The Design and Application of a Unified Ontology for Cyber Security
|
2023 |
Akbar, Khandakar Ashrafi |
Big Data Forensics on Apache Kafka
|
2023 |
Mager, Thomas |
A Survey on Security Threats and Mitigation Strategies for NoSQL Databases: MongoDB as a Use Case
|
2023 |
Dwivedi, Surabhi |
Security and Privacy in Machine Learning
|
2023 |
Chandran, Nishanth |
Attack on the Privacy-Preserving Carpooling Service TAROT
|
2023 |
Vargheese, Meghana |
Escrow and Pairing Free CP-ABE Scheme with Forward and Backward Secrecy for Healthcare Internet of Things
|
2023 |
Bhaskar, Sourabh |
SoK: Digital Signatures and Taproot Transactions in Bitcoin
|
2023 |
Jain, Anubha |
Proof-of-Variable-Authority: A Blockchain Consensus Mechanism for Securing ToT Networks
|
2023 |
Chacko, Lenoah |
Private and Verifiable Inter-bank Transactions and Settlements on Blockchain
|
2023 |
Narumanchi, Harika |
Attack Graph Based Security Metrics for Dynamic Networks
|
2023 |
Gain, Ayan |
Theoretical Enumeration of Deployable Single-Output Strong PUF Instances Based on Uniformity and Uniqueness Constraints
|
2023 |
Balijabudda, Venkata Sreekanth |
A Multi-stage Multi-modal Classification Model for DeepFakes Combining Deep Learned and Computer Vision Oriented Features
|
2023 |
Das, Arnab Kumar |
Secure Smart Grid Data Aggregation Based on Fog Computing and Blockchain Technology
|
2023 |
Sethi, Kamalakanta |
PSDP: Blockchain-Based Computationally Efficient Provably Secure Data Possession
|
2023 |
Kar, Jayaprakash |
Crypto-Ransomware Detection: A Honey-File Based Approach Using Chi-Square Test
|
2023 |
Arakkal, Ajith |
An Energy-Conscious Surveillance Scheme for Intrusion Detection in Underwater Sensor Networks Using Tunicate Swarm Optimization
|
2023 |
Kammula, Sunil Kumar |
Verifiable Timed Accountable Subgroup Multi-signatures
|
2023 |
Özden, Duygu |
Analysis of Optimal Number of Shards Using ShardEval, A Simulator for Sharded BIockchains
|
2023 |
Priyadarshi, Vishisht |
A Security Analysis of Password Managers on Android
|
2023 |
Sharma, Abhyudaya |
Detection and Hardening Strategies to Secure an Enterprise Network
|
2023 |
Mukherjee, Preetam |