Research Publications (By Faculty)

  1. Gregory Paul T. G. & Gireesh Kumar T.  A Framework for Dynamic Malware Analysis Based on Behavior Artifacts. In: Satapathy S., Bhateja V., Udgata S., Pattnaik P. (eds) Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications. Advances in Intelligent Systems and Computing, vol 515, pp. 551-559, Springer, Singapore 2017 (March)
  2. Amritha P. P., Ravi R. P. & Sethumadhavan M.  Active Steganalysis on SVDBased Embedding Algorithm. In: Satapathy S., Bhateja V., Udgata S., Pattnaik P. (eds) Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications. Advances in Intelligent Systems and Computing, vol 515, pp. 777-785 , Springer, Singapore 2017 (March)
  3. Akshay Dev P.K. & Jevitha K.P.  STRIDE Based Analysis of the Chrome Browser Extensions API. In: Satapathy S., Bhateja V., Udgata S., Pattnaik P. (eds) Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications. Advances in Intelligent Systems and Computing, vol 516, pp. 169-178, Springer, Singapore 2017 (March)
  1. K. Praveen & M. Sethumadhavan. Ideal Contrast Visual Cryptography for General Access Structures with AND Operation. In Proceedings of 3rd International Conference on Advanced Computing, Networking and Informatics ,Volume 44 of the series Smart Innovation, Systems and Technologies, pp. 309-314, 2016.
  2. Pavani Bharathula & N. Mridula Menon. Equitable Machine Learning Algorithms to Probe Over P2P Botnets. In Proceedings of the 4th International Conference on Frontiers in Intelligent Computing: Theory and Applications (FICTA) 2015, Volume 404 of the series Advances in Intelligent Systems and Computing , pp. 13-21, 2016.
  3. P. P. Amritha, M. Sreedivya Muraleedharan, K. Rajeev & M. Sethumadhavan. Steganalysis of LSB Using Energy Function. In Intelligent Systems Technologies and Applications, Volume 384 of the series Advances in Intelligent Systems and Computing pp 549-558, 2016.
  4. Amritha.P.P , Induja K, Rajeev K. Active Warden Attack on Steganography using Prewitt Filter, International Conference on Soft Computing Systems , 2016.
  5. Akshay Eldho Jose & T. Gireeshkumar. Gigabit Network Intrusion Detection System Using Extended Bloom Filter in Re-configurable Hardware. In Proceedings of the Second International Conference on Computer and Communication Technologies, Volume 379 of the series Advances in Intelligent Systems and Computing , pp. 11-19, 2016.
  6. M. D. Amruth & K. Praveen. Android Smudge Attack Prevention Techniques. In Intelligent Systems Technologies and Applications, Volume 385 of the series Advances in Intelligent Systems and Computing, pp. 23-31, 2016.
  7. S. Anuraj, P. Premalatha & T. Gireeshkumar. High Speed Network Intrusion Detection System Using FPGA. In Proceedings of the Second International Conference on Computer and Communication Technologies, Volume 379 of the series Advances in Intelligent Systems and Computing, pp. 187-194, 2016.
  8. S. Remya, & K. Praveen. Protecting the Augmented Browser Extension from Mutation Cross-Site Scripting. In Proceedings of the Second International Conference on Computer and Communication Technologies, Volume 379 of the series Advances in Intelligent Systems and Computing, pp. 215-223, 2016.
  9. Maria James, Chungath Srinivasan, K. V. Lakshmy, and M. Sethumadhavan. Decrypting Shared Encrypted Data Files Stored in a Cloud Using Dynamic Key Aggregation. In Computational Intelligence, Cyber Security and Computational Models,Volume 412 of the series Advances in Intelligent Systems and Computing, pp. 385-392, 2016.
  10. S. Priya, P. P. Amritha. Information Hiding in H.264, H.265, and MJPEG. In Proceedings of the International Conference on Soft Computing Systems, Volume 398 of the series Advances in Intelligent Systems and Computing, pp. 479-487, 2016.
