default search action
Vimal Kumar 0001
Person information
- affiliation: University of Waikato, Department of Computer Science, Hamilton, New Zealand
Other persons with the same name
- Vimal Kumar — disambiguation page
- Vimal Kumar 0002 — Madan Mohan Malaviya University of Technology, India
- Vimal Kumar 0003 — Government of India, Ministry of Science and Technology, New Delhi, India
- Vimal Kumar 0004 — Indian Institute of Technology Kanpur, UP, India
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j4]Zijing Zhang, Vimal Kumar, Bernhard Pfahringer, Albert Bifet:
Ai-enabled automated common vulnerability scoring from common vulnerabilities and exposures descriptions. Int. J. Inf. Sec. 24(1): 16 (2025) - 2024
- [j3]Christopher Jun-Wen Chew, Vimal Kumar, Panos Patros, Robi Malik:
Real-time system call-based ransomware detection. Int. J. Inf. Sec. 23(3): 1839-1858 (2024) - [c19]Harpreet Kaur, Vimal Kumar, Atthapan Daramas:
Detecting Ransomware Using System Calls Through Transfer Learning on a Limited Feature Set. WISE (3) 2024: 426-440 - [d1]Christopher Jun-Wen Chew, Vimal Kumar, Panos Patros, Robi Malik:
Android Crypto Ransomware System Call Dataset. IEEE DataPort, 2024 - 2022
- [c18]Michael Tsai, Vimal Kumar:
Listen to the Music: Evaluating the Use of Music in Audio Based Authentication. UbiSec 2022: 22-37 - [c17]Zijing Zhang, Vimal Kumar, Michael Mayo, Albert Bifet:
Assessing Vulnerability from Its Description. UbiSec 2022: 129-143 - 2021
- [c16]Thye Way Phua, Panos Patros, Vimal Kumar:
Towards Embedding Data Provenance in Files. CCWC 2021: 1319-1325 - [c15]Daniel Roodt, Ulrich Speidel, Vimal Kumar, Ryan K. L. Ko:
On Random Editing in LZ-End. DCC 2021: 366 - [c14]Atthapan Daramas, Vimal Kumar:
Searching on Non-Systematic Erasure Codes. PST 2021: 1-8 - [c13]Tristan Corrick, Vimal Kumar:
Design and Architecture of Progger 3: A Low-Overhead, Tamper-Proof Provenance System. UbiSec 2021: 189-202 - 2020
- [c12]Christopher Jun-Wen Chew, Vimal Kumar, Panos Patros, Robi Malik:
ESCAPADE: Encryption-Type-Ransomware: System Call Based Pattern Detection. NSS 2020: 388-407 - [i1]Daniel Roodt, Ulrich Speidel, Vimal Kumar, Ryan K. L. Ko:
Local Editing in LZ-End Compressed Data. CoRR abs/2007.06167 (2020)
2010 – 2019
- 2019
- [c11]Christopher Jun-Wen Chew, Vimal Kumar:
Behaviour Based Ransomware Detection. CATA 2019: 127-136 - [c10]Vimal Kumar:
A Bilinear Pairing Based Secure Data Aggregation Scheme for WSNs. IWCMC 2019: 102-107 - [c9]Matthew Dekker, Vimal Kumar:
Using Audio Characteristics for Mobile Device Authentication. NSS 2019: 98-113 - 2018
- [b1]Vimal Kumar, Amartya Sen, Sanjay Madria:
Secure Sensor Cloud. Synthesis Lectures on Algorithms and Software in Engineering, Morgan & Claypool Publishers 2018, ISBN 978-3-031-00399-8 - 2015
- [j2]Roy Cabaniss, Vimal Kumar, Sanjay Madria:
Multi-party encryption (MPE): secure communications in delay tolerant networks. Wirel. Networks 21(4): 1243-1258 (2015) - [c8]Vimal Kumar, Sanjay Madria:
Distributed Attribute Based Access Control of Aggregated Data in Sensor Clouds. SRDS 2015: 218-227 - 2014
- [j1]Sanjay Madria, Vimal Kumar, Rashmi Dalvi:
Sensor Cloud: A Cloud of Virtual Sensors. IEEE Softw. 31(2): 70-77 (2014) - [c7]Vimal Kumar, Sanjay Madria:
Efficient and Secure Code Dissemination in Sensor Clouds. MDM (1) 2014: 103-112 - 2013
- [c6]Vimal Kumar, Sanjay Madria:
PIP: Privacy and Integrity Preserving Data Aggregation in Wireless Sensor Networks. SRDS 2013: 10-19 - 2012
- [c5]Vimal Kumar, Sanjay Kumar Madria:
Secure Hierarchical Data Aggregation in Wireless Sensor Networks: Performance Evaluation and Analysis. MDM 2012: 196-201 - [c4]Roy Cabaniss, Vimal Kumar, Sanjay Madria:
Three Point Encryption (3PE): Secure Communications in Delay Tolerant Networks. SRDS 2012: 479-480 - 2011
- [c3]Nayot Poolsappasit, Vimal Kumar, Sanjay Madria, Sriram Chellappan:
Challenges in Secure Sensor-Cloud Computing. Secure Data Management 2011: 70-84 - 2010
- [c2]Vimal Kumar, Joshua McCarville-Schueths, Sanjay Madria:
A test-bed for secure hierarchical data aggregation in wireless sensor networks. MASS 2010: 762-764 - [c1]Vimal Kumar, Sanjay Madria:
Performance Analysis of Secure Hierarchical Data Aggregation in Wireless Sensor Networks. Mobile Data Management 2010: 299-300 - [p1]Vimal Kumar, Sanjay Madria:
Secure Data Aggregation in Wireless Sensor Networks. Wireless Sensor Network Technologies for the Information Explosion Era 2010: 77-107
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-23 20:34 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint