Abstract is missing.
- A Graph-Based Decision Support Model for Vulnerability Analysis in IoT NetworksGemini George, Sabu M. Thampi. 1-23 [doi]
- Privacy-Preserving Searchable Encryption Scheme over Encrypted Data Supporting Dynamic UpdateR. Rashmi, D. V. N. Siva Kumar, P. Santhi Thilagam. 24-38 [doi]
- Survey on Prevention, Mitigation and Containment of Ransomware AttacksSumith Maniath, Prabaharan Poornachandran, V. G. Sujadevi. 39-52 [doi]
- Inter-path Diversity Metrics for Increasing Networks Robustness Against Zero-Day AttacksGhanshyam S. Bopche, Gopal N. Rai, Babu M. Mehtre. 53-66 [doi]
- Cost Based Model for Secure Health Care Data RetrievalKritika Kumari, Sayantani Saha, Sarmistha Neogy. 67-75 [doi]
- Mitigation of Cross-Site Scripting Attacks in Mobile Cloud EnvironmentsR. Madhusudhan, Shashidhara. 76-87 [doi]
- Managing Network Functions in Stateful Application Aware SDNPrabhakar Krishnan, Krishnashree Achuthan. 88-103 [doi]
- Proof of Stack Consensus for Blockchain NetworksAnjani Barhanpure, Paaras Belandor, Bhaskarjyoti Das. 104-116 [doi]
- Trust-Neighbors-Based to Mitigate the Cooperative Black Hole Attack in OLSR ProtocolKamel Saddiki, Sofiane BOUKLI HACENE, Marc Gilg, Pascal Lorenz. 117-131 [doi]
- Workload Distribution for Supporting Anonymous Communications in Automotive NetworkMehran Alidoost Nia, Antonio Ruiz-MartÃnez. 132-144 [doi]
- Policy-Based Network and Security Management in Federated Service Infrastructures with Permissioned BlockchainsMichael Grabatin, Wolfgang Hommel, Michael Steinke. 145-156 [doi]
- Statistical Comparison of Opinion Spam Detectors in Social Media with Imbalanced DatasetsEl-Sayed M. El-Alfy, Sadam Al-Azani. 157-167 [doi]
- A Participatory Privacy Protection Framework for Smart-Phone Application Default SettingsHaroon Elahi, Guojun Wang. 168-182 [doi]
- Designing a User-Experience-First, Privacy-Respectful, High-Security Mutual-Multifactor Authentication SolutionChris Drake, Praveen Gauravaram. 183-210 [doi]
- Investigating Deep Learning for Collective Anomaly Detection - An Experimental StudyMohiuddin Ahmed, Al-Sakib Khan Pathan. 211-219 [doi]
- BVD - A Blockchain Based Vehicle Database SystemS. V. Aswathy, K. V. Lakshmy. 220-230 [doi]
- HGKA: Hierarchical Dynamic Group Key Agreement Protocol for Machine Type Communication in LTE NetworksV. Srinidhi, K. V. Lakshmy, Madathil Sethumadhavan. 231-241 [doi]
- Security Threats Against LTE Networks: A SurveyKhyati Vachhani. 242-256 [doi]
- Network Anomaly Detection Using Artificial Neural Networks Optimised with PSO-DE HybridK. Rithesh, Adwaith V. Gautham, K. Chandra Sekaran. 257-270 [doi]
- Effective Hardware Trojan Detection Using Front-End Compressive SensingA. P. Nandhini, M. Sai Bhavani, S. Dharani Dharan, N. Harish, M. Priyatharishini. 271-277 [doi]
- Enhanced Session Initiation Protocols for Emergency Healthcare ApplicationsSaha Sourav, Vanga Odelu, Rajendra Prasath. 278-289 [doi]
- Wearable Device Forensic: Probable Case Studies and Proposed MethodologyDhenuka H. Kasukurti, Suchitra Patil. 290-300 [doi]
- Accessing Data in Healthcare ApplicationGaurav Mitra, Souradeep Barua, Srijan Chattopadhyay, Sukalyan Sen, Sarmistha Neogy. 301-312 [doi]
- Diversity and Progress Controlled Gravitational Search Algorithm for Balancing Load in CloudDivya Chaudhary, Bijendra Kumar, Shaksham Garg. 313-323 [doi]
- On Minimality Attack for Privacy-Preserving Data PublishingK. Hemantha, Nidhi Desai, Manik Lal Das. 324-335 [doi]
- Probabilistic Real-Time Intrusion Detection System for Docker ContainersSiddharth Srinivasan, Akshay Kumar, Manik Mahajan, Dinkar Sitaram, Sanchika Gupta. 336-347 [doi]
- Identification of Bugs and Vulnerabilities in TLS Implementation for Windows Operating System Using State Machine LearningTarun Yadav, Koustav Sadhukhan. 348-362 [doi]