  11. Yadu Kaladharan, Prabhaker Mateti, K. P. Jevitha. An Encryption Technique to Thwart Android Binder Exploits. In Intelligent Systems Technologies and Appli- cations, Volume 385 of the series Advances in Intelligent Systems and Computing, pp. 13-21, 2016.
  1. Kumar, M., & Praveen, I. (2015). A Fully Simulatable Oblivious Transfer Scheme Using Vector Decomposition. In Intelligent Computing, Communication and Devices (pp. 131-137). Springer India.
  2. Devisree, G. S., & Praveen, K. (2015). Secretly Shared QR Code and Its Applications. In Artificial Intelligence and Evolutionary Algorithms in Engineering Systems (pp. 473-480). Springer India.
  3. Mohan, A. K., & Gireesh Kumar, T. (2015). Secure Seed-Based Sturdy OTP via Convenient Carry-on Device. In Artificial Intelligence and Evolutionary Algorithms in Engineering Systems (pp. 447-455). Springer India.
  4. Rahul, P. K., & Gireesh Kumar, T. (2015). A Novel Authentication Framework for Hadoop. In Artificial Intelligence and Evolutionary Algorithms in Engineering Systems (pp. 333-340). Springer India.
  5. Anjana, S., & Amritha, P. P. (2015). A Novel Method for Secure Image Steganography. In Artificial Intelligence and Evolutionary Algorithms in Engineering Systems (pp. 151-158). Springer India.
  6. Jayasree, N., & Amritha, P. P. (2015). A Model for the Effective Steganalysis of VoIP. In Artificial Intelligence and Evolutionary Algorithms in Engineering Systems (pp. 379-387). Springer India.
  7. Menon, R. P. (2015, January). Log Analysis Based Intrusion Prediction System. In Emerging ICT for Bridging the Future Proceedings of the 49th Annual Convention of the Computer Society of India (CSI) Volume 1 (pp. 409-416). Springer International Publishing.
  8. Divya, T., & Muniasamy, K. (2015). Real-Time Intrusion Prediction Using Hidden Markov Model with Genetic Algorithm. In Artificial Intelligence and Evolutionary Algorithms in Engineering Systems (pp. 731-736). Springer India.
  9. Aparna, S., & Muniasamy, K. (2015). Phish Indicator: An Indication for Phishing Sites. In Artificial Intelligence and Evolutionary Algorithms in Engineering Systems (pp. 481-487). Springer India.
  10. Rajeev, Chandini, & Girish, K. P. (2015). Comparative Analysis of Digital Watermarking in Discrete Wavelet Transform and Mojette Transform. In Artificial Intelligence and Evolutionary Algorithms in Engineering Systems (pp. 667-672). Springer India.
  11. Kumar, A. S., & Girish, K. P. (2015). A Three Factor Authentication System for Smartcard Using Biometric, Visual Cryptography and OTP. In Artificial Intelligence and Evolutionary Algorithms in Engineering Systems (pp. 673-679). Springer India.
  12. Praveen, K., & Sasi, N. (2015). A (t; n) Secure Sum Multiparty Computation Protocol Using Multivariate Polynomial Secret Sharing Scheme. In Artificial Intelligence and Evolutionary Algorithms in Engineering Systems (pp. 457-463). Springer India.
  13. Rahman, A., & Amritha, P. P. (2015). Using Signature for Hidden Communication Prevention in IP Telephony. In Artificial Intelligence and Evolutionary Algorithms in Engineering Systems (pp. 489-494). Springer India.
  14. Sabarish, B. A., Karthi, R., & Gireeshkumar, T. (2015). A Survey of Location Prediction Using Trajectory Mining. In Artificial Intelligence and Evolutionary Algorithms in Engineering Systems (pp. 119-127). Springer India.
