| 2017 | 'Global view' in SDN: existing implementation, vulnerabilities & threats. Ajay Nehra, Meenakshi Tripathi, Manoj Singh Gaur |
| 2017 | A comparative analysis of machine learning techniques for botnet detection. Ankit Bansal, Sudipta Mahapatra |
| 2017 | A framework for data security in cloud using collaborative intrusion detection scheme. Upasana T. Nagar, Priyadarsi Nanda, Xiangjian He, Zhiyuan Thomas Tan |
| 2017 | A model of a secure electronic voting system based on blind intermediaries using russian cryptographic algorithms. Liudmila Babenko, Ilya Pisarev, Oleg B. Makarevich |
| 2017 | A novel malware analysis for malware detection and classification using machine learning algorithms. Kamalakanta Sethi, Shankar Kumar Chaudhary, Bata Krishna Tripathy, Padmalochan Bera |
| 2017 | A universal cloud user revocation scheme with key-escrow resistance for ciphertext-policy attribute-based access control. Nazatul Haque Sultan, Ferdous Ahmed Barbhuiya, Nityananda Sarma |
| 2017 | Abnormal leakage of energy in battery-based IoT-devices. Raksha Nawal, Rajbir Kaur |
| 2017 | An enhanced parallel version of RSA public key crypto based algorithm using openMP. Rahul Saxena, Monika Jain, Dushyant Singh, Ashutosh Kushwah |
| 2017 | Analysis and comparison of electronic digital signature state standards GOST R 34.10-1994, GOST R 34.10-2001 and GOST R 34.10-2012. Antonina Komarova, Alexander Menshchikov, Tatyana Klyaus, Anatoly Korobeynikov, Yurij A. Gatchin, Nina Tishukova |
| 2017 | Analysis of ways to secure group control for autonomous mobile robots. Alexander S. Basan, Elena Basan, Oleg B. Makarevich |
| 2017 | Anomaly detection survey for information security. Harsurinder Kaur, Husanbir Singh Pannu |
| 2017 | Approxhash: delay, power and area optimized approximate hash functions for cryptography applications. Sunil Dutt, Bikram Paul, Anshu Chauhan, Sukumar Nandi, Gaurav Trivedi |
| 2017 | Attribute-based approach of defining the secure behavior of automata objects. Fedor Novikov, Ludmila N. Fedorchenko, Vladimir I. Vorobiev, Roza R. Fatkieva, Dmitriy K. Levonevskiy |
| 2017 | CAP: collaborative attack on pastry. Srikanta Pradhan, Somanath Tripathy |
| 2017 | Collaborative representation of Grassmann manifold projection metric for robust multi-spectral face recognition. Narayan Vetrekar, Kiran B. Raja, Ramachandra Raghavendra, Rajendra S. Gad, Christoph Busch |
| 2017 | Component-centric application-driven framework: towards taming privilege separation in Android. Swati Gaur, Sudhanshu Gaur |
| 2017 | Cooperation based defense mechanism against selfish nodes in DTNs. Jaina P. Bhoiwala, Rutvij H. Jhaveri |
| 2017 | Detecting Android application malicious behaviors based on the analysis of control flows and data flows. Peter D. Zegzhda, Dmitry P. Zegzhda, Evgeny Pavlenko, Andrew Dremov |
| 2017 | Differential ananlysis of 3 round Kuznyechik. Evgeniya Ishchukova, Ekaterina Tolomanenko, Ludmila K. Babenko |
| 2017 | Element-key table based complex key generation (E-CKG) for IoT based health care networks. Shailja Dahiya, Manoj Kumar Bohra |
| 2017 | Evaluating machine learning algorithms for detection of interest flooding attack in named data networking. Naveen Kumar, Ashutosh Kumar Singh, Shashank Srivastava |
| 2017 | Extended multi-spectral imaging for gender classification based on image set. Narayan Vetrekar, Ramachandra Raghavendra, Kiran B. Raja, Rajendra S. Gad, Christoph Busch |
| 2017 | Feasibility of idle port scanning using RST rate-limit. Ronak Odhaviya, Anamika Modi, Rahi Sheth, Anish Mathuria |
| 2017 | Flooding in secure wireless sensor networks: Student contribution. Jimmy Bondu, Anupal Mishra, Vijay Laxmi, Manoj Singh Gaur |
