114 results on '"Yegneswaran, A."'
Search Results
2. DPX: Data-Plane eXtensions for SDN Security Service Instantiation
3. Detecting and Defending Against Certificate Attacks with Origin-Bound CAPTCHAs
4. Taxonomic Updates with Key Focus on Medically Important Aspergilli
5. Current Approaches Towards Development of Molecular Markers in Diagnostics of Invasive Aspergillosis
6. Using Provenance Patterns to Vet Sensitive Behaviors in Android Apps
7. JumpBox – A Seamless Browser Proxy for Tor Pluggable Transports
8. DroidMiner: Automated Mining and Characterization of Fine-grained Malicious Behaviors in Android Applications
9. Efficient Runtime Policy Enforcement Using Counterexample-Guided Abstraction Refinement
10. An Analysis of the iKee.B iPhone Botnet
11. Employing Honeynets For Network Situational Awareness
12. Using Failure Information Analysis to Detect Enterprise Zombies
13. An Attacker-Defender Game for Honeynets
14. Eureka: A Framework for Enabling Static Malware Analysis
15. An Inside Look at Botnets
16. On the Design and Use of Internet Sinks for Network Abuse Monitoring
17. ALICE@home: Distributed Framework for Detecting Malicious Sites
18. BLADE: Slashing the Invisible Channel of Drive-by Download Malware
19. Unique on the Road: Re-identification of Vehicular Location-Based Metadata
20. POSTER: Location Privacy Using Homomorphic Encryption
21. Security Analysis of Vendor Customized Code in Firmware of Embedded Device
22. Attribution of Economic Denial of Sustainability Attacks in Public Clouds
23. Data Flow Analysis on Android Platform with Fragment Lifecycle Modeling
24. Impact of Environment on Branch Transfer of Software
25. SQLite Forensic Analysis Based on WAL
26. POSTER: Security Analysis of Personal Unmanned Aerial Vehicles
27. GreatEatlon: Fast, Static Detection of Mobile Ransomware
28. Alde: Privacy Risk Analysis of Analytics Libraries in the Android Ecosystem
29. DroidClassifier: Efficient Adaptive Mining of Application-Layer Header for Classifying Android Malware
30. TZ-SSAP: Security-Sensitive Application Protection on Hardware-Assisted Isolated Environment
31. Website Forensic Investigation to Identify Evidence and Impact of Compromise
32. BinDNN: Resilient Function Matching Using Deep Learning
33. A Secure and Fast Dispersal Storage Scheme Based on the Learning with Errors Problem
34. A Behavioral Biometrics Based Approach to Online Gender Classification
35. ase-PoW: A Proof of Ownership Mechanism for Cloud Deduplication in Hierarchical Environments
36. SecWeb: Privacy-Preserving Web Browsing Monitoring with w-Event Differential Privacy
37. A Very Compact Masked S-Box for High-Performance Implementation of SM4 Based on Composite Field
38. Access Control Management for Secure Cloud Storage
39. Architecture Support for Controllable VMI on Untrusted Cloud
40. A Multi-layer Model to Detect Spam Email at Client Side
41. IacCE: Extended Taint Path Guided Dynamic Analysis of Android Inter-App Data Leakage
42. Platform as a Service (PaaS) in Public Cloud: Challenges and Mitigating Strategy
43. Parallel and Dynamic Structured Encryption
44. A Multi-protocol Security Framework to Support Internet of Things
45. Biometric Authentication Using Facial Recognition
46. Attribute-Based Encryption with Granular Revocation
47. Secure IoT Using Weighted Signed Graphs
48. Privacy-Preserving Multi-pattern Matching
49. Faulty Node Repair and Dynamically Spawned Black Hole Search
50. Tinder Me Softly – How Safe Are You Really on Tinder?
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.