default search action
SECURIT 2012, Kollam, India
- R. Chandrasekhar, Andrew S. Tanenbaum, P. Venkat Rangan:
First International Conference on Security of Internet of Things, SECURIT '12, Kollam, India - August 17 - 19, 2012. ACM 2012, ISBN 978-1-4503-1822-8 - Jayaraj Poroor, Bharat Jayaraman:
Formal analysis of event-driven cyber physical systems. 1-8 - Hiran V. Nath, K. Gangadharan, M. Sethumadhavan:
Reconciliation engine and metric for network vulnerability assessment. 9-21 - Dhruwajita Devi, Sukumar Nandi:
Detection of packed malware. 22-26 - Shaik Shakeel Ahamad, V. N. Sastry, Siba K. Udgata:
A secure and optimized mobile payment framework with formal verification. 27-35 - V. Natarajan, Shina Sheen, R. Anitha:
Detection of StegoBot: a covert social network botnet. 36-41 - Garima Jain, Yatin Mehandiratta:
Chronicle security against covert crawling. 42-50 - Renu Aggarwal, Manik Lal Das:
RFID security in the context of "internet of things". 51-56 - Sampreet A. Sharma, Bernard L. Menezes:
Implementing side-channel attacks on suggest boxes in web applications. 57-62 - Mitul Shah, Anjali Sardana:
Searching in internet of things using VCS. 63-67 - B. S. Adiga, P. Balamuralidhar, M. A. Rajan, Ravishankara Shastry, V. L. Shivraj:
An identity based encryption using elliptic curve cryptography for secure M2M communication. 68-74 - Arijit Ukil, Soma Bandyopadhyay, Joel Joseph, Vijayanand Banahatti, Sachin Lodha:
Negotiation-based privacy preservation scheme in internet of things platform. 75-84 - Parvez Faruki, Vijay Laxmi, Manoj Singh Gaur, P. Vinod:
Behavioural detection with API call-grams to identify malicious PE files. 85-91 - Xavier N. Fernando, Kuganeswaran Thambu:
Cross-layer coding improves quality and security in wireless video sensor networks. 92-95 - Digambar Powar, G. Geethakumari:
Digital evidence detection in virtual environment for cloud computing. 102-106 - Meiyuan Zhao, Jesse Walker, Chieh-Chih Wang:
Security challenges for the intelligent transportation system. 107-115 - Parman Sukarno, Nandita Bhattacharjee, Bala Srinivasan:
How confident are you to counter uncertainty? 116-125 - Abdullah Mohammed Almuhaideb, Bala Srinivasan, Phu Dung Le, Campbell Wilson, Vishv Malhotra:
Analysis of mobile authentication protocols by SVO logic. 126-134 - Lee W. Lerner, Mohammed M. Farag, Cameron D. Patterson:
Run-time prediction and preemption of configuration attacks on embedded process controllers. 135-144 - I. Praveen, M. Sethumadhavan:
A more efficient and faster pairing computation with cryptographic security. 145-149 - Simon Burton, Jürgen Likkei, Priyamvadha Vembar, Marko Wolf:
Automotive functional safety = safety + security. 150-159 - Zhiyuan Tan, Aruna Jamdagni, Priyadarsi Nanda, Xiangjian He, Ren Ping Liu:
Evaluation on multivariate correlation analysis based denial-of-service attack detection system. 160-164 - Kamalanathan Kandasamy, Krishnashree Achuthan:
Re-architecture of database software stack with planner module for query optimization in a cloud environment. 165-171 - James Clarke, Rodrigo Roman Castro, Abhishek Sharma, Javier López, Neeraj Suri:
Trust & security RTD in the internet of things: opportunities for international cooperation. 172-178 - Annie George, Prabaharan Poornachandran, M. Ramachandra Kaimal:
adsvm: pre-processor plug-in using support vector machine algorithm for Snort. 179-184 - Chinmaya Kumar Patanaik, Ferdous A. Barbhuiya, Sukumar Nandi:
Obfuscated malware detection using API call dependency. 185-193 - D. Bapat Ameya, Alwyn Roshan Pais:
Restraining add-on's behavior in private browsing. 194-199 - Susmita Horrow, Anjali Sardana:
Identity management framework for cloud based internet of things. 200-203 - G. K. Ragesh, K. Baskaran:
CRYPE: towards cryptographically enforced and privacy enhanced WBANs. 204-209 - Senthil Kumar Mathi, M. L. Valarmathi, G. Ramprasath:
A secure and efficient registration for IP mobility. 210-215 - Dhiren, Maulik, Hardik Joshi, Bhadresh K. Patel:
Towards application classification with vulnerability signatures for IDS/IPS. 216-221 - B. Dinesh Reddy, V. Valli Kumari, K. V. S. V. N. Raju:
Randomized symmetric block encryption. 222-226 - Usha Banerjee, K. V. Arya, Geetika Gupta, Sakshi Sharma:
Performance evaluation of an ant colony based routing algorithm in the presence of a misbehaving node. 227-233 - M. Marfa, Subu Surendran, Sabu M. Thampi, T. Radhakrishnan:
Cache based approach for improving location based query processing in mobile environment. 234-238 - N. Kaleeswari, K. Baskaran:
Reducing the energy consumption in wireless sensor networks using delay aware dynamic routing protocol. 239-245 - V. Rajalakshmi, G. S. Anandha Mala:
Integer partitioning based encryption for privacy preservation in data mining. 246-251
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.