|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
No Growbag Graphs found.
|
|
|
Results
Found 37 publication records. Showing 37 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Dhiren, Maulik, Hardik Joshi, Bhadresh K. Patel |
Towards application classification with vulnerability signatures for IDS/IPS. |
SECURIT |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Parvez Faruki, Vijay Laxmi, Manoj Singh Gaur, P. Vinod 0001 |
Behavioural detection with API call-grams to identify malicious PE files. |
SECURIT |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Hiran V. Nath, K. Gangadharan, M. Sethumadhavan 0001 |
Reconciliation engine and metric for network vulnerability assessment. |
SECURIT |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Usha Banerjee, K. V. Arya, Geetika Gupta, Sakshi Sharma |
Performance evaluation of an ant colony based routing algorithm in the presence of a misbehaving node. |
SECURIT |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Abdullah Mohammed Almuhaideb, Bala Srinivasan 0002, Phu Dung Le, Campbell Wilson, Vishv Malhotra |
Analysis of mobile authentication protocols by SVO logic. |
SECURIT |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Senthil Kumar Mathi, M. L. Valarmathi, G. Ramprasath |
A secure and efficient registration for IP mobility. |
SECURIT |
2012 |
DBLP DOI BibTeX RDF |
|
1 | V. Rajalakshmi, G. S. Anandha Mala |
Integer partitioning based encryption for privacy preservation in data mining. |
SECURIT |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Shaik Shakeel Ahamad, V. N. Sastry, Siba K. Udgata |
A secure and optimized mobile payment framework with formal verification. |
SECURIT |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Lee W. Lerner, Mohammed M. Farag, Cameron D. Patterson |
Run-time prediction and preemption of configuration attacks on embedded process controllers. |
SECURIT |
2012 |
DBLP DOI BibTeX RDF |
|
1 | B. S. Adiga, P. Balamuralidhar, M. A. Rajan, Ravishankara Shastry, V. L. Shivraj |
An identity based encryption using elliptic curve cryptography for secure M2M communication. |
SECURIT |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Annie George, Prabaharan Poornachandran, M. Ramachandra Kaimal |
adsvm: pre-processor plug-in using support vector machine algorithm for Snort. |
SECURIT |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Xavier N. Fernando, Kuganeswaran Thambu |
Cross-layer coding improves quality and security in wireless video sensor networks. |
SECURIT |
2012 |
DBLP DOI BibTeX RDF |
|
1 | V. Natarajan, Shina Sheen, R. Anitha 0002 |
Detection of StegoBot: a covert social network botnet. |
SECURIT |
2012 |
DBLP DOI BibTeX RDF |
|
1 | N. Kaleeswari, K. Baskaran |
Reducing the energy consumption in wireless sensor networks using delay aware dynamic routing protocol. |
SECURIT |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Simon Burton 0001, Jürgen Likkei, Priyamvadha Vembar, Marko Wolf |
Automotive functional safety = safety + security. |
SECURIT |
2012 |
DBLP DOI BibTeX RDF |
|
1 | I. Praveen, M. Sethumadhavan 0001 |
A more efficient and faster pairing computation with cryptographic security. |
SECURIT |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Zhiyuan Tan 0001, Aruna Jamdagni, Priyadarsi Nanda, Xiangjian He, Ren Ping Liu |
Evaluation on multivariate correlation analysis based denial-of-service attack detection system. |
SECURIT |
2012 |
DBLP DOI BibTeX RDF |
|
1 | James Clarke, Rodrigo Roman Castro, Abhishek Sharma, Javier López 0001, Neeraj Suri |
Trust & security RTD in the internet of things: opportunities for international cooperation. |
SECURIT |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Susmita Horrow, Anjali Sardana |
Identity management framework for cloud based internet of things. |
SECURIT |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Kamalanathan Kandasamy, Krishnashree Achuthan |
Re-architecture of database software stack with planner module for query optimization in a cloud environment. |
SECURIT |
2012 |
DBLP DOI BibTeX RDF |
|
1 | M. Marfa, Subu Surendran, Sabu M. Thampi, T. Radhakrishnan |
Cache based approach for improving location based query processing in mobile environment. |
SECURIT |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Smita Naval, Vijay Laxmi, Manoj Singh Gaur, P. Vinod 0001 |
SPADE: Signature based PAcker DEtection. |
SECURIT |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Renu Aggarwal, Manik Lal Das |
RFID security in the context of "internet of things". |
SECURIT |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Sampreet A. Sharma, Bernard L. Menezes |
Implementing side-channel attacks on suggest boxes in web applications. |
SECURIT |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Chinmaya Kumar Patanaik, Ferdous A. Barbhuiya, Sukumar Nandi |
Obfuscated malware detection using API call dependency. |
SECURIT |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Meiyuan Zhao, Jesse Walker, Chieh-Chih Wang |
Security challenges for the intelligent transportation system. |
SECURIT |
2012 |
DBLP DOI BibTeX RDF |
|
1 | G. K. Ragesh, K. Baskaran |
CRYPE: towards cryptographically enforced and privacy enhanced WBANs. |
SECURIT |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Garima Jain, Yatin Mehandiratta |
Chronicle security against covert crawling. |
SECURIT |
2012 |
DBLP DOI BibTeX RDF |
|
1 | B. Dinesh Reddy, V. Valli Kumari, K. V. S. V. N. Raju |
Randomized symmetric block encryption. |
SECURIT |
2012 |
DBLP DOI BibTeX RDF |
|
1 | D. Bapat Ameya, Alwyn Roshan Pais |
Restraining add-on's behavior in private browsing. |
SECURIT |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Parman Sukarno, Nandita Bhattacharjee, Bala Srinivasan 0002 |
How confident are you to counter uncertainty? |
SECURIT |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Digambar Powar, G. Geethakumari |
Digital evidence detection in virtual environment for cloud computing. |
SECURIT |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Jayaraj Poroor, Bharat Jayaraman |
Formal analysis of event-driven cyber physical systems. |
SECURIT |
2012 |
DBLP DOI BibTeX RDF |
|
1 | R. Chandrasekhar, Andrew S. Tanenbaum, P. Venkat Rangan (eds.) |
First International Conference on Security of Internet of Things, SECURIT '12, Kollam, India - August 17 - 19, 2012 |
SECURIT |
2012 |
DBLP BibTeX RDF |
|
1 | Mitul Shah, Anjali Sardana |
Searching in internet of things using VCS. |
SECURIT |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Arijit Ukil, Soma Bandyopadhyay, Joel Joseph, Vijayanand Banahatti, Sachin Lodha |
Negotiation-based privacy preservation scheme in internet of things platform. |
SECURIT |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Dhruwajita Devi, Sukumar Nandi |
Detection of packed malware. |
SECURIT |
2012 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #37 of 37 (100 per page; Change: )
|
|