1. Book Chapter: Sybil Attack Detection in Vehicular Networks. J. M. Kannimoola, B. Jayaraman, K. Achuthan. Security and Privacy in Internet of Things (IoTs): Models, Algorithms, and Implementations. Taylor & Francis LLC, CRC Press, 2016.
  2. Dynamic Constrained Objects in Vehicular Network Modeling, J. M. Kannimoola, B. Jayaraman, K. Achuthan. Applications of Formal Methods for Security & Safety: Practical Case Studies, Springer International Publishing, 2016.
  3. H-Plane: Intelligent Data Management for Mobile Healthcare Applications, R. K. Pathinarupothi, B. Alangot, M. V. Ramesh, K. Achuthan, and P Venkat Rangan, Proc. MobiWis, 2016.
  4. Predictive Modeling based Power Estimation for Embedded Multicore Systems, S. Sankaran, ACM Computing Frontiers Conference (CF), Como, 2016.
  5. MobAware’-Employing Context Awareness, Sensors and Cloud for Automatic Emergency Help Requests P. Poornachandran; A. Ashok; Prem Shankar AU; Sujadevi VG; S. Krishnamoorthy; M. Bharataraju; S. K. Panchagnula; D. Khyati, International Conference on Ambient Assisted Living Technologies based on Internet of Things, 2016
  6. AMA: Static Code Analysis of Web Page For The Detection of Malicious Scripts, Seshagiri Prabhu , Anu Vazhayil, Procedia Computer Science, Elsevier Publishing, 2016.



  1. Computer science (CS) education in Indian schools: Situation analysis using Darmstadt model, R. Raman, S. Venkatasubramanian, K. Achuthan, & P. Nedungadi, ACM Transactions on Computing Education (TOCE), 15(2), 7, 2015
  2. A lexical approach for classifying malicious URLs, M. Darling, G. Heileman; G. Gressel; A. Ashok , P. Poornachandran, International Conference on High Performance Computing & Simulation (HPCS), 2015.
  3. Modeling and analysis of routing in IoT networks, S. Sankaran, R. Sridhar, IEEE International Conference on Computing and Network Communications, 2015
  4. Learning Cyber Security Through Gamification, K. Boopathi, S. Sreejith, B. Alangot, Indian Journal of Science and Technology, Vol. 4, 2015.
  5. Security Maturity in NoSQL Databases - Are they Secure Enough to Haul the Modern IT Applications?, S. Srinivas, A. Nair, International Conference on Advances in Computing, Communications and Informatics, 2015.
  6. ESEC: An Ideal Secret Sharing Scheme, G. Sarath, S. Deepu, S. Sudararajan, K. Achuthan, “”, Proceedings of ICCD 2014, 2014-10-19 - 2014-10-22 Volume 1 Intelligent Computing, Communication and Devices, Springer, Volume 308, 2015.
  7. Optimization of Hadoop using software-internet Wide Area Remote Direct Memory Access Protocol and Unstructured Data Accelerator - Vejesh V, G Reshma Nayar and Shiju Sathyadevan; CSOC 2014
  8. Network Data Analysis Using Spark - Swetha K V, Shiju Sathyadevan and Bilna P; CSOC 2014.
  9. Proposal of Browser by Exploiting the Proficiency of V8 for Large Data Visualization - Shiju Sathyadevan, Jaison P.J, Geethu Sankar; International Journal of Applied Engineering Research (IJAER).
  10. Fast Approximate Aggregation Algorithms for Effective Browser Visualization Using Similarity Heuristics - Shiju Sathyadevan,Hariram S, Akhil Antony, Mahith VP; International Journal of Applied Engineering Research (IJAER)
  11. Comparison of Checkpointed  Aided Parallel Execution against MapReduce - Nisha Rani N, Shiju Sathyadevan, Eric Renault, Viet Ha Hai; International Journal of Applied Engineering Research (IJAER)



