Linked e-resources

Details

[I]. Information security: A memory-efficient multiple string matching algorithm based on charset transformation / Yuhai Lu, Yanbing Liu, Gongxin Sun, and Jianlong Tan
An image mathcrypt : a flawless security via flawed image / R. Anushiadevi, Veeramuthu Venkatesh, and Rengarajan Amirtharajan
Secure ATM device design by control command verification / Hisao Ogata, Tomoyoshi Ishikawa, Norichika Miyamoto, and Tsutomu Matsumoto
Construction of two dimensional cubic-tent-sine map for secure image transmission / Sujarani Rajendran and Manivannan Doraipandian
Confused memory read attracts synthetic diffusion on the fly : a lightweight image encryption for IoT platform / Vinoth Raj, Siva Janakiraman, Sundararaman Rajagopalan, and Amirtharajan Rengarajan.

[II]. Network security: Insider attacks on Zigbee based IoT networks by exploiting AT commands / Waqas Ahmad Piracha, Morshed Chowdhury, Biplob Ray, Sutharshan Rajasegarar, and Robin Doss
A survey on various integrity verification schemes on the data outsourced to cloud storage / S. Milton Ganesh and S. P. Manikandan
Prognostic views on software defined networks based security for Internet of Things / Antony Taurshia, Jaspher W. Kathrine, and D. Shibin
Integrity checking of cloud data with an auditing mechanism using ECC and Merkle hash tree / T. Suriya Praba and V. Meena
Anomaly detection in critical infrastructure using probabilistic neural network / M. R. Gauthama Raman, Nivethitha Somu, and Aditya P. Mathur
Chaotic map based key generation and realistic power allocation technique for secure MU-MIMO wireless system / C. Manikandan, S. Rakesh Kumar, Kopparthi Nikhith, M. Sai Gayathri, and P. Neelamegam.

[III]. Intrusion detection system: A survey of machine learning techniques used to combat against the advanced persistent threat / E. Rajalakshmi, N. Asik Ibrahim, and V. Subramaniyaswamy
Subtree hypergraph-based attack detection model for signature matching over SCADA HMI / Sujeet S. Jagtap and V. S. Shankar Sriram
Computational CBGSA : SVM model for network based intrusion detection system / Tina Manghnani and T. Thirumaran
Attention-based LSTM for insider threat detection / Fangfang Yuan, Yanmin Shang, Yanbing Liu, Yanan Cao, and Jianlong Tan
Cog-SDN : mitigation mechanism for distributed denial of service attacks in software defined networks / P. Mohana Priya and K. R. Manjula.

[IV]. Authentication and key management system: Password strength estimators trained on the leaked password lists / Cameron R. Schafer and Lei Pan
Cellular automata based key stream generator : a reconfigurable hardware approach / Sundararaman Rajagopalan, Nikhil Krishnaa Sriram, V. Manikandan, Sivaraman Rethinam, Sridevi Arumugham, Siva Janakiraman, and Amirtharajan Rengarajan
Hardware Trojan on SIMON architecture for key retrieval / Sivappriya Manivannan and K. K. Soundra Pandian
Privacy-preserving authentication scheme using reduced-advanced encryption standard for vehicular ad hoc network / S. Sharon, T. Suriya Praba, R. Anushiadevi, and Veeramuthu Venkatesh
On the security of the double-block-length hash function NCASH / Tapadyoti Banerjee and Dipanwita Roy Chowdhury.

[V]. Security centric applications: Tele-transmission of secured prefrontal cortex information records for remote health care / Monish Ram K, Ananya Sairaj, Ramya Lakshmi Srinivasan, Raajan N R, and Girish Ganesan R
Encryption by heart (EbH) for secured data transmission and CNN based EKG signal classification of arrhythmia with normal data / Tarun Kumar D, Ramya Lakshmi Srinivasan, and Raajan N R
Ripping the fabric : attacks and mitigations on hyperledger fabric / Ahaan Dabholkar and Vishal Saraswat.

Browse Subjects

Show more subjects...

Statistics

from
to
Export