Waqas Ahmad Piracha, M. Chowdhury, B. Ray, S. Rajasegarar, R. Doss
{"title":"Insider Attacks on Zigbee Based IoT Networks by Exploiting AT Commands","authors":"Waqas Ahmad Piracha, M. Chowdhury, B. Ray, S. Rajasegarar, R. Doss","doi":"10.1007/978-981-15-0871-4_6","DOIUrl":"https://doi.org/10.1007/978-981-15-0871-4_6","url":null,"abstract":"","PeriodicalId":127302,"journal":{"name":"International Conference on Applications and Techniques in Information Security","volume":"24 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120906423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Anushiadevi, V. Venkatesh, Rengarajan Amirtharajan
{"title":"An Image Mathcrypt - A Flawless Security via Flawed Image","authors":"R. Anushiadevi, V. Venkatesh, Rengarajan Amirtharajan","doi":"10.1007/978-981-15-0871-4_2","DOIUrl":"https://doi.org/10.1007/978-981-15-0871-4_2","url":null,"abstract":"","PeriodicalId":127302,"journal":{"name":"International Conference on Applications and Techniques in Information Security","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114316235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cog-SDN: Mitigation Mechanism for Distributed Denial of Service Attacks in Software Defined Networks","authors":"P. Priya, K. Manjula","doi":"10.1007/978-981-15-0871-4_16","DOIUrl":"https://doi.org/10.1007/978-981-15-0871-4_16","url":null,"abstract":"","PeriodicalId":127302,"journal":{"name":"International Conference on Applications and Techniques in Information Security","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121520850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sundararaman Rajagopalan, Nikhil Krishnaa Sriram, V. Manikandan, Sivaraman Rethinam, S. Arumugham, S. Janakiraman, Amirtharajan Rengarajan
{"title":"Cellular Automata Based Key Stream Generator - A Reconfigurable Hardware Approach","authors":"Sundararaman Rajagopalan, Nikhil Krishnaa Sriram, V. Manikandan, Sivaraman Rethinam, S. Arumugham, S. Janakiraman, Amirtharajan Rengarajan","doi":"10.1007/978-981-15-0871-4_18","DOIUrl":"https://doi.org/10.1007/978-981-15-0871-4_18","url":null,"abstract":"","PeriodicalId":127302,"journal":{"name":"International Conference on Applications and Techniques in Information Security","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125750320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secure ATM Device Design by Control Command Verification","authors":"Hisao Ogata, Tomoyoshi Ishikawa, Norichika Miyamoto, Tsutomu Matsumoto","doi":"10.1007/978-981-15-0871-4_3","DOIUrl":"https://doi.org/10.1007/978-981-15-0871-4_3","url":null,"abstract":"","PeriodicalId":127302,"journal":{"name":"International Conference on Applications and Techniques in Information Security","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126360250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Survey on Various Integrity Verification Schemes on the Data Outsourced to Cloud Storage","authors":"S. Ganesh, S. Manikandan","doi":"10.1007/978-981-15-0871-4_7","DOIUrl":"https://doi.org/10.1007/978-981-15-0871-4_7","url":null,"abstract":"","PeriodicalId":127302,"journal":{"name":"International Conference on Applications and Techniques in Information Security","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130294594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
V. Raj, S. Janakiraman, Sundararaman Rajagopalan, Amirtharajan Rengarajan
{"title":"Confused Memory Read Attracts Synthetic Diffusion on the Fly - A Lightweight Image Encryption for IoT Platform","authors":"V. Raj, S. Janakiraman, Sundararaman Rajagopalan, Amirtharajan Rengarajan","doi":"10.1007/978-981-15-0871-4_5","DOIUrl":"https://doi.org/10.1007/978-981-15-0871-4_5","url":null,"abstract":"","PeriodicalId":127302,"journal":{"name":"International Conference on Applications and Techniques in Information Security","volume":"240 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132247411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Password Strength Estimators Trained on the Leaked Password Lists","authors":"Cameron R. Schafer, Lei Pan","doi":"10.1007/978-981-15-0871-4_17","DOIUrl":"https://doi.org/10.1007/978-981-15-0871-4_17","url":null,"abstract":"","PeriodicalId":127302,"journal":{"name":"International Conference on Applications and Techniques in Information Security","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114064265","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. MonishRam, Ananya Sairaj, Ramya Lakshmi Srinivasan, R. RaajanN., R. GirishGanesan
{"title":"Tele-Transmission of Secured Prefrontal Cortex Information Records for Remote Health Care","authors":"K. MonishRam, Ananya Sairaj, Ramya Lakshmi Srinivasan, R. RaajanN., R. GirishGanesan","doi":"10.1007/978-981-15-0871-4_22","DOIUrl":"https://doi.org/10.1007/978-981-15-0871-4_22","url":null,"abstract":"","PeriodicalId":127302,"journal":{"name":"International Conference on Applications and Techniques in Information Security","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122420363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Computational CBGSA - SVM Model for Network Based Intrusion Detection System","authors":"Tina Manghnani, T. Thirumaran","doi":"10.1007/978-981-15-0871-4_14","DOIUrl":"https://doi.org/10.1007/978-981-15-0871-4_14","url":null,"abstract":"","PeriodicalId":127302,"journal":{"name":"International Conference on Applications and Techniques in Information Security","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121686928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}