Abstract is missing.
- Secure Opportunistic Data Exchange Using Smart Devices in 5G/LTE-A NetworksSumit Kumar Tetarave, Somanath Tripathy. 3-16 [doi]
- Bloom Filter Based Privacy Preserving Deduplication SystemJay Dave, Vijay Laxmi, Parvez Faruki, Manoj Singh Gaur, Bhavya Shah. 17-34 [doi]
- A Semantic Notion of Secure Information-FlowN. V. Narendra Kumar, R. K. Shyamasundar. 35-52 [doi]
- Bad Signature Identification in a Batch Using Error Detection CodesApurva S. Kittur, Swapnil Kauthale, Alwyn R. Pais. 53-66 [doi]
- A Solution to "Confused Deputy" Problem Using RWFM LabelsSandip Ghosal, R. K. Shyamasundar. 67-76 [doi]
- BlockSLaaS: Blockchain Assisted Secure Logging-as-a-Service for Cloud ForensicsSagar Rane, Arati Dixit. 77-88 [doi]
- Keystroke Dynamics Authentication Using Small DatasetsNataasha Raul, Royston D'mello, Mandar Bhalerao. 89-96 [doi]
- ARBAC: Attribute-Enabled Role Based Access Control ModelMahendra Pratap Singh, S. Sudharsan, M. Vani. 97-111 [doi]
- Malware Signature Generation Using Locality Sensitive HashingHassan Naderi, P. Vinod, Mauro Conti, Saeed Parsa, Mohammad Hadi Alaeiyan. 115-124 [doi]
- DroidDivesDeep: Android Malware Classification via Low Level Monitorable Features with Deep Neural NetworksParvez Faruki, Bharat Buddhadev, Bhavya Shah, Akka Zemmari, Vijay Laxmi, Manoj Singh Gaur. 125-139 [doi]
- EvadePDF: Towards Evading Machine Learning Based PDF Malware ClassifiersSukanta Dey, Abhishek Kumar, Mehul Sawarkar, Pranav Kumar Singh, Sukumar Nandi. 140-150 [doi]
- IP Traceback in Dynamic NetworksSangita Roy, Hardik Chawla, Ashok Singh Sairam. 153-165 [doi]
- Machine Learning Based Approach to Detect Position Falsification Attack in VANETsPranav Kumar Singh, Shivam Gupta, Ritveeka Vashistha, Sunit Kumar Nandi, Sukumar Nandi. 166-178 [doi]
- Unsupervised Person Re-ID in Surveillance Feed Using Re-rankingMohit Kumar Singh, Vijay Laxmi, Neeta Nain. 179-192 [doi]
- An Approach to Meta-Alert Generation for Anomalous TCP TrafficDeeksha Kushwah, Rajni Ranjan Singh, Deepak Singh Tomar. 193-216 [doi]
- APPLADroid: Automaton Based Inter-app Privacy Leak Analysis for AndroidVineeta Jain, Vijay Laxmi, Manoj Singh Gaur, Mohamed Mosbah. 219-233 [doi]
- Multiparty Evaluation of Finite State MachineDhaneshwar Mardi, Jaydeep Howlader. 234-246 [doi]
- An Enhanced Privacy-Preserving Recommender SystemPranav Verma, Harshul Vaishnav, Anish Mathuria, Sourish Dasgupta. 247-260 [doi]
- Threshold Ring Signature with Message Block SharingSwati Rawal, Sahadeo Padhye. 261-271 [doi]
- Testing Program Crash Based on Search Based Testing and Exception InjectionFaisal Anwer, Mohd Nazir, Khurram Mustafa. 275-285 [doi]
- Fuzzy String Matching Algorithm for Spam Detection in TwitterAlok Kumar, Maninder Singh, Alwyn Roshan Pais. 289-301 [doi]