Avinash Srinivasan
Orcid: 0000-0002-6940-0139
According to our database1,
Avinash Srinivasan
authored at least 40 papers
between 2006 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Cyber-AnDe: Cybersecurity Framework With Adaptive Distributed Sampling for Anomaly Detection on SDNs.
IEEE Trans. Inf. Forensics Secur., 2024
Int. J. Secur. Networks, 2024
2023
Network, October, 2023
2022
Proceedings of the IEEE International Conference on Networking, Architecture and Storage, 2022
2019
XTRA - eXtended bit-Torrent pRotocol for Authenticated covert peer communication - Authenticated covert P2P communication.
Peer-to-Peer Netw. Appl., 2019
2018
VOUCH-AP: privacy preserving open-access 802.11 public hotspot AP authentication mechanism with co-located evil-twins.
Int. J. Secur. Networks, 2018
2017
J. Cyber Secur. Mobil., 2017
Secure android covert channel with robust survivability to service provider restrictions.
Int. J. Secur. Networks, 2017
Proceedings of the 12th International Conference on Malicious and Unwanted Software, 2017
FROST: Anti-Forensics Digital-Dead-DROp Information Hiding RobuST to Detection & Data Loss with Fault tolerance.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017
2016
Proceedings of the 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, 2016
2015
Android-Stego: A Novel Service Provider Imperceptible MMS Steganography Technique Robust to Message Loss.
EAI Endorsed Trans. Ambient Syst., 2015
Proceedings of the 21st IEEE International Conference on Parallel and Distributed Systems, 2015
2014
Towards a Reference Architecture for Service-Oriented Cross Domain Security Infrastructures.
Proceedings of the Internet and Distributed Computing Systems, 2014
SAFE: Secure and Big Data-Adaptive Framework for Efficient Cross-Domain Communication.
Proceedings of the First International Workshop on Privacy and Secuirty of Big Data, 2014
2013
Int. J. Secur. Networks, 2013
Proceedings of the Media Watermarking, 2013
Proceedings of the International Conference on Computing, Networking and Communications, 2013
2012
Uncertainty Mitigation for Trustworthiness-Oriented Applications in Wireless Ad Hoc Networks.
IEICE Trans. Inf. Syst., 2012
Exploring an open WiFi detection vulnerability as a malware attack vector on iOS devices.
Proceedings of the 7th International Conference on Malicious and Unwanted Software, 2012
Proceedings of the 7th International Conference for Internet Technology and Secured Transactions, 2012
Proceedings of the 7th International Conference for Internet Technology and Secured Transactions, 2012
Proceedings of the Cyberspace Safety and Security - 4th International Symposium, 2012
Robust Authentication of Public Access Points Using Digital Certificates - A Novel Approach.
Proceedings of the Cyberspace Safety and Security - 4th International Symposium, 2012
2011
Proceedings of the Advances in Computing and Communications, 2011
2010
Proceedings of the 2010 IEEE International Workshop on Information Forensics and Security, 2010
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010
2009
Secure and reliable broadcasting in wireless sensor networks using multi-parent trees.
Secur. Commun. Networks, 2009
Proceedings of IEEE International Conference on Communications, 2009
2008
Encyclopedia of Wireless and Mobile Communications, 2008
Int. J. Secur. Networks, 2008
Int. J. Secur. Networks, 2008
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2008 Workshops), 2008
Proceedings of the 17th International Conference on Computer Communications and Networks, 2008
2007
A Novel k-Parent Flooding Tree for Secure and Reliable Broadcasting in Sensor Networks.
Proceedings of IEEE International Conference on Communications, 2007
Proceedings of the Global Communications Conference, 2007
2006
Proceedings of the Second International Symposium on Dependable Autonomic and Secure Computing (DASC 2006), 29 September, 2006