Sr. No. Paper-id Title Presenter Name
Presentation
Mode
Track Date Time
1 34
Standardization In Cloud Computing:
Unlocking The Potential Of A Fragmented
Industry
Aayush Kulkarni
Online Cyber 08.12.2023
02:00 PM
Onwards
2 47
A Survey On Secure Aggregation For Privacy-
Preserving Federated Learning
Ankit Chouhan
Online Cyber 08.12.2023
02:00 PM
Onwards
3 51
Call Data Records/Internet Protocol Data
Records Analysis Using K Means And Rfm
Algorithm
Yeshasvi
Online Cyber 08.12.2023
02:00 PM
Onwards
4 71
Revealing Insights Into Criminal Behaviour:
Exploring Patterns And Trends Through
Machine Learning Predictive Models
Manisha Patil
Online Cyber 08.12.2023
02:00 PM
Onwards
5 87
Securing Confidential Information On
Whatsapp With Blockchain Technology
Urmila Pilania
Online Cyber 08.12.2023
02:00 PM
Onwards
6 89
A Text Encryption Approach For Iot Devices
To Prioritize Security And Efficiency
Urmila Pilania
Online Cyber 08.12.2023
02:00 PM
Onwards
7 134
Network Traffic Classification: Solution To
Detect Intruder
SUJATA BHOSLE
Online Cyber 08.12.2023
02:00 PM
Onwards
8 167
Review On Privacy Preservation Techniques
And Challenges In Iot Devices
Prakash Meena
Offline Cyber 09.12.2023
02:00 PM
Onwards
9 192
Mitigation And Prevention Methods For
Cross-Layer Attacks In Iot (Internet Of Things)
Devices
Enoch Boakai
Offline Cyber 09.12.2023
02:00 PM
Onwards
2ndīš¬International Conference on
Advancements In Smart Computing And Information
Security ASCIS 2023
Track - 2 : Cyber Security
10 212
Enhancing Copy-Move Forgery Detection: A
Study Of Block-Based And Key-Point-Based
Techniques
Jaynesh Desai
Online Cyber 08.12.2023
02:00 PM
Onwards
11 214
Multiple Memory Image Instances Stratagem
To Detect Fileless Malware
Swapna M P
Online Cyber 08.12.2023
02:00 PM
Onwards
12 238
A Survey Of Machine Learning Techniques In
Phishing Detection
Nishant Joshi
Offline Cyber 09.12.2023
02:00 PM
Onwards
13 240
Cytie: Cyber Threat Intelligence Extraction
With Named Entity Recognition
Dincy R. Arikkat
Online Cyber 08.12.2023
02:00 PM
Onwards
14 265
Design And Implementation Of Multilayer
Encryption For Audio File Security
Lakichand Patil
Offline Cyber 09.12.2023
02:00 PM
Onwards
15 282
Development Of Secure Framework In
Mobile Cloud Computing Using Aes-Hmac
Encryption Approach
V. Naveen
Online Cyber 09.12.2023
02:00 PM
Onwards
16 292
An Efficient Ch Based Authentication And
Authorization For Secure Ehr Using Df-Bcrypt
And Hashed Access Structure
S. Prathima
Online Cyber 09.12.2023
02:00 PM
Onwards
17 304
A Novel Framework To Detect Business Email
Compromise Through Unconsented Email
Autoforwards
Priti Kulkarni
Online Cyber 09.12.2023
02:00 PM
Onwards
18 309
A Novel Mechanism For Tuning Neural
Network For Malware Detection In Android
Device
Eslavath Ravi
Online Cyber 09.12.2023
02:00 PM
Onwards
19 323
Enhancing Security Through Qr Code And
Enriched Blowfish Cryptography For Sensitive
Data
Aishwarya Palaniappan
Online Cyber 09.12.2023
02:00 PM
Onwards
20 362
Taxonomy Of Image Encryption Techniques -
A Survey
Vilas Mahajan
Offline Cyber 09.12.2023
02:00 PM
Onwards
21 391
Optimizing The Security And Privacy Of Cloud
Data Communication; Hybridizing
Cryptography And Steganography Using
Triple Key Of Aes, Rsa And Lsb With
Deceptive Qr Code Technique: A Novel
Approach.
Edwin Xorsenyo Amenu
Offline Cyber 09.12.2023
02:00 PM
Onwards
22 396
Fuzzy Membership Grasshopper
Optimization Algorithm (Fmgoa) Based
Feature Selection And Mean Weight Deep
Belief Network (Mwdbn) Classifier With
Fusion Approach For Android Malware
Detection (Amd)
Anuja Rajan
Online Cyber 09.12.2023
02:00 PM
Onwards
23 229
A Cyber Diplomacy Framework For Promoting
Global Cybersecurity Norms And Cooperation
Niraj Singh
Online Cyber 09.12.2023
02:00 PM
Onwards
24 426
Dual Security Rgb Image Encryption
Algorithm For Lightweight Cryptography
Vrushali Khaladkar
Online Cyber 09.12.2023
02:00 PM
Onwards