default search action
Narasimha K. Shashidhar
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c33]Kubra Gundogan, Khushi Gupta, Laura Garland, Cihan Varol, Narasimha K. Shashidhar:
Identifying Malware Family with String Matching Algorithms Based on API Calls and Entire Strings. ISDFS 2024: 1-7 - [c32]Mario Merendon, Cihan Varol, Narasimha K. Shashidhar, Kirk Burns:
iOS Mobile Forensics Methodologies, Extracting Biome Artifacts, and Overlooked Artifacts Needed to Improve Investigations. ISDFS 2024: 1-7 - 2023
- [c31]Damilola Oladimeji, Amar Rasheed, Narasimha K. Shashidhar, Cihan Varol:
A Testbed for a Controller Area Network Communication Protocol in Automobiles. CCNC 2023: 1-6 - [c30]Phani Lanka, Cihan Varol, Narasimha K. Shashidhar:
Strategies for a Startup Software-as-a-Service Organizations with Minimal Budget to Achieve Security and Compliance Goals. ISDFS 2023: 1-6 - [c29]Jayanthi Ramamoorthy, Narasimha K. Shashidhar, Bing Zhou:
Anomaly based malware threat detection on Linux Systems. TrustCom 2023: 1744-1750 - 2022
- [c28]Naciye Celebi, Narasimha K. Shashidhar:
Topic Modeling in the ENRON Dataset. BigData 2022: 27-34 - [c27]Ashok Adarsh Angadi, Cihan Varol, Narasimha K. Shashidhar:
Penetration Testing: Smart Home IoT Devices. ICIOT 2022: 33-46 - [c26]Khushi Gupta, Ashar Neyaz, Narasimha K. Shashidhar, Cihan Varol:
Digital Forensics Lab Design: A framework. ISDFS 2022: 1-6 - [c25]Eduardo Martinez, Cihan Varol, Narasimha K. Shashidhar, Van Vung Pham:
Development of a Forensic Toolkit for Small-Medium Size Business (SMB). ISDFS 2022: 1-4 - [c24]Ashar Neyaz, Narasimha K. Shashidhar, Cihan Varol, Amar Rasheed:
Digital Forensics Analysis of Windows 11 Shellbag with Comparative Tools. ISDFS 2022: 1-10 - 2021
- [c23]Alberto Alejandro Ceballos Delgado, William Bradley Glisson, Narasimha K. Shashidhar, Jeffrey Todd McDonald, George Grispos, Ryan Benton:
Deception Detection Using Machine Learning. HICSS 2021: 1-10 - [c22]Ahmet Furkan Aydogan, Narasimha K. Shashidhar:
Prevention Pre-Violence in E-Labs with Machine Learning: PVE. ISDFS 2021: 1-5 - [c21]Roberto Solís, Narasimha K. Shashidhar, Cihan Varol:
A Novel Risk Mitigation & Cloud-Based Disaster Recovery Framework for Small to Medium Size Businesses. ISDFS 2021: 1-5 - [c20]Frank Williams, Cihan Varol, Amar Rasheed, Narasimha K. Shashidhar:
Threat Landscape Expansion During Covid-19: Remote Incident Response Handling. ISDFS 2021: 1-7 - 2020
- [c19]Selim Ozcan, Merve Astekin, Narasimha K. Shashidhar, Bing Zhou:
Centrality and Scalability Analysis on Distributed Graph of Large-Scale E-mail Dataset for Digital Forensics. IEEE BigData 2020: 2318-2327 - [c18]Safa Aktepe, Cihan Varol, Narasimha K. Shashidhar:
MiNo: The Chrome Web Browser Add-on Application to Block the Hidden Cryptocurrency Mining Activities. ISDFS 2020: 1-5 - [c17]Derrick Berger, Narasimha K. Shashidhar, Cihan Varol:
Using ITIL 4 in Security Management. ISDFS 2020: 1-6 - [c16]Christine Orosco, Cihan Varol, Narasimha K. Shashidhar:
Graphically Display Database Transactions to Enhance Database Forensics. ISDFS 2020: 1-6 - [c15]Luis Francisco Plá, Narasimha K. Shashidhar, Cihan Varol:
On-Premises Versus SECaaS Security Models. ISDFS 2020: 1-6 - [c14]Steven Zavala, Narasimha K. Shashidhar, Cihan Varol:
Cybersecurity Evaluation with PowerShell. ISDFS 2020: 1-6
2010 – 2019
- 2018
- [c13]Ashar Neyaz, Narasimha K. Shashidhar, Umit Karabiyik:
Forensic Analysis of Wear Leveling on Solid-State Media. TrustCom/BigDataSE 2018: 1706-1710 - 2016
- [j5]Eric Olson, Narasimha K. Shashidhar:
Low Budget Forensic Drive Imaging Using ARM Based Single Board Computers. J. Digit. Forensics Secur. Law 11(1): 53-76 (2016) - [c12]Lei Chen, Narasimha K. Shashidhar, Danda B. Rawat, Ming Yang, Christopher Kadlec:
