Accepted Papers at Cyber Security and Blockchain Workshop

  1. A Lightweight Intrusion Detection System using Benford's law and Network Flow Size Difference

    Kamalakanta Sethi (Indian Institute of Technology, Bhubaneswar, India); Rahul Kumar (Indian Institute of Technology Bhubaneswar, India); Nishant Prajapati (National Institute of Technology Rourkela, India); Padmalochan Bera (IIT Bhubaneswar, India)

  2. An Automated Solution for Improving the Efficiency of Cryptocurrency Mining

    Connie Man-Ching Yuen (Hong Kong Shue Yan University, Hong Kong); Ka-Ming Lau (Hong Kong Institute of Vocational Education, Hong Kong); Ka-Fai Ng (The Hong Kong University of Science and Technology, Hong Kong)

  3. Blockchain-based Interoperable Healthcare Using Zero-knowledge Proofs and Proxy Re-Encryption

    Bhavye Sharma (Maharaja Agrasen Institute of Technology, India); Raju Halder and Jawar Singh (IIT Patna, India)

  4. Deep Reinforcement Learning based Intrusion Detection System for Cloud Infrastructure

    Kamalakanta Sethi (Indian Institute of Technology, Bhubaneswar, India); Rahul Kumar (Indian Institute of Technology Bhubaneswar, India); Nishant Prajapati (National Institute of Technology Rourkela, India); Padmalochan Bera (IIT Bhubaneswar, India)

  5. Detection of Algorithmically Generated Domain Names using LSTM

    Palak Vij and Sayali Nikam (BITS Pilani, India); Ashutosh Bhatia (Birla Institute of Technology and Science, Pilani, India)

  6. Distributed Off-chain Storage of Patient Diagnostic Reports in Healthcare System using IPFS and Blockchain

    Randhir Kumar. (NIT Raipur, India); Rakesh Tripathi (Indian Institute of Technology Guwahati, India); Ningrinla Marchang (North Eastern Regional Institute of Science and Technology, Arunachal Pradesh, India)

  7. Evaluation of Feature and Signature based training approaches for Malware Classification using Autoencoders

    Sreenivas Sremath Tirumala (Auckland University of Technology); Maheswara Rao Valluri (Fiji National University, Fiji); David Nandigam (ATMC New Zealand, New Zealand)

  8. Fountain Coding for Bootstrapping of the Blockchain

    Rudrashish Pal (Indian Institute of Technology Bhilai, India)

  9. HTmRPL++: A Trust-Aware RPL routing protocol for Fog Enabled Internet of Things

    Nishanth Subramanian and Shashwatha Mitra G B (National Institute of Technology Karnataka, Surathkal, India); John Martin (National Institute of Technology, Karnataka, India); Chandra Sekaran (National Instittute of Technology Karnataka, India)

  10. Privacy-Aware Switch-Controller Mapping in SDN-Based IoT Networks

    Vignesh Sridharan (National University of Singapore, Singapore); Kushan Sudheera Kalupahana Liyanage (National University of Singapore & Nanyang Technological University, Singapore); Mohan Gurusamy (National University of Singapore, Singapore)

  11. Reputation Based Routing in MANET Using Blockchain

    Maqsood Abdul Careem and Aveek Dutta (University at Albany, SUNY, USA)

  12. Software wallet based secure participation in Hyperledger Fabric networks

    Anil Thota (Lovely Professional University, India); Prashant Upadhyay (Birla Institute of Technology, Mesra, India); Srihari Kulkarni and Parameswaram Selvam (IBM Software Labs, India); Balaji Viswanathan (IBM India Pvt Ltd, India)

  13. Veriblock: A novel blockchain framework based on verifiable computing and trusted execution environment

    Lakshmi Padmaja Maddali (Tata Consultancy Services, India); Meena Singh (Tata Consultancy Sevices Limited, India); Rajan M A, Vigneswaran R, Srujana Kanchanapalli and Batsayan Das (Tata Consultancy Services, India)