SIN C

35 papers

YearTitle / Authors
202316th International Conference on Security of Information and Networks, SIN 2023, Jaipur, India, November 20-21, 2023
2023A Comparative Analysis of Autonomous Ledger Systems for Enhanced Blockchain Computing Applications.
Soumi Ghosh, Kamal Upreti, Samreen Jafri, Prakash Divakaran, Vandana Mishra Chaturvedi, Prashant Vats
2023A Comparative Performance Analysis of Android Malware Classification Using Supervised and Semi-supervised Deep Learning.
Md Sharafat Hossain, Md Delwar Hossain, Md Mahbubur Rahman, Yuzo Taenaka, Md Saiful Islam, Youki Kadobayashi
2023A Lightweight Certificateless Signcryption Scheme based on HCC for securing Underwater Wireless Sensor Networks (UWSNs).
Meenakshi Gupta, Poonam Gera, Bharavi Mishra
2023A Review of DNA Cryptography: From a Data Protection Perspective.
Parth Parmar, Jekil Gadhiya, Satvik Vats, Deepak Kumar Verma, Krunal Vaghela
2023Analysis of the Semantic Webs for Their Information Security.
Chudinov Pavel, Babenko Ludmila
2023BATFL: Battling Backdoor Attacks in Federated Learning.
Mayank Kumar, Radha Agrawal, Priyanka Singh
2023Blockchain Based Security Enabled Smart Contract for Energy Management.
Aditi Sharma, Mukta Patel, Arjun Choudhary, Gajender Kumar
2023Data Leaks to Third-Party Services on Medical Websites.
Sampsa Rauti, Esko Vuorinen, Robin Carlsson, Panu Puhtila
2023Defending the Cloud: Understanding the Role of Explainable AI in Intrusion Detection Systems.
Utsav Upadhyay, Alok Kumar, Satyabrata Roy, Umashankar Rawat, Sandeep Chaurasia
2023Detection and Analysis of DDoS Attack Using a Collaborative Network Monitoring Stack.
Muhammad Aashiq Moosa, Apurva K. Vangujar, Dnyanesh Pramod Mahajan
2023Digital Power Play: Unraveling the Evolution of State-Sponsored Cyber Operations.
Aviral Srivastava, Viral Parmar, Priyansh Sanghavi, Seema Rani
2023Efficient Virtual Machine Provisioning Techniques in Cloud Computing: A Systematic Review.
Manik Chandra Pandey, Pradeep Singh Rawat
2023Emerging Technologies in the Fight Against Drug Counterfeiting - A Survey of Security Measures.
Bagannagari Sai Teja, Baru Charita Sri, Gandam Vindya, Ch. Madhu Babu
2023Exploring the Evolving Landscape of API Security Challenges in the Healthcare Industry: A Comprehensive Review.
Akram Al-Rumaim, Jyoti D. Pawar
2023Exploring the Threat of Software Supply Chain Attacks on Containerized Applications.
Motahare Mounesan, Hossein Siadati, Sima Jafarikhah
2023Fortifying Information Security: Security Implications of Microservice and Monolithic Architectures.
Sanghamitra Nemmini, S. Abhishek, Anjali T, Sincy Raj
2023HTML Smuggling: Attack and Mitigation.
Keshav Kaushik, Govind Sharma, Preeti Narooka, Gunjan Chhabra, Ankit Vishnoi
2023Hybrid Steganography: A Multi-Layered Framework for Hybrid Text and Image Concealment Enhanced by AES and LSB Techniques.
Mohon Dash Tanu, S. M. Fahim Faisal, Srabony Majumder, Mumtahinah Rahman Sristy, Rigan Paul, Muhammad Iqbal Hossain, Md. Sabbir Ahmed
2023Image Encryption based on Chaotic Map and Fractal Sorting Matrix.
Puneet Kumar Pal, Dhirendra Kumar
2023Implementation of Communication Aid Using Zigbee Technology Based On Personal Area Network(PAN).
Harshita Jha, Surinder Kaur
2023Interpretable PDF Malware Detector.
Sneha Rajagopal, Avanthika Gaur, P. Vinod
2023LSB Steganography Mechanism to Hide Texts Within Images Backed with Layers of Encryption.
Ishaan Shukla, Atharva Joshi, Shital Girme
2023Low-Rate DDoS Attack on SDN Controller and Its Impact.
Virender, Lokesh Sharma, Satyabrata Roy, Umashankar Rawat
2023Preserving Service Availability Under DDoS Attack in Micro-Service Based Cloud Infrastructure.
Anmol Kumar, Mayank Agarwal
2023Privacy Risks of Third-Party Services on Women's Shelter Websites.
Panu Puhtila, Robin Carlsson, Sampsa Rauti
2023Quantum Computing: Exploring Superposition and Entanglement for Cutting-Edge Applications.
Sahib J. Parmar, Vinitkumar R. Parmar, Jai Prakash Verma, Satyabrata Roy, Pronaya Bhattacharya
2023RAFT: Evaluating Federated Learning Resilience Against Threats.
Mayank Kumar, Radha Agrawal, Priyanka Singh
2023Secure and Efficient Key Management for Deduplicated Cloud Storage Systems.
Jay Dave, Anshul Kanodia, Raj Srivastava, Kushagra Singh, Prithvi Hegde, Hitaishi Desai
2023Storage and Maintenance of Sensitive Data using Homomorphic Encryption.
Mazharul Islam, Mubasshir Ahmed, Rajesh Palit
2023The Crucial Function that Clouds Access Security Brokers Play in Ensuring the Safety of Cloud Computing.
B. S. Vidhyasagar, M. Arvindhan, Sivakumar Kalimuthu
2023Towards Learning Based Detection and Mitigation of DDoS Attacks in Software Defined Networks.
Hema Dhadhal, Paresh P. Kotak, Parvez Faruki, Atul Gonsai, Sajal Bhatia
2023UART Port Bane or Boon: Vulnerabilities vs Significance for Digital Investigation in Ag-IoT.
Santoshi Rudrakar, Parag H. Rughani, Jeet Rami
2023Unveiling Threats: A Comprehensive Taxonomy of Attacks in In-Vehicle Networks.
Ritu Rai, Jyoti Grover, Soumya Pandey
2023Zero-Click Exploits and Malware: An In-Depth Analysis and Case Studies.
Prabith GS, S. Abhishek, Anjali T, Radhika Ravindran