  1. Nov 2014: Implementing Scatternet to Enhance Bluetooth Communication Capability - Shiju Sathyadevan, Lakshmi, Bipin, Jinesh; CSI Hyderabad 2014.
  2. Nov 2014: Comparing ID3, C4.5 and Random Forest - Shiju Sathyadevan, Remya Nair, Arun B Krishnan; ICCIDM 2014.
  3. Nov 2014: Airfoil Self Noise Prediction Using Linear Regression Approach - Shiju Sathyadevan, Chaitra M.A, Arun B Krishnan; ICNSC 2014.
  4. Nov 2014: Shiju Sathyadevan, Dr. Krishnashree Achuthan, Dr. Jayaraj Poroor; Architectural Recommendations in Building a Network Based Secure, Scalable &Interoperable Internet of Things Middleware, FICTA 2014.
  5. Nov 2014: Shiju Sathyadevan, Subi Prabhakar, Bipin K - Analysis Of Ovehead Due to Security Implementations in WSN; FICTA 2014.
  6. Nov 2014: Shiju Sathyadevan, Boney Kalarikkal, Jinesh - Security, Trust and Implementation Limitations of Prominent IoT Platforms; FICTA 2014.
  7. Sep 2014: Shiju Sathyadevan, Nandini Muraleedharan, Sreeranga P Rajan; Accomplishing Data Level Security in MongoDB; ISI 2014
  8. Sep 2014: Shiju Sathyadevan, Sukanya Anoop; Comparison of Traditional Linear SVM Implementation Against MapReduce SVM Implementation. ISI 2014
  9. Aug 2014: Shiju Sathyadevan, Arya S, Athira Raghunath; Identifying Moving Bodies from CCTV Videos Using Machine Learning Techniques; ICNSC 2014.
  10. Aug 2014: Shiju Sathyadevan, Athira, Arun Balakrishnan - Improved Document Classification Through Enhanced Naive Bayes Algorithm, ICDSC 2014
  11. Aug 2014 Shiju Sathyadevan, Surya Gangadharan, Devan M.S - Crime Analytics using News feeds and Social Media through profiling; ICNSC 2014
  12. April 2014: Customizing EPCGlobal to fit Local ONS Requirement- Shiju Sathyadevan, Jinesh M.K, Akhila; ICCD 2014
  13. High Performance Packet Processing on Commodity Hardware Bypassing the Kernel - Prabaharan Poornachandran, Aravind C Ajayan - IEEE CAMAD 2014
  14. Human vs. Machine: Analyzing the Robustness of Advertisement Based Captchas - Prabaharan Poornachandran, P. Hrudya, Jothis Reghunadh - International Symposium on Signal Processing and Intelligent Recognition Syatems(SIRS-2014)
  15. Personal Health Data Exchange Using NFC - Suja Devi, Prabaharan Poornachandran, Twintu H Kumar, Hrudya P - International Symposium on Women in Computing and Informatics (WCI-2014)
  16. Effectiveness of Email Address Obfuscation on Internet - PrabaharanPoornachandran, Deepak Raj, Soumajit Pal - International Conference on Computational Intelligence in Data Mining (ICCIDM)-2014.
  17. Prabaharan Poornachandran, Hrudya P, Jothis Reghunadh. Human Vs Machine: Analyzing The Robustness of Advertisement Based Captchas Second International Conference on Security in Computer Networks and Distributed Systems (SNDS-2014) Springer in Communications in Computer and Information Science Series(CCIS), ISSN: 1865:0929.
  18. Demalvertising: A Probabilistic Approach for Detecting Malwares in Advertising Networks- Prabaharan Poornachandran, Balagopal N, Soumajit Pal and Aravind Ashok Nair- International Conference on Advances in Computing, Communications and Informatics


  1. Prabaharan Poornachandran, Gopika N G, Hrudya P Forepart Based Captcha Segmentation And Recognition Using DFT. Fourth International Conference on Recent Trends in Information, Telecommunication and Computing – ITC 2013. (To appear in Elsevier)
  2. Hrudya P, Lekha S. Nair, Adithya S.M, Reshma Unni, Vishnu Priya H and Prabaharan Poornachandran. Digital Image Forgery Detection on Artificially Blurred Images. IEEE Explore ISBN 978-1-4799-1085-4


