Login / Signup
SIN
2009
2013
2019
2023
2009
2023
Keyphrases
Publications
2023
Meenakshi Gupta
,
Poonam Gera
,
Bharavi Mishra
A Lightweight Certificateless Signcryption Scheme based on HCC for securing Underwater Wireless Sensor Networks (UWSNs).
SIN
(2023)
Soumi Ghosh
,
Kamal Upreti
,
Samreen Jafri
,
Prakash Divakaran
,
Vandana Mishra Chaturvedi
,
Prashant Vats
A Comparative Analysis of Autonomous Ledger Systems for Enhanced Blockchain Computing Applications.
SIN
(2023)
Muhammad Aashiq Moosa
,
Apurva K. Vangujar
,
Dnyanesh Pramod Mahajan
Detection and Analysis of DDoS Attack Using a Collaborative Network Monitoring Stack.
SIN
(2023)
Utsav Upadhyay
,
Alok Kumar
,
Satyabrata Roy
,
Umashankar Rawat
,
Sandeep Chaurasia
Defending the Cloud: Understanding the Role of Explainable AI in Intrusion Detection Systems.
SIN
(2023)
Akram Al-Rumaim
,
Jyoti D. Pawar
Exploring the Evolving Landscape of API Security Challenges in the Healthcare Industry: A Comprehensive Review.
SIN
(2023)
Mayank Kumar
,
Radha Agrawal
,
Priyanka Singh
BATFL: Battling Backdoor Attacks in Federated Learning.
SIN
(2023)
Aditi Sharma
,
Mukta Patel
,
Arjun Choudhary
,
Gajender Kumar
Blockchain Based Security Enabled Smart Contract for Energy Management.
SIN
(2023)
Anmol Kumar
,
Mayank Agarwal
Preserving Service Availability Under DDoS Attack in Micro-Service Based Cloud Infrastructure.
SIN
(2023)
Santoshi Rudrakar
,
Parag H. Rughani
,
Jeet Rami
UART Port Bane or Boon: Vulnerabilities vs Significance for Digital Investigation in Ag-IoT.
SIN
(2023)
16th International Conference on Security of Information and Networks, SIN 2023, Jaipur, India, November 20-21, 2023
SIN
(2023)
Harshita Jha
,
Surinder Kaur
Implementation of Communication Aid Using Zigbee Technology Based On Personal Area Network(PAN).
SIN
(2023)
Ritu Rai
,
Jyoti Grover
,
Soumya Pandey
Unveiling Threats: A Comprehensive Taxonomy of Attacks in In-Vehicle Networks.
SIN
(2023)
B. S. Vidhyasagar
,
M. Arvindhan
,
Sivakumar Kalimuthu
The Crucial Function that Clouds Access Security Brokers Play in Ensuring the Safety of Cloud Computing.
SIN
(2023)
Puneet Kumar Pal
,
Dhirendra Kumar
Image Encryption based on Chaotic Map and Fractal Sorting Matrix.
SIN
(2023)
Sanghamitra Nemmini
,
S. Abhishek
,
Anjali T
,
Sincy Raj
Fortifying Information Security: Security Implications of Microservice and Monolithic Architectures.
SIN
(2023)
Parth Parmar
,
Jekil Gadhiya
,
Satvik Vats
,
Deepak Kumar Verma
,
Krunal Vaghela
A Review of DNA Cryptography: From a Data Protection Perspective.
SIN
(2023)
Sampsa Rauti
,
Esko Vuorinen
,
Robin Carlsson
,
Panu Puhtila
Data Leaks to Third-Party Services on Medical Websites.
SIN
(2023)
Mohon Dash Tanu
,
S. M. Fahim Faisal
,
Srabony Majumder
,
Mumtahinah Rahman Sristy
,
Rigan Paul
,
Muhammad Iqbal Hossain
,
Md. Sabbir Ahmed
Hybrid Steganography: A Multi-Layered Framework for Hybrid Text and Image Concealment Enhanced by AES and LSB Techniques.
SIN
(2023)
Motahare Mounesan
,
Hossein Siadati
,
Sima Jafarikhah
Exploring the Threat of Software Supply Chain Attacks on Containerized Applications.
SIN
(2023)
Hema Dhadhal
,
Paresh P. Kotak
,
Parvez Faruki
,
Atul Gonsai
,
Sajal Bhatia
Towards Learning Based Detection and Mitigation of DDoS Attacks in Software Defined Networks.
SIN
(2023)
Sneha Rajagopal
,
Avanthika Gaur
,
P. Vinod
Interpretable PDF Malware Detector.
SIN
(2023)
Prabith GS
,
S. Abhishek
,
Anjali T
,
Radhika Ravindran
Zero-Click Exploits and Malware: An In-Depth Analysis and Case Studies.
SIN
(2023)
Ishaan Shukla
,
Atharva Joshi
,
Shital Girme
LSB Steganography Mechanism to Hide Texts Within Images Backed with Layers of Encryption.
SIN
(2023)
Manik Chandra Pandey
,
Pradeep Singh Rawat
Efficient Virtual Machine Provisioning Techniques in Cloud Computing: A Systematic Review.
