| 2012 | (Student contribution) ASPS: an authentication scheme using pre-formed visual cryptographic shares. Kunal Sain, Mradula Sharma, Suneeta Agarwal |
| 2012 | 5th International Conference of Security of Information and Networks, SIN '12, Jaipur, India, October 22 - 26, 2012 Manoj Singh Gaur, Atilla Elçi, Oleg B. Makarevich, Mehmet A. Orgun, Virendra Singh |
| 2012 | A clustering based algorithm for network intrusion detection. K. V. Arya, Hemant Kumar |
| 2012 | A concept of unification of network security policies. Dmitry Chernyavskiy, Natalia G. Miloslavskaya |
| 2012 | A novel framework for intrusion detection in cloud. Chirag Modi, Dhiren R. Patel, Bhavesh Borisaniya, Avi Patel, Muttukrishnan Rajarajan |
| 2012 | A region specific robust watermarking scheme based on singular value decomposition. Priyanka Singh, Suneeta Agarwal |
| 2012 | An efficient fuzzy controller based technique for network traffic classification to improve QoS. Ajay Chaudhary, Manoj Misra, Anjali Sardana |
| 2012 | Analysis of a secure cooperative channel sensing protocol for cognitive radio networks. Geong Sen Poh, Kok-Lim Alvin Yau, Mee Hong Ling |
| 2012 | Anomaly based intrusion detection using meta ensemble classifier. Debojit Boro, Bernard Nongpoh, Dhruba K. Bhattacharyya |
| 2012 | Botnets: a heuristic-based detection framework. Luís Mendonça, Henrique Santos |
| 2012 | Building of alphabetic data protection cryptosystems on the base of equal power knapsacks with Diophantine problems. Valeriy O. Osipyan |
| 2012 | Classification of polymorphic and metamorphic malware samples based on their behavior. Ksenia Tsyganok, Evgeny Tumoyan, Ludmila K. Babenko, Maxim Anikeev |
| 2012 | Detection attack analysis using partial watermark in DCT domain. Reena Gunjan, Vijay Laxmi, Manoj Singh Gaur |
| 2012 | Detection of NDP based attacks using MLD. Gunjan Bansal, Niteesh Kumar, Sukumar Nandi, Santosh Biswas |
| 2012 | Detection of incorrect position information using speed and time span verification in VANET. Jyoti Grover, Manoj Singh Gaur, Vijay Laxmi, Rakesh Kumar Tiwari |
| 2012 | ESCAPE: entropy score analysis of packed executable. Smita Naval, Vijay Laxmi, Manoj Singh Gaur, P. Vinod |
| 2012 | Efficient image encryption and decryption using discrete wavelet transform and fractional Fourier transform. Prerana Sharma, Devesh Mishra, Ankur Agarwal |
| 2012 | Efficient regular expression pattern matching for network intrusion detection systems using modified word-based automata. Pawan Kumar, Virendra Singh |
| 2012 | Enforcement of access control policy for mobile ad hoc networks. Soumya Maity, Soumya Kanti Ghosh |
| 2012 | Enhancing the ArchiMate® standard with a responsibility modeling language for access rights management. Christophe Feltus, Eric Dubois, Erik Proper, Iver Band, Michaël Petit |
| 2012 | Ensemble-based DDoS detection and mitigation model. Sajal Bhatia, Desmond Allan Schmidt, George M. Mohay |
| 2012 | Feature analysis for the blind-watermarked electroencephalogram signal in wireless telemonitoring using Alattar's method. Nilanjan Dey, Poulami Das, Sheli Sinha Chaudhuri, Achintya Das |
| 2012 | Fine tuning the advanced encryption standard (AES). Behnam Rahnama, Atilla Elçi, Ibukun Eweoya |
| 2012 | Fusion of multiple data mining techniques for effective network intrusion detection: a contemporary approach. A. M. Chandrashekar, K. Raghuveer |
| 2012 | Hybridization of DCTune and psycho-visual saliency model to improve security and capacity in DCT based image watermarking. Apurba Das, S. Kavitha |
| 2012 | Lip peripheral motion for visual surveillance. Preety Singh, Vijay Laxmi, Manoj Singh Gaur |
| 2012 | Methods of automated analysis of vendor specific implementation of stateful-filtration. Evgeny Sergeevich Abramov, Elena Barannik, Oleg B. Makarevich |
| 2012 | Mining control flow graph as Parvez Faruki, Vijay Laxmi, Manoj Singh Gaur, P. Vinod |
| 2012 | Randomness analysis on LED block ciphers. Herman Isa, Muhammad Reza Z'aba |
| 2012 | Research about strength of GOST 28147-89 encryption algorithm. Ludmila K. Babenko, Evgeniya Ishchukova, Ekaterina Maro |
| 2012 | SIRIS: secure IRIS authentication system. Priyanka Loya, Alwyn Roshan Pais |
| 2012 | Security by simple network traffic monitoring. Hiroshi Tsunoda, Glenn Mansfield Keeni |
| 2012 | Split personality malware detection and defeating in popular virtual machines. Anjana V. Kumar, Kalpa Vishnani, K. Vinay Kumar |
| 2012 | The method of optimizing the automatic vulnerability validation. Eugene Tumoyan, Daria Kavchuk |