Enhancing Digital Forensic Readiness: Automated Detection of Missing and Null Log Values
Authors : Saurabh Shrivastava, Aparna Tripathi, K. Praveen
Publisher : Springer Nature Singapore
Year : 2025
Security Inspection of Site-to-Site VPN by exploiting Internet Key Exchange(IKE) using OSPF
Authors : Saurabh Shrivastava, Shanthosh K P
Year : 2025
Explainable AI for Glaucoma Detection: Integrating Alternet-k and LIME
Authors : Avadhani Bindu, S Sri Kailaash Kumar, K S Harshni Sri, Senthil Kumar Thangavel, K Somasundaram, Sathyan Parthasaradhi, M C Shunmugapriya, Selvanayaki Kolandapalayam Shanmugam
Publisher : IEEE
Year : 2024
Beyond the Black Box: Explainable AI for Glaucoma Detection and Future Improvements
Authors : Avadhani Bindu, Senthil Kumar Thangavel, K Somasundaram, Sathyan Parthasaradhi, Ram Gopal Pulgurthi, Meenakshi Y Dhar
Publisher : IEEE
Year : 2024
An Automated Glaucoma Detection using DenseNet for ANSAN
Authors : Avadhani Bindu, K S Harshni Sri, S Sri Kailaash Kumar, Senthil Kumar Thangavel, K Somasundaram, Sathyan Parthasaradhi, Selvanayaki Kolandapalayam Shanmugam
Publisher : IEEE
Year : 2024
An Investigational Study on Face Recognitionbased Attendance Tracking System for Educational Institutions
Authors : Avadhani Bindu, Srivaishnavi J V, Adwaita Sathrukkan, Raghul S, T Senthil Kumar, G Jeyakumar
Publisher : IEEE
Year : 2024
ANSAN: Utilizing Inception V3 for Glaucoma Detection
Authors : Avadhani Bindu, K R Hanish, G Sukantha Velan, Senthil Kumar Thangavel, K Somasundaram, Sathyan Parthasaradhi, Selvanayaki Kolandapalayam Shanmugam
Publisher : IEEE
Year : 2024
ANSAN: Data Interpretability based analysis of Deep Learning Model
Authors : Avadhani Bindu, S Harish, K Karthie Krishna, Senthil Kumar Thangavel, K Somasundaram, Sathyan Parthasaradhi, Selvanayaki Kolandapalayam Shanmugam
Publisher : IEEE
Year : 2024
Aatma Yoga: Automation of Yoga Pose Recognition and Recommendation using Deep Learning
Authors : Avadhani Bindu, Vijaya Raghava Duppala, Harika Yadav Marepalli, Kirti Jain S, Koduru Anusha, Senthil Kumar Thangavel, B Senthil Kumar, Latha Satish, Jeeva Sekar
Publisher : IEEE
Year : 2024
On the Design of a Searchable Encryption Protocol for Keyword Search using Proactive Secret Sharing
Authors : Dr. Praveen K., Gabriel Anand K S; Indranil Ghosh Ray; Avishek Adhikari; Sabyasachi Datta; Arnab Kumar Biswas
Publisher : IEEE
Year : 2024
A Secure Protocol for Authentication and Data Storage for Healthcare System
Authors : Saurabh Shrivastava, R. Preethi, K. V. Lakshmy
Publisher : Springer Nature Singapore
Year : 2023
A Novel Fragile Zero Software Watermarking Algorithm for Tamper Detection
Authors : Dr. Praveen K., Sathya Jothi, S.P, Amritha, P.P
Publisher : IEEE
Year : 2023
Detection of Log4j Attack in SDN Environment
Authors : Dr. Praveen K., Abilesh Raja, G., Harish, R
Publisher : Springer
Year : 2023
Classifying DNS over HTTPS Malicious/Benign Traffic Using Deep Learning Models
Authors : Dr. Praveen K., Mandar Chougule, Praveen, K., Amritha P.P, Sangeetha Viswanathan, K.S Ravichandran, M. Sethumadhavan, Masoumeh Rahimi and Amir H Gandomi
Publisher : IEEE
Year : 2023
Anomaly-based Intrusion Detection using GAN for Industrial Control Systems
Authors : Saurabh Shrivastava, Sabari KK, Sangeetha. V
Publisher : IEEE
Year : 2022
Prevention of Phishing Attacks Using QR Code Safe Authentication
Authors : Dr. Praveen K., M. Taraka Rama Mokshagna Teja
Publisher : Springer
Year : 2022
Zero-Trust Security Implementation Using SDP over VPN
Authors : Dr. Praveen K., Abhiram D., Harish R
Publisher : Springer
Year : 2022
Identifying Key Strategies for Reconnaissance in Cyber Security
