Sindhu M., and M. Sethumadhavan. "On the k-error Joint Linear Complexity and Error Multisequence over Fq (char Fq= p, prime)." Recent Trends in Computer Networks and Distributed Systems Security. Springer Berlin Heidelberg, 2014. 512-519.


Lakshmy, K. V., M. Sethumadhavan, and Thomas W. Cusick. “Counting rotation symmetric functions using Polya’s theorem.” Discrete Applied Mathematics (2014).


Pandian, Vijay Anand, and T. Gireesh Kumar. "A Novel Cloud Based NIDPS for Smartphones." Recent Trends in Computer Networks and Distributed Systems Security. Springer Berlin Heidelberg, 2014. 473-484.


Praveen K., K. Rajeev, and M. Sethumadhavan. "On the Extensions of (k, n) *-Visual Cryptographic Schemes." Recent Trends in Computer Networks and Distributed Systems Security. Springer Berlin Heidelberg, 2014. 231-238.

5.   Gireesh Kumar T. “Comparative Study of Algorithms for Frontier based Area Exploration and Slam for Mobile Robots”, International Journal of Computer Applications (0975 – 8887) vol. 77 - Number 8, 2014

Gireesh Kumar T., K. J. Poornaselvan, “Performance evaluation of various mobile robot navigation techniques for unknown and unpredictable environment”, Mementic Computing, Springer 2014. (Accepted for publication).


Nimmy K., M. Sethumadhavan, ''Novel Mutual Authentication Protocol for Cloud Computing using Secret Sharing and Steganography”, ICADIWT-2014 (Accepted for publication).


Ranjith V., Chungath Srinivasan, Lakshmy K. V., “Secure FCSR based Light Weight Stream Ciphers”, to appear in IEEE Xplore (2014). (Accepted for publication).


Devisree G.S. and Praveen K. “Secretly Shared QR code and its Applications”, ICAEES 2014, (Accepted for publication).


Praveen K and Nithin Sasi, “A (t, n) Secure Sum Multiparty Computation Protocol using Multivariate polynomial Secret Sharing scheme”, ICAEES 2014, (Accepted for publication).


Ashok Kumar Mohan and Gireesh Kumar T., “Secure Seed Based Sturdy OTP Via Convenient Carry On Device”, ICAEES 2014, (Accepted for publication).


Rahul P. K. and T. Gireesh Kumar, “A Novel Authentication Framework for Hadoop”, ICAEES 2014, (Accepted for publication).


Anjana S. and Amritha P. P., “ A Novel Method For Secure  Image Steganography”, ICAEES 2014, (Accepted for publication).


Jayasree N. and Amritha P. P., “A Model for the Effective Steganalysis of VOIP”, ICAEES 2014, (Accepted for publication).


Ajvad Rahman and Amritha P. P., “Using Signature for Hidden Communication Prevention in IP Telephoney”, ICAEES 2014, (Accepted for publication).


Rakesh P Menon and Kandasamy Muniasamy, “Intrusion Prediction System Based on Log Analysis”, ICAEES 2014, (Accepted for publication).


T. Divya and Kandasamy Muniasamy, “Real Time Intrusion Prediction using Hidden Markov Model with Genetic Algorithm”, ICAEES 2014, (Accepted for publication).


S. Aparna and Kandasamy Muniasamy, “Phish Indicator: An Indication For Phishing Sites”, ICAEES 2014, (Accepted for publication).


Chandini Rajeev and K. P. Girish, “Comparative Analysis of Digital Watermarking in Discrete Wavelet Transform and Mojette Transform” ICAEES 2014, (Accepted for publication).


Akhitha S. Kumar and K. P. Girish, “A Three Factor Authentication System for Smartcard using Biometric, Visual Cryptography and OTP”, ICAEES 2014, (Accepted for publication).


Sindhu M., M. Sethumadhavan, “Linear Complexity Measures of Binary  Multisequences”, International Journal of Computer Applications, vol. 62 - Number 16, pp.6-10, 2013


Premalatha P. , Amritha P. P. , “Optimally Locating for Hiding Information in Audio Signal”, International Journal of Computer Applications, vol.65 (14), pp.37-42, 2013.


Ritwik M., Praveen K., “Analysing the Makier Virus”, International Journal for Computer Science issues, vol. 10(2), 2013.