  15. Anoop, R. S., Gireeshkumar, T., & Saisuriyaa, G. (2015). A Probabilistic Method Toward SLAM for Mobile Robotic Systems. In Intelligent Computing, Communication and Devices (pp. 285-291). Springer India.
  16. Velayudhan, A., & Gireeshkumar, T. (2015). An Autonomous Obstacle Avoiding and Target Recognition Robotic System Using Kinect. In Intelligent Computing, Communication and Devices (pp. 643-649). Springer India.
  17. Andoor, J. T. (2015, January). A Filtering Based Android Malware Detection System for Google Play Store. In Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014 (pp. 559-566). Springer International Publishing.
  18. Anumol, E. T. (2015). Use of Machine Learning Algorithms with SIEM for Attack Prediction. In Intelligent Computing, Communication and Devices (pp. 231-235). Springer India.
  19. Kuriakose, R., & Premalatha, P. (2015). A Novel Method for MP3 Steganalysis. In Intelligent Computing, Communication and Devices (pp. 605-611). Springer India.
  20. Chungath Srinivasan, Utkarsh Umesan Pillai, K.V. Lakshmy, & M. Sethumadhavan (2015). Cube attack on stream ciphers using a modified linearity test. Journal of Discrete Mathematical Sciences and Cryptography, 18(3): 301-311.
  21. Nidhin D., Praveen I. and Praveen K. Role Based Access Control for Encrypted Data using Vector Decomposition in proceedings of International Conference on Soft Computing Systems ( ICSCS 2015) (Accepted)
  1. Sindhu, M., & Sethumadhavan, M. (2014). On the k-error Joint Linear Complex- ity and Error Multisequence over Fq (charFq = p; prime). In Recent Trends in Computer Networks and Distributed Systems Security (pp. 512-519). Springer Berlin Heidelberg.
  2. Praveen, K., & Sethumadhavan, M. (2014). A Probabilistic Essential Visual Cryptographic Scheme for Plural Secret Images. In Advanced Computing, Networking and Informatics-Volume 2 (pp. 225-231). Springer International Publishing.
  3. Praveen, K., Rajeev, K., & Sethumadhavan, M. (2014). On the Extensions of (k; n)-Visual Cryptographic Schemes. In Recent Trends in Computer Networks and Distributed Systems Security (pp. 231-238). Springer Berlin Heidelberg.
  4. Pandian, V. A., & Gireesh Kumar, T. (2014). A Novel Cloud Based NIDPS for Smartphones. In Recent Trends in Computer Networks and Distributed Systems Security (pp. 473-484). Springer Berlin Heidelberg.
  5. Nimmy, K., & Sethumadhavan, M. (2014). Novel mutual authentication protocol for cloud computing using secret sharing and steganography. In Applications of Digital Information and Web Technologies (ICADIWT), 2014 Fifth International Conference on the (pp. 101-106). IEEE.
  6. Lakshmy, K. V., Sethumadhavan, M., & Cusick, T. W. (2014). Counting rotation symmetric functions using Polyas theorem. Discrete Applied Mathematics, 169, (pp.162-167).
  7. Aravind, V., & Sethumadhavan, M. (2014). A Framework for Analyzing the Security of Chrome Extensions. In Advanced Computing, Networking and Informatics- Volume 2 (pp. 267-272). Springer International Publishing.
  8. Robert, R. R. (2014). Differential Execution Analysis for Obfuscation Reduction. In Recent Trends in Computer Networks and Distributed Systems Security (pp. 358-369). Springer Berlin Heidelberg.
  9. Praveen, K., & Sethumadhavan, M. (2014). Results on (2; n) Visual Cryptographic Scheme. In Security in Computing and Communications (pp. 335-340). Springer Berlin Heidelberg

Patents Filed

  1. Mukil Rajeev, & Jevitha K. P. (2014). HTTP Proxy Based Solution for Mitigating Cross-Site Scripting and SQL Injection Vulnerabilities.
