Deepak Subramanian

According to our database1, Deepak Subramanian authored at least 14 papers between 2007 and 2016.

Collaborative distances :
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2016
Preventive information flow control through a mechanism of split addresses.
Proceedings of the 9th International Conference on Security of Information and Networks, 2016

Ensuring endpoint authenticity in WebRTC peer-to-peer communication.
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016

A Self-correcting Information Flow Control Model for the Web-Browser.
Proceedings of the Foundations and Practice of Security - 9th International Symposium, 2016

2014
DAPriv: Decentralized architecture for preserving the privacy of medical data.
CoRR, 2014

2012
Mobile augmented reality learning tool to simulate experts' perspectives in the field.
Proceedings of the 2012 ACM Conference on Ubiquitous Computing, 2012

2011
Modeling the role of basal ganglia in saccade generation: Is the indirect pathway the explorer?
Neural Networks, 2011

Modeling Basal Ganglia for Understanding Parkinsonian Reaching Movements.
Neural Computation, 2011

2010
Fuzzy Classification Metrics for Scanner Assessment and Vulnerability Reporting.
IEEE Trans. Information Forensics and Security, 2010

An empirical vulnerability remediation model.
Proceedings of the IEEE International Conference on Wireless Communications, 2010

Quantitative Evaluation of Related Web-Based Vulnerabilities.
Proceedings of the Fourth International Conference on Secure Software Integration and Reliability Improvement, 2010

A Model of Basal Ganglia in Saccade Generation.
Proceedings of the Artificial Neural Networks - ICANN 2010, 2010

Scoring Web-Based Vulnerability Impact Using Property-Based Vulnerability Model.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2010

2009
An empirical property-based model for vulnerability analysis and evaluation.
Proceedings of the 4th IEEE Asia-Pacific Services Computing Conference, 2009

2007
"NetPhone"-Reintegrating the net phone.
Proceedings of the 2nd International ICST Conference on Cognitive Radio Oriented Wireless Networks and Communications, 2007


  Loading...