Publications

 

Suraksha:


Suraksha: A Security Designer's Workbench Proceedings of Hack.in 2009, IIT   Kanpur, 17-19 March 2009,pp 59-66 by Santhosh Babu G, Vineet Kumar Maurya, Ebenezer Jangam, Muni Sekhar V, Asoke K   Talukder, Alwyn Roshan Pais


Security-aware Software Development Life Cycle (SaSDLC) - Processes and Tools WOCN 2009, Cairo, Egypt by Asoke K Talukder, Vineet Kumar Maurya, Santhosh Babu G, Jangam Ebenezer, Muni Sekhar V, Jevitha K P, Alwyn   Roshan Pais, Saurabh Samanta


DDoS:


Throttling DDoS Attacks using Discrete Logarithm Problem. SECRYPT 2010, July 26-28, 2010 Athens, Greece. by Avinash D., Radhesh M., Alwyn R. Pais


Throttling DDoS Attacks SECRYPT 2009 - International Conference on Security and   Cryptography, Italy by Madhu Babu J, Taqi Ali Syed, Saraiah G, Avinash D, Radhesh Mohandas, Alwyn R Pais


HTTPattack : An Open Source Web Stress Tool. Taqi Ali Syed, Radhesh M., Alwyn R. Pais (Indo-US conference and Workshop on Cyber Security,Cyber Crime and Cyber Forensics, Aug 2009.)


Others:


Secure Short Message Peer-to-Peer Protocol, NETs 2010, Taiwan by Saurab Samantha, Radhesh M, Alwyn R Pais


Attacks on Web Services and Mitigation Schemes, SECRYPT - 2010, International Conference on Security and Cryptography, Athens, Greece. by Vipul Patel, Radhesh Mohandas, Alwyn R. Pais


A New Probabilistic Rekeying Method For Secure Multicast Groups , International Journal of Information Security, Springer Verlag (2010) by Shankar Joshi, Alwyn R. Pais


Design and Implementation of Secure Intenet Based Voting System with User Anonymity using Identity Based Encryption System. Purushotham B.R., Alwyn R. Pais.(IEEE SCC -2009,Bangalore).


Preventing Image based Cross Site Request Forgery Attacks. Ramarao Ramisetty , Radhesh M., Alwyn R. Pais (Indo-US conference and Workshop on Cyber Security,Cyber Crime and Cyber Forensics, Aug 2009.)


Secure Web Based Single Sign On (SSO) Framework using Identity Based Encryption System. Rajesh Kumar Singh, Alwyn R. Pais.(ARTCom 2009).


Identity Based DRM System with Total Anonymity and Device Flexibility using IBES, SHPCS 08,   Cyprus by Sharath Palavalli, U S Srinivas, Alwyn Roshan Pais


Secure and Efficient Protocol for Mobile Payments, ICEC 08, Austria by Rahul M. Godbole, Alwyn R. Pais


A New Probabilistic Rekeying Method For Secure Multicast Groups , SECRYPT 08 Portugal by Shankar Joshi, Alwyn R. Pais


Kappa: A system for Linux P2P Load Balancing and Transparent Process Migration HiPC-2010, Student Research Symposium Gaurav Mogre, Avinash H, Alwyn R Pais.


Secure Short Message Peer-to-Peer Protocol, NETs 2010 Saurab Samantha, Radhesh M, Alwyn R Pais.


Attacks on Web Services and Mitigation Schemes. SECRYPT - 2010: International Conference on Security and Cryptography, Athens, Greece. by Vipul Patel, Radhesh Mohandas, Alwyn R. Pais


Super Resolution of video with Sharpened Edges using Multiple Frames - A Novel Approach A Novel Approach, Alwyn R. Pais, John D'Souza, Sandeep Patil. (ARTCom 2009)


Preventing Image based Cross Site Request Forgery Attacks Ramarao Ramisetty , Radhesh M., Alwyn R. Pais (Indo-US conference and Workshop on Cyber Security,Cyber Crime and Cyber Forensics, Aug 2009.)


Automatic Video Object Plane Segmentation and Super Resolution: A Novel Approach Alwyn R. Pais, Naveen P., Rajashekar Gidnavar, John D'Souza.(IICAI 2009,Tumkur)


Design and Implementation of Secure Intenet Based Voting System with User Anonymity using Identity Based Encryption System Purushotham B.R., Alwyn R. Pais.(IEEE SCC -2009,Bangalore)


Generation of super resolution video from low resolution video sequences with improved Lightening and temporal resolutin(Madhusudhan T,Alwyn R Pais. CISTM 2007,July 16-18,Hyderabad,India)


Super Resolution video using Histogram Based Segmentation and ferequrncy domain registration(Madhusudhan T,Alwyn R Pais. ICIT 2007,March 19-21 Haldia,India)


Model Based tracking(Sumanth kumar reddy, Alwyn R Pais. ICIC 2007, Aug 21-24.QingDao China.)


Managing Functional & Nonfunctional Requirements for Collaborative Clouds Asoke K Talukder, Santhosh Babu G, Prahalad H.A, Vineet Kumar Maurya, Jangam Ebenezer, Muni Sekhar V, Alwyn Roshan Pais, IMSAA 2009 (IIITB Bangalore)


Automatic Shadow Removal Algorithm for VOP and Generation of Super Resolved VOP Alwyn R Pais, Hari Krishna R, John D'Souza, Ram Mohana Reddy,( BEST PAPER AWARD) ICIP- 2010,Aug 6-8, Bangalore


Fortifying Web Services using Custom Paros Proxy Extension Vipul Patel, Radhesh M & Alwyn R Pais NCNDSS 2011, India


Responsive system for DDoS Attack against Apache Web Server Prashanth Kulkarni, Radhesh M and Alwyn R Pais, NCNDSS 2011, India


Testing Resilience of Router against Denial of Service Attacks Vishal Maruti Karande, Sandeep Nair Narayanan, Alwyn Roshan Pais and N. Balakrishnan, NeCom/WeSt/WiMon 2011, LNCS-CCIS 197, pp.107-116, 2011


Detection and Prevention of SQL injection Attacks using semantic equivalence Sandeep Nair Narayanan, Alwyn Roshan Pais and Radhesh Mohandas, ICIP 2011, LNCS-CCIS 157, pp.103-112, 2011


Towards Evaluating Resilience of SIP Server under Low Rate DoS Attack Abhishek Kumar, P. Shanthi Thilagam, Alwyn R. Pais, Vishwas Sharma and Kunal M. Sadalkar, AIM 2011, LNCS-CCIS 147, pp.336-339, 2011


Safeguarding Web Services Using Self-Adaptive Schema Hardening Algorithm Vipul Patel, Radhesh Mohandas and Alwyn Pais, CNSA 2011, LNCS-CCIS 196, pp.383-392, 2011


A Framework for Intrusion Tolerance in Cloud Computing Vishal M. Karande and Alwyn R. Pais, ACC 2011, Part IV, LNCS-CCIS 193, pp.386-395, 2011


An In-Depth Analysis of the Epitome of Online Stealth: Keyloggers; and Their Countermeasures Kalpa Vishnani, Alwyn Roshan Pais and Radhesh Mohandas, ACC 2011, Part III, LNCS-CCIS 192, pp.10-19, 2011


Protection against Denial of Service and Input Manipulation Vulnerabilities in Service Oriented Architecture Alwyn Roshan Pais, D. J. Deepak and B. R. Chandavarkar, CNSA 2011, LNCS-CCIS 196, pp.331-343, 2011


Detecting & Defeating Split Personality Malware Kalpa Vishnani, Alwyn R. Pais, Radhesh Mohandas, The Fifth International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2011 August 21-27, 2011 - French Riviera, Nice/Saint Laurent du Var, France (Best Paper Award)

Model Based Hybrid Approach to Prevent SQL Injection Attacks in PHP Kunal Sadalkar, Radhesh Mohandas, Alwyn R. Pais InfoSecHiComNet 2011, LNCS, 2011, Volume 7011/2011, 3-15, 2011, India


IFrandbox - Client Side Protection from Malicious Injected Iframes Tanusha S. Nadkarni, Radhesh Mohandas and Alwyn R. Pais, ICISS-2011, LNCS, 2011, Volume 7093/2011, 383-386, 2011


Location Estimation of mobile in GSM & CDMA networks Tataram Adapa, Alwyn R. Pais, International Conference on Security in Computer Networks and Distributed Systems(SNDS-2012),11-12 Oct 2012. IIITM-K


SIRIS-Secure IRIS Authentication System Priyanka Loya, Alwyn R. Pais, SINCONF 2012- International Conference on Security of Information and Networks. Oct 22-27,MNIT-Jaipur


Restraining Add-on's Behaviour in Private Browsing (Poster paper), Ameya bapat, Alwyn R. Pais, Ist International Conference on Security of Internet of Things. Aug 17-19,2012, Kerala, India


Indian Share Market Analysis and Stock Price Prediction Mechanism Using News Tanvi S. Jagtap, Radhesh M, Alwyn R. Pais, Ananya M., Barve Abhishek K, India Finance Conference 2012(IFC-2012) Dec. 19-21,2012,IIM Calcutta


Integrated Market Surveillance System to Detect Potential insider Trading and Manipulation in Indian Markets. Alwyn R. Pais, Radhesh M., Annfreeda D, Tanvi S. Jagtap, Barve Abhishek K., India Finance Conference 2012 (IFC-2012). IIM Calcutta.


Effectiveness of SIP Messages on SIP Server. ICT-2013 - IEEE International Conference on Information and Communication Technologies, India by Abhishek Bansal, Prashant kulkarni, Alwyn R. Pais


Mitigation of Flooding Based Denial of Service Attack against Session Initiation Protocol Based VoIP System. Abhishek Bansal, Alwyn R. Pais (communicated)


Emulating a High Interaction Honeypot to Monitor Intrusion Activity. SSCC - 2013, International Symposium on Security in Computing and Communications, SJCE Mysore by Anil Gopalakrishna, Alwyn R. Pais(accepted)


Scalable Group Key Distribution Scheme Based on Chinese Remainder Theorem.Third International Conference on Security, Privacy, and Applied Cryptography Engineering (SPACE-2013) IIT Kharagpur, India, Oct 19-23, 2013 by Akash Dhorajiya, Alwyn R.Pais(communicated)



Content with URLs that have the current URL as a prefix has been hosted in accordance with fair use principles, for academic and non-profit purposes. By downloading the contents of this page, you agree to bring possible violation of fair use to my notice before taking legal recourse.