咨询与建议

限定检索结果

文献类型

  • 85 篇 会议
  • 22 篇 期刊文献

馆藏范围

  • 107 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 62 篇 工学
    • 55 篇 计算机科学与技术...
    • 51 篇 软件工程
    • 16 篇 信息与通信工程
    • 9 篇 生物工程
    • 7 篇 控制科学与工程
    • 6 篇 电气工程
    • 6 篇 生物医学工程(可授...
    • 4 篇 光学工程
    • 3 篇 安全科学与工程
    • 2 篇 机械工程
    • 2 篇 仪器科学与技术
    • 2 篇 动力工程及工程热...
    • 2 篇 电子科学与技术(可...
  • 27 篇 理学
    • 10 篇 物理学
    • 9 篇 生物学
    • 8 篇 数学
    • 4 篇 系统科学
    • 1 篇 化学
    • 1 篇 统计学(可授理学、...
  • 13 篇 管理学
    • 8 篇 管理科学与工程(可...
    • 4 篇 工商管理
    • 4 篇 图书情报与档案管...
    • 2 篇 公共管理
  • 4 篇 法学
    • 2 篇 法学
    • 2 篇 社会学
  • 4 篇 医学
    • 3 篇 临床医学
    • 2 篇 基础医学(可授医学...
    • 2 篇 公共卫生与预防医...
  • 2 篇 经济学
    • 2 篇 应用经济学
  • 1 篇 教育学
    • 1 篇 教育学

主题

  • 6 篇 authentication
  • 5 篇 encryption
  • 5 篇 cryptography
  • 4 篇 intrusion detect...
  • 4 篇 support vector m...
  • 4 篇 deep learning
  • 4 篇 servers
  • 3 篇 internet of thin...
  • 3 篇 sensitivity
  • 3 篇 long short-term ...
  • 3 篇 computer archite...
  • 3 篇 ciphers
  • 3 篇 drones
  • 3 篇 real-time system...
  • 3 篇 steganography
  • 3 篇 blockchain
  • 3 篇 hardware
  • 3 篇 accuracy
  • 3 篇 cloud computing
  • 3 篇 machine learning...

机构

  • 8 篇 center for cyber...
  • 8 篇 center for cyber...
  • 6 篇 amrita vishwa vi...
  • 5 篇 department of co...
  • 5 篇 amrita vishwa vi...
  • 5 篇 department of co...
  • 5 篇 care college of ...
  • 5 篇 department of co...
  • 5 篇 saveetha institu...
  • 5 篇 saveetha institu...
  • 4 篇 center for cyber...
  • 3 篇 center for cyber...
  • 3 篇 amrita school of...
  • 3 篇 center for cyber...
  • 3 篇 center for cyber...
  • 3 篇 center for cyber...
  • 2 篇 amrita school of...
  • 2 篇 amrita vishwa vi...
  • 2 篇 mohan babu unive...
  • 2 篇 cyber security g...

作者

  • 16 篇 jain kurunandan
  • 14 篇 krishnan prabhak...
  • 11 篇 poornachandran p...
  • 11 篇 soman k.p.
  • 9 篇 kurunandan jain
  • 8 篇 prabhakar krishn...
  • 7 篇 prabaharan poorn...
  • 5 篇 vinayakumar r.
  • 5 篇 premjith b.
  • 4 篇 balakrishnan t. ...
  • 4 篇 u. samson ebenez...
  • 4 篇 ebenezar u. sams...
  • 4 篇 sriram sankaran
  • 4 篇 t. suresh balakr...
  • 4 篇 narayanan subram...
  • 3 篇 sachin kumar s.
  • 3 篇 vaithiyanathan v...
  • 3 篇 sathyadevan shij...
  • 2 篇 soman kp
  • 2 篇 soumajit pal

