SIN C

50 papers

YearTitle / Authors
2017'Global view' in SDN: existing implementation, vulnerabilities & threats.
Ajay Nehra, Meenakshi Tripathi, Manoj Singh Gaur
2017A comparative analysis of machine learning techniques for botnet detection.
Ankit Bansal, Sudipta Mahapatra
2017A framework for data security in cloud using collaborative intrusion detection scheme.
Upasana T. Nagar, Priyadarsi Nanda, Xiangjian He, Zhiyuan Thomas Tan
2017A model of a secure electronic voting system based on blind intermediaries using russian cryptographic algorithms.
Liudmila Babenko, Ilya Pisarev, Oleg B. Makarevich
2017A novel malware analysis for malware detection and classification using machine learning algorithms.
Kamalakanta Sethi, Shankar Kumar Chaudhary, Bata Krishna Tripathy, Padmalochan Bera
2017A universal cloud user revocation scheme with key-escrow resistance for ciphertext-policy attribute-based access control.
Nazatul Haque Sultan, Ferdous Ahmed Barbhuiya, Nityananda Sarma
2017Abnormal leakage of energy in battery-based IoT-devices.
Raksha Nawal, Rajbir Kaur
2017An enhanced parallel version of RSA public key crypto based algorithm using openMP.
Rahul Saxena, Monika Jain, Dushyant Singh, Ashutosh Kushwah
2017Analysis and comparison of electronic digital signature state standards GOST R 34.10-1994, GOST R 34.10-2001 and GOST R 34.10-2012.
Antonina Komarova, Alexander Menshchikov, Tatyana Klyaus, Anatoly Korobeynikov, Yurij A. Gatchin, Nina Tishukova
2017Analysis of ways to secure group control for autonomous mobile robots.
Alexander S. Basan, Elena Basan, Oleg B. Makarevich
2017Anomaly detection survey for information security.
Harsurinder Kaur, Husanbir Singh Pannu
2017Approxhash: delay, power and area optimized approximate hash functions for cryptography applications.
Sunil Dutt, Bikram Paul, Anshu Chauhan, Sukumar Nandi, Gaurav Trivedi
2017Attribute-based approach of defining the secure behavior of automata objects.
Fedor Novikov, Ludmila N. Fedorchenko, Vladimir I. Vorobiev, Roza R. Fatkieva, Dmitriy K. Levonevskiy
2017CAP: collaborative attack on pastry.
Srikanta Pradhan, Somanath Tripathy
2017Collaborative representation of Grassmann manifold projection metric for robust multi-spectral face recognition.
Narayan Vetrekar, Kiran B. Raja, Ramachandra Raghavendra, Rajendra S. Gad, Christoph Busch
2017Component-centric application-driven framework: towards taming privilege separation in Android.
Swati Gaur, Sudhanshu Gaur
2017Cooperation based defense mechanism against selfish nodes in DTNs.
Jaina P. Bhoiwala, Rutvij H. Jhaveri
2017Detecting Android application malicious behaviors based on the analysis of control flows and data flows.
Peter D. Zegzhda, Dmitry P. Zegzhda, Evgeny Pavlenko, Andrew Dremov
2017Differential ananlysis of 3 round Kuznyechik.
Evgeniya Ishchukova, Ekaterina Tolomanenko, Ludmila K. Babenko
2017Element-key table based complex key generation (E-CKG) for IoT based health care networks.
Shailja Dahiya, Manoj Kumar Bohra
2017Evaluating machine learning algorithms for detection of interest flooding attack in named data networking.
Naveen Kumar, Ashutosh Kumar Singh, Shashank Srivastava
2017Extended multi-spectral imaging for gender classification based on image set.
Narayan Vetrekar, Ramachandra Raghavendra, Kiran B. Raja, Rajendra S. Gad, Christoph Busch
2017Feasibility of idle port scanning using RST rate-limit.
Ronak Odhaviya, Anamika Modi, Rahi Sheth, Anish Mathuria
2017Flooding in secure wireless sensor networks: Student contribution.
Jimmy Bondu, Anupal Mishra, Vijay Laxmi, Manoj Singh Gaur
2017Identification of gait data using machine learning technique to categories human locomotion.
