Alwyn Roshan Pais

Orcid: 0000-0003-4571-4608

According to our database1, Alwyn Roshan Pais authored at least 77 papers between 2007 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Enhanced Malicious Traffic Detection in Encrypted Communication Using TLS Features and a Multi-class Classifier Ensemble.
J. Netw. Syst. Manag., October, 2024

Accelerating randomized image secret sharing with GPU: contrast enhancement and secure reconstruction using progressive and convolutional approaches.
Multim. Tools Appl., May, 2024

2023
Machine learning models for phishing detection from TLS traffic.
Clust. Comput., October, 2023

Secure latent fingerprint storage and self-recovered reconstruction using POB number system.
Pattern Recognit. Lett., March, 2023

Combinatorial Design Based Key Pre-distribution Scheme with High Scalability and Minimal Storage for Wireless Sensor Networks.
Wirel. Pers. Commun., 2023

A secure fingerprint template generation mechanism using visual secret sharing with inverse halftoning.
J. Vis. Commun. Image Represent., 2023

A Boosting-Based Hybrid Feature Selection and Multi-Layer Stacked Ensemble Learning Model to Detect Phishing Websites.
IEEE Access, 2023

2022
Enhanced optical flow-based full reference video quality assessment algorithm.
Multim. Tools Appl., November, 2022

An Effective GPGPU Visual Secret Sharing by Contrast-Adaptive ConvNet Super-Resolution.
Wirel. Pers. Commun., 2022

Application of word embedding and machine learning in detecting phishing websites.
Telecommun. Syst., 2022

Classification of Phishing Email Using Word Embedding and Machine Learning Techniques.
J. Cyber Secur. Mobil., 2022

Object detection in hyperspectral images.
Digit. Signal Process., 2022

High-performance medical image secret sharing using super-resolution for CAD systems.
Appl. Intell., 2022

2021
A secure visual secret sharing (VSS) scheme with CNN-based image enhancement for underwater images.
Vis. Comput., 2021

A heuristic technique to detect phishing websites using TWSVM classifier.
Neural Comput. Appl., 2021

A novel fingerprint template protection and fingerprint authentication scheme using visual secret sharing and super-resolution.
Multim. Tools Appl., 2021

An Accelerator-based Logistic Map Image Cryptosystems for Grayscale Images.
J. Cyber Secur. Mobil., 2021

A partial key pre-distribution based en-route filtering scheme for wireless sensor networks.
J. Ambient Intell. Humaniz. Comput., 2021

A Novel Cancelable Fingerprint Template Generation Mechanism Using Visual Secret Sharing.
Proceedings of the Pattern Recognition and Machine Intelligence, 2021

Salient Object Detection in Hyperspectral Images Using Felzenswalb's Segmentation Algorithm.
Proceedings of the Pattern Recognition and Machine Intelligence, 2021

2020
CatchPhish: detection of phishing websites by inspecting URLs.
J. Ambient Intell. Humaniz. Comput., 2020

Two level filtering mechanism to detect phishing sites using lightweight visual similarity approach.
J. Ambient Intell. Humaniz. Comput., 2020

A trust model based batch verification of digital signatures in IoT.
J. Ambient Intell. Humaniz. Comput., 2020

Attacks on Android-Based Smartphones and Impact of Vendor Customization on Android OS Security.
Proceedings of the Information Systems Security - 16th International Conference, 2020

CP-ABE Scheme Satisfying Constant-size Keys based on ECC.
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020

2019
A new hybrid key pre-distribution scheme for wireless sensor networks.
Wirel. Networks, 2019

Contrast enhancement of Progressive Visual Secret Sharing (PVSS) scheme for gray-scale and color images using super-resolution.
Signal Process., 2019

PhishDump: A multi-model ensemble based technique for the detection of phishing sites in mobile devices.
Pervasive Mob. Comput., 2019

Detection of phishing websites using an efficient feature-based machine learning framework.
Neural Comput. Appl., 2019

A new combinatorial design based key pre-distribution scheme for wireless sensor networks.
J. Ambient Intell. Humaniz. Comput., 2019

New key pre-distribution scheme based on combinatorial design for wireless sensor networks.
IET Commun., 2019

Expressive CP-ABE Scheme Satisfying Constant-Size Keys and Ciphertexts.
IACR Cryptol. ePrint Arch., 2019

Jail-Phish: An improved search engine based phishing detection system.
Comput. Secur., 2019

An Improved and Secure Visual Secret Sharing (VSS) scheme for Medical Images.
Proceedings of the 11th International Conference on Communication Systems & Networks, 2019

Blockchain based En-Route Filtering of False Data in Wireless Sensor Networks.
Proceedings of the 11th International Conference on Communication Systems & Networks, 2019

2018
DetLogic: A black-box approach for detecting logic vulnerabilities in web applications.
J. Netw. Comput. Appl., 2018

Black-box detection of XQuery injection and parameter tampering vulnerabilities in web applications.
Int. J. Inf. Sec., 2018

Randomised visual secret sharing scheme for grey-scale and colour images.
IET Image Process., 2018

Deterministic En-Route Filtering of False Reports: A Combinatorial Design Based Approach.
IEEE Access, 2018