- Security Improvement of Common-Key Cryptographic Communication by Mixture of Fake Plain-TextsMasayoshi Hayashi, Hiroaki Higaki. 363-376 [doi]
- SPIC - SRAM PUF Intergrated Chip Based Software Licensing ModelVyshak Suresh, R. Manimegalai. 377-388 [doi]
- DeepMal4J: Java Malware Detection Employing Deep LearningPallavi Kumari Jha, Prem Shankar, V. G. Sujadevi, P. Prabhaharan. 389-402 [doi]
- Group Key Management Schemes Under Strong Active Adversary Model: A Security AnalysisSarvesh V. Sawant, Gaurav Pareek, B. R. Purushothama. 403-418 [doi]
- Detection of Suspicious Transactions with Database Forensics and Theory of EvidenceHarmeet Kaur Khanuja, Dattatraya S. Adane. 419-430 [doi]
- KarmaNet: SDN Solution to DNS-Based Denial-of-ServiceGovind Mittal, Vishal Gupta. 431-442 [doi]
- FinSec 3.0: Theory and Practices in Financial EnterpriseYang Li, Jing-Ping Qiu, Qing Xie. 443-454 [doi]
- A TCB Minimizing Model of ComputationNaila Bushra, Naresh Adhikari, Mahalingam Ramkumar. 455-470 [doi]
- MedCop: Verifiable Computation for Mobile Healthcare SystemHardik Gajera, Shruti Naik, Manik Lal Das. 471-482 [doi]
- Key Retrieval from AES Architecture Through Hardware Trojan HorseSivappriya Manivannan, N. Nalla Anandakumar, M. Nirmala Devi. 483-494 [doi]
- Hiding in Plain Sight - Symmetric Key Chaotic Image Encryption by Sequential Pixel ShufflingAniq Ur Rahman, Mayukh Bhattacharyya. 495-503 [doi]
- Overinfection in RansomwareYassine Lemmou, El Mamoun Souidi. 504-519 [doi]
- Analysis of Circuits for Security Using Logic EncryptionBandarupalli Chandini, M. Nirmala Devi. 520-528 [doi]
- Extensive Simulation Analysis of TCP Variants for Wireless CommunicationAmol P. Pande, S. R. Devane. 529-542 [doi]
- A New Chaotic Map Based Secure and Efficient Pseudo-Random Bit Sequence GenerationMusheer Ahmad, Mohammad Najam Doja, M. M. Sufyan Beg. 543-553 [doi]
- Inverted Index Based Ranked Keyword Search in Multi-user Searchable EncryptionManju S. Nair, M. S. Rajasree. 554-562 [doi]
- A Comparative Analysis of Different Soft Computing Techniques for Intrusion Detection SystemJosy Elsa Varghese, Balachandra Muniyal. 563-577 [doi]
- A Novel Secret Key Exchange Mechanism for Secure Communication and Data Transfer in Symmetric CryptosystemsKrishna Prakasha, Rachana Kalkur, Vasundhara Acharya, Balachandra Muniyal, Mayank Khandelwal. 578-590 [doi]
- Survey of Security Threats in IoT and Emerging CountermeasuresMimi Cherian, Madhumita Chatterjee. 591-604 [doi]
- Holistic Credit Rating System for Online Microlending Platforms with Blockchain TechnologyYash Mahajan, Shobhit Srivastava. 605-616 [doi]
- Analysis of Execution Time for Encryption During Data Integrity Check in Cloud EnvironmentAkshay K. C., Balachandra Muniyal. 617-627 [doi]
- Attunement of Trickle Algorithm for Optimum Reliability of RPL over IoTA. S. Joseph Charles, Kalavathi Palanisamy. 628-639 [doi]
- Algorithmically Generated Domain Detection and Malware Family ClassificationChhaya Choudhary, Raaghavi Sivaguru, Mayana Pereira, Bin Yu, Anderson C. A. Nascimento, Martine De Cock. 640-655 [doi]
- Transfer Learning Approach for Identification of Malicious Domain NamesR. Rajalakshmi, S. Ramraj, R. Ramesh Kannan. 656-666 [doi]
- Behavioral Biometrics and Machine Learning to Secure Website LoginsFalaah Arif Khan, Sajin Kunhambu, K. Chakravarthy G. 667-677 [doi]
- Domain Name Detection and Classification Using Deep Neural NetworksB. Bharathi, J. Bhuvana. 678-686 [doi]
- Bidirectional LSTM Models for DGA ClassificationGiuseppe Attardi, Daniele Sartiano. 687-694 [doi]
- Detecting DGA Using Deep Neural Networks (DNNs)P. V. Jyothsna, Greeshma Prabha, K. K. Shahina, Anu Vazhayil. 695-706 [doi]