| 2017 | Identification of gait data using machine learning technique to categories human locomotion. Anubha Parashar, Apoorva Parashar, Somya Goyal |
| 2017 | Image encryption using wavelet transform over finite field. Vivek P. Khalane, Umesh Bhadade |
| 2017 | Insider threat detection using principal component analysis and self-organising map. Naghmeh Moradpoor, Martyn Brown, Gordon Russell |
| 2017 | Integer overflow vulnerabilities detection in software binary code. Roman Demidov, Alexander I. Pechenkin, Peter D. Zegzhda |
| 2017 | Integration of role based access control with homomorphic cryptosystem for secure and controlled access of data in cloud. Kamalakanta Sethi, Anish Chopra, Padmalochan Bera, Bata Krishna Tripathy |
| 2017 | Internal interface diversification with multiple fake interfaces. Sampsa Rauti, Ville Leppänen |
| 2017 | Language usage on Twitter predicts crime rates. Abdulaziz Almehmadi, Zeinab Joudaki, Roozbeh Jalali |
| 2017 | Light-weight hash algorithms using GRP instruction. Mahaveer Prasad Soni, Alwyn R. Pais |
| 2017 | Malware detection by meta-information of used system functions. Ludmila K. Babenko, Alexey Kirillov |
| 2017 | Modeling of information systems to their security evaluation. Dmitry P. Zegzhda, Peter D. Zegzhda, Alexander I. Pechenkin, Maria A. Poltavtseva |
| 2017 | Network security architectures for VANET. Maxim O. Kalinin, Vasiliy M. Krundyshev, Peter D. Zegzhda, Viacheslav Belenko |
| 2017 | Parameters of the two-stage synchronization algorithm for the quantum key distribution system. Konstantin E. Rumyantsev, Evgeny Rudinsky |
| 2017 | Performance impact of topology poisoning attack in SDN and its countermeasure. Nivindar Kaur, Ashutosh Kumar Singh, Naveen Kumar, Shashank Srivastava |
| 2017 | Permission recommender system for Android. Ankur Shukla, Divya Vikash, Bharavi Mishra, Poonam Gera |
| 2017 | Practical challenges in building fake services with the record and play approach. Jani Tammi, Sampsa Rauti, Ville Leppänen |
| 2017 | Privacy preserving two-server Diffie-Hellman key exchange protocol. Durbadal Chattaraj, Monalisa Sarma, Debasis Samanta |
| 2017 | Proceedings of the 10th International Conference on Security of Information and Networks, SIN 2017, Jaipur, IN, India, October 13-15, 2017. Rajveer Singh Shekhawat, Manoj Singh Gaur, Atilla Elçi, Jaideep Vaidya, Oleg B. Makarevich, Ron Poet, Mehmet A. Orgun, Vijaypal S. Dhaka, Manoj Kumar Bohra, Virender Singh, Ludmila K. Babenko, Naghmeh Moradpoor Sheykhkanloo, Behnam Rahnama |
| 2017 | Proxy visible re-encryption scheme with application to e-mail forwarding. Gaurav Pareek, B. R. Purushothama |
| 2017 | Redesign cloudRAID for flexible and secure enterprise file sharing over public cloud storage. Muhammad I. H. Sukmana, Kennedy A. Torkura, Christoph Meinel, Hendrik Graupner |
| 2017 | Resilient complex event processing in IoT using side-channel information. Rajesh Kumar Shrivastava, Sanket Mishra, Srimanta Barua, Chittaranjan Hota |
| 2017 | SMITE: an SDN and MPLS integrated traceback mechanism. Pynbianglut Hadem, Dilip Kumar Saikia |
| 2017 | Secret sharing scheme based on Cauchy matrix for data outsourcing. Vishnu Prasad C, Arun Raj Kumar P |
| 2017 | Secure and efficient proof of ownership for deduplicated cloud storage. Jay Dave, Parvez Faruki, Vijay Laxmi, Bruhadeshwar Bezawada, Manoj Singh Gaur |
| 2017 | The duality principle in the theory of development generalized A-M knapsack cryptosystems. Valeriy O. Osipyan, Valeriy S. Tlusten, Nina V. Laktionova, Nadezhda V. Vakhrusheva |
| 2017 | Two simplified versions of Kuznyechik cipher (GOST R 34.12-2015). Evgeniya Ishchukova, Ludmila K. Babenko, Maxim Anikeev |
| 2017 | Unmasking of source identity, a step beyond in cyber forensic. Rachana Yogesh Patil, Satish R. Devane |