Narasimha K. Shashidhar

According to our database1, Narasimha K. Shashidhar authored at least 36 papers between 2007 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Strategies for a Startup Software-as-a-Service Organizations with Minimal Budget to Achieve Security and Compliance Goals.
Proceedings of the 11th International Symposium on Digital Forensics and Security, 2023

A Testbed for a Controller Area Network Communication Protocol in Automobiles.
Proceedings of the 20th IEEE Consumer Communications & Networking Conference, 2023

2022
Digital Forensics Analysis of Windows 11 Shellbag with Comparative Tools.
Proceedings of the 10th International Symposium on Digital Forensics and Security, 2022

Development of a Forensic Toolkit for Small-Medium Size Business (SMB).
Proceedings of the 10th International Symposium on Digital Forensics and Security, 2022

Digital Forensics Lab Design: A framework.
Proceedings of the 10th International Symposium on Digital Forensics and Security, 2022

Penetration Testing: Smart Home IoT Devices.
Proceedings of the Internet of Things - ICIOT 2022, 2022

Topic Modeling in the ENRON Dataset.
Proceedings of the Big Data - BigData 2022, 2022

2021
Threat Landscape Expansion During Covid-19: Remote Incident Response Handling.
Proceedings of the 9th International Symposium on Digital Forensics and Security, 2021

A Novel Risk Mitigation & Cloud-Based Disaster Recovery Framework for Small to Medium Size Businesses.
Proceedings of the 9th International Symposium on Digital Forensics and Security, 2021

Prevention Pre-Violence in E-Labs with Machine Learning: PVE.
Proceedings of the 9th International Symposium on Digital Forensics and Security, 2021

Deception Detection Using Machine Learning.
Proceedings of the 54th Hawaii International Conference on System Sciences, 2021

2020
Cybersecurity Evaluation with PowerShell.
Proceedings of the 8th International Symposium on Digital Forensics and Security, 2020

On-Premises Versus SECaaS Security Models.
Proceedings of the 8th International Symposium on Digital Forensics and Security, 2020

Graphically Display Database Transactions to Enhance Database Forensics.
Proceedings of the 8th International Symposium on Digital Forensics and Security, 2020

Using ITIL 4 in Security Management.
Proceedings of the 8th International Symposium on Digital Forensics and Security, 2020

MiNo: The Chrome Web Browser Add-on Application to Block the Hidden Cryptocurrency Mining Activities.
Proceedings of the 8th International Symposium on Digital Forensics and Security, 2020

Centrality and Scalability Analysis on Distributed Graph of Large-Scale E-mail Dataset for Digital Forensics.
Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020

2018
Forensic Analysis of Wear Leveling on Solid-State Media.
Proceedings of the 17th IEEE International Conference On Trust, 2018

2016
Low Budget Forensic Drive Imaging Using ARM Based Single Board Computers.
J. Digit. Forensics Secur. Law, 2016

Investigating the security and digital forensics of video games and gaming systems: A study of PC games and PS4 console.
Proceedings of the 2016 International Conference on Computing, 2016

2015
Work-Competitive Scheduling on Task Dependency Graphs.
Parallel Process. Lett., 2015

The Efficacy of Epidemic Algorithms on Detecting Node Replicas in Wireless Sensor Networks.
J. Sens. Actuator Networks, 2015

Digital forensics in social networks and the cloud: Process, approaches, methods, tools, and challenges.
Proceedings of the International Conference on Computing, Networking and Communications, 2015

2014
A One-Time Stegosystem and Applications to Efficient Covert Communication.
J. Cryptol., 2014

Distributed dynamic channel assignment in wireless networks.
Proceedings of the International Conference on Computing, Networking and Communications, 2014

2013
Do private and portable web browsers leave incriminating evidence?: a forensic analysis of residual artifacts from private and portable web browsing sessions.
EURASIP J. Inf. Secur., 2013

2012
Key-Efficient Steganography.
Proceedings of the Information Hiding - 14th International Conference, 2012

Detecting Phishing Emails the Natural Language Way.
Proceedings of the Computer Security - ESORICS 2012, 2012

Scalable Secure MJPEG Video Streaming.
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012

Two-Pronged Phish Snagging.
Proceedings of the Seventh International Conference on Availability, 2012

2009
Randomness-optimal Steganography
CoRR, 2009

Efficient Steganography with Provable Security Guarantees
CoRR, 2009

Taking total control of voting systems: firmware manipulations on an optical scan voting terminal.
Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), 2009

2008
Pre-Election Testing and Post-Election Audit of Optical Scan Voting Terminal Memory Cards.
Proceedings of the 2008 USENIX/ACCURATE Electronic Voting Workshop, 2008

Randomized Work-Competitive Scheduling for Cooperative Computing on k-partite Task Graphs.
Proceedings of The Seventh IEEE International Symposium on Networking Computing and Applications, 2008

2007
Tampering with Special Purpose Trusted Computing Devices: A Case Study in Optical Scan E-Voting.
Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), 2007


  Loading...