Deepa R., Nimmy K. Thiruppathi K., Reshma R., “Survey on various steganographic algorithms” International Conference on Information and network technology, IPCSIT vol. xx , 2012.


Praveen I., M. Sethumadhavan. “An Efficient and Faster Pairing Computation”, SecurIT 2012 Internet of Things, ACM Digital Library, 2012.


C. Srinivasan, K. V. Lakshmy, and M. Sethumadhavan, “Measuring Diffusion in Stream Ciphers using Statistical Testing Methods,” Defence Science Journal, vol. 62, no. 1, pp. 6–10, 2012.


R. Arun, K. Praveen, Divya Chandra Bose, Hiran V. Nath, “A Distortion Free Relational Database Watermarking Using Patch Work Method”, Advances in Intelligent and Soft Computing, vol. 132, pp 531-538, 2012.


K. P. Girish, Sunil Jacob John, “Multiset Topologies Induced by Multiset Relations”, Information Sciences, vol. 188, pp 298 – 313, 2012.


Aishwarya Nandakumar, P. P. Amritha, K.V. Lakshmy, Vijaya Sai Talluri, “Non Linear Secret Sharing for Gray Scale Images,” Procedia Engineering, vol. 30, pp 945-952, 2012.


Niranjan, M., Saipreethy, M. S., Gireesh Kumar, T. “An Intelligent Question Answering Conversational Agent using Naïve Bayesian Classifier”, IEEE Computer Society, pp 1-5, 2012.


Gireesh Kumar T., K. J. Poornaselvan, Sattviksharma, Gulshan Kumar, Sreevathsan R., “Tracking of nose tip: An Alternative for Mouse”, LNCS, Springer-Verlag, vol. 6411, pp. 219-225, 2012.


Sudheesh P., Gireesh Kumar T., “Vision based Robot Navigation for Disaster Scenarios”, International Journal of Computer Applications (0975 – 8887) vol. 49- No.6, July 2012.


Bhuvana Chandra, K. Nagarjuna Varma, Gireesh Kumar T., “Foreground Estimation in a Degraded Text document”, International Journal of Computer Applications (0975 – 8887) Volume 44- No.22, 2012.


Deepa D. Shankar, Gireesh Kumar T., Praveen K., Jithin R., Ashji S. Raj, “Block Dependency Feature Based Classification Scheme for Uncalibrated Image Steganalysis”, Data Engineering and Management , ICDEM 2010, LNCS 6411, pp. 189–195, Springer-Verlag Berlin Heidelberg, 2012.


Raj, Ashji S., and Chungath Srinivasan. “Analysis of Algebraic Attack on TRIVIUM and Minute Modification to TRIVIUM.” Advances in Network Security and Applications (2011): 35-42.


Hiran. V. Nath, “Vulnerability Assessment Methods - A Review,” Advances in Network Security and Applications, Communications in Computer and Information Science, Volume 196, pp. 1–10, 2011.


Sanoop Mallissery, K. Praveen, Shahana Sathar, “Correlation of Alerts Using Prerequisites and Consequences for Intrusion Detection”, Computational Intelligence and Information Technology, Communications in Computer and Information Science, vol. 250, Part 2, pp 662-666, 2011.


K. P. Girish, Sunil Jacob John, “Rough Multiset and Information Multi-systems”, Advances in Decision Sciences, vol. 2011.


Sattvik Sharma, M. V. N. N. S. Srikanth, Harshith C., Sreevathsan R., Gireesh Kumar T., “Cognitive Environment for Pervasive Learners”, Communications in Computer and Information Science, LNCS ,vol. 191, pp 506-515, 2011.


Shankar, Deepa D., T. Gireeshkumar, and Hiran V. Nath. “Steganalysis for calibrated and lower embedded uncalibrated images.” Swarm, Evolutionary, and Memetic Computing. Springer Berlin Heidelberg, 2011. 294-301.


Amritha P. P., Gireesh Kumar T., “A survey on digital image steganographic methods”, Book Chapter: Cyber Security, Cyber Crime and Cyber Forensics: Applications and Perspectives, IGI Global, US, pp 250-258, 2011.


M. Sindhu, Sajan Kumar S. and M. Sethumadhavan, “Error Linear Complexity Measures of Binary Multisequences,” Cyber Security, Cyber Crime and Cyber Forensics: Applications and Perspectives, pp 240-249, 2010.


C. Srinivasan, K. V. Lakshmy, and M. Sethumadhavan, “Complexity Measures of Cryptographically Secure Boolean Functions,” Cyber Security, Cyber Crime and Cyber Forensics: Applications and Perspectives, pp. 220-230, 2010.


Sajan Kumar S., Hari Krishna Prasad M., Suresh Raju Pilli, “Extended Time Machine Design using Reconfigurable Computing for Efficient Recording and Retrieval of Gigabit Network Traffic”, Cyber Security, Cyber Crime and Cyber Forensics: Applications and Perspectives, pp 168-177, 2010.


Aathira K. S., Hiran V. Nath, Thulasi N. Kutty, Gireesh Kumar T., “Low Budget Honeynet Creation and Implementation for Nids and Nips”, International Journal of Computer and Network Security, vol. 2, No. 8, pp 27-32, August 2010.


Vipin Das, Vijaya Pathak, Sattvik Sharma, Sreevathsan, M. V. V. N. S. Srikanth, Gireesh Kumar T., “Network Intrusion Detection System Based On Machine Learning Algorithms”, International Journal of Computer Science & Information Technology (IJCSIT), vol. 2, No. 6, December 2010.


J. Divya Udayan, T. Gireesh Kumar, Roshy M. John, K. J. Poornaselvan, S. A. Lakshmanan, “Mobile Robot Pose Estimation Based on Particle Filters for Multi-dimensional State Spaces” , Lecture Notes in Computer Science, vol. 101, pp 602-605, 2010.


Gireesh Kumar T., Divya Udayan J., Roshy M. John, K. J. Poornaselvan , “Self Localization and pose estimation of Mobile robot”, International journal of Embedded System and Computer Engineering, vol.2,No.1, ISSN:0975-4482, 2010.


Gireesh Kumar T., K. J. Poornaselvan, M. Sethumadhavan, “Fuzzy Support Vector Machine-Based Multi-agent Optimal Path Planning Approach to Robotics Environment”, Defence Science Journal, vol. 60, No. 4, pp. 387-391, July 2010.


Gireesh Kumar T., Jithin R., Deepa Suresh, “Feature Based Steganalysis using Wavelet Decomposition and Magnitude Statistics”, in Advances in Computer Engineering (ACE), 2010 International Conference on, pp. 298–300, 2010.


Deepa D. Shankar, Gireesh Kumar T., “Feature based Classification System for Image Steganalysis”, International Conference on Computer Communication and Network 2010, pp 70 – 74, 2010.


Sapna Sasidharan, Sherly A. P., Karthikha N. R., Avani Y., Gireeshkumar T., “An Advanced Steganographic Scheme with Diamond Encoding and Morphological Neural Network”, Macmillan Advance Research Series, pp 3-14, 2010.


Gireeshkumar T., Sapna Sasidharan, Sherly A. P., Karthikha N. R., Avani Y.,“An Efficient Embedding and Restoration Steganographic Scheme for Secure Multimedia Communication”, IEEE Computer Society, pp 361-363, 2010.


Amritha P. P., Anoj Madathil, “Payload Estimation in Universal Steganalysis”, Defence Science Journal, Vol. 60, No. 4, pp. 412-414, 2010.


P. P. Amritha, Anoj Madathil, T. Gireesh Kumar, “Unconditional Steganalysis of JPEG and BMP Images and its Performance Analysis Using Support Vector Machine”,Springer, LNCS, vol.101, pp. 638-640, 2010.


A. P. Sherly, Sapna Sasidharan, Ashji S. Raj, P. P. Amritha, “A Novel Approach for Compressed Video Steganography”, Recent Trends in Network Security and Applications, Communications in Computer and Information Science, vol 89, Part 3, pp 567-575, 2010.


Sherly A. P., Amritha P. P., “A Compressed Video Steganography using TPVD”, International Journal of Database Management Systems ,vol.2, No.3, pp 67-80, 2010.


M. Sethumadhavan, Sindhu M., Chungath Srinivasan and C. Kavitha: “An algorithm for k-error joint linear complexity of binary multisequences”, Journal of Discrete Mathematical Sciences & Cryptography, vol. 11, No.3, pp 297-304, 2008.


M. Sethumadhavan, C. Yogha Laxmie and C. Vijaya Govindan, “A construction of p-ary balanced sequence with large k-error linear complexity”, Journal of Discrete Mathematical Sciences and Cryptography, vol. 9, No.2, pp.253-261, 2006.