


default search action
SECURIT 2012, Kollam, India
- R. Chandrasekhar, Andrew S. Tanenbaum, P. Venkat Rangan:

First International Conference on Security of Internet of Things, SECURIT '12, Kollam, India - August 17 - 19, 2012. ACM 2012, ISBN 978-1-4503-1822-8 - Jayaraj Poroor, Bharat Jayaraman:

Formal analysis of event-driven cyber physical systems. 1-8 - Hiran V. Nath, K. Gangadharan, M. Sethumadhavan:

Reconciliation engine and metric for network vulnerability assessment. 9-21 - Dhruwajita Devi, Sukumar Nandi

:
Detection of packed malware. 22-26 - Shaik Shakeel Ahamad

, V. N. Sastry, Siba K. Udgata
:
A secure and optimized mobile payment framework with formal verification. 27-35 - V. Natarajan, Shina Sheen, R. Anitha:

Detection of StegoBot: a covert social network botnet. 36-41 - Garima Jain, Yatin Mehandiratta:

Chronicle security against covert crawling. 42-50 - Renu Aggarwal, Manik Lal Das:

RFID security in the context of "internet of things". 51-56 - Sampreet A. Sharma, Bernard L. Menezes:

Implementing side-channel attacks on suggest boxes in web applications. 57-62 - Mitul Shah, Anjali Sardana:

Searching in internet of things using VCS. 63-67 - B. S. Adiga, P. Balamuralidhar, M. A. Rajan, Ravishankara Shastry, V. L. Shivraj:

An identity based encryption using elliptic curve cryptography for secure M2M communication. 68-74 - Arijit Ukil, Soma Bandyopadhyay, Joel Joseph, Vijayanand Banahatti, Sachin Lodha:

Negotiation-based privacy preservation scheme in internet of things platform. 75-84 - Parvez Faruki, Vijay Laxmi

, Manoj Singh Gaur, P. Vinod:
Behavioural detection with API call-grams to identify malicious PE files. 85-91 - Xavier N. Fernando

, Kuganeswaran Thambu:
Cross-layer coding improves quality and security in wireless video sensor networks. 92-95 - Digambar Powar

, G. Geethakumari:
Digital evidence detection in virtual environment for cloud computing. 102-106 - Meiyuan Zhao, Jesse Walker, Chieh-Chih Wang:

Security challenges for the intelligent transportation system. 107-115 - Parman Sukarno, Nandita Bhattacharjee, Bala Srinivasan:

How confident are you to counter uncertainty? 116-125 - Abdullah Mohammed Almuhaideb

, Bala Srinivasan, Phu Dung Le, Campbell Wilson
, Vishv Malhotra
:
Analysis of mobile authentication protocols by SVO logic. 126-134 - Lee W. Lerner, Mohammed M. Farag

, Cameron D. Patterson:
Run-time prediction and preemption of configuration attacks on embedded process controllers. 135-144 - I. Praveen

, M. Sethumadhavan
:
A more efficient and faster pairing computation with cryptographic security. 145-149 - Simon Burton, Jürgen Likkei, Priyamvadha Vembar, Marko Wolf

:
Automotive functional safety = safety + security. 150-159 - Zhiyuan Tan

, Aruna Jamdagni, Priyadarsi Nanda, Xiangjian He
, Ren Ping Liu:
Evaluation on multivariate correlation analysis based denial-of-service attack detection system. 160-164 - Kamalanathan Kandasamy, Krishnashree Achuthan:

Re-architecture of database software stack with planner module for query optimization in a cloud environment. 165-171 - James Clarke, Rodrigo Roman Castro, Abhishek Sharma, Javier López

, Neeraj Suri
:
Trust & security RTD in the internet of things: opportunities for international cooperation. 172-178 - Annie George, Prabaharan Poornachandran

, M. Ramachandra Kaimal:
adsvm: pre-processor plug-in using support vector machine algorithm for Snort. 179-184 - Chinmaya Kumar Patanaik, Ferdous A. Barbhuiya, Sukumar Nandi

:
Obfuscated malware detection using API call dependency. 185-193 - D. Bapat Ameya, Alwyn Roshan Pais

:
Restraining add-on's behavior in private browsing. 194-199 - Susmita Horrow, Anjali Sardana:

Identity management framework for cloud based internet of things. 200-203 - G. K. Ragesh

, K. Baskaran
:
CRYPE: towards cryptographically enforced and privacy enhanced WBANs. 204-209 - Senthil Kumar Mathi

, M. L. Valarmathi
, G. Ramprasath:
A secure and efficient registration for IP mobility. 210-215 - Dhiren, Maulik, Hardik Joshi

, Bhadresh K. Patel:
Towards application classification with vulnerability signatures for IDS/IPS. 216-221 - B. Dinesh Reddy

, V. Valli Kumari
, K. V. S. V. N. Raju:
Randomized symmetric block encryption. 222-226 - Usha Banerjee, K. V. Arya

, Geetika Gupta, Sakshi Sharma:
Performance evaluation of an ant colony based routing algorithm in the presence of a misbehaving node. 227-233 - M. Marfa, Subu Surendran, Sabu M. Thampi

, T. Radhakrishnan:
Cache based approach for improving location based query processing in mobile environment. 234-238 - N. Kaleeswari, K. Baskaran

:
Reducing the energy consumption in wireless sensor networks using delay aware dynamic routing protocol. 239-245 - V. Rajalakshmi, G. S. Anandha Mala

:
Integer partitioning based encryption for privacy preservation in data mining. 246-251

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