  1. Kamalanathan Kandasamy, Krishnashree Achuthan, Re-architecture of Database Software Stack with Planner module for query optimization in a Cloud Environment, International Conference on Security of Internet of Things, ACM Digital Library, 2012
  2. Aravind Ashok, Prabaharan Poornachandran, Krishnashree Achuthan, Secure Authentication in Multimodal Biometric Systems Using Cryptographic Hash Functions. Recent Trends in Computer Networks and Distributed Systems Security, International Conference, SNDS 2012.
  3. Jayaraj Poroor, Bharat Jayaraman: C2L: A Formal Policy Language for Secure Cloud configuration. Procedia CS, Elsevier, 10: 499-506 (2012)
  4. Jinu Elizabeth John, A. S. Remya Ajai, Prabaharan Poornachandran, Effective Implementation of DES Algorithm for Voice Scrambling, Recent Trends in Computer Networks and Distributed Systems Security, Communications in Computer and Information Science Volume 335, 2012.
  5. Jayaraj Poroor, Bharat Jayaraman, Modeling mobile stateful channels in piZ, Science of Computer Programming, Elsevier, Available online 27 October 2012.
  6. Avinash Joshi, Varrun Ramani, Hrishikesh Murali, Radhesh Krishnan, Zubin Mithra, and Vipin Pavithran, Student Centric Design for Cyber Security Knowledge Empowerment , IEEE International Conference on Technology Enhanced Education, 2012.
  7. P. V. Sruthi,, Prabaharan Poornachandran, A. S. Remya Ajai, Performance Analysis and Improvement Using LFSR in the Pipelined Key Scheduling Section of DES, Recent Trends in Computer Networks and Distributed Systems Security Communications in Computer and Information Science Volume 335, 2012.
  8. Jayaraj Poroor and Bharat Jayaraman, Formal Analysis of Event-Driven Cyber Physical Systems, SecurIT 2012.
  9. Praveen.K, Prabaharan Poornachandran and Remya Ajai A S, Implementation of DES using Pipelining concept with Skew Core Key Scheduling in Secure Transmission of Images, Implementation of DES using Pipelining concept with Skew Core Key Scheduling in Secure Transmission of Images, 2012
  10. Ramesh M.V, Prabaharan P, Shameem A, Rekha, P, DVM based Multipath Routing in MANET for Different Scalable and Adaptive Environment, ICDSE 2012.
  11. Ramesh, M.V.; Prabaharan, P.; Shameem, A.A.; Rekha, P. DVM based scalable and adaptive multipath routing in MANET for emergency rescue application, Wireless and Optical Communications Conference (WOCC), 2012.
  12. Nov 2012 Padmashani R, Shiju Sathyadevan and Devi Dath - BSnort IPS; ISDA 2012 is co-organized by Machine Intelligence Research Labs (MIR Labs) andCochin University of Science and Technology (CUSAT), India
  13. Annie George, Prabaharan. P M.R. Kaimal adsvm : Pre-processor Plug-in Using Support Vector Machine Algorithm For Snort ACM Conference proceedings 2012


  1. September 2011: Shiju Sathyadevan: Kloud – A Virtual Elastic Knowledge Cloud; IEEE International conference on Technology Enhanced Education, IEEE 2011, Amritapuri, Kerala, India.
  2. August 2011: Shiju Sathyadevan, Hari Kallingalthodi and Hari N N: IRIGNET - Intelligent Communication Network for Power-scarce Rural India; International Conference on Wireless Technologies for Humanitarian Relief, ACWR2011 Amrita Vishwa Vidyapeetham, Amritapuri Campus, Kerala, India.
  3. Jayaraj Poroor, Bharat Jayaraman: Verifying security properties of internet protocol stacks: The split verification approach. Journal of Systems Architecture - Embedded Systems Design, Elsevier, 57(3): 269-281 (2011)
  4. Jayaraj Poroor and Bharat Jayaraman. 2011. Formal specification and verification of vehicular handoff using pi-calculus. ACWR2011.
  5. Shiju Satyadevan, Krishnashree Achuthan, Venkat Rangan, SEDO -Security Enabled Data Objects, Patent Pending.
  6. Sudharsan Sundararajan, Hari N N, Vipin Pavithran, Kaladhar Vorungati, Krishnashree Achuthan, "Preventing Insider Attacks in the Cloud" Advances in Computing and Communications, 2011: p. 488-500
  7. Jayaraj Poroor, Bharat Jayaraman, "DoS Attacks on Real-Time Media through Indirect Contention-in-Hosts," IEEE Internet Computing, vol. 13, no. 6, pp. 22-30, November/December, 2009