Publications.

    1. Kappa: A system for Linux P2P Load Balancing and Transparent Process Migration, HiPC-2010, Student Research Symposium, Gaurav Mogre, Avinash H, Alwyn R Pais
    2. Secure Short Message Peer-to-Peer Protocol, NETs 2010, Taiwan by Saurab Samantha, Radhesh M, Alwyn R Pais
    3. Attacks on Web Services and Mitigation Schemes, SECRYPT - 2010: International Conference on Security and Cryptography, Athens, Greece. by Vipul Patel, Radhesh Mohandas, Alwyn R. Pais
    4. Throttling DDoS Attacks using Discrete Logarithm Problem, SECRYPT - 2010: International Conference on Security and Cryptography, Athens, Greece. by Avinash D., Radhesh M., Alwyn R. Pais
    5. HTTPattack : An Open Source web stress tool, Taqi Ali Syed, Radhesh M., Alwyn R. Pais (Indo-US conference and Workshop on Cyber Security,Cyber Crime and Cyber Forensics, Aug 2009.)
    6. Secure Web Based Single Sign On (SSO) Framework using Identity Based Encryption System ,Rajesh Kumar Singh, Alwyn R. Pais.(ARTCom 2009).
    7. Super Resolution of video with Sharpened Edges using Multiple Frames - A Novel Approach, Alwyn R. Pais, John D'Souza, Sandeep Patil. (ARTCom 2009)
    8. Preventing Image based Cross Site Request Forgery Attacks, Ramarao Ramisetty , Radhesh M., Alwyn R. Pais (Indo-US conference and Workshop on Cyber Security,Cyber Crime and Cyber Forensics, Aug 2009.)
    9. Automatic Video Object Plane Segmentation and Super Resolution: A Novel Approach, Alwyn R. Pais, Naveen P., Rajashekar Gidnavar, John D'Souza.(IICAI 2009,Tumkur)
    10. Design and Implementation of Secure Intenet Based Voting System with User Anonymity using Identity Based Encryption System. Purushotham B.R., Alwyn R. Pais.(IEEE SCC -2009,Bangalore).
    11. Suraksha: A Security Designers' Workbench, March 17-19, 2009, Hack.in 2009, India. (With Asoke K Talukder, Vineet Kumar Maurya, Santhosh Babu G, Jangam Ebenezer, Muni Sekhar V)
    12. Security-aware Software Development Life Cycle (SaSDLC) - Processes and Tools, April 28-30, 2009, WOCN 2009, Egypt. (With Asoke K Talukder, Vineet Kumar Maurya, Santhosh Babu G, Jangam Ebenezer, Muni Sekhar V, Jevitha K P, Saurabh Samanta)
    13. Throttling DDoS Attacks, Saraiah G, Taqi Ali, Madhu Babu , Avinash D, Radhesh M., Alwyn R. Pais(SECRYPT 2009,Italy)
    14. Secure and Efficient Protocol for Mobile Payments, Aug 19-22, 2008, ICEC-08, Austria. (With Rahul Godbole)
    15. A New Probabilistic Rekeying Method For Secure Multicast Groups SECRYPT 08 Portugal by Shankar Joshi, Alwyn R. Pais
    16. Identity Based DRM System with Total Anonymity and Device Flexibility using IBES, June 3-6, 2008, SHPCS08, Cyprus. (With Palavalli Sharath and U.Srinivas)
    17. Generation of super resolution video from low resolution video sequences with improved Lightening and temporal resolutin. (Madhusudhan T,Alwyn R Pais. CISTM 2007,July 16-18,Hyderabad,India)
    18. Super Resolution video using Histogram Based Segmentation and ferequrncy domain registration.(Madhusudhan T,Alwyn R Pais. ICIT 2007,March 19-21 Haldia,India)
    19. Model Based tracking.(Sumanth kumar reddy, Alwyn R Pais. ICIC 2007, Aug 21-24.QingDao China.)
    20. Managing Functional & Nonfunctional Requirements for Collaborative Clouds, Asoke K Talukder, Santhosh Babu G, Prahalad H.A, Vineet Kumar Maurya, Jangam Ebenezer, Muni Sekhar V, Alwyn Roshan Pais, IMSAA 2009 (IIITB Bangalore)
    21. Automatic Shadow Removal Algorithm for VOP and Generation of Super Resolved VOP, Alwyn R Pais, Hari Krishna R, John D'Souza, Ram Mohana Reddy,( BEST PAPER AWARD) ICIP- 2010,Aug 6-8, Bangalore
    22. Fortifying Web Services using Custom Paros Proxy Extension. Vipul Patel, Radhesh M & Alwyn R Pais NCNDSS 2011, India
    23. Responsive system for DDoS Attack against Apache Web Server, Prashanth Kulkarni, Radhesh M and Alwyn R Pais, NCNDSS 2011, India
    24. Testing Resilience of Router against Denial of Service Attacks, Vishal Maruti Karande, Sandeep Nair Narayanan, Alwyn Roshan Pais and N. Balakrishnan, NeCom/WeSt/WiMon 2011, LNCS-CCIS 197, pp.107-116, 2011
    25. Detection and Prevention of SQL injection Attacks using semantic equivalence, Sandeep Nair Narayanan, Alwyn Roshan Pais and Radhesh Mohandas, ICIP 2011, LNCS-CCIS 157, pp.103-112, 2011
    26. Towards Evaluating Resilience of SIP Server under Low Rate DoS Attack, Abhishek Kumar, P. Shanthi Thilagam, Alwyn R. Pais, Vishwas Sharma and Kunal M. Sadalkar, AIM 2011, LNCS-CCIS 147, pp.336-339, 2011
    27. Safeguarding Web Services Using Self-Adaptive Schema Hardening Algorithm, Vipul Patel, Radhesh Mohandas and Alwyn Pais, CNSA 2011, LNCS-CCIS 196, pp.383-392, 2011
    28. A Framework for Intrusion Tolerance in Cloud Computing, Vishal M. Karande and Alwyn R. Pais, ACC 2011, Part IV, LNCS-CCIS 193, pp.386-395, 2011
    29. An In-Depth Analysis of the Epitome of Online Stealth: Keyloggers; and Their Countermeasures, Kalpa Vishnani, Alwyn Roshan Pais and Radhesh Mohandas, ACC 2011, Part III, LNCS-CCIS 192, pp.10-19, 2011
    30. Protection against Denial of Service and Input Manipulation Vulnerabilities in Service Oriented Architecture, Alwyn Roshan Pais, D. J. Deepak and B. R. Chandavarkar, CNSA 2011, LNCS-CCIS 196, pp.331-343, 2011
    31. Detecting & Defeating Split Personality Malware, Kalpa Vishnani, Alwyn R. Pais, Radhesh Mohandas, The Fifth International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2011 August 21-27, 2011 - French Riviera, Nice/Saint Laurent du Var, France
      (Best Paper Award)
    32. Kunal Sadalkar, Radhesh Mohandas, Alwyn R. Pais: Model Based Hybrid Approach to Prevent SQL Injection Attacks in PHP. InfoSecHiComNet 2011, LNCS, 2011, Volume 7011/2011, 3-15, 2011, India
    33. IFrandbox - Client Side Protection from Malicious Injected Iframes, Tanusha S. Nadkarni, Radhesh Mohandas and Alwyn R. Pais, ICISS-2011, LNCS, 2011, Volume 7093/2011, 383-386, 2011
    34. Location Estimation of mobile in GSM & CDMA networks, Tataram Adapa, Alwyn R. Pais, International Conference on Security in Computer Networks and Distributed Systems(SNDS-2012),11-12 Oct 2012. IIITM-K
    35. SIRIS-Secure IRIS Authentication System, Priyanka Loya, Alwyn R. Pais, SINCONF 2012- International Conference on Security of Information and Networks. Oct 22-27,MNIT-Jaipur
    36. Restraining Add-on's Behaviour in Private Browsing,(Poster paper) Ameya bapat, Alwyn R. Pais, Ist International Conference on Security of Internet of Things. Aug 17-19,2012, Kerala, India
    37. Indian Share Market Analysis and Stock Price Prediction Mechanism Using News,Tanvi S. Jagtap, Radhesh M, Alwyn R. Pais, Ananya M., Barve Abhishek K, India Finance Conference 2012(IFC-2012) Dec. 19-21,2012,IIM Calcutta
    38. Integrated Market Surveillance System to Detect Potential insider Trading and Manipulation in Indian Markets, Alwyn R. Pais, Radhesh M., Annfreeda D, Tanvi S. Jagtap, Barve Abhishek K., India Finance Conference 2012 (IFC-2012). IIM Calcutta.
