Avinash Srinivasan

Orcid: 0000-0002-6940-0139

According to our database1, Avinash Srinivasan authored at least 38 papers between 2006 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Maritime Communications - Current State and the Future Potential with SDN and SDR.
Network, October, 2023

2022
Steganography With FileSystem-in-SlackSpace.
Proceedings of the IEEE International Conference on Networking, Architecture and Storage, 2022

2019
XTRA - eXtended bit-Torrent pRotocol for Authenticated covert peer communication - Authenticated covert P2P communication.
Peer-to-Peer Netw. Appl., 2019

2018
VOUCH-AP: privacy preserving open-access 802.11 public hotspot AP authentication mechanism with co-located evil-twins.
Int. J. Secur. Networks, 2018

2017
SURE-FIT - SecURE and AdaptiveFramework for Information Hidingwith Fault-Tolerance.
J. Cyber Secur. Mobil., 2017

Secure android covert channel with robust survivability to service provider restrictions.
Int. J. Secur. Networks, 2017

Preface: Security and privacy in big data clouds.
Future Gener. Comput. Syst., 2017

Lightweight behavioral malware detection for windows platforms.
Proceedings of the 12th International Conference on Malicious and Unwanted Software, 2017

FROST: Anti-Forensics Digital-Dead-DROp Information Hiding RobuST to Detection & Data Loss with Fault tolerance.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2016
Detecting Attacks Smartly in Vehicle Cloud Computing.
Proceedings of the 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, 2016

2015
Android-Stego: A Novel Service Provider Imperceptible MMS Steganography Technique Robust to Message Loss.
EAI Endorsed Trans. Ambient Syst., 2015

STUMP - STalling offline password attacks Using pre-hash ManiPulations.
Proceedings of the 21st IEEE International Conference on Parallel and Distributed Systems, 2015

2014
Towards a Reference Architecture for Service-Oriented Cross Domain Security Infrastructures.
Proceedings of the Internet and Distributed Computing Systems, 2014

SAFE: Secure and Big Data-Adaptive Framework for Efficient Cross-Domain Communication.
Proceedings of the First International Workshop on Privacy and Secuirty of Big Data, 2014

2013
Steganographic information hiding that exploits a novel file system vulnerability.
Int. J. Secur. Networks, 2013

Accelerating video carving from unallocated space.
Proceedings of the Media Watermarking, 2013

HIDEINSIDE - A novel randomized & encrypted antiforensic information hiding.
Proceedings of the International Conference on Computing, Networking and Communications, 2013

2012
Uncertainty Mitigation for Trustworthiness-Oriented Applications in Wireless Ad Hoc Networks.
IEICE Trans. Inf. Syst., 2012

Exploring an open WiFi detection vulnerability as a malware attack vector on iOS devices.
Proceedings of the 7th International Conference on Malicious and Unwanted Software, 2012

ERASE- entropy-based sanitization of sensitive data for privacy preservation.
Proceedings of the 7th International Conference for Internet Technology and Secured Transactions, 2012

Forensics filesystem with cluster-level identifiers for efficient data recovery.
Proceedings of the 7th International Conference for Internet Technology and Secured Transactions, 2012

SafeCode - Safeguarding Security and Privacy of User Data on Stolen iOS Devices.
Proceedings of the Cyberspace Safety and Security - 4th International Symposium, 2012

Robust Authentication of Public Access Points Using Digital Certificates - A Novel Approach.
Proceedings of the Cyberspace Safety and Security - 4th International Symposium, 2012

2011
SecLoc - secure localization in WSNs using CDS.
Secur. Commun. Networks, 2011

Duplicate File Names-A Novel Steganographic Data Hiding Technique.
Proceedings of the Advances in Computing and Communications, 2011

2010
Similarity coefficient generators for network forensics.
Proceedings of the 2010 IEEE International Workshop on Information Forensics and Security, 2010

<i>iTrust</i>: an integrated trust framework for wireless sensor networks.
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010

2009
Secure and reliable broadcasting in wireless sensor networks using multi-parent trees.
Secur. Commun. Networks, 2009

Efficient Resource Discovery in Mobile Ad Hoc Networks.
Proceedings of IEEE International Conference on Communications, 2009

2008
Wireless Sensor Networks (WSNs): Secure Localization.
Encyclopedia of Wireless and Mobile Communications, 2008

Reputation and trust-based security in wireless sensor networks.
PhD thesis, 2008

Clique-based group key assignment in Wireless Sensor Networks.
Int. J. Secur. Networks, 2008

PVFS: A Probabilistic Voting-based Filtering Scheme in Wireless Sensor Networks.
Int. J. Secur. Networks, 2008

A Novel CDS-Based Reputation Monitoring System for Wireless Sensor Networks.
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2008 Workshops), 2008

TRACK: A Novel Connected Dominating Set based Sink Mobility Model for WSNs.
Proceedings of the 17th International Conference on Computer Communications and Networks, 2008

2007
A Novel k-Parent Flooding Tree for Secure and Reliable Broadcasting in Sensor Networks.
Proceedings of IEEE International Conference on Communications, 2007

Uncertainty Mitigation for Utility-Oriented Routing in Wireless Ad Hoc Networks.
Proceedings of the Global Communications Conference, 2007

2006
DRBTS: Distributed Reputation-based Beacon Trust System.
Proceedings of the Second International Symposium on Dependable Autonomic and Secure Computing (DASC 2006), 29 September, 2006


  Loading...