SIN
(2023)
Chudinov Pavel
,
Babenko Ludmila
Analysis of the Semantic Webs for Their Information Security.
SIN
(2023)
Panu Puhtila
,
Robin Carlsson
,
Sampsa Rauti
Privacy Risks of Third-Party Services on Women's Shelter Websites.
SIN
(2023)
Bagannagari Sai Teja
,
Baru Charita Sri
,
Gandam Vindya
,
Ch. Madhu Babu
Emerging Technologies in the Fight Against Drug Counterfeiting - A Survey of Security Measures.
SIN
(2023)
Mazharul Islam
,
Mubasshir Ahmed
,
Rajesh Palit
Storage and Maintenance of Sensitive Data using Homomorphic Encryption.
SIN
(2023)
Md Sharafat Hossain
,
Md Delwar Hossain
,
Md Mahbubur Rahman
,
Yuzo Taenaka
,
Md Saiful Islam
,
Youki Kadobayashi
A Comparative Performance Analysis of Android Malware Classification Using Supervised and Semi-supervised Deep Learning.
SIN
(2023)
Aviral Srivastava
,
Viral Parmar
,
Priyansh Sanghavi
,
Seema Rani
Digital Power Play: Unraveling the Evolution of State-Sponsored Cyber Operations.
SIN
(2023)
Keshav Kaushik
,
Govind Sharma
,
Preeti Narooka
,
Gunjan Chhabra
,
Ankit Vishnoi
HTML Smuggling: Attack and Mitigation.
SIN
(2023)
Sahib J. Parmar
,
Vinitkumar R. Parmar
,
Jai Prakash Verma
,
Satyabrata Roy
,
Pronaya Bhattacharya
Quantum Computing: Exploring Superposition and Entanglement for Cutting-Edge Applications.
SIN
(2023)
Virender
,
Lokesh Sharma
,
Satyabrata Roy
,
Umashankar Rawat
Low-Rate DDoS Attack on SDN Controller and Its Impact.
SIN
(2023)
Mayank Kumar
,
Radha Agrawal
,
Priyanka Singh
RAFT: Evaluating Federated Learning Resilience Against Threats.
SIN
(2023)
Jay Dave
,
Anshul Kanodia
,
Raj Srivastava
,
Kushagra Singh
,
Prithvi Hegde
,
Hitaishi Desai
Secure and Efficient Key Management for Deduplicated Cloud Storage Systems.
SIN
(2023)
2022
Amina Sahbi
,
Faouzi Jaïdi
,
Adel Bouhoula
Artificial Intelligence for SDN Security: Analysis, Challenges and Approach Proposal.
SIN
(2022)
Ines Jemal
,
Mohamed Amine Haddar
,
Omar Cheikhrouhou
,
Adel Mahfoudhi
SWAF: A Smart Web Application Firewall Based on Convolutional Neural Network.
SIN
(2022)
Bessem Zaabar
,
Omar Cheikhrouhou
,
Mohamed Abid
Intrusion Detection System for IoMT through Blockchain-based Federated Learning.
SIN
(2022)
Hela Makina
,
Asma Ben Letaifa
,
Abderazek Rachedi
Leveraging Edge Computing, Blockchain and IPFS for Addressing eHealth Records Challenges.
SIN
(2022)
Ahmed Abadulla Ashlam
,
Atta Badii
,
Frederic T. Stahl
Multi-Phase Algorithmic Framework to Prevent SQL Injection Attacks using Improved Machine learning and Deep learning to Enhance Database security in Real-time.
SIN
(2022)
Siegfried Hollerer
,
Marta Chabrová
,
Thilo Sauter
,
Wolfgang Kastner
Combined Modeling Techniques for Safety and Security in Industrial Automation: A Case Study.
SIN
(2022)
Sondes Ksibi
,
Faouzi Jaïdi
,
Adel Bouhoula
A User-Centric Fuzzy AHP-based Method for Medical Devices Security Assessment.
SIN
(2022)
Haider Abbas
Keynote Speaker 5: Cyber Security Threat Landscape in the Context of Industry 4.0.
SIN
(2022)
Elías Grande
Social Behaviour Identification relying on Device Fingerprint Analysis.
SIN
(2022)
Mohamed Mosbah
Keynote Speaker 2: Cybersecurity of connected Vehicules.
SIN
(2022)
Ouissem Ben Fredj
A NLP-inspired method to predict multi-step cyberattacks.
SIN
(2022)
Mohamed Hamdi
Keynote Speaker 4: Introducing Homomorphic Encryption in Blockchain-enabled Applications.
SIN
(2022)
Mays Kareem Jabbar
,
Hafedh Trabelsi
A Betweenness Centrality Based Clustering in VANETs.
SIN
(2022)
Chidera Biringa
,
Gökhan Kul
A Secure Design Pattern Approach Toward Tackling Lateral-Injection Attacks.
SIN
(2022)
Murshedul Arifeen
,
Andrei Petrovski
Topology for Preserving Feature Correlation in Tabular Synthetic Data.
SIN
(2022)