Authors : Dr. Praveen K., Vishnu, V
Publisher : Springer
Year : 2022
The Mechanism of Generating the Automated Java Unit Test Cases by Achieving Maximum Code Coverage
Authors : Avadhani Bindu, Saumya Ranjan Giri, Venkateswara Rao Pulipati
Publisher : Springer Singapore
Year : 2021
Dynamic Watermarking Using Python AST
Authors : Dr. Praveen K., V. Vivekananthan, M. Sethumadhavan
Publisher : Springer
Year : 2021
(t, k, n)-Deterministic Extended Visual Secret Sharing Scheme Using Combined Boolean Operations
Authors : Dr. Praveen K., L. Chandana Priya
Publisher : Springer
Year : 2021
Application of Visual Cryptography Scheme in Software Watermarking
Authors : Dr. Praveen K., R. M. Jacob, Amritha. P.P
Publisher : IEEE
Year : 2020
Towards the Detection of Phishing Attacks
Authors : Dr. Praveen K., Athulya. A.A
Publisher : IEEE
Year : 2020
Role Mining in Distributed Firewall Using Matrix Factorization Methods
Authors : Dr. Praveen K., Aravind. D. D
Publisher : IEEE
Year : 2020
Application of Secret Sharing Scheme in Software Watermarking
Authors : Dr. Praveen K., Aiswarya K.K, Amritha P.P., Sethumadhavan
Publisher : Springer
Year : 2020
Selection of Apt Renewable Energy Source for Smart Cities using Generalized Orthopair Fuzzy Information
Authors : Dr. Sangeetha Viswanathan, R. Krishankumar, Pratibha Rani, K. S. Ravichandran, Amir H. Gandomi
Publisher : IEEE
Year : 2020
Fraud Detection in Medical Insurance Claim with Privacy Preserving Data Publishing in TLS-N Using Blockchain
Authors : Dr. Praveen K., Thanusree Mohan
Publisher : Springer
Year : 2019
Data Obfuscation Using Secret Sharing
Authors : Dr. Praveen K., Sidhardhan, Manasa
Publisher : Springer
Year : 2019
PUF Authentication using Visual Secret Sharing Scheme
Authors : Dr. Praveen K., Naveen, Devarapalli
Publisher : IEEE
Year : 2019
Variant of Nearest Neighborhood Fingerprint Storage System by Reducing Redundancies
Authors : Dr. Praveen K., Anjana, K., P. P. Amritha & M. Sethumadhavan
Publisher : Springer
Year : 2019
Preserving the Privacy of Audio File Using Ideal Secret Sharing Scheme with Cloud Storage
Authors : Dr. Praveen K., Mohan, Meghna Ashoka, T. V. Jayakumar
Publisher : Springer
Year : 2019
Neighbor Attack Detection in Internet of Things
Authors : Dr. Gireeshkumar T., Thomas, Arun
Publisher : Advanced Computational and Communication Paradigms
Year : 2018
Facial Expression Classification Using Machine Learning Approach: A Review
Authors : Baskar A., Dr. Gireeshkumar T.
Publisher : Advances in Intelligent Systems and Computing
Year : 2018
Disk memory forensics: Analysis of memory forensics frameworks flow
Authors : Mr. Ashok Kumar Mohan
Publisher : 2017 Innovations in Power and Advanced Computing Technologies, i-PACT 2017
Year : 2018
Cheating Immune Visual Cryptographic Scheme with Reduced Pixel Expansion
Authors : Dr. Praveen K., M. Sethumadhavan
Publisher : Advances in Intelligent Systems and Computing
Year : 2018
On The Extension Of Xor Step Construction For Optimal Contrast Grey Level Visual Cryptography
Authors : Dr. Praveen K., M. Sethumadhavan
Publisher : IEEE
Year : 2017
OR Operation Based Deterministic Extended Visual Cryptography Using Complementary Cover Images
Authors : Dr. Praveen K., G. Indhu,M. Sethumadhavan.
Publisher : Springer
Year : 2017
Active Steganalysis on SVDBased Embedding Algorithm
Authors : Dr. M. Sethumadhavan, Amritha P. P, Ravi R. P
Publisher : Proceedings of the 5th International Conference on Frontiers in Intelligent Computing
Year : 2017
Sum Chain Based Approach against Session Hijacking in MPTCP
Authors : Dr. M. Sethumadhavan, Akash Krishnan, V.; Amritha, P.P.
