A novel approach to format based text steganography S Roy, M Manasmita Proceedings of the 2011 International Conference on Communication, Computing …, 2011 | 66 | 2011 |
A network based vulnerability scanner for detecting sqli attacks in web applications AK Singh, S Roy 2012 1st International Conference on Recent Advances in Information …, 2012 | 41 | 2012 |
Fast and lean encrypted Internet traffic classification S Roy, T Shapira, Y Shavitt Computer Communications 186, 166-173, 2022 | 22 | 2022 |
Audio steganography using LSB encoding technique with increased capacity and bit error rate optimization S Roy, J Parida, AK Singh, AS Sairam Proceedings of the Second International Conference on Computational Science …, 2012 | 22 | 2012 |
Detecting and defeating SQL injection attacks S Roy, AK Singh, AS Sairam International Journal of Information and Electronics Engineering 1 (1), 38, 2011 | 22 | 2011 |
IP traceback in star colored networks S Roy, A Singh, AS Sairam 2013 Fifth International Conference on Communication Systems and Networks …, 2013 | 15 | 2013 |
Analyzing SQL Meta characters and preventing SQL Injection attacks using meta filter S Roy, AK Singh, AS Sairam Proceedings of International Conference on Information and Electronics …, 2011 | 9 | 2011 |
Coloring networks for attacker identification and response AS Sairam, S Roy, R Sahay Security and Communication Networks 8 (5), 751-768, 2015 | 6 | 2015 |
Distributed star coloring of network for IP traceback S Roy, A Sairam International Journal of Information Security 16 (77), 1-12, 2017 | 5 | 2017 |
Using CAPTCHA Selectively to Mitigate HTTP-Based Attacks DS Sairam Ashok Singh, Roy Sangita 2015 IEEE Global Communications Conference (GLOBECOM), 1 - 6, 2015 | 5 | 2015 |
A Novel Approach to Prevent SQL Injection Attack Using URL Filter S Roy, AK Singh, AS Sairam International Journal of Innovation, Management and Technology 3 (5), 499, 2012 | 5 | 2012 |
High Data Rate Audio Steganography S Roy, V Kapoor International Conference on Innovative Computing and Communications …, 2020 | 2 | 2020 |
Extended deterministic edge router marking S Saurabh, S Roy, AS Sairam International Journal of Communication Networks and Distributed Systems 13 …, 2014 | 2 | 2014 |
IP traceback in dynamic networks S Roy, H Chawla, AS Sairam Security and Privacy: Second ISEA International Conference, ISEA-ISAP 2018 …, 2019 | 1 | 2019 |
Efficient Copy-Move Forgery Detection using Blur and Rotation Invariant Technique A Verma, V Kapoor, S Roy Proceedings of the 2018 VII International Conference on Network …, 2018 | 1 | 2018 |
Defending Against Network and Application Level Denial of Service Attacks S Roy IIT Patna, 2016 | | 2016 |
Network Attack Detection and Mitigation S Roy, A Sairam Self-Adaptive and Self-Organizing Systems Workshops (SASOW), 2015 IEEE …, 2015 | | 2015 |
A Network Based Vulnerability Scanner for Detecting SQLI Attacks in Web Applications S Roy, AK Singh IEEE Xplore, 2012 | | 2012 |
Audio Steganography Using LSB Encoding Technique with Increased Capacity and Bit Error Rate Optimization AS Sairam, J Parida, AK Singh, S Roy ACM Digital Library, 2012 | | 2012 |