Real-time system call-based ransomware detection CJW Chew, V Kumar, P Patros, R Malik International Journal of Information Security, 1-20, 2024 | 3 | 2024 |
ADMIn: Attacks on Dataset, Model and Input: A Threat Model for AI Based Software V Kumar, J Mayo, K Bahiss International Conference on Information Systems Security and Privacy (ICISSP …, 2024 | | 2024 |
Android Crypto Ransomware System Call Dataset C Chew, V Kumar, P Patros, R Malik IEEE Dataport, 2024 | | 2024 |
SoK: Static Configuration Analysis in Infrastructure as Code Scripts PRR Konala, V Kumar, D Bainbridge 2023 IEEE International Conference on Cyber Security and Resilience (CSR …, 2023 | 4 | 2023 |
Listen to the Music: Evaluating the Use of Music in Audio Based Authentication M Tsai, V Kumar International Conference on Ubiquitous Security, 22-37, 2022 | | 2022 |
Assessing Vulnerability from Its Description Z Zhang, V Kumar, M Mayo, A Bifet International Conference on Ubiquitous Security, 129-143, 2022 | | 2022 |
Design and Architecture of Progger 3: A Low-Overhead, Tamper-Proof Provenance System T Corrick, V Kumar First International Conference on Ubiquitous Security, 189-202, 2022 | | 2022 |
Searching on Non-Systematic Erasure Codes A Daramas, V Kumar 2021 18th International Conference on Privacy, Security and Trust (PST), 1-8, 2021 | | 2021 |
On Random Editing in LZ-End D Roodt, U Speidel, V Kumar, RKL Ko 2021 Data Compression Conference (DCC), 366-366, 2021 | | 2021 |
Towards embedding data provenance in files TW Phua, P Patros, V Kumar 2021 IEEE 11th Annual Computing and Communication Workshop and Conference …, 2021 | | 2021 |
ESCAPADE: Encryption-type-ransomware: System Call based Pattern Detection C Chew, V Kumar, P Patros, R Malik 14th International Conference on Network and System Security, 2020 | 13 | 2020 |
Local Editing in LZ-End Compressed Data D Roodt, U Speidel, V Kumar, RKL Ko arXiv preprint arXiv:2007.06167, 2020 | 1 | 2020 |
Using Audio Characteristics for Mobile Device Authentication M Dekker, V Kumar 13th International Conference on Network and System Security, NSS 2019 1198 …, 2019 | 2 | 2019 |
A bilinear pairing based secure data aggregation scheme for WSNs V Kumar 2019 15th International Wireless Communications & Mobile Computing …, 2019 | 6 | 2019 |
Secure Sensor Cloud V Kumar, A Sen, S Madria | | 2019 |
Behaviour Based Ransomware Detection C Chew, V Kumar 34th International Conference on Computers and Their Applications 58, 127-136, 2019 | 17 | 2019 |
Fine Grained Attribute Based Access Control of Healthcare Data E Mrema, V Kumar 12th International Symposium on Medical Information and Communication Technology, 2018 | 4 | 2018 |
Understanding software-defined perimeter C Tang, V Kumar, S Chaisiri Data Security in Cloud Computing 5, 151, 2017 | | 2017 |
A data-centric view of cloud security V Kumar, S Chaisiri, R Ko Data Security in Cloud Computing, 1-17, 2017 | 36 | 2017 |
Data security in cloud computing V Kumar, S Chaisiri, R Ko Institution of Engineering and Technology, 2017 | 15 | 2017 |