


default search action
ISEA-ISAP 2018: Jaipur, India
- Sukumar Nandi, Devesh Jinwala, Virendra Singh, Vijay Laxmi

, Manoj Singh Gaur, Parvez Faruki:
Security and Privacy - Second ISEA International Conference, ISEA-ISAP 2018, Jaipur, India, January, 9-11, 2019, Revised Selected Papers. Communications in Computer and Information Science 939, Springer 2019, ISBN 978-981-13-7560-6
Authentication and Access Control
- Sumit Kumar Tetarave, Somanath Tripathy:

Secure Opportunistic Data Exchange Using Smart Devices in 5G/LTE-A Networks. 3-16 - Jay Dave, Vijay Laxmi

, Parvez Faruki, Manoj Singh Gaur, Bhavya Shah:
Bloom Filter Based Privacy Preserving Deduplication System. 17-34 - N. V. Narendra Kumar, R. K. Shyamasundar:

A Semantic Notion of Secure Information-Flow. 35-52 - Apurva S. Kittur, Swapnil Kauthale, Alwyn R. Pais

:
Bad Signature Identification in a Batch Using Error Detection Codes. 53-66 - Sandip Ghosal

, R. K. Shyamasundar:
A Solution to "Confused Deputy" Problem Using RWFM Labels. 67-76 - Sagar Rane, Arati M. Dixit:

BlockSLaaS: Blockchain Assisted Secure Logging-as-a-Service for Cloud Forensics. 77-88 - Nataasha Raul, Royston D'mello, Mandar Bhalerao:

Keystroke Dynamics Authentication Using Small Datasets. 89-96 - Mahendra Pratap Singh

, S. Sudharsan, M. Vani:
ARBAC: Attribute-Enabled Role Based Access Control Model. 97-111
Malware Analysis
- Hassan Naderi, P. Vinod, Mauro Conti

, Saeed Parsa, Mohammad Hadi Alaeiyan
:
Malware Signature Generation Using Locality Sensitive Hashing. 115-124 - Parvez Faruki, Bharat Buddhadev, Bhavya Shah, Akka Zemmari

, Vijay Laxmi
, Manoj Singh Gaur:
DroidDivesDeep: Android Malware Classification via Low Level Monitorable Features with Deep Neural Networks. 125-139 - Sukanta Dey

, Abhishek Kumar, Mehul Sawarkar, Pranav Kumar Singh
, Sukumar Nandi
:
EvadePDF: Towards Evading Machine Learning Based PDF Malware Classifiers. 140-150
Network Security
- Sangita Roy

, Hardik Chawla, Ashok Singh Sairam:
IP Traceback in Dynamic Networks. 153-165 - Pranav Kumar Singh

, Shivam Gupta, Ritveeka Vashistha, Sunit Kumar Nandi, Sukumar Nandi
:
Machine Learning Based Approach to Detect Position Falsification Attack in VANETs. 166-178 - Mohit Kumar Singh, Vijay Laxmi

, Neeta Nain
:
Unsupervised Person Re-ID in Surveillance Feed Using Re-ranking. 179-192 - Deeksha Kushwah

, Rajni Ranjan Singh
, Deepak Singh Tomar:
An Approach to Meta-Alert Generation for Anomalous TCP Traffic. 193-216
Privacy Preservation
- Vineeta Jain

, Vijay Laxmi
, Manoj Singh Gaur, Mohamed Mosbah
:
APPLADroid: Automaton Based Inter-app Privacy Leak Analysis for Android. 219-233 - Dhaneshwar Mardi, Jaydeep Howlader:

Multiparty Evaluation of Finite State Machine. 234-246 - Pranav Verma, Harshul Vaishnav, Anish Mathuria, Sourish Dasgupta:

An Enhanced Privacy-Preserving Recommender System. 247-260 - Swati Rawal, Sahadeo Padhye

:
Threshold Ring Signature with Message Block Sharing. 261-271
Secure Software Systems
- Faisal Anwer, Mohd Nazir, Khurram Mustafa:

Testing Program Crash Based on Search Based Testing and Exception Injection. 275-285
Social Network Analytics
- Alok Kumar

, Maninder Singh
, Alwyn Roshan Pais
:
Fuzzy String Matching Algorithm for Spam Detection in Twitter. 289-301

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














