Narasimha K. Shashidhar
According to our database1,
Narasimha K. Shashidhar
authored at least 39 papers
between 2007 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
iOS Mobile Forensics Methodologies, Extracting Biome Artifacts, and Overlooked Artifacts Needed to Improve Investigations.
Proceedings of the 12th International Symposium on Digital Forensics and Security, 2024
Identifying Malware Family with String Matching Algorithms Based on API Calls and Entire Strings.
Proceedings of the 12th International Symposium on Digital Forensics and Security, 2024
2023
Proceedings of the 22nd IEEE International Conference on Trust, 2023
Strategies for a Startup Software-as-a-Service Organizations with Minimal Budget to Achieve Security and Compliance Goals.
Proceedings of the 11th International Symposium on Digital Forensics and Security, 2023
Proceedings of the 20th IEEE Consumer Communications & Networking Conference, 2023
2022
Proceedings of the 10th International Symposium on Digital Forensics and Security, 2022
Proceedings of the 10th International Symposium on Digital Forensics and Security, 2022
Proceedings of the 10th International Symposium on Digital Forensics and Security, 2022
Proceedings of the Internet of Things - ICIOT 2022, 2022
Proceedings of the Big Data - BigData 2022, 2022
2021
Proceedings of the 9th International Symposium on Digital Forensics and Security, 2021
A Novel Risk Mitigation & Cloud-Based Disaster Recovery Framework for Small to Medium Size Businesses.
Proceedings of the 9th International Symposium on Digital Forensics and Security, 2021
Proceedings of the 9th International Symposium on Digital Forensics and Security, 2021
Proceedings of the 54th Hawaii International Conference on System Sciences, 2021
2020
Proceedings of the 8th International Symposium on Digital Forensics and Security, 2020
Proceedings of the 8th International Symposium on Digital Forensics and Security, 2020
Proceedings of the 8th International Symposium on Digital Forensics and Security, 2020
Proceedings of the 8th International Symposium on Digital Forensics and Security, 2020
MiNo: The Chrome Web Browser Add-on Application to Block the Hidden Cryptocurrency Mining Activities.
Proceedings of the 8th International Symposium on Digital Forensics and Security, 2020
Centrality and Scalability Analysis on Distributed Graph of Large-Scale E-mail Dataset for Digital Forensics.
Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020
2018
Proceedings of the 17th IEEE International Conference On Trust, 2018
2016
J. Digit. Forensics Secur. Law, 2016
Investigating the security and digital forensics of video games and gaming systems: A study of PC games and PS4 console.
Proceedings of the 2016 International Conference on Computing, 2016
2015
The Efficacy of Epidemic Algorithms on Detecting Node Replicas in Wireless Sensor Networks.
J. Sens. Actuator Networks, 2015
Digital forensics in social networks and the cloud: Process, approaches, methods, tools, and challenges.
Proceedings of the International Conference on Computing, Networking and Communications, 2015
2014
J. Cryptol., 2014
Proceedings of the International Conference on Computing, Networking and Communications, 2014
2013
Do private and portable web browsers leave incriminating evidence?: a forensic analysis of residual artifacts from private and portable web browsing sessions.
EURASIP J. Inf. Secur., 2013
2012
Proceedings of the Information Hiding - 14th International Conference, 2012
Proceedings of the Computer Security - ESORICS 2012, 2012
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012
Proceedings of the Seventh International Conference on Availability, 2012
2009
Taking total control of voting systems: firmware manipulations on an optical scan voting terminal.
Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), 2009
2008
Pre-Election Testing and Post-Election Audit of Optical Scan Voting Terminal Memory Cards.
Proceedings of the 2008 USENIX/ACCURATE Electronic Voting Workshop, 2008
Randomized Work-Competitive Scheduling for Cooperative Computing on k-partite Task Graphs.
Proceedings of The Seventh IEEE International Symposium on Networking Computing and Applications, 2008
2007
Tampering with Special Purpose Trusted Computing Devices: A Case Study in Optical Scan E-Voting.
Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), 2007