Anubha Parashar, Apoorva Parashar, Somya Goyal
2017Image encryption using wavelet transform over finite field.
Vivek P. Khalane, Umesh Bhadade
2017Insider threat detection using principal component analysis and self-organising map.
Naghmeh Moradpoor, Martyn Brown, Gordon Russell
2017Integer overflow vulnerabilities detection in software binary code.
Roman Demidov, Alexander I. Pechenkin, Peter D. Zegzhda
2017Integration of role based access control with homomorphic cryptosystem for secure and controlled access of data in cloud.
Kamalakanta Sethi, Anish Chopra, Padmalochan Bera, Bata Krishna Tripathy
2017Internal interface diversification with multiple fake interfaces.
Sampsa Rauti, Ville Leppänen
2017Language usage on Twitter predicts crime rates.
Abdulaziz Almehmadi, Zeinab Joudaki, Roozbeh Jalali
2017Light-weight hash algorithms using GRP instruction.
Mahaveer Prasad Soni, Alwyn R. Pais
2017Malware detection by meta-information of used system functions.
Ludmila K. Babenko, Alexey Kirillov
2017Modeling of information systems to their security evaluation.
Dmitry P. Zegzhda, Peter D. Zegzhda, Alexander I. Pechenkin, Maria A. Poltavtseva
2017Network security architectures for VANET.
Maxim O. Kalinin, Vasiliy M. Krundyshev, Peter D. Zegzhda, Viacheslav Belenko
2017Parameters of the two-stage synchronization algorithm for the quantum key distribution system.
Konstantin E. Rumyantsev, Evgeny Rudinsky
2017Performance impact of topology poisoning attack in SDN and its countermeasure.
Nivindar Kaur, Ashutosh Kumar Singh, Naveen Kumar, Shashank Srivastava
2017Permission recommender system for Android.
Ankur Shukla, Divya Vikash, Bharavi Mishra, Poonam Gera
2017Practical challenges in building fake services with the record and play approach.
Jani Tammi, Sampsa Rauti, Ville Leppänen
2017Privacy preserving two-server Diffie-Hellman key exchange protocol.
Durbadal Chattaraj, Monalisa Sarma, Debasis Samanta
2017Proceedings of the 10th International Conference on Security of Information and Networks, SIN 2017, Jaipur, IN, India, October 13-15, 2017.
Rajveer Singh Shekhawat, Manoj Singh Gaur, Atilla Elçi, Jaideep Vaidya, Oleg B. Makarevich, Ron Poet, Mehmet A. Orgun, Vijaypal S. Dhaka, Manoj Kumar Bohra, Virender Singh, Ludmila K. Babenko, Naghmeh Moradpoor Sheykhkanloo, Behnam Rahnama
2017Proxy visible re-encryption scheme with application to e-mail forwarding.
Gaurav Pareek, B. R. Purushothama
2017Redesign cloudRAID for flexible and secure enterprise file sharing over public cloud storage.
Muhammad I. H. Sukmana, Kennedy A. Torkura, Christoph Meinel, Hendrik Graupner
2017Resilient complex event processing in IoT using side-channel information.
Rajesh Kumar Shrivastava, Sanket Mishra, Srimanta Barua, Chittaranjan Hota
2017SMITE: an SDN and MPLS integrated traceback mechanism.
Pynbianglut Hadem, Dilip Kumar Saikia
2017Secret sharing scheme based on Cauchy matrix for data outsourcing.
Vishnu Prasad C, Arun Raj Kumar P
2017Secure and efficient proof of ownership for deduplicated cloud storage.
Jay Dave, Parvez Faruki, Vijay Laxmi, Bruhadeshwar Bezawada, Manoj Singh Gaur
2017The duality principle in the theory of development generalized A-M knapsack cryptosystems.
Valeriy O. Osipyan, Valeriy S. Tlusten, Nina V. Laktionova, Nadezhda V. Vakhrusheva
2017Two simplified versions of Kuznyechik cipher (GOST R 34.12-2015).
Evgeniya Ishchukova, Ludmila K. Babenko, Maxim Anikeev
2017Unmasking of source identity, a step beyond in cyber forensic.
Rachana Yogesh Patil, Satish R. Devane