelligent Systems and Computing},
  volume       = {395},
  pages        = {65--84},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-81-322-2650-5\_5},
  doi          = {10.1007/978-81-322-2650-5\_5},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acss/BhattasaliCCS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acss/BinuRM15,
  author       = {Sumitra Binu and
                  Pethuru Raj and
                  Mohammed Misbahuddin},
  editor       = {Rituparna Chaki and
                  Agostino Cortesi and
                  Khalid Saeed and
                  Nabendu Chaki},
  title        = {Safe Cloud: Secure and Usable Authentication Framework for Cloud Environment},
  booktitle    = {Advanced Computing and Systems for Security - {ACSS} 2015 - 2nd International
                  Doctoral Symposium on Applied Computation and Security Systems (ACSS),
                  May, 23-25, 2015, Kolkata, India, Proceedings, Volume 1},
  series       = {Advances in Intelligent Systems and Computing},
  volume       = {395},
  pages        = {183--202},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-81-322-2650-5\_12},
  doi          = {10.1007/978-81-322-2650-5\_12},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acss/BinuRM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acss/DasCD15,
  author       = {Ayan Kumar Das and
                  Rituparna Chaki and
                  Kashi Nath Dey},
  editor       = {Rituparna Chaki and
                  Agostino Cortesi and
                  Khalid Saeed and
                  Nabendu Chaki},
  title        = {The Design of Hierarchical Routing Protocol for Wireless Sensor Network},
  booktitle    = {Advanced Computing and Systems for Security - {ACSS} 2015 - 2nd International
                  Doctoral Symposium on Applied Computation and Security Systems (ACSS),
                  May, 23-25, 2015, Kolkata, India, Proceedings, Volume 1},
  series       = {Advances in Intelligent Systems and Computing},
  volume       = {395},
  pages        = {223--233},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-81-322-2650-5\_14},
  doi          = {10.1007/978-81-322-2650-5\_14},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acss/DasCD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acss/GhoshDN15,
  author       = {Kaushik Ghosh and
                  Pradip Kumar Das and
                  Sarmistha Neogy},
  editor       = {Rituparna Chaki and
                  Agostino Cortesi and
                  Khalid Saeed and
                  Nabendu Chaki},
  title        = {{KPS:} {A} Fermat Point Based Energy Efficient Data Aggregating Routing
                  Protocol for Multi-sink Wireless Sensor Networks},
  booktitle    = {Advanced Computing and Systems for Security - {ACSS} 2015 - 2nd International
                  Doctoral Symposium on Applied Computation and Security Systems (ACSS),
                  May, 23-25, 2015, Kolkata, India, Proceedings, Volume 1},
  series       = {Advances in Intelligent Systems and Computing},
  volume       = {395},
  pages        = {203--221},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-81-322-2650-5\_13},
  doi          = {10.1007/978-81-322-2650-5\_13},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acss/GhoshDN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acss/GoyalK15,
  author       = {Raman Kumar Goyal and
                  Sakshi Kaushal},
  editor       = {Rituparna Chaki and
                  Agostino Cortesi and
                  Khalid Saeed and
                  Nabendu Chaki},
  title        = {Network Selection Using {AHP} for Fast Moving Vehicles in Heterogeneous
                  Networks},
  booktitle    = {Advanced Computing and Systems for Security - {ACSS} 2015 - 2nd International
                  Doctoral Symposium on Applied Computation and Security Systems (ACSS),
                  May, 23-25, 2015, Kolkata, India, Proceedings, Volume 1},
  series       = {Advances in Intelligent Systems and Computing},
  volume       = {395},
  pages        = {235--243},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-81-322-2650-5\_15},
  doi          = {10.1007/978-81-322-2650-5\_15},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acss/GoyalK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acss/MandalSP15,
  author       = {Sudip Mandal and
                  Goutam Saha and