    39. Effectiveness of SIP Messages on SIP Server. ICT-2013 - IEEE International Conference on Information and Communication Technologies, India by Abhishek Bansal, Prashant kulkarni, Alwyn R. Pais
    40. Mitigation of Flooding Based Denial of Service Attack against Session Initiation Protocol Based VoIP System. Abhishek Bansal, Alwyn R. Pais (communicated)
    41. Emulating a High Interaction Honeypot to Monitor Intrusion Activity. SSCC - 2013, International Symposium on Security in Computing and Communications, SJCE Mysore by Anil Gopalakrishna, Alwyn R. Pais(accepted)
    42. Scalable Group Key Distribution Scheme Based on Chinese Remainder Theorem.Third International Conference on Security, Privacy, and Applied Cryptography Engineering (SPACE-2013) IIT Kharagpur, India, Oct 19-23, 2013 by Akash Dhorajiya, Alwyn R.Pais(communicated)

Journals.

    1. Secure Short Message Peer-to-Peer Protocol, International Journal of Electronic Commerce studies, Taiwan by Saurab Samantha, Radhesh M, Alwyn R Pais,pp. 45-60, Vol.3, No.1, 2012. (ISSN 2073-9729)
    2. A New Probabilistic Rekeying Method For Secure Multicast Groups. International Journal of Information Security, Springer Verlag (2010) by Alwyn R. Pais, Shankar Joshi.
    3. Edge model based Super Resolution Video Generation. International Journal of Recent Trends in Engineering, Computer Science, Vol. 1, June 2009 by Chintan A. Modi, Alwyn R. Pais and John D'Souza.
    4. Automatic Shadow Removal Algorithm for VOP and Generation of Super Resolved VOP, Alwyn R Pais, Hari Krishna R, John D'Souza, Ram Mohana Reddy, International Journal of Information Processing Nov 2010
    5. Model Based Approach to Prevent SQL Injection Attacks on .NET Applications Shikhar Jain & Alwyn R. Pais International Journal of Computer Science & Informatics, Volume-I, Issue-II, pp.43-27, 2011
    6. Automatic Shadow Removal Algorithm for VOP, DWT Based Watermarking Algorithm for VOP and Generation of Super Resolved VOP, Alwyn R. Pais, John D'Souza, Ram Mohana Reddy, P.Hari Krishna, International Journal of Multimedia and Ubiquitous Engineering Vol. 6, No. 3, July, 2011
    7. Anonimity and Verifiability in Multi-attribute Reverse Auction, T. R. Srinath, Mahendra Pratap Singh and Alwyn R. Pais, International Journal of Information Technology Convergence and Services(IJITCS), Vol.1, No.4, August 2011.
    8. Super-resolution Video Generation Algorithm for Surveillance Applications, A. R. Pais, J. D'Souza, and R. M. Reddy, The Imaging Science Journal, UK, 2013.

Books Edited.