  2. Ashok Kumar Mohan, & Gireesh Kumar, T.(2014). Secured Communication for Sturdy-OTP.
  1. Dayanand, V., Sharma, R., & Gireesh Kumar, T.(2013). Comparative Study of Algorithms for Frontier based Area Exploration and Slam for Mobile Robots. International Journal of Computer Applications 77(8)(pp. 37-42).
  2. Praveen, I., & Sethumadhavan, M. (2013). An Application of Vector Decom- position Problem in Public Key Cryptography Using Homomorphic Encryption. In proceedings of International Conference on Emerging Research in Computing, Information, Communication and Applications - ERICA 2013 (pp. 328-331).
  3. Sindhu, M., & Sethumadhavan, M. (2013). Linear Complexity Measures of Binary Multi-sequences. International Journal of Computer Applications, 62(16), (pp. 6-10).
  4. Ritwik, M., & Praveen, K. (2013). Analyzing the Makier Virus. International Journal of Computer Science Issues (IJCSI), 10(2) (pp. 530-533).
  5. Premalatha, P., & Amritha, P. P. (2013). Optimally Locating for Hiding Infor- mation in Audio Signal. International Journal of Computer Applications (0975- 8887), Vol. 65, No.14,(pp. 37-42).
  1. Gireeshkumar, T., Poornaselvan, K. J., & Sreevathsan, R. (2012). Tracking of nose tip: an alternative for mouse. In Data Engineering and Management (pp. 219-225). Springer Berlin Heidelberg.
  2. Shankar, D. D., Gireeshkumar, T., Praveen, K., Jithin, R., & Raj, A. S. (2012). Block dependency feature based classification scheme for uncalibrated image steganalysis. In Data Engineering and Management (pp. 189-195). Springer Berlin Heidelberg.
  3. Srinivasan, C., Lakshmy, K. V., & Sethumadhavan, M. (2012). Measuring Diffusion in Stream Ciphers using Statistical Testing Methods. Defence Science Journal, 62(1), (pp. 6-10).
  4. Nandakumar, A., Amritha, P. P., Lakshmy, K. V., & Talluri, V. S. (2012). Non Linear Secret Sharing For Gray Scale Images. Proceedia Engineering, 30, (pp. 945-952).
  5. Praveen, I., & Sethumadhavan, M. (2012, August). A more ecient and faster pairing computation with cryptographic security. In Proceedings of the first international conference on security of internet of things (pp. 145-149). ACM.
  6. Arun, R., Praveen, K., Bose, D. C., & Nath, H. V. (2012, January). A distortion free relational database watermarking using patch work method. In Proceedings of the International Conference on Information Systems Design and Intelligent Applications 2012 (INDIA 2012) held in Visakhapatnam, India, January 2012 (pp. 531-538). Springer Berlin Heidelberg.
  7. Niranjan, M., Saipreethy, M. S., & Gireesh Kumar, T. (2012, January). An intelligent question answering conversational agent using Nave Bayesian classifier. In Technology Enhanced Education (ICTEE), 2012 IEEE International Conference on (pp. 1-5). IEEE.
  8. Girish, K. P., & John, S. J. (2012). Multiset topologies induced by multiset relations. Information Sciences, 188, 298-313.
  9. Girish, K. P., & Jacob John, S. (2012). Rough multisets and information multi-systems. Advances in Decision Sciences, 2012.
  10. Sudheesh, P., & Gireesh Kumar, T. (2012). Vision based Robot Navigation for Disaster Scenarios. International Journal of Computer Applications 49(6),(pp. 36-39).
  11. Deepa, R., Nimmy, K. Thiruppathi, K., & Reshma R. (2012). Survey on various steganographic algorithms. In Proceedings of International Conference on Information and network technology, IPCSIT vol. xx , 2012.
