Regular Paper |
| Paper ID |
Author Details |
Title of the work |
| 9 |
Khandakar Ashrafi Akbar, Yigong Wang, Islam Md Shihabul, Anoop Singhal, Latifur Khan, Bhavani Thuraisingham
|
Identifying Tactics of Advanced Persistent Threats with Limited Attack Traces
|
| 10 |
Krishnaraj Bhat
|
A Verifiable Lossless Multiple Secret Images Sharing Scheme
|
| 18 |
Tejpal Kumar, Gaurav Somani
|
Origin information assisted hybrid analysis to detect APT malware
|
| 24 |
Sandeep Romana, Anil Bandgar, Mohit Kumar, Mahesh Uttam Patil, Lakshmi Eswari P R
|
Raising MIPS binaries to LLVM IR |
| 32 |
Shivani Arya, Saurabh Chamotra |
Multi layer detection framework for spear-phishing attacks |
| 40 |
Renjith G, Aji S |
Vulnerability Analysis and Detection using Graph Neural Networks for Android Operating System |
| 53 |
Vishwas Patil, RK Shyamasundar |
A Practical Protocol for Asset Management |
| 58 |
Debapriyay Mukhopadhyay |
Improvement Over Montgomery Modular Multiplication |
| 59 |
Pranav Verma, Anish Mathuria, Sourish Dasgupta |
Faster Private Rating Update via Integer-based Homomorphic Encryption |
Short Paper |
| 12 |
Amane Takeshige, Haruhisa Kosuge, Hidema Tanaka |
Experimental Verification of Estimated Block Size of BKZ Algorithm against LWE |
| 38 |
Sina Mahdipour Saravani, Indrajit Ray, Indrakshi Ray |
Automated Identification of Social Media Bots using Deep fake Text Detection |
Work-in-Progress Paper |
| 29 |
Shaurya Sood, Manash Saikia, Neminath Hubballi |
WiP: Slow Rate HTTP Attack Detection with Behavioral Parameters |
| 46 |
Habeeb Syed, Imtiyazuddin Shaik, Nitesh Emmadi, Harika Narumanchi, Meena Dilip Thakur, RAJAN M A |
WiP: Privacy Enabled Biometric Authentication Based on Proof of Decryption Techniques
|
| 47 |
Imtiyazuddin Shaik, Raj Chaudhari, RAJAN M A, Jayavardhana Gubbi, Balamuralidhar P, Sachin Lodha |
WiP: QoS based Recommendation system for efficient private inference of CNN using FHE
|
| 60 |
Afshin Amighi, Mortaza Shoae Bargh, Ahmad Omar |
WiP: A Distributed Approach for SDC Technologies |