关注
Vimal Kumar
Vimal Kumar
Senior Lecturer, University of Waikato
在 waikato.ac.nz 的电子邮件经过验证 - 首页
标题
引用次数
年份
Real-time system call-based ransomware detection
CJW Chew, V Kumar, P Patros, R Malik
International Journal of Information Security, 1-20, 2024
32024
ADMIn: Attacks on Dataset, Model and Input: A Threat Model for AI Based Software
V Kumar, J Mayo, K Bahiss
International Conference on Information Systems Security and Privacy (ICISSP …, 2024
2024
Android Crypto Ransomware System Call Dataset
C Chew, V Kumar, P Patros, R Malik
IEEE Dataport, 2024
2024
SoK: Static Configuration Analysis in Infrastructure as Code Scripts
PRR Konala, V Kumar, D Bainbridge
2023 IEEE International Conference on Cyber Security and Resilience (CSR …, 2023
42023
Listen to the Music: Evaluating the Use of Music in Audio Based Authentication
M Tsai, V Kumar
International Conference on Ubiquitous Security, 22-37, 2022
2022
Assessing Vulnerability from Its Description
Z Zhang, V Kumar, M Mayo, A Bifet
International Conference on Ubiquitous Security, 129-143, 2022
2022
Design and Architecture of Progger 3: A Low-Overhead, Tamper-Proof Provenance System
T Corrick, V Kumar
First International Conference on Ubiquitous Security, 189-202, 2022
2022
Searching on Non-Systematic Erasure Codes
A Daramas, V Kumar
2021 18th International Conference on Privacy, Security and Trust (PST), 1-8, 2021
2021
On Random Editing in LZ-End
D Roodt, U Speidel, V Kumar, RKL Ko
2021 Data Compression Conference (DCC), 366-366, 2021
2021
Towards embedding data provenance in files
TW Phua, P Patros, V Kumar
2021 IEEE 11th Annual Computing and Communication Workshop and Conference …, 2021
2021
ESCAPADE: Encryption-type-ransomware: System Call based Pattern Detection
C Chew, V Kumar, P Patros, R Malik
14th International Conference on Network and System Security, 2020
132020
Local Editing in LZ-End Compressed Data
D Roodt, U Speidel, V Kumar, RKL Ko
arXiv preprint arXiv:2007.06167, 2020
12020
Using Audio Characteristics for Mobile Device Authentication
M Dekker, V Kumar
13th International Conference on Network and System Security, NSS 2019 1198 …, 2019
22019
A bilinear pairing based secure data aggregation scheme for WSNs
V Kumar
2019 15th International Wireless Communications & Mobile Computing …, 2019
62019
Secure Sensor Cloud
V Kumar, A Sen, S Madria
2019
Behaviour Based Ransomware Detection
C Chew, V Kumar
34th International Conference on Computers and Their Applications 58, 127-136, 2019
172019
Fine Grained Attribute Based Access Control of Healthcare Data
E Mrema, V Kumar
12th International Symposium on Medical Information and Communication Technology, 2018
42018
Understanding software-defined perimeter
C Tang, V Kumar, S Chaisiri
Data Security in Cloud Computing 5, 151, 2017
2017
A data-centric view of cloud security
V Kumar, S Chaisiri, R Ko
Data Security in Cloud Computing, 1-17, 2017
362017
Data security in cloud computing
V Kumar, S Chaisiri, R Ko
Institution of Engineering and Technology, 2017
152017
系统目前无法执行此操作,请稍后再试。
文章 1–20