  12. Bhuvana I. Chandra, Nagarjunavarma, K., & Gireesh Kumar, T. (2012). Foreground Estimation in a Degraded Text document. International Journal of Com puter Applications 44(22), (pp. 31-37).
  1. Sharma, S., Sreevathsan, R., Srikanth, M. V. V. N. S., Harshith, C., & Gireesh Kumar, T. (2011). Cognitive Environment for Pervasive Learners. In Advances in Computing and Communications (pp. 506-515). Springer Berlin Heidelberg.
  2. Shankar, D. D., Gireeshkumar, T., & Nath, H. V. (2011). Steganalysis for calibrated and lower embedded uncalibrated images. In Swarm, Evolutionary, and Memetic Computing (pp. 294-301). Springer Berlin Heidelberg.
  3. Mallissery, S., Praveen, K., & Sathar, S. (2011). Correlation of Alerts Using Prerequisites and Consequences for Intrusion Detection. In Computational Intelligence and Information Technology (pp. 662-666). Springer Berlin Heidelberg.
  4. Nath, H. V. (2011). Vulnerability Assessment Methods A Review. In Advances in Network Security and Applications (pp. 1-10). Springer Berlin Heidelberg.
  5. Raj, A. S., & Srinivasan, C. (2011). Analysis of Algebraic Attack on TRIVIUM and Minute Modification to TRIVIUM. In Advances in Network Security and Applications (pp. 35-42). Springer Berlin Heidelberg.
  6. Amritha, P. P., & Gireesh, T. K. (2011). A Survey on Digital Image Steganographic Methods. In R. Santanam, M. Sethumadhavan, & M. Virendra (Eds.) Cyber Security, Cyber Crime and Cyber Forensics: Applications and Perspectives (pp. 250-258).
  7. Sindhu, M., Sajan, S. K., & Sethumadhavan, M. (2011). Error Linear Complexity Measures of Binary Multi- sequences. In R. Santanam, M. Sethumadhavan, & M. Virendra (Eds.) Cyber Security, Cyber Crime and Cyber Forensics: Applications and Perspectives (pp. 240-249).
  8. Kumar, S. S., Prasad, M. H., & Pilli, S. R. (2011). Extended Time Machine Design using Re-configurable Computing for Efficient Recording and Retrieval of Gigabit Network Traffic. In R. Santanam, M. Sethumadhavan, & M. Virendra (Eds.) Cyber Security, Cyber Crime and Cyber Forensics: Applications and Perspectives (pp. 168-177).
  9. Srinivasan, C., Lakshmy, K., & Sethumadhavan, M. (2011). Complexity Measures of Cryptographically Secure Boolean Functions. In R. Santanam, M. Sethumadhavan, & M. Virendra (Eds.) Cyber Security, Cyber Crime and Cyber Forensics: Applications and Perspectives (pp. 220-230).
  1. Gireesh Kumar, T., Poornaselvan, K. J., & Sethumadhavan, M. (2010). Fuzzy Support Vector Machine-based Multi-agent Optimal Path. Defense Science Journal, 60(4),(pp. 387-391).
  2. J. Divya Udayan, J., Gireesh Kumar, T., Roshy M. John, Poornaselvan, K. J., & Lakshmanan, S. A. (2010). Mobile Robot Pose Estimation Based on Particle Filters for Multi-dimensional State Spaces. Information and Communication Technologies, Communications in Computer and Information Science Volume 101, (pp. 602-605).
  3. Amritha, P. P., Madathil, A., & Kumar, T. G. (2010, January). Unconditional Steganalysis of JPEG and BMP Images and Its Performance Analysis Using Support Vector Machine. In Information and Communication Technologies (pp. 638-640). Springer Berlin Heidelberg.
  4. Sherly, A. P., Sasidharan, S., Raj, A. S., & Amritha, P. P. (2010). A Novel Approach for Compressed Video Steganography. In Recent Trends in Network Security and Applications (pp. 567-575). Springer Berlin Heidelberg.
  5. Amritha, P. P., & Madathil, A. (2010). Payload Estimation in Universal Steganalysis. Defense Science Journal, 60(4), (pp. 412-414).
  6. Gireesh Kumar, T., Sasidharan, S., Karthikha, N., Sherly, A. P., & Avani, Y. (2010, June). An Efficient Embedding and Restoration Steganographic Scheme for Secure Multimedia Communication. In Advances in Computer Engineering (ACE), 2010 International Conference on (pp. 363-365). IEEE.
  7. Gireesh Kumar, T., Jithin, R., & Shankar, D. D. (2010, June). Feature Based Steganalysis Using Wavelet Decomposition and Magnitude Statistics. In Ad- vances in Computer Engineering (ACE), 2010 International Conference on (pp. 298-300). IEEE.
  8. Sherly, A. P., & Amritha, P. P. (2010). A compressed video steganography using TPVD. International Journal of Database Management Systems (IJDMS) Vol. 2, No. 3,(pp. 67-80).
  9. Aathira, K. S. , Hiran. V. Nath, Thulasi. N. Kutty, & Gireesh Kumar, T. (2010). Low Budget Honeynet Creation and Implementation for Nids and Nips. International Journal of Computer and Network Security, Vol. 2, No. 8, (pp. 27-32).
  10. Shankar, D. D., Gireeshkumar, T., & Jithin, R.(2010). Feature Based Classification System for JPEG Steganalysis. In Conference Proceedings RTCSP (Vol.10), (pp. 1 - 4).
  11. Vipin Das, Vijaya Pathak, Sattvik Sharma, Sreevathsan, MVVNS. Srikanth, & Gireesh Kumar,T.(2010). Network Intrusion Detection System Based On Machine Learning Algorithms. International Journal of Computer Science & Information Technology (IJCSIT), Vol. 2, No 6., (pp. 138-151).
  12. Shankar, D. D., Gireeshkumar, T., & Jithin, R. (2010). Feature based Classification System for Image Steganalysis. In Conference Proceedings RTCSP , Vol. 10, (pp. 1 - 4). 15
  1. Gireesh Kumar, T., Anna Alexander, Jina Varghese, & Sneha Johnson (2009). Image Steganographic Scheme Based On Modied Triway PVD in Orthogonal Domain. In Indo-US Conference and Workshop on Cyber Security, Cyber Crime and Cyber Forensics, Aug 19-21, 2009.
  2. M. Sethumadhavan , M. Sindhu , Chungath Srinivasan , & C. Kavitha (2008). An algorithm for k-error joint linear complexity of binary multi-sequences. Journal of Discrete Mathematical Sciences and Cryptography, Vol. 11, Iss. 3., (pp. 297- 304).
  3. Poornaselvan, K. J., Gireesh Kumar, T. , & Vijayan, V. P. (2008, July). Agent based ground ight control using type-2 fuzzy logic and hybrid ant colony optimization to a dynamic environment. In Emerging Trends in Engineering and Technology, 2008. ICETET'08. First International Conference on (pp. 343-348). IEEE.
  4. Gireesh, K. T., & Vijayan, V. P. (2007, December). A multi-agent optimal path planning approach to robotics environment. In Conference on Computational Intelligence and Multimedia Applications, 2007. International Conference on (Vol. 1, pp. 400-404). IEEE.
  5. Sethumadhavan, M., Lakxmie, C. Y., & Vijayagovindan, C. (2006). A construction of p-ary balanced sequence with large k-error linear complexity. Journal of Discrete Mathematical Sciences and Cryptography, 9(2), (pp. 253-261).
207
PROGRAMS
OFFERED
6
AMRITA
CAMPUSES
15
CONSTITUENT
SCHOOLS
A
GRADE BY
NAAC, MHRD
8th
RANK(INDIA):
NIRF 2018
150+
INTERNATIONAL
PARTNERS