                  Rajat Kumar Pal},
  editor       = {Rituparna Chaki and
                  Agostino Cortesi and
                  Khalid Saeed and
                  Nabendu Chaki},
  title        = {Inference of Gene Regulatory Networks with Neural-Cuckoo Hybrid},
  booktitle    = {Advanced Computing and Systems for Security - {ACSS} 2015 - 2nd International
                  Doctoral Symposium on Applied Computation and Security Systems (ACSS),
                  May, 23-25, 2015, Kolkata, India, Proceedings, Volume 1},
  series       = {Advances in Intelligent Systems and Computing},
  volume       = {395},
  pages        = {87--99},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-81-322-2650-5\_6},
  doi          = {10.1007/978-81-322-2650-5\_6},
  timestamp    = {Tue, 30 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acss/MandalSP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acss/MukherjeeSKC15,
  author       = {Jhilam Mukherjee and
                  Soharab Hossain Shaikh and
                  Madhuchanda Kar and
                  Amlan Chakrabarti},
  editor       = {Rituparna Chaki and
                  Agostino Cortesi and
                  Khalid Saeed and
                  Nabendu Chaki},
  title        = {A Comparative Analysis of Image Segmentation Techniques Toward Automatic
                  Risk Prediction of Solitary Pulmonary Nodules},
  booktitle    = {Advanced Computing and Systems for Security - {ACSS} 2015 - 2nd International
                  Doctoral Symposium on Applied Computation and Security Systems (ACSS),
                  May, 23-25, 2015, Kolkata, India, Proceedings, Volume 1},
  series       = {Advances in Intelligent Systems and Computing},
  volume       = {395},
  pages        = {159--179},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-81-322-2650-5\_11},
  doi          = {10.1007/978-81-322-2650-5\_11},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acss/MukherjeeSKC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acss/OrczykP15,
  author       = {Tomasz Orczyk and
                  Piotr Porwik},
  editor       = {Rituparna Chaki and
                  Agostino Cortesi and
                  Khalid Saeed and
                  Nabendu Chaki},
  title        = {Liver Fibrosis Diagnosis Support System Using Machine Learning Methods},
  booktitle    = {Advanced Computing and Systems for Security - {ACSS} 2015 - 2nd International
                  Doctoral Symposium on Applied Computation and Security Systems (ACSS),
                  May, 23-25, 2015, Kolkata, India, Proceedings, Volume 1},
  series       = {Advances in Intelligent Systems and Computing},
  volume       = {395},
  pages        = {111--121},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-81-322-2650-5\_8},
  doi          = {10.1007/978-81-322-2650-5\_8},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acss/OrczykP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acss/PrasadR15,
  author       = {K. Rajendra Prasad and
                  B. Eswara Reddy},
  editor       = {Rituparna Chaki and
                  Agostino Cortesi and
                  Khalid Saeed and
                  Nabendu Chaki},
  title        = {Context-Aware Graph-Based Visualized Clustering Approach {(CAVCA)}},
  booktitle    = {Advanced Computing and Systems for Security - {ACSS} 2015 - 2nd International
                  Doctoral Symposium on Applied Computation and Security Systems (ACSS),
                  May, 23-25, 2015, Kolkata, India, Proceedings, Volume 1},
  series       = {Advances in Intelligent Systems and Computing},
  volume       = {395},
  pages        = {247--260},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-81-322-2650-5\_16},
  doi          = {10.1007/978-81-322-2650-5\_16},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acss/PrasadR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acss/SahaNC15,
  author       = {Manas Saha and
                  Mrinal Kanti Naskar and
                  B. N. Chatterji},
  editor       = {Rituparna Chaki and
                  Agostino Cortesi and
                  Khalid Saeed and
                  Nabendu Chaki},
  title        = {Detection of Diabetic Retinopathy Using the Wavelet Transform and
                  Feedforward Neural Network},
  booktitle    = {Advanced Computing and Systems for Security - {ACSS} 2015 - 2nd International
