Search

Your search keyword '"Yegneswaran, A."' showing total 114 results

Search Constraints

Start Over You searched for: Author "Yegneswaran, A." Remove constraint Author: "Yegneswaran, A." Database Springer Nature eBooks Remove constraint Database: Springer Nature eBooks
114 results on '"Yegneswaran, A."'

Search Results

1. SoK: A Tale of Reduction, Security, and Correctness - Evaluating Program Debloating Paradigms and Their Compositions

2. DPX: Data-Plane eXtensions for SDN Security Service Instantiation

3. Detecting and Defending Against Certificate Attacks with Origin-Bound CAPTCHAs

6. Using Provenance Patterns to Vet Sensitive Behaviors in Android Apps

7. JumpBox – A Seamless Browser Proxy for Tor Pluggable Transports

8. DroidMiner: Automated Mining and Characterization of Fine-grained Malicious Behaviors in Android Applications

9. Efficient Runtime Policy Enforcement Using Counterexample-Guided Abstraction Refinement

10. An Analysis of the iKee.B iPhone Botnet

12. Using Failure Information Analysis to Detect Enterprise Zombies

13. An Attacker-Defender Game for Honeynets

14. Eureka: A Framework for Enabling Static Malware Analysis

15. An Inside Look at Botnets

16. On the Design and Use of Internet Sinks for Network Abuse Monitoring

17. ALICE@home: Distributed Framework for Detecting Malicious Sites

18. BLADE: Slashing the Invisible Channel of Drive-by Download Malware

19. Unique on the Road: Re-identification of Vehicular Location-Based Metadata

20. POSTER: Location Privacy Using Homomorphic Encryption

21. Security Analysis of Vendor Customized Code in Firmware of Embedded Device

22. Attribution of Economic Denial of Sustainability Attacks in Public Clouds

23. Data Flow Analysis on Android Platform with Fragment Lifecycle Modeling

24. Impact of Environment on Branch Transfer of Software

25. SQLite Forensic Analysis Based on WAL

26. POSTER: Security Analysis of Personal Unmanned Aerial Vehicles

27. GreatEatlon: Fast, Static Detection of Mobile Ransomware

28. Alde: Privacy Risk Analysis of Analytics Libraries in the Android Ecosystem

29. DroidClassifier: Efficient Adaptive Mining of Application-Layer Header for Classifying Android Malware

30. TZ-SSAP: Security-Sensitive Application Protection on Hardware-Assisted Isolated Environment

31. Website Forensic Investigation to Identify Evidence and Impact of Compromise

32. BinDNN: Resilient Function Matching Using Deep Learning

33. A Secure and Fast Dispersal Storage Scheme Based on the Learning with Errors Problem

34. A Behavioral Biometrics Based Approach to Online Gender Classification

35. ase-PoW: A Proof of Ownership Mechanism for Cloud Deduplication in Hierarchical Environments

36. SecWeb: Privacy-Preserving Web Browsing Monitoring with w-Event Differential Privacy

37. A Very Compact Masked S-Box for High-Performance Implementation of SM4 Based on Composite Field

38. Access Control Management for Secure Cloud Storage

39. Architecture Support for Controllable VMI on Untrusted Cloud

40. A Multi-layer Model to Detect Spam Email at Client Side

41. IacCE: Extended Taint Path Guided Dynamic Analysis of Android Inter-App Data Leakage

42. Platform as a Service (PaaS) in Public Cloud: Challenges and Mitigating Strategy

43. Parallel and Dynamic Structured Encryption

44. A Multi-protocol Security Framework to Support Internet of Things

45. Biometric Authentication Using Facial Recognition

46. Attribute-Based Encryption with Granular Revocation

47. Secure IoT Using Weighted Signed Graphs

48. Privacy-Preserving Multi-pattern Matching

49. Faulty Node Repair and Dynamically Spawned Black Hole Search

50. Tinder Me Softly – How Safe Are You Really on Tinder?

Catalog

Books, media, physical & digital resources