{"title":"Multiparty Evaluation of Finite State Machine","authors":"Dhaneshwar Mardi, Jaydeep Howlader","doi":"10.1007/978-981-13-7561-3_17","DOIUrl":"https://doi.org/10.1007/978-981-13-7561-3_17","url":null,"abstract":"","PeriodicalId":166108,"journal":{"name":"ISEA Asia Security and Privacy Conference","volume":"191 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121736033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Semantic Notion of Secure Information-Flow","authors":"N. Kumar, R. Shyamasundar","doi":"10.1007/978-981-13-7561-3_3","DOIUrl":"https://doi.org/10.1007/978-981-13-7561-3_3","url":null,"abstract":"","PeriodicalId":166108,"journal":{"name":"ISEA Asia Security and Privacy Conference","volume":"550 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132060127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"APPLADroid: Automaton Based Inter-app Privacy Leak Analysis for Android","authors":"Vineeta Jain, V. Laxmi, M. Gaur, M. Mosbah","doi":"10.1007/978-981-13-7561-3_16","DOIUrl":"https://doi.org/10.1007/978-981-13-7561-3_16","url":null,"abstract":"","PeriodicalId":166108,"journal":{"name":"ISEA Asia Security and Privacy Conference","volume":"466 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123280401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Keystroke Dynamics Authentication Using Small Datasets","authors":"Nataasha Raul, Royston D'mello, Mandar Bhalerao","doi":"10.1007/978-981-13-7561-3_7","DOIUrl":"https://doi.org/10.1007/978-981-13-7561-3_7","url":null,"abstract":"","PeriodicalId":166108,"journal":{"name":"ISEA Asia Security and Privacy Conference","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126887740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Approach to Meta-Alert Generation for Anomalous TCP Traffic","authors":"D. Kushwah, R. Singh, D. Tomar","doi":"10.1007/978-981-13-7561-3_15","DOIUrl":"https://doi.org/10.1007/978-981-13-7561-3_15","url":null,"abstract":"","PeriodicalId":166108,"journal":{"name":"ISEA Asia Security and Privacy Conference","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121847904","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"BlockSLaaS: Blockchain Assisted Secure Logging-as-a-Service for Cloud Forensics","authors":"Sagar Rane, A. Dixit","doi":"10.1007/978-981-13-7561-3_6","DOIUrl":"https://doi.org/10.1007/978-981-13-7561-3_6","url":null,"abstract":"","PeriodicalId":166108,"journal":{"name":"ISEA Asia Security and Privacy Conference","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114923428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
P. Singh, S. Gupta, Ritveeka Vashistha, S. Nandi, Sukumar Nandi
{"title":"Machine Learning Based Approach to Detect Position Falsification Attack in VANETs","authors":"P. Singh, S. Gupta, Ritveeka Vashistha, S. Nandi, Sukumar Nandi","doi":"10.1007/978-981-13-7561-3_13","DOIUrl":"https://doi.org/10.1007/978-981-13-7561-3_13","url":null,"abstract":"","PeriodicalId":166108,"journal":{"name":"ISEA Asia Security and Privacy Conference","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122609684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ARBAC: Attribute-Enabled Role Based Access Control Model","authors":"M. Singh, S. Sudharsan, M. Vani","doi":"10.1007/978-981-13-7561-3_8","DOIUrl":"https://doi.org/10.1007/978-981-13-7561-3_8","url":null,"abstract":"","PeriodicalId":166108,"journal":{"name":"ISEA Asia Security and Privacy Conference","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116863655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Testing Program Crash Based on Search Based Testing and Exception Injection","authors":"Faisal Anwer, Mohd Nazir, K. Mustafa","doi":"10.1007/978-981-13-7561-3_20","DOIUrl":"https://doi.org/10.1007/978-981-13-7561-3_20","url":null,"abstract":"","PeriodicalId":166108,"journal":{"name":"ISEA Asia Security and Privacy Conference","volume":" 72","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113952716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}