Investigating the security and digital forensics of video games and gaming systems: A study of PC games and PS4 console. ICNC 2016: 1-5 - 2015
- [j4]Narasimha K. Shashidhar, Chadi Kari, Rakesh M. Verma:
The Efficacy of Epidemic Algorithms on Detecting Node Replicas in Wireless Sensor Networks. J. Sens. Actuator Networks 4(4): 378-409 (2015) - [j3]Chadi Kari, Alexander Russell, Narasimha K. Shashidhar:
Work-Competitive Scheduling on Task Dependency Graphs. Parallel Process. Lett. 25(2): 1550001:1-1550001:18 (2015) - [c11]Lei Chen, Lanchuan Xu, Xiaohui Yuan, Narasimha K. Shashidhar:
Digital forensics in social networks and the cloud: Process, approaches, methods, tools, and challenges. ICNC 2015: 1132-1136 - [i4]Aggelos Kiayias, Yona Raekow, Alexander Russell, Narasimha K. Shashidhar:
A One-time Stegosystem and Applications to Efficient Covert Communication. IACR Cryptol. ePrint Arch. 2015: 684 (2015) - 2014
- [j2]Aggelos Kiayias, Yona Raekow, Alexander Russell, Narasimha K. Shashidhar:
A One-Time Stegosystem and Applications to Efficient Covert Communication. J. Cryptol. 27(1): 23-44 (2014) - [c10]Chadi Kari, Narasimha K. Shashidhar, Sotiris Kentros:
Distributed dynamic channel assignment in wireless networks. ICNC 2014: 1113-1117 - 2013
- [j1]Donny Jacob Ohana, Narasimha K. Shashidhar:
Do private and portable web browsers leave incriminating evidence?: a forensic analysis of residual artifacts from private and portable web browsing sessions. EURASIP J. Inf. Secur. 2013: 6 (2013) - [c9]Donny Jacob Ohana, Narasimha K. Shashidhar:
Do Private and Portable Web Browsers Leave Incriminating Evidence? A Forensic Analysis of Residual Artifacts from Private and Portable Web Browsing Sessions. IEEE Symposium on Security and Privacy Workshops 2013: 135-142 - 2012
- [c8]Rakesh M. Verma, Narasimha K. Shashidhar, Nabil Hossain:
Two-Pronged Phish Snagging. ARES 2012: 174-179 - [c7]Lei Chen, Narasimha K. Shashidhar, Qingzhong Liu:
Scalable Secure MJPEG Video Streaming. AINA Workshops 2012: 111-115 - [c6]Rakesh M. Verma, Narasimha K. Shashidhar, Nabil Hossain:
Detecting Phishing Emails the Natural Language Way. ESORICS 2012: 824-841 - [c5]Aggelos Kiayias, Alexander Russell, Narasimha K. Shashidhar:
Key-Efficient Steganography. Information Hiding 2012: 142-159
2000 – 2009
- 2009
- [c4]Seda Davtyan, Sotiris Kentros, Aggelos Kiayias, Laurent D. Michel, Nicolas C. Nicolaou, Alexander Russell, Andrew See, Narasimha K. Shashidhar, Alexander A. Shvartsman:
Taking total control of voting systems: firmware manipulations on an optical scan voting terminal. SAC 2009: 2049-2053 - [i3]Aggelos Kiayias, Yona Raekow, Alexander Russell, Narasimha K. Shashidhar:
Efficient Steganography with Provable Security Guarantees. CoRR abs/0909.3658 (2009) - [i2]Aggelos Kiayias, Alexander Russell, Narasimha K. Shashidhar:
Randomness-optimal Steganography. CoRR abs/0909.4575 (2009) - 2008
- [c3]Chadi Kari, Alexander Russell, Narasimha K. Shashidhar:
Randomized Work-Competitive Scheduling for Cooperative Computing on k-partite Task Graphs. NCA 2008: 267-270 - [c2]Seda Davtyan, Sotiris Kentros, Aggelos Kiayias, Laurent Michel, Nicolas C. Nicolaou, Alexander Russell, Andrew See, Narasimha K. Shashidhar, Alexander A. Shvartsman:
Pre-Election Testing and Post-Election Audit of Optical Scan Voting Terminal Memory Cards. EVT 2008 - [i1]Chadi Kari, Alexander Russell, Narasimha K. Shashidhar:
Randomized Work-Competitive Scheduling for Cooperative Computing on $k$-partite Task Graphs. CoRR abs/0805.1257 (2008) - 2007
- [c1]Aggelos Kiayias, Laurent Michel, Alexander Russell, Narasimha K. Shashidhar, Andrew See, Alexander A. Shvartsman, Seda Davtyan:
Tampering with Special Purpose Trusted Computing Devices: A Case Study in Optical Scan E-Voting. ACSAC 2007: 30-39
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:20 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint