Login / Signup
SECURIT
2012
2012
2012
Keyphrases
Publications
2012
Dhiren
,
Maulik
,
Hardik Joshi
,
Bhadresh K. Patel
Towards application classification with vulnerability signatures for IDS/IPS.
SECURIT
(2012)
Parvez Faruki
,
Vijay Laxmi
,
Manoj Singh Gaur
,
P. Vinod
to identify malicious PE files.
SECURIT
(2012)
Hiran V. Nath
,
K. Gangadharan
,
M. Sethumadhavan
Reconciliation engine and metric for network vulnerability assessment.
SECURIT
(2012)
Usha Banerjee
,
K. V. Arya
,
Geetika Gupta
,
Sakshi Sharma
Performance evaluation of an ant colony based routing algorithm in the presence of a misbehaving node.
SECURIT
(2012)
Abdullah Mohammed Almuhaideb
,
Bala Srinivasan
,
Phu Dung Le
,
Campbell Wilson
,
Vishv Malhotra
Analysis of mobile authentication protocols by SVO logic.
SECURIT
(2012)
Senthil Kumar Mathi
,
M. L. Valarmathi
,
G. Ramprasath
A secure and efficient registration for IP mobility.
SECURIT
(2012)
V. Rajalakshmi
,
G. S. Anandha Mala
Integer partitioning based encryption for privacy preservation in data mining.
SECURIT
(2012)
Shaik Shakeel Ahamad
,
V. N. Sastry
,
Siba K. Udgata
A secure and optimized mobile payment framework with formal verification.
SECURIT
(2012)
Lee W. Lerner
,
Mohammed M. Farag
,
Cameron D. Patterson
Run-time prediction and preemption of configuration attacks on embedded process controllers.
SECURIT
(2012)
B. S. Adiga
,
P. Balamuralidhar
,
M. A. Rajan
,
Ravishankara Shastry
,
V. L. Shivraj
An identity based encryption using elliptic curve cryptography for secure M2M communication.
SECURIT
(2012)
Annie George
,
Prabaharan Poornachandran
,
M. Ramachandra Kaimal
adsvm: pre-processor plug-in using support vector machine algorithm for Snort.
SECURIT
(2012)
Xavier N. Fernando
,
Kuganeswaran Thambu
Cross-layer coding improves quality and security in wireless video sensor networks.
SECURIT
(2012)
V. Natarajan
,
Shina Sheen
,
R. Anitha
Detection of StegoBot: a covert social network botnet.
SECURIT
(2012)
N. Kaleeswari
,
K. Baskaran
Reducing the energy consumption in wireless sensor networks using delay aware dynamic routing protocol.
SECURIT
(2012)
Simon Burton
,
Jürgen Likkei
,
Priyamvadha Vembar
,
Marko Wolf
Automotive functional safety = safety + security.
SECURIT
(2012)
I. Praveen
,
M. Sethumadhavan
A more efficient and faster pairing computation with cryptographic security.
SECURIT
(2012)
Zhiyuan Tan
,
Aruna Jamdagni
,
Priyadarsi Nanda
,
Xiangjian He
,
Ren Ping Liu
Evaluation on multivariate correlation analysis based denial-of-service attack detection system.
SECURIT
(2012)
James Clarke
,
Rodrigo Roman Castro
,
Abhishek Sharma
,
Javier López
,
Neeraj Suri
Trust & security RTD in the internet of things: opportunities for international cooperation.
SECURIT
(2012)
Susmita Horrow
,
Anjali Sardana
Identity management framework for cloud based internet of things.
SECURIT
(2012)
Kamalanathan Kandasamy
,
Krishnashree Achuthan
Re-architecture of database software stack with planner module for query optimization in a cloud environment.
SECURIT
(2012)
M. Marfa
,
Subu Surendran
,
Sabu M. Thampi
,
T. Radhakrishnan
Cache based approach for improving location based query processing in mobile environment.
SECURIT
(2012)
Smita Naval
,
Vijay Laxmi
,
Manoj Singh Gaur
,
P. Vinod
SPADE: Signature based PAcker DEtection.
SECURIT
(2012)
Renu Aggarwal
,
Manik Lal Das
RFID security in the context of "internet of things".
SECURIT
(2012)
Sampreet A. Sharma
,
Bernard L. Menezes
Implementing side-channel attacks on suggest boxes in web applications.
SECURIT
(2012)
Chinmaya Kumar Patanaik
,
Ferdous A. Barbhuiya
,
Sukumar Nandi
Obfuscated malware detection using API call dependency.
SECURIT
(2012)
Meiyuan Zhao
,
Jesse Walker
,
Chieh-Chih Wang
Security challenges for the intelligent transportation system.
SECURIT
(2012)
G. K. Ragesh
,
K. Baskaran
CRYPE: towards cryptographically enforced and privacy enhanced WBANs.
SECURIT
(2012)
Garima Jain
,
Yatin Mehandiratta
Chronicle security against covert crawling.
SECURIT
(2012)
B. Dinesh Reddy
,
V. Valli Kumari
,
K. V. S. V. N. Raju
Randomized symmetric block encryption.
SECURIT
(2012)
D. Bapat Ameya
,
Alwyn Roshan Pais
Restraining add-on's behavior in private browsing.
SECURIT
(2012)
Parman Sukarno
,
Nandita Bhattacharjee
,
Bala Srinivasan
How confident are you to counter uncertainty?
SECURIT
(2012)
Digambar Powar
,
G. Geethakumari
Digital evidence detection in virtual environment for cloud computing.
SECURIT
(2012)
Jayaraj Poroor
,
Bharat Jayaraman
Formal analysis of event-driven cyber physical systems.
SECURIT
(2012)
First International Conference on Security of Internet of Things, SECURIT '12, Kollam, India - August 17 - 19, 2012
SECURIT
(2012)
Mitul Shah
,
Anjali Sardana
Searching in internet of things using VCS.
SECURIT
(2012)
Arijit Ukil
,
Soma Bandyopadhyay
,
Joel Joseph
,
Vijayanand Banahatti
,
Sachin Lodha
Negotiation-based privacy preservation scheme in internet of things platform.
SECURIT
(2012)
Dhruwajita Devi
,
Sukumar Nandi
Detection of packed malware.
SECURIT
(2012)