Fuzzy classification metrics for scanner assessment and vulnerability reporting PKK Loh, D Subramanian IEEE Transactions on Information Forensics and security 5 (4), 613-624, 2010 | 26 | 2010 |
Ensuring endpoint authenticity in WebRTC peer-to-peer communication W De Groef, D Subramanian, M Johns, F Piessens, L Desmet Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2103-2110, 2016 | 14 | 2016 |
Fuzzy Heuristic Design for Diagnosis of Web-Based Vulnerabilities D Subramanian, HT Le, PKK Loh Internet Monitoring and Protection, 2009. ICIMP'09. Fourth International …, 2009 | 12 | 2009 |
An empirical property-based model for vulnerability analysis and evaluation HT Le, D Subramanian, WJ Hsu, PKK Loh Services Computing Conference, 2009. APSCC 2009. IEEE Asia-Pacific, 40-45, 2009 | 7 | 2009 |
Quantitative Evaluation of Related Web-Based Vulnerabilities D Subramanian, HT Le, P Loh, AB Premkumar Secure Software Integration and Reliability Improvement Companion (SSIRI-C …, 2010 | 6 | 2010 |
DAPriv: Decentralized architecture for preserving the privacy of medical data R Sharma, D Subramanian, SN Srirama arXiv preprint arXiv:1410.5696, 2014 | 4 | 2014 |
Scoring Web-based Vulnerability Impact using Property-Based Vulnerability Model HT Le, D Subramanian, WJ Hsu, PKK Loh Advanced Information Networking and Applications Workshops (WAINA), 2010 …, 2010 | 4 | 2010 |
Preventive information flow control through a mechanism of split addresses D Subramanian, G Hiet, C Bidan Proceedings of the 9th International Conference on Security of Information …, 2016 | 3 | 2016 |
An empirical vulnerability remediation model D Subramanian, HT Le, PKK Loh, AB Premkumar Wireless Communications, Networking and Information Security (WCNIS), 2010 …, 2010 | 3 | 2010 |
Assuring Quality in Vulnerability Reports for Security Risk Analysis D Subramanian, LH Thanh, K Loh, P Kok International Journal On Advances in Security 2 (2 and 3), 226-241, 2009 | 3 | 2009 |
A self-correcting information flow control model for the web-browser D Subramanian, G Hiet, C Bidan International Symposium on Foundations and Practice of Security, 285-301, 2016 | 2 | 2016 |
Malware Analytics for Social Networking D Subramanian, PKK Loh Trends and Applications of Serious Gaming and Social Media, 71-87, 2014 | 1 | 2014 |
"NetPhone" - Reintegrating the net phone V Bharath Kumar, D Subramanian Integrated Circuits, 2007. ISIC'07. International Symposium on, 164-167, 2007 | 1* | 2007 |
NetPhone-Reintegrating the net phone D Subramanian, VB Kumar Cognitive Radio Oriented Wireless Networks and Communications, 2007 …, 2007 | | 2007 |