Alwyn Roshan Pais
Orcid: 0000-0003-4571-4608
According to our database1,
Alwyn Roshan Pais
authored at least 78 papers
between 2007 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2024
New Gener. Comput., November, 2024
Enhanced Malicious Traffic Detection in Encrypted Communication Using TLS Features and a Multi-class Classifier Ensemble.
J. Netw. Syst. Manag., October, 2024
Accelerating randomized image secret sharing with GPU: contrast enhancement and secure reconstruction using progressive and convolutional approaches.
Multim. Tools Appl., May, 2024
2023
Clust. Comput., October, 2023
Secure latent fingerprint storage and self-recovered reconstruction using POB number system.
Pattern Recognit. Lett., March, 2023
Combinatorial Design Based Key Pre-distribution Scheme with High Scalability and Minimal Storage for Wireless Sensor Networks.
Wirel. Pers. Commun., 2023
A secure fingerprint template generation mechanism using visual secret sharing with inverse halftoning.
J. Vis. Commun. Image Represent., 2023
A Boosting-Based Hybrid Feature Selection and Multi-Layer Stacked Ensemble Learning Model to Detect Phishing Websites.
IEEE Access, 2023
2022
Multim. Tools Appl., November, 2022
An Effective GPGPU Visual Secret Sharing by Contrast-Adaptive ConvNet Super-Resolution.
Wirel. Pers. Commun., 2022
Telecommun. Syst., 2022
Classification of Phishing Email Using Word Embedding and Machine Learning Techniques.
J. Cyber Secur. Mobil., 2022
High-performance medical image secret sharing using super-resolution for CAD systems.
Appl. Intell., 2022
2021
A secure visual secret sharing (VSS) scheme with CNN-based image enhancement for underwater images.
Vis. Comput., 2021
Neural Comput. Appl., 2021
A novel fingerprint template protection and fingerprint authentication scheme using visual secret sharing and super-resolution.
Multim. Tools Appl., 2021
J. Cyber Secur. Mobil., 2021
A partial key pre-distribution based en-route filtering scheme for wireless sensor networks.
J. Ambient Intell. Humaniz. Comput., 2021
A Novel Cancelable Fingerprint Template Generation Mechanism Using Visual Secret Sharing.
Proceedings of the Pattern Recognition and Machine Intelligence, 2021
Salient Object Detection in Hyperspectral Images Using Felzenswalb's Segmentation Algorithm.
Proceedings of the Pattern Recognition and Machine Intelligence, 2021
2020
J. Ambient Intell. Humaniz. Comput., 2020
Two level filtering mechanism to detect phishing sites using lightweight visual similarity approach.
J. Ambient Intell. Humaniz. Comput., 2020
J. Ambient Intell. Humaniz. Comput., 2020
Attacks on Android-Based Smartphones and Impact of Vendor Customization on Android OS Security.
Proceedings of the Information Systems Security - 16th International Conference, 2020
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020
2019
Wirel. Networks, 2019
Contrast enhancement of Progressive Visual Secret Sharing (PVSS) scheme for gray-scale and color images using super-resolution.
Signal Process., 2019
PhishDump: A multi-model ensemble based technique for the detection of phishing sites in mobile devices.
Pervasive Mob. Comput., 2019
Detection of phishing websites using an efficient feature-based machine learning framework.
Neural Comput. Appl., 2019
A new combinatorial design based key pre-distribution scheme for wireless sensor networks.
J. Ambient Intell. Humaniz. Comput., 2019
New key pre-distribution scheme based on combinatorial design for wireless sensor networks.
IET Commun., 2019
IACR Cryptol. ePrint Arch., 2019
Comput. Secur., 2019
Proceedings of the 11th International Conference on Communication Systems & Networks, 2019
Proceedings of the 11th International Conference on Communication Systems & Networks, 2019
2018
DetLogic: A black-box approach for detecting logic vulnerabilities in web applications.
J. Netw. Comput. Appl., 2018
Black-box detection of XQuery injection and parameter tampering vulnerabilities in web applications.
Int. J. Inf. Sec., 2018
IET Image Process., 2018
Deterministic En-Route Filtering of False Reports: A Combinatorial Design Based Approach.
IEEE Access, 2018
Proceedings of the Security and Privacy - Second ISEA International Conference, 2018
Proceedings of the Security and Privacy - Second ISEA International Conference, 2018
Proceedings of the 9th International Conference on Computing, 2018
2017
Wirel. Pers. Commun., 2017
J. Inf. Secur. Appl., 2017
Proceedings of the Security in Computing and Communications - 5th International Symposium, 2017
Proceedings of the Security in Computing and Communications - 5th International Symposium, 2017
Proceedings of the Security in Computing and Communications - 5th International Symposium, 2017
Proceedings of the 10th International Conference on Security of Information and Networks, 2017
Proceedings of the Information Systems Security - 13th International Conference, 2017
Proceedings of the 3rd ACM Workshop on Cyber-Physical System Security, 2017
2016
Securing native XML database-driven web applications from XQuery injection vulnerabilities.
J. Syst. Softw., 2016
Proceedings of the Security in Computing and Communications - 4th International Symposium, 2016
Proceedings of the Security in Computing and Communications - 4th International Symposium, 2016
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016
2015
Proceedings of the Twelfth International Conference on Wireless and Optical Communications Networks, 2015
A Chinese Remainder Theorem Based Key Management Algorithm for Hierarchical Wireless Sensor Network.
Proceedings of the Distributed Computing and Internet Technology, 2015
2013
Proceedings of the Security in Computing and Communications - International Symposium, 2013
2012
Proceedings of the Recent Trends in Computer Networks and Distributed Systems Security, 2012
Proceedings of the 5th International Conference of Security of Information and Networks, 2012
Proceedings of the First International Conference on Security of Internet of Things, 2012
2011
Proceedings of the Security Aspects in Information Technology, 2011
Proceedings of the Information Systems Security - 7th International Conference, 2011
An In-Depth Analysis of the Epitome of Online Stealth: Keyloggers; and Their Countermeasures.
Proceedings of the Advances in Computing and Communications, 2011
A Novel Technique for Defeating Virtual Keyboards - Exploiting Insecure Features of Modern Browsers.
Proceedings of the Advances in Computing and Communications, 2011
Proceedings of the Advances in Computing and Communications, 2011
2010
Int. J. Inf. Sec., 2010
Attacks on Web Services and Mitigation Schemes.
Proceedings of the SECRYPT 2010, 2010
Throttling DDoS Attacks using Discrete Logarithm Problem.
Proceedings of the SECRYPT 2010, 2010
2009
Throttling DDoS Attacks.
Proceedings of the SECRYPT 2009, 2009
Automatic Video Object Plane Segmentation and Super resolution: A Novel Approach.
Proceedings of the 4th Indian International Conference on Artificial Intelligence, 2009
Secure Web Based Single Sign-On (SSO) Framework Using Identity Based Encryption System.
Proceedings of the ARTCom 2009, 2009
Super Resolution of Video with Sharpened Edges Using Multiple Frames -- A Novel Approach.
Proceedings of the ARTCom 2009, 2009
Design and Implementation of Secure Internet Based Voting System with User Anonymity Using Identity Based Encryption System.
Proceedings of the 2009 IEEE International Conference on Services Computing (SCC 2009), 2009
2008
A New Probabilistic Rekeying Method for Secure Dynamic Groups.
Proceedings of the SECRYPT 2008, 2008
Proceedings of the 10th International Conference on Electronic Commerce 2008, 2008
2007
Proceedings of the Advanced Intelligent Computing Theories and Applications. With Aspects of Contemporary Intelligent Computing Techniques, 2007