Follow
Deepak Subramanian
Deepak Subramanian
PhD Student, Supelec
Verified email at supelec.fr
Title
Cited by
Cited by
Year
Fuzzy classification metrics for scanner assessment and vulnerability reporting
PKK Loh, D Subramanian
IEEE Transactions on Information Forensics and security 5 (4), 613-624, 2010
262010
Ensuring endpoint authenticity in WebRTC peer-to-peer communication
W De Groef, D Subramanian, M Johns, F Piessens, L Desmet
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2103-2110, 2016
142016
Fuzzy Heuristic Design for Diagnosis of Web-Based Vulnerabilities
D Subramanian, HT Le, PKK Loh
Internet Monitoring and Protection, 2009. ICIMP'09. Fourth International …, 2009
122009
An empirical property-based model for vulnerability analysis and evaluation
HT Le, D Subramanian, WJ Hsu, PKK Loh
Services Computing Conference, 2009. APSCC 2009. IEEE Asia-Pacific, 40-45, 2009
72009
Quantitative Evaluation of Related Web-Based Vulnerabilities
D Subramanian, HT Le, P Loh, AB Premkumar
Secure Software Integration and Reliability Improvement Companion (SSIRI-C …, 2010
62010
DAPriv: Decentralized architecture for preserving the privacy of medical data
R Sharma, D Subramanian, SN Srirama
arXiv preprint arXiv:1410.5696, 2014
42014
Scoring Web-based Vulnerability Impact using Property-Based Vulnerability Model
HT Le, D Subramanian, WJ Hsu, PKK Loh
Advanced Information Networking and Applications Workshops (WAINA), 2010 …, 2010
42010
Preventive information flow control through a mechanism of split addresses
D Subramanian, G Hiet, C Bidan
Proceedings of the 9th International Conference on Security of Information …, 2016
32016
An empirical vulnerability remediation model
D Subramanian, HT Le, PKK Loh, AB Premkumar
Wireless Communications, Networking and Information Security (WCNIS), 2010 …, 2010
32010
Assuring Quality in Vulnerability Reports for Security Risk Analysis
D Subramanian, LH Thanh, K Loh, P Kok
International Journal On Advances in Security 2 (2 and 3), 226-241, 2009
32009
A self-correcting information flow control model for the web-browser
D Subramanian, G Hiet, C Bidan
International Symposium on Foundations and Practice of Security, 285-301, 2016
22016
Malware Analytics for Social Networking
D Subramanian, PKK Loh
Trends and Applications of Serious Gaming and Social Media, 71-87, 2014
12014
"NetPhone" - Reintegrating the net phone
V Bharath Kumar, D Subramanian
Integrated Circuits, 2007. ISIC'07. International Symposium on, 164-167, 2007
1*2007
NetPhone-Reintegrating the net phone
D Subramanian, VB Kumar
Cognitive Radio Oriented Wireless Networks and Communications, 2007 …, 2007
2007
The system can't perform the operation now. Try again later.
Articles 1–14