default search action
16th SIN 2023: Jaipur, India
- 16th International Conference on Security of Information and Networks, SIN 2023, Jaipur, India, November 20-21, 2023. IEEE 2023, ISBN 979-8-3503-4321-2
- Mayank Kumar, Radha Agrawal, Priyanka Singh:
RAFT: Evaluating Federated Learning Resilience Against Threats. 1-6 - Panu Puhtila, Robin Carlsson, Sampsa Rauti:
Privacy Risks of Third-Party Services on Women's Shelter Websites. 1-6 - Keshav Kaushik, Govind Sharma, Preeti Narooka, Gunjan Chhabra, Ankit Vishnoi:
HTML Smuggling: Attack and Mitigation. 1-5 - Mohon Dash Tanu, S. M. Fahim Faisal, Srabony Majumder, Mumtahinah Rahman Sristy, Rigan Paul, Muhammad Iqbal Hossain, Md. Sabbir Ahmed:
Hybrid Steganography: A Multi-Layered Framework for Hybrid Text and Image Concealment Enhanced by AES and LSB Techniques. 1-6 - Prabith GS, S. Abhishek, Anjali T, Radhika Ravindran:
Zero-Click Exploits and Malware: An In-Depth Analysis and Case Studies. 1-9 - Manik Chandra Pandey, Pradeep Singh Rawat:
Efficient Virtual Machine Provisioning Techniques in Cloud Computing: A Systematic Review. 1-11 - Ishaan Shukla, Atharva Joshi, Shital Girme:
LSB Steganography Mechanism to Hide Texts Within Images Backed with Layers of Encryption. 1-6 - Jay Dave, Anshul Kanodia, Raj Srivastava, Kushagra Singh, Prithvi Hegde, Hitaishi Desai:
Secure and Efficient Key Management for Deduplicated Cloud Storage Systems. 1-6 - Harshita Jha, Surinder Kaur:
Implementation of Communication Aid Using Zigbee Technology Based On Personal Area Network(PAN). 1-6 - Md Sharafat Hossain, Md Delwar Hossain, Md Mahbubur Rahman, Yuzo Taenaka, Md Saiful Islam, Youki Kadobayashi:
A Comparative Performance Analysis of Android Malware Classification Using Supervised and Semi-supervised Deep Learning. 1-8 - Virender, Lokesh Sharma, Satyabrata Roy, Umashankar Rawat:
Low-Rate DDoS Attack on SDN Controller and Its Impact. 1-6 - Soumi Ghosh, Kamal Upreti, Samreen Jafri, Prakash Divakaran, Vandana Mishra Chaturvedi, Prashant Vats:
A Comparative Analysis of Autonomous Ledger Systems for Enhanced Blockchain Computing Applications. 1-6 - Mazharul Islam, Mubasshir Ahmed, Rajesh Palit:
Storage and Maintenance of Sensitive Data using Homomorphic Encryption. 1-6 - Utsav Upadhyay, Alok Kumar, Satyabrata Roy, Umashankar Rawat, Sandeep Chaurasia:
Defending the Cloud: Understanding the Role of Explainable AI in Intrusion Detection Systems. 1-9 - Sampsa Rauti, Esko Vuorinen, Robin Carlsson, Panu Puhtila:
Data Leaks to Third-Party Services on Medical Websites. 1-7 - Aditi Sharma, Mukta Patel, Arjun Choudhary, Gajender Kumar:
Blockchain Based Security Enabled Smart Contract for Energy Management. 1-7 - Anmol Kumar, Mayank Agarwal:
Preserving Service Availability Under DDoS Attack in Micro-Service Based Cloud Infrastructure. 1-8 - Sanghamitra Nemmini, S. Abhishek, Anjali T, Sincy Raj:
Fortifying Information Security: Security Implications of Microservice and Monolithic Architectures. 1-6 - Motahare Mounesan, Hossein Siadati, Sima Jafarikhah:
Exploring the Threat of Software Supply Chain Attacks on Containerized Applications. 1-8 - Meenakshi Gupta, Poonam Gera, Bharavi Mishra:
A Lightweight Certificateless Signcryption Scheme based on HCC for securing Underwater Wireless Sensor Networks (UWSNs). 1-8 - Hema Dhadhal, Paresh P. Kotak, Parvez Faruki, Atul Gonsai, Sajal Bhatia:
Towards Learning Based Detection and Mitigation of DDoS Attacks in Software Defined Networks. 1-6 - Muhammad Aashiq Moosa, Apurva K. Vangujar, Dnyanesh Pramod Mahajan:
Detection and Analysis of DDoS Attack Using a Collaborative Network Monitoring Stack. 1-9 - Bagannagari Sai Teja, Baru Charita Sri, Gandam Vindya, Ch. Madhu Babu:
Emerging Technologies in the Fight Against Drug Counterfeiting - A Survey of Security Measures. 1-6 - Puneet Kumar Pal, Dhirendra Kumar:
Image Encryption based on Chaotic Map and Fractal Sorting Matrix. 1-6 - Mayank Kumar, Radha Agrawal, Priyanka Singh:
BATFL: Battling Backdoor Attacks in Federated Learning. 1-6 - Chudinov Pavel, Babenko Ludmila:
Analysis of the Semantic Webs for Their Information Security. 1-4 - Sahib J. Parmar, Vinitkumar R. Parmar, Jai Prakash Verma, Satyabrata Roy, Pronaya Bhattacharya:
Quantum Computing: Exploring Superposition and Entanglement for Cutting-Edge Applications. 1-6 - Ritu Rai, Jyoti Grover, Soumya Pandey:
Unveiling Threats: A Comprehensive Taxonomy of Attacks in In-Vehicle Networks. 1-7 - Akram Al-Rumaim, Jyoti D. Pawar:
Exploring the Evolving Landscape of API Security Challenges in the Healthcare Industry: A Comprehensive Review. 1-8 - Sneha Rajagopal, Avanthika Gaur, P. Vinod:
Interpretable PDF Malware Detector. 1-6 - Santoshi Rudrakar, Parag H. Rughani, Jeet Rami:
UART Port Bane or Boon: Vulnerabilities vs Significance for Digital Investigation in Ag-IoT. 1-6 - B. S. Vidhyasagar, M. Arvindhan, Sivakumar Kalimuthu:
The Crucial Function that Clouds Access Security Brokers Play in Ensuring the Safety of Cloud Computing. 1-5 - Aviral Srivastava, Viral Parmar, Priyansh Sanghavi, Seema Rani:
Digital Power Play: Unraveling the Evolution of State-Sponsored Cyber Operations. 1-6 - Parth Parmar, Jekil Gadhiya, Satvik Vats, Deepak Kumar Verma, Krunal Vaghela:
A Review of DNA Cryptography: From a Data Protection Perspective. 1-7
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.