语言

  • 84 篇 英文
  • 23 篇 其他
检索条件"机构=Center for Cyber Security Systems and Networks"
107 条 记 录,以下是1-10 订阅
排序:
Securing IoT Devices with Enhanced Tiny Encryption Algorithm  3
Securing IoT Devices with Enhanced Tiny Encryption Algorithm
收藏 引用
3rd International Conference on Automation, Computing and Renewable systems, ICACRS 2024
作者: Bhagya, S. Jain, Kurunandhan Krishnan, Prabhakar Center for Cyber Security Systems and Networks Amrita Vishwa Vidyapeetham Kerala India
The exponential growth of Internet of Things (IoT) devices has brought about significant security challenges, particularly due to their limited computational resources and deployment in critical applications such as s... 详细信息
来源: 评论
Minimum Selection Feature Importance Guided Attack
Minimum Selection Feature Importance Guided Attack
收藏 引用
2023 IEEE World Conference on Applied Intelligence and Computing, AIC 2023
作者: Karumanchi, Rohitha Gressel, Gilad Amrita Vishwa Vidyapeetham Center for Cyber Security Systems and Networks Amritapuri India
Machine learning models are under severe threat by adversarial attacks. Machine learning is swiftly taking on a central role in organizations' value propositions, and as a result, organizations need to safeguard t... 详细信息
来源: 评论
A Lightweight Medical Image Encryption Scheme Using Chaotic Maps and Image Scrambling  11
A Lightweight Medical Image Encryption Scheme Using Chaotic ...
收藏 引用
11th International Symposium on Digital Forensics and security, ISDFS 2023
作者: Sudevan, Sujitha Jain, Kurunandan Amrita Vishwa Vidyapeetham Center for Cyber Security Systems & Networks Amritapuri India
Telehealth is an emerging sector that enables doctors to remotely treat patients using virtual communication. This involves transferring medical images and other clinical data over public networks, presenting a signif... 详细信息
来源: 评论
Data security Approach Using Blockchain Mechanism and Cryptography Algorithms  11
Data Security Approach Using Blockchain Mechanism and Crypto...
收藏 引用
11th International Symposium on Digital Forensics and security, ISDFS 2023
作者: Singh, Navdeep Jain, Kurunandan Amrita Vishwa Vidyapeetham Center for Cyber Security Systems & Networks Amritapuri India
Data security is an important aspect of the digital world, and protecting sensitive or confidential data from unauthorized access, modification, or theft is required. So, moving in the same direction, in this research... 详细信息
来源: 评论
Cryptography based Identity Management for IoT Devices  2
Cryptography based Identity Management for IoT Devices
收藏 引用
2nd International Conference on Augmented Intelligence and Sustainable systems, ICAISS 2023
作者: Nair, Jishnu Jain, Kurunandan Center for Cyber Security Systems & Networks Amrita Vishwa Vidyapeetham Amritapuri India
While the Internet of Things (IoT) and connected devices offer numerous benefits for enterprises, they have also increased the need for strong security measures. Due to the quantity of sensitive data it sends and reta... 详细信息
来源: 评论
Comparison of Post-Quantum Cryptography Algorithms for Authentication in Quantum Key Distribution Classical Channel  2
Comparison of Post-Quantum Cryptography Algorithms for Authe...
收藏 引用
2nd International Conference on Augmented Intelligence and Sustainable systems, ICAISS 2023
作者: Dhanush, Cheruku Sai Jain, Kurunandan Amrita Vishwa Vidyapeetham Center for Cyber Security Systems & Networks Amritapuri India
Post-quantum cryptography is becoming more popular due to the threat posed by quantum computers, which can defeat the majority of the public key cryptography primitives currently in use, such as discrete logarithmic p... 详细信息
来源: 评论
Implementable Smart FIR Management  14
Implementable Smart FIR Management
收藏 引用
14th International Conference on Computing Communication and Networking Technologies, ICCCNT 2023
作者: Das, Ayush Mohan Subramanian, Narayanan Amrita Vishwa Vidyapeetham Center for Cyber Security Systems & Networks Amritapuri India
In the current scenario, the Indian policing system handles around 3 million cases per year involving a variety of interstate and personal issues. This paper aims to present an implementable and feasible First Informa... 详细信息
来源: 评论
Evaluating the Effectiveness of PRNU-Based Forensic Techniques in Mobile Devices using Peak Correlation Coefficient  9
Evaluating the Effectiveness of PRNU-Based Forensic Techniqu...
收藏 引用
9th IEEE International Symposium on Smart Electronic systems, iSES 2023
作者: Shashank Kumar, P. Sankaran, Sriram Center for Cyber Security Systems and Networks Amrita Vishwa Vidyapeetham Amritapuri Kollam India
In the digital age, this pioneering investigation is the initial endeavor to confront a crucial challenge in image forensics, marking a notable advancement. The implementation of photoresponse non-uniformity (PRNU) an... 详细信息
来源: 评论
Stalkerware Detection Using Static and Dynamic Analysis  20
Stalkerware Detection Using Static and Dynamic Analysis
收藏 引用
20th IEEE India Council International Conference, INDICON 2023
作者: Mithun, S. Abhinand, N. Pavithran, Vipin Chandran, Saranya Amrita Vishwa Vidyapeetham Center for Cyber Security Systems and Networks Kerala Kollam India
Stalkerware, a pervasive and invasive form of spy-ware, poses severe privacy and security threats by clandestinely collecting personal information and monitoring victims. This research paper presents an automated fram... 详细信息
来源: 评论
Explanatory Case Study: Digital Forensics Investigation on DJI Spark Drone  14
Explanatory Case Study: Digital Forensics Investigation on D...
收藏 引用
14th International Conference on Computing Communication and Networking Technologies, ICCCNT 2023
作者: Kumar, P. Shashank Sankaran, Sriram Amrita Vishwa Vidyapeetham Amritapuri Center for Cyber Security Systems and Networks Kollam India
Drones are now widely used and have grown in popularity in recent years. However, as a result of their greater use, there have been more crimes involving drones. In this explanatory case study, digital forensics metho... 详细信息
来源: 评论