                  Doctoral Symposium on Applied Computation and Security Systems (ACSS),
                  May, 23-25, 2015, Kolkata, India, Proceedings, Volume 1},
  series       = {Advances in Intelligent Systems and Computing},
  volume       = {395},
  pages        = {101--109},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-81-322-2650-5\_7},
  doi          = {10.1007/978-81-322-2650-5\_7},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acss/SahaNC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acss/SenGC15,
  author       = {Soumya Sen and
                  Partha Ghosh and
                  Agostino Cortesi},
  editor       = {Rituparna Chaki and
                  Agostino Cortesi and
                  Khalid Saeed and
                  Nabendu Chaki},
  title        = {Materialized View Construction Using Linearizable Nonlinear Regression},
  booktitle    = {Advanced Computing and Systems for Security - {ACSS} 2015 - 2nd International
                  Doctoral Symposium on Applied Computation and Security Systems (ACSS),
                  May, 23-25, 2015, Kolkata, India, Proceedings, Volume 1},
  series       = {Advances in Intelligent Systems and Computing},
  volume       = {395},
  pages        = {261--276},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-81-322-2650-5\_17},
  doi          = {10.1007/978-81-322-2650-5\_17},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acss/SenGC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acss/WesolowskiP15,
  author       = {Tomasz Emanuel Wesolowski and
                  Piotr Porwik},
  editor       = {Rituparna Chaki and
                  Agostino Cortesi and
                  Khalid Saeed and
                  Nabendu Chaki},
  title        = {Computer User Profiling Based on Keystroke Analysis},
  booktitle    = {Advanced Computing and Systems for Security - {ACSS} 2015 - 2nd International
                  Doctoral Symposium on Applied Computation and Security Systems (ACSS),
                  May, 23-25, 2015, Kolkata, India, Proceedings, Volume 1},
  series       = {Advances in Intelligent Systems and Computing},
  volume       = {395},
  pages        = {3--13},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-81-322-2650-5\_1},
  doi          = {10.1007/978-81-322-2650-5\_1},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acss/WesolowskiP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acss/YadavB15,
  author       = {Rohit Kumar Yadav and
                  Haider Banka},
  editor       = {Rituparna Chaki and
                  Agostino Cortesi and
                  Khalid Saeed and
                  Nabendu Chaki},
  title        = {Genetic Algorithm Using Guide Tree in Mutation Operator for Solving
                  Multiple Sequence Alignment},
  booktitle    = {Advanced Computing and Systems for Security - {ACSS} 2015 - 2nd International
                  Doctoral Symposium on Applied Computation and Security Systems (ACSS),
                  May, 23-25, 2015, Kolkata, India, Proceedings, Volume 1},
  series       = {Advances in Intelligent Systems and Computing},
  volume       = {395},
  pages        = {145--157},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-81-322-2650-5\_10},
  doi          = {10.1007/978-81-322-2650-5\_10},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acss/YadavB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acss/ZamanDG15,
  author       = {J. K. M. Sadique Uz Zaman and
                  Sankhanil Dey and
                  Ranjan Ghosh},
  editor       = {Rituparna Chaki and
                  Agostino Cortesi and
                  Khalid Saeed and
                  Nabendu Chaki},
  title        = {Dynamic Ciphering-15 Based on Multiplicative Polynomial Inverses Over
                  Galois Field GF(7\({}^{\mbox{3}}\))},
  booktitle    = {Advanced Computing and Systems for Security - {ACSS} 2015 - 2nd International
                  Doctoral Symposium on Applied Computation and Security Systems (ACSS),
                  May, 23-25, 2015, Kolkata, India, Proceedings, Volume 1},
  series       = {Advances in Intelligent Systems and Computing},
  volume       = {395},
  pages        = {31--48},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-81-322-2650-5\_3},
  doi          = {10.1007/978-81-322-2650-5\_3},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acss/ZamanDG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics