default search action
18th ICISS 2022: Tirupati, India
- Venkata Ramana Badarla, Surya Nepal, Rudrapatna K. Shyamasundar:
Information Systems Security - 18th International Conference, ICISS 2022, Tirupati, India, December 16-20, 2022, Proceedings. Lecture Notes in Computer Science 13784, Springer 2022, ISBN 978-3-031-23689-1 - Sutanu Kumar Ghosh, Kiavash Satvat, Rigel Gjomemo, V. N. Venkatakrishnan:
Ostinato: Cross-host Attack Correlation Through Attack Activity Similarity Detection. 1-22 - Abu Faisal, Mohammad Zulkernine:
DKS-PKI: A Distributed Key Server Architecture for Public Key Infrastructure. 23-43 - Karin Mortl, Rinku Dewri:
Generating-Set Evaluation of Bloom Filter Hardening Techniques in Private Record Linkage. 44-63 - Narendra Singh, Somanath Tripathy, Bruhadeshwar Bezawada:
SHIELD: A Multimodal Deep Learning Framework for Android Malware Detection. 64-83 - B. S. Radhika, N. V. Narendra Kumar, R. K. Shyamasundar:
Samyukta: A Unified Access Control Model using Roles, Labels, and Attributes. 84-102 - Vidhi Bansal, Mohona Ghosh, Niyati Baliyan:
Efficient and Effective Static Android Malware Detection Using Machine Learning. 103-118 - Qingtian Zou, Lan Zhang, Anoop Singhal, Xiaoyan Sun, Peng Liu:
Attacks on ML Systems: From Security Analysis to Attack Mitigation. 119-138 - Debasmita Manna, Harsh Kasyap, Somanath Tripathy:
MILSA: Model Interpretation Based Label Sniffing Attack in Federated Learning. 139-154 - N. G. Bhuvaneswari Amma, P. Valarmathi:
IoTInDet: Detecting Internet of Things Intrusions with Class Scatter Ratio and Hellinger Distance Statistics. 155-168 - Gulshan Kumar Singh, Gaurav Somani:
Detecting Cloud Originated DDoS Attacks at the Source Using Out-Cloud Attack Detection (OCAD). 169-185 - Maryam Davari, Mohammad Zulkernine:
Mining Attribute-Based Access Control Policies. 186-201 - Sandip Ghosal, R. K. Shyamasundar:
Preventing Privacy-Violating Information Flows in JavaScript Applications Using Dynamic Labelling. 202-219 - Srinidhi Madabhushi, Rinku Dewri:
On the Impact of Model Tolerance in Power Grid Anomaly Detection Systems. 220-234 - Neminath Hubballi, Kanishk Patel:
WiP: Control Plane Saturation Attack Mitigation in Software Defined Networks. 235-246 - Aniket Sangwan, Sarthak Jain, Neminath Hubballi:
WiP: EventTracker-Event Driven Evidence Collection for Digital Forensics. 247-259 - Shaurya Sood, Pritesh Palod, Neminath Hubballi:
WiP: Characterizing the Impact of Multiplexed DoS Attacks on HTTP and Detection. 260-271
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.