Fuzzy String Matching Algorithm for Spam Detection in Twitter.
Proceedings of the Security and Privacy - Second ISEA International Conference, 2018

Bad Signature Identification in a Batch Using Error Detection Codes.
Proceedings of the Security and Privacy - Second ISEA International Conference, 2018

A Fine Grain Attribute Enabled Access Control.
Proceedings of the 9th International Conference on Computing, 2018

2017
En-Route Filtering Techniques in Wireless Sensor Networks: A Survey.
Wirel. Pers. Commun., 2017

Batch verification of Digital Signatures: Approaches and challenges.
J. Inf. Secur. Appl., 2017

Multi-sink En-Route Filtering Mechanism for Wireless Sensor Networks.
Proceedings of the Security in Computing and Communications - 5th International Symposium, 2017

Fast Verification of Digital Signatures in IoT.
Proceedings of the Security in Computing and Communications - 5th International Symposium, 2017

Kernel Modification APT Attack Detection in Android.
Proceedings of the Security in Computing and Communications - 5th International Symposium, 2017

Light-weight hash algorithms using GRP instruction.
Proceedings of the 10th International Conference on Security of Information and Networks, 2017

An Enhanced Blacklist Method to Detect Phishing Websites.
Proceedings of the Information Systems Security - 13th International Conference, 2017

Detecting Phishing Websites using Automation of Human Behavior.
Proceedings of the 3rd ACM Workshop on Cyber-Physical System Security, 2017

2016
Securing native XML database-driven web applications from XQuery injection vulnerabilities.
J. Syst. Softw., 2016

A Random Key Generation Scheme Using Primitive Polynomials over GF(2).
Proceedings of the Security in Computing and Communications - 4th International Symposium, 2016

Efficient Key Management in IoT Using Mobile Aggregator.
Proceedings of the Security in Computing and Communications - 4th International Symposium, 2016

Distributed Data Aggregation in Wireless Sensor Network - with Peer Verification.
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016

2015
Optimal placement of sensor nodes for water quality measurement.
Proceedings of the Twelfth International Conference on Wireless and Optical Communications Networks, 2015

A Chinese Remainder Theorem Based Key Management Algorithm for Hierarchical Wireless Sensor Network.
Proceedings of the Distributed Computing and Internet Technology, 2015

2013
Emulating a High Interaction Honeypot to Monitor Intrusion Activity.
Proceedings of the Security in Computing and Communications - International Symposium, 2013

2012
Location Estimation of Mobile in GSM and CDMA Networks.
Proceedings of the Recent Trends in Computer Networks and Distributed Systems Security, 2012

SIRIS: secure IRIS authentication system.
Proceedings of the 5th International Conference of Security of Information and Networks, 2012

Restraining add-on's behavior in private browsing.
Proceedings of the First International Conference on Security of Internet of Things, 2012

2011
Anonymity and verifiability in multi-attribute reverse auction
CoRR, 2011

Model Based Hybrid Approach to Prevent SQL Injection Attacks in PHP.
Proceedings of the Security Aspects in Information Technology, 2011

IFrandbox - Client Side Protection from Malicious Injected Iframes.
Proceedings of the Information Systems Security - 7th International Conference, 2011

An In-Depth Analysis of the Epitome of Online Stealth: Keyloggers; and Their Countermeasures.
Proceedings of the Advances in Computing and Communications, 2011

A Novel Technique for Defeating Virtual Keyboards - Exploiting Insecure Features of Modern Browsers.
Proceedings of the Advances in Computing and Communications, 2011

A Framework for Intrusion Tolerance in Cloud Computing.
Proceedings of the Advances in Computing and Communications, 2011

2010
A new probabilistic rekeying method for secure multicast groups.
Int. J. Inf. Sec., 2010

Attacks on Web Services and Mitigation Schemes.
Proceedings of the SECRYPT 2010, 2010

Throttling DDoS Attacks using Discrete Logarithm Problem.
Proceedings of the SECRYPT 2010, 2010

2009
Throttling DDoS Attacks.
Proceedings of the SECRYPT 2009, 2009

Automatic Video Object Plane Segmentation and Super resolution: A Novel Approach.
Proceedings of the 4th Indian International Conference on Artificial Intelligence, 2009

Secure Web Based Single Sign-On (SSO) Framework Using Identity Based Encryption System.
Proceedings of the ARTCom 2009, 2009

Super Resolution of Video with Sharpened Edges Using Multiple Frames -- A Novel Approach.
Proceedings of the ARTCom 2009, 2009

Design and Implementation of Secure Internet Based Voting System with User Anonymity Using Identity Based Encryption System.
Proceedings of the 2009 IEEE International Conference on Services Computing (SCC 2009), 2009

2008
A New Probabilistic Rekeying Method for Secure Dynamic Groups.
Proceedings of the SECRYPT 2008, 2008

Secure and efficient protocol for mobile payments.
Proceedings of the 10th International Conference on Electronic Commerce 2008, 2008

2007
Model Based Tracking.
Proceedings of the Advanced Intelligent Computing Theories and Applications. With Aspects of Contemporary Intelligent Computing Techniques, 2007


  Loading...