default search action
10th ATIS 2019: Thanjavur, India
- V. S. Shankar Sriram, V. Subramaniyaswamy, N. Sasikaladevi, Leo Zhang, Lynn Batten, Gang Li:
Applications and Techniques in Information Security - 10th International Conference, ATIS 2019, Thanjavur, India, November 22-24, 2019, Proceedings. Communications in Computer and Information Science 1116, Springer 2019, ISBN 978-981-15-0870-7
Information Security
- Yuhai Lu, Yanbing Liu, Gongxin Sun, Jianlong Tan:
A Memory-Efficient Multiple String Matching Algorithm Based on Charset Transformation. 3-15 - R. Anushiadevi, Veeramuthu Venkatesh, Rengarajan Amirtharajan:
An Image Mathcrypt - A Flawless Security via Flawed Image. 16-31 - Hisao Ogata, Tomoyoshi Ishikawa, Norichika Miyamoto, Tsutomu Matsumoto:
Secure ATM Device Design by Control Command Verification. 32-50 - Sujarani Rajendran, Manivannan Doraipandian:
Construction of Two Dimensional Cubic-Tent-Sine Map for Secure Image Transmission. 51-61 - Vinoth Raj, Siva Janakiraman, Sundararaman Rajagopalan, Amirtharajan Rengarajan:
Confused Memory Read Attracts Synthetic Diffusion on the Fly - A Lightweight Image Encryption for IoT Platform. 62-73
Network Security
- Waqas Ahmad Piracha, Morshed U. Chowdhury, Biplob Ray, Sutharshan Rajasegarar, Robin Doss:
Insider Attacks on Zigbee Based IoT Networks by Exploiting AT Commands. 77-91 - S. Milton Ganesh, S. P. Manikandan:
A Survey on Various Integrity Verification Schemes on the Data Outsourced to Cloud Storage. 92-99 - Antony Taurshia, G. Jaspher W. Kathrine, Shibin David:
Prognostic Views on Software Defined Networks Based Security for Internet of Things. 100-116 - T. Suriya Praba, V. Meena:
Integrity Checking of Cloud Data with an Auditing Mechanism Using ECC and Merkle Hash Tree. 117-128 - M. R. Gauthama Raman, Nivethitha Somu, Aditya P. Mathur:
Anomaly Detection in Critical Infrastructure Using Probabilistic Neural Network. 129-141 - C. Manikandan, S. Rakesh Kumar, Kopparthi Nikhith, M. Sai Gayathri, P. Neelamegam:
Chaotic Map Based Key Generation and Realistic Power Allocation Technique for Secure MU-MIMO Wireless System. 142-155
Intrusion Detection System
- Rajalakshmi Elangovan, N. Asik Ibrahim, V. Subramaniyaswamy:
A Survey of Machine Learning Techniques Used to Combat Against the Advanced Persistent Threat. 159-172 - Sujeet S. Jagtap, V. S. Shankar Sriram:
Subtree Hypergraph-Based Attack Detection Model for Signature Matching over SCADA HMI. 173-184 - Tina Manghnani, T. Thirumaran:
Computational CBGSA - SVM Model for Network Based Intrusion Detection System. 185-191 - Fangfang Yuan, Yanmin Shang, Yanbing Liu, Yanan Cao, Jianlong Tan:
Attention-Based LSTM for Insider Threat Detection. 192-201 - P. Mohana Priya, K. R. Manjula:
Cog-SDN: Mitigation Mechanism for Distributed Denial of Service Attacks in Software Defined Networks. 202-215
Authentication and Key Management System
- Cameron R. Schafer, Lei Pan:
Password Strength Estimators Trained on the Leaked Password Lists. 219-231 - Sundararaman Rajagopalan, Nikhil Krishnaa Sriram, Veerappan Manikandan, Sivaraman Rethinam, Sridevi Arumugham, Siva Janakiraman, Amirtharajan Rengarajan:
Cellular Automata Based Key Stream Generator - A Reconfigurable Hardware Approach. 232-242 - Sivappriya Manivannan, K. K. Soundra Pandian:
Hardware Trojan on SIMON Architecture for Key Retrieval. 243-253 - S. Sharon, T. Suriya Praba, R. Anushiadevi, Veeramuthu Venkatesh:
Privacy-Preserving Authentication Scheme Using Reduced-Advanced Encryption Standard for Vehicular Ad Hoc Network. 254-265 - Tapadyoti Banerjee, Dipanwita Roy Chowdhury:
On the Security of the Double-Block-Length Hash Function NCASH. 266-278
Security Centric Applications
- Monish Ram K, Ananya Sairaj, Ramya Lakshmi Srinivasan, Raajan N. R, Girish Ganesan R:
Tele-Transmission of Secured Prefrontal Cortex Information Records for Remote Health Care. 281-289 - Tarun Kumar D, Ramya Lakshmi Srinivasan, Raajan N. R:
Encryption by Heart (EbH) for Secured Data Transmission and CNN Based EKG Signal Classification of Arrhythmia with Normal Data. 290-299 - Ahaan Dabholkar, Vishal Saraswat:
Ripping the Fabric: Attacks and Mitigations on Hyperledger Fabric. 300-311
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.