SIN C

34 papers

YearTitle / Authors
2012(Student contribution) ASPS: an authentication scheme using pre-formed visual cryptographic shares.
Kunal Sain, Mradula Sharma, Suneeta Agarwal
20125th International Conference of Security of Information and Networks, SIN '12, Jaipur, India, October 22 - 26, 2012
Manoj Singh Gaur, Atilla Elçi, Oleg B. Makarevich, Mehmet A. Orgun, Virendra Singh
2012A clustering based algorithm for network intrusion detection.
K. V. Arya, Hemant Kumar
2012A concept of unification of network security policies.
Dmitry Chernyavskiy, Natalia G. Miloslavskaya
2012A novel framework for intrusion detection in cloud.
Chirag Modi, Dhiren R. Patel, Bhavesh Borisaniya, Avi Patel, Muttukrishnan Rajarajan
2012A region specific robust watermarking scheme based on singular value decomposition.
Priyanka Singh, Suneeta Agarwal
2012An efficient fuzzy controller based technique for network traffic classification to improve QoS.
Ajay Chaudhary, Manoj Misra, Anjali Sardana
2012Analysis of a secure cooperative channel sensing protocol for cognitive radio networks.
Geong Sen Poh, Kok-Lim Alvin Yau, Mee Hong Ling
2012Anomaly based intrusion detection using meta ensemble classifier.
Debojit Boro, Bernard Nongpoh, Dhruba K. Bhattacharyya
2012Botnets: a heuristic-based detection framework.
Luís Mendonça, Henrique Santos
2012Building of alphabetic data protection cryptosystems on the base of equal power knapsacks with Diophantine problems.
Valeriy O. Osipyan
2012Classification of polymorphic and metamorphic malware samples based on their behavior.
Ksenia Tsyganok, Evgeny Tumoyan, Ludmila K. Babenko, Maxim Anikeev
2012Detection attack analysis using partial watermark in DCT domain.
Reena Gunjan, Vijay Laxmi, Manoj Singh Gaur
2012Detection of NDP based attacks using MLD.
Gunjan Bansal, Niteesh Kumar, Sukumar Nandi, Santosh Biswas
2012Detection of incorrect position information using speed and time span verification in VANET.
Jyoti Grover, Manoj Singh Gaur, Vijay Laxmi, Rakesh Kumar Tiwari
2012ESCAPE: entropy score analysis of packed executable.
Smita Naval, Vijay Laxmi, Manoj Singh Gaur, P. Vinod
2012Efficient image encryption and decryption using discrete wavelet transform and fractional Fourier transform.
Prerana Sharma, Devesh Mishra, Ankur Agarwal
2012Efficient regular expression pattern matching for network intrusion detection systems using modified word-based automata.
Pawan Kumar, Virendra Singh
2012Enforcement of access control policy for mobile ad hoc networks.
Soumya Maity, Soumya Kanti Ghosh
2012Enhancing the ArchiMate® standard with a responsibility modeling language for access rights management.
Christophe Feltus, Eric Dubois, Erik Proper, Iver Band, Michaël Petit
2012Ensemble-based DDoS detection and mitigation model.
Sajal Bhatia, Desmond Allan Schmidt, George M. Mohay
2012Feature analysis for the blind-watermarked electroencephalogram signal in wireless telemonitoring using Alattar's method.
Nilanjan Dey, Poulami Das, Sheli Sinha Chaudhuri, Achintya Das
2012Fine tuning the advanced encryption standard (AES).
Behnam Rahnama, Atilla Elçi, Ibukun Eweoya
2012Fusion of multiple data mining techniques for effective network intrusion detection: a contemporary approach.
A. M. Chandrashekar, K. Raghuveer
2012Hybridization of DCTune and psycho-visual saliency model to improve security and capacity in DCT based image watermarking.
Apurba Das, S. Kavitha
2012Lip peripheral motion for visual surveillance.
Preety Singh, Vijay Laxmi, Manoj Singh Gaur
2012Methods of automated analysis of vendor specific implementation of stateful-filtration.
Evgeny Sergeevich Abramov, Elena Barannik, Oleg B. Makarevich
2012Mining control flow graph as
Parvez Faruki, Vijay Laxmi, Manoj Singh Gaur, P. Vinod
2012Randomness analysis on LED block ciphers.
Herman Isa, Muhammad Reza Z'aba
2012Research about strength of GOST 28147-89 encryption algorithm.
Ludmila K. Babenko, Evgeniya Ishchukova, Ekaterina Maro
2012SIRIS: secure IRIS authentication system.
Priyanka Loya, Alwyn Roshan Pais
2012Security by simple network traffic monitoring.
Hiroshi Tsunoda, Glenn Mansfield Keeni
2012Split personality malware detection and defeating in popular virtual machines.
Anjana V. Kumar, Kalpa Vishnani, K. Vinay Kumar
2012The method of optimizing the automatic vulnerability validation.
Eugene Tumoyan, Daria Kavchuk