Abstract is missing.
- Diversity-aware, Cost-effective Network Security Hardening Using Attack GraphM. A. Jabbar, Ghanshyam S. Bopche, Bulusu Lakshmana Deekshatulu, Babu M. Mehtre. 1-15 [doi]
- Fast Verification of Digital Signatures in IoTApurva S. Kittur, Ashu Jain, Alwyn Roshan Pais. 16-27 [doi]
- Efficient and Provably Secure Pairing Free ID-Based Directed Signature SchemeN. B. Gayathri, R. R. V. Krishna Rao, P. Vasudeva Reddy. 28-38 [doi]
- User Authentication Scheme for Wireless Sensor Networks and Internet of Things Using LU DecompositionAnup Kumar Maurya, V. N. Sastry. 39-53 [doi]
- Detection of Zeus Bot Based on Host and Network ActivitiesRamesh Kalpika, A. R. Vasudevan. 54-64 [doi]
- An Asymmetric Key Based Efficient Authentication Mechanism for Proxy Mobile IPv6 NetworksSandipan Biswas, Pampa Sadhukhan, Sarmistha Neogy. 65-78 [doi]
- User Authentication Scheme for Wireless Sensor Networks and Internet of Things Using Chinese Remainder TheoremAnup Kumar Maurya, V. N. Sastry. 79-94 [doi]
- A Ringer-Based Throttling Approach to Mitigate DDoS AttacksSarvesh V. Sawant, Gaurav Pareek, B. R. Purushothama. 95-108 [doi]
- NPSO Based Cost Optimization for Load Scheduling in Cloud ComputingDivya Chaudhary, Bijendra Kumar, Rahul Khanna. 109-121 [doi]
- Multi-sink En-Route Filtering Mechanism for Wireless Sensor NetworksAlok Kumar, Alwyn Roshan Pais. 122-133 [doi]
- Security Schemes for Constrained Application Protocol in IoT: A Precise SurveyAmit Mali, Anant Nimkar. 134-145 [doi]
- Jordan Center Segregation: Rumors in Social Media NetworksR. Krithika 0002, Ashok Kumar Mohan, M. Sethumadhavan. 146-158 [doi]
- Honeyword with Salt-Chlorine Generator to Enhance Security of Cloud User CredentialsT. Nathezhtha, V. Vaidehi. 159-169 [doi]
- Multi Class Machine Learning Algorithms for Intrusion Detection - A Performance StudyManjula C. Belavagi, Balachandra Muniyal. 170-178 [doi]
- Symmetric Key Based Secure Resource SharingBruhadeshwar Bezawada, Kishore Kothapalli, Dugyala Raman, Rui Li. 179-194 [doi]
- Prevention of PAC File Based Attack Using DHCP SnoopingK. R. Atul, K. P. Jevitha. 195-204 [doi]
- A Quasigroup Based Synchronous Stream Cipher for Lightweight ApplicationsS. Lakshmi, Chungath Srinivasan, K. V. Lakshmy, M. Sindhu. 205-214 [doi]
- Security Analysis of Key Management Schemes Based on Chinese Remainder Theorem Under Strong Active Outsider Adversary ModelB. R. Purushothama, Arun Prakash Verma, Abhilash Kumar. 215-225 [doi]
- Deep Learning for Network Flow Analysis and Malware ClassificationR. K. Rahul, T. Anjali, Vijay Krishna Menon, K. P. Soman. 226-235 [doi]
- Kernel Modification APT Attack Detection in AndroidAjay Anto, Routhu Srinivasa Rao, Alwyn Roshan Pais. 236-249 [doi]
- Opaque Predicate Detection by Static Analysis of Binary ExecutablesR. Krishna Ram Prakash, P. P. Amritha, M. Sethumadhavan. 250-258 [doi]
- An Overview on Spora RansomwareYassine Lemmou, El Mamoun Souidi. 259-275 [doi]
- Pattern Generation and Test Compression Using PRESTO GeneratorAnnu Roy, J. P. Anita. 276-285 [doi]
- Challenges in Android ForensicsSudip Hazra, Prabhaker Mateti. 286-299 [doi]
- Current Consumption Analysis of AES and PRESENT Encryption Algorithms in FPGA Using the Welch MethodWilliam P. Maia, Edward D. Moreno. 300-311 [doi]
- Spiral Model for Digital Forensics InvestigationSuvarna Kothari, Hitesh Hasija. 312-324 [doi]
- Smart-Lock Security Re-engineered Using Cryptography and SteganographyChaitanya Bapat, Ganesh Baleri, Shivani Inamdar, Anant V. Nimkar. 325-336 [doi]
- Adding Continuous Proactive Forensics to AndroidKarthik M. Rao, P. S. Aiyyappan, Prabhaker Mateti. 337-349 [doi]
- ASLR and ROP Attack Mitigations for ARM-Based Android DevicesVivek Parikh, Prabhaker Mateti. 350-363 [doi]
- CBEAT: Chrome Browser Extension Analysis ToolSudakshina Singha Roy, K. P. Jevitha. 364-378 [doi]
- Hardware Trojan Detection Using Effective Test Patterns and Selective SegmentationK. Atchuta Sashank, Hari Sivarami Reddy, P. Pavithran, M. S. Akash, M. Nirmala Devi. 379-386 [doi]
- Estimation and Tracking of a Ballistic Target Using Sequential Importance Sampling MethodJ. Ramnarayan, J. P. Anita, P. Sudheesh. 387-398 [doi]
- An Android Application for Secret Image Sharing with Cloud StorageKanakkath Praveen, G. Indu, R. Santhya, M. Sethumadhavan. 399-410 [doi]
- Tracking of GPS Parameters Using Particle FilterM. Nishanth, J. P. Anita, P. Sudheesh. 411-421 [doi]