RESEARCH PUBLICATIONS (By Faculty)

  • 2016
  • 2015
  • 2014
  • 2013
  • 2012
  • 2011
  • 2010
  • 2006-2009
  1. K. Praveen & M. Sethumadhavan. Ideal Contrast Visual Cryptography for General Access Structures with AND Operation. In Proceedings of 3rd International Conference on Advanced Computing, Networking and Informatics ,Volume 44 of the series Smart Innovation, Systems and Technologies, pp. 309-314, 2016.
  2. Pavani Bharathula & N. Mridula Menon. Equitable Machine Learning Algorithms to Probe Over P2P Botnets. In Proceedings of the 4th International Conference on Frontiers in Intelligent Computing: Theory and Applications (FICTA) 2015, Volume 404 of the series Advances in Intelligent Systems and Computing , pp. 13-21, 2016.
  3. P. P. Amritha, M. Sreedivya Muraleedharan, K. Rajeev & M. Sethumadhavan. Steganalysis of LSB Using Energy Function. In Intelligent Systems Technologies and Applications, Volume 384 of the series Advances in Intelligent Systems and Computing pp 549-558, 2016.
  4. Amritha.P.P , Induja K, Rajeev K. Active Warden Attack on Steganography using Prewitt Filter, International Conference on Soft Computing Systems , 2016.
  5. Akshay Eldho Jose & T. Gireeshkumar. Gigabit Network Intrusion Detection System Using Extended Bloom Filter in Re-configurable Hardware. In Proceedings of the Second International Conference on Computer and Communication Technologies, Volume 379 of the series Advances in Intelligent Systems and Computing , pp. 11-19, 2016.
  6. M. D. Amruth & K. Praveen. Android Smudge Attack Prevention Techniques. In Intelligent Systems Technologies and Applications, Volume 385 of the series Advances in Intelligent Systems and Computing, pp. 23-31, 2016.
  7. S. Anuraj, P. Premalatha & T. Gireeshkumar. High Speed Network Intrusion Detection System Using FPGA. In Proceedings of the Second International Conference on Computer and Communication Technologies, Volume 379 of the series Advances in Intelligent Systems and Computing, pp. 187-194, 2016.
  8. S. Remya, & K. Praveen. Protecting the Augmented Browser Extension from Mutation Cross-Site Scripting. In Proceedings of the Second International Conference on Computer and Communication Technologies, Volume 379 of the series Advances in Intelligent Systems and Computing, pp. 215-223, 2016.
  9. Maria James, Chungath Srinivasan, K. V. Lakshmy, and M. Sethumadhavan. Decrypting Shared Encrypted Data Files Stored in a Cloud Using Dynamic Key Aggregation. In Computational Intelligence, Cyber Security and Computational Models,Volume 412 of the series Advances in Intelligent Systems and Computing, pp. 385-392, 2016.
  10. S. Priya, P. P. Amritha. Information Hiding in H.264, H.265, and MJPEG. In Proceedings of the International Conference on Soft Computing Systems, Volume 398 of the series Advances in Intelligent Systems and Computing, pp. 479-487, 2016.
  11. Yadu Kaladharan, Prabhaker Mateti, K. P. Jevitha. An Encryption Technique to Thwart Android Binder Exploits. In Intelligent Systems Technologies and Appli- cations, Volume 385 of the series Advances in Intelligent Systems and Computing, pp. 13-21, 2016.