1![Detecting and Mitigating the Effect of Manipulated Reputation on Online Social Networks Anupama Aggarwal « supervised by Dr. Ponnurangam Kumaraguru » Indraprastha Institute of Information Technology, Delhi New Delhi, I Detecting and Mitigating the Effect of Manipulated Reputation on Online Social Networks Anupama Aggarwal « supervised by Dr. Ponnurangam Kumaraguru » Indraprastha Institute of Information Technology, Delhi New Delhi, I](https://www.pdfsearch.io/img/a0bc0a967d13ca07c980fab9dcbd4cbc.jpg) | Add to Reading ListSource URL: gdac.uqam.caLanguage: English - Date: 2017-10-04 00:34:37
|
---|
2![General Chairs: Karl Aberer (EPFL, Switzerland) Anupam Joshi (University of Maryland Baltimore County, USA) Sougata Mukherjea (IBM Research India) General Chairs: Karl Aberer (EPFL, Switzerland) Anupam Joshi (University of Maryland Baltimore County, USA) Sougata Mukherjea (IBM Research India)](https://www.pdfsearch.io/img/6a2848810ecfb59c56cd61a6f0265abb.jpg) | Add to Reading ListSource URL: mdmconferences.orgLanguage: English - Date: 2012-09-19 04:07:38
|
---|
3![Rig∗ : A simple, secure and flexible design for Password Hashing Version 2.0 Donghoon Chang, Arpan Jati, Sweta Mishra, Somitra Kumar Sanadhya Indraprastha Institute of Information Technology, Delhi (IIIT-Delhi), India Rig∗ : A simple, secure and flexible design for Password Hashing Version 2.0 Donghoon Chang, Arpan Jati, Sweta Mishra, Somitra Kumar Sanadhya Indraprastha Institute of Information Technology, Delhi (IIIT-Delhi), India](https://www.pdfsearch.io/img/18b0471ece8bfbdf8bfbb1e783df9981.jpg) | Add to Reading ListSource URL: password-hashing.netLanguage: English - Date: 2014-10-16 08:19:35
|
---|
4![Occupant-Centric Federated Cyber-Physical System for Building Management Pandarasamy Arjunan Indraprastha Institute of Information Technology, Delhi, India Occupant-Centric Federated Cyber-Physical System for Building Management Pandarasamy Arjunan Indraprastha Institute of Information Technology, Delhi, India](https://www.pdfsearch.io/img/4d3b540f6b9bedec922f716cb108ce1a.jpg) | Add to Reading ListSource URL: nslab.ee.ntu.edu.twLanguage: English - Date: 2012-11-23 08:15:55
|
---|
5![It Doesn’t Break Just on Twitter. Characterizing Facebook content During Real World Events Prateek Dewan, Ponnurangam Kumaraguru Indraprastha Institute of Information Technology - Delhi (IIITD) {prateekd,pk}@iiitd.ac.i It Doesn’t Break Just on Twitter. Characterizing Facebook content During Real World Events Prateek Dewan, Ponnurangam Kumaraguru Indraprastha Institute of Information Technology - Delhi (IIITD) {prateekd,pk}@iiitd.ac.i](https://www.pdfsearch.io/img/f3a42a16830219a647724751f3bad723.jpg) | Add to Reading ListSource URL: arxiv.orgLanguage: English - Date: 2014-05-19 21:02:22
|
---|
6![What They Do in Shadows: Twitter Underground Follower Market Anupama Aggarwal, Ponnurangam Kumaraguru Indraprastha Institute of Information Technology, Delhi (IIIT-D) Cybersecurity Education and Research Centre (CERC), I What They Do in Shadows: Twitter Underground Follower Market Anupama Aggarwal, Ponnurangam Kumaraguru Indraprastha Institute of Information Technology, Delhi (IIIT-D) Cybersecurity Education and Research Centre (CERC), I](https://www.pdfsearch.io/img/45ffe47bdc38da581f1d3bf940ad48e5.jpg) | Add to Reading ListSource URL: precog.iiitd.edu.inLanguage: English - Date: 2015-07-23 07:03:21
|
---|
7![Profiling Energy Consumption in a Residential Campus Ankur Sial1 , Abhishek Jain1 , Amarjeet Singh1 , and Aniket Mahanti2 1 Indraprastha Institute of Information Technology (IIIT-Delhi), India {ankur11024, abhishek11005, Profiling Energy Consumption in a Residential Campus Ankur Sial1 , Abhishek Jain1 , Amarjeet Singh1 , and Aniket Mahanti2 1 Indraprastha Institute of Information Technology (IIIT-Delhi), India {ankur11024, abhishek11005,](https://www.pdfsearch.io/img/9aef8066e9248d0cac2eb26d360fba31.jpg) | Add to Reading ListSource URL: conferences2.sigcomm.orgLanguage: English - Date: 2014-12-01 17:06:58
|
---|
8![Microsoft Word - PSOSM13-welcome.doc Microsoft Word - PSOSM13-welcome.doc](https://www.pdfsearch.io/img/27275f394f80f138a9b25f533b9a70fd.jpg) | Add to Reading ListSource URL: www2013.wwwconference.orgLanguage: English - Date: 2014-07-21 08:47:00
|
---|
9![bit.ly/malicious: Deep Dive into Short URL based e-Crime Detection Neha Gupta, Anupama Aggarwal, Ponnurangam Kumaraguru Indraprastha Institute of Information Technology, Delhi (IIIT-D) Cybersecurity Education and Researc bit.ly/malicious: Deep Dive into Short URL based e-Crime Detection Neha Gupta, Anupama Aggarwal, Ponnurangam Kumaraguru Indraprastha Institute of Information Technology, Delhi (IIIT-D) Cybersecurity Education and Researc](https://www.pdfsearch.io/img/e02544802c23ef20fd7b6d4f79f0276d.jpg) | Add to Reading ListSource URL: precog.iiitd.edu.inLanguage: English - Date: 2014-08-25 02:36:38
|
---|
10![A New Authenticated Encryption Technique for Handling Long Ciphertexts in Memory Constrained Devices Megha Agrawal, Donghoon Chang, and Somitra Sanadhya Indraprastha Institute of Information Technology, Delhi (IIIT-D), I A New Authenticated Encryption Technique for Handling Long Ciphertexts in Memory Constrained Devices Megha Agrawal, Donghoon Chang, and Somitra Sanadhya Indraprastha Institute of Information Technology, Delhi (IIIT-D), I](https://www.pdfsearch.io/img/ed4a3f954094c272fc24518da46b3394.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2015-04-21 05:49:18
|
---|