Publisher : Procedia Computer Science
Year : 2017
On federated and proof of validation based consensus algorithms in blockchain
Authors : Dr. Ambili Kakkad Narayanan, M. Sindhu and M. Sethumadhavan
Publisher : IOP Conference Series: Materials Science and Engineering
Year : 2017
CBEAT: Chrome Browser Extension Analysis Tool
Authors : Dr. Jevitha K. P., Roy, Sudakshina Singha;
Publisher : Security in Computing and Communications, Springer Singapore.
Year : 2017
Gigabit Network Intrusion Detection System Using Extended Bloom Filter in Re-configurable Hardware
Authors : Dr. Gireeshkumar T., Akshay Eldho Jose
Publisher : Proceedings of the Second International Conference on Computer and Communication Technologies
Year : 2016
High Speed Network Intrusion Detection System Using FPGA
Authors : Dr. Gireeshkumar T., Anuraj, S.; P. Premalatha;
Publisher : Proceedings of the Second International Conference on Computer and Communication Technologies: IC3T 2015
Year : 2016
Frontier based multi robot area exploration using prioritized routing
Authors : Dr. Gireeshkumar T., Rahul, S.K.; Honc, D.; Dušek, F.; Herrmann F.; Rose O.; Manitz M.
Publisher : Proceedings – 30th European Conference on Modelling and Simulation, ECMS 2016, European Council for Modelling and Simulation, p.25-30
Year : 2016
Equitable machine learning algorithms to probe over P2P botnets
Authors : Mridula Menon N, Bharathula P
Publisher : Advances in Intelligent Systems and Computing, Springer Verlag.
Year : 2016
Cluster analysis of breast cancer data using Genetic Algorithm and Spiking Neural Networks
Authors : Dr. Sangeetha Viswanathan, Preethi J.
Publisher : IEEE
Year : 2015
Novel mutual authentication protocol for cloud computing using secret sharing and steganography
Authors : Dr. M. Sethumadhavan, Dr. Nimmy K.
Publisher : IEEE Xplore
Year : 2014
Multi-Level Steganography for Smart phones
Authors : Dr. Amritha P. P., V. A. C
Publisher : Networks Soft Computing (ICNSC), 2014 First International Conference on
Year : 2014
Student centric design for cyber security knowledge empowerment
Authors : A. Joshi, Ramani, V., Murali, H., Krishnan, R., Mithra, Z., and Pavithran, V
Publisher : ICTEE
Year : 2012
Reconciliation engine and metric for network vulnerability assessment
Authors : Dr. M. Sethumadhavan, H. Va Nath, and Gangadharan, Kb
Publisher : ACM International Conference Proceeding Series
Year : 2012
Power aware seamless emergency communication for heterogeneous wireless networks
Authors : Balaji Hariharan, Dr. Sangeeth Kumar, Sreejith K
Publisher : IEEE
Year : 2012
A More Efficient and Faster Pairing Computation with Cryptographic Security
Authors : Praveen I., Dr. M. Sethumadhavan
Publisher : Proceedings of the First International Conference on Security of Internet of Things
Year : 2012
An intelligent question answering conversational agent using Naïve Bayesian classifier
Authors : Dr. Gireeshkumar T., Niranjan, M.a; Saipreethy, M.S.a; Kumar, T.G.b
Publisher : ICTEE
Year : 2012
An intelligent question answering conversational agent using Na #x00EF;ve Bayesian classifier
Authors : Dr. Gireesh Kumar T., M. Niranjan; M. S. Saipreethy;
Publisher : ICTEE
Year : 2012
Feature based steganalysis using wavelet decomposition and magnitude statistics
Authors : Dr. Gireeshkumar T., Jithin, R.; Shankar, D.D.
Publisher : ACE 2010 – 2010 International Conference on Advances in Computer Engineering
Year : 2010
An Efficient Embedding and Restoration Steganographic Scheme for Secure Multimedia Communication
Authors : Dr. Gireeshkumar T., Sasidharan, Sapna; N., Karthikha; A.P., Sherly; Y., Avani
Publisher : Proceedings of the 2010 International Conference on Advances in Computer Engineering
Year : 2010
Image Steganographic Scheme Based On Modied Triway PVD in Orthogonal Domain
Authors : Dr. Gireesh Kumar T., Anna Alexander, Jina Varghese, Sneha Johnson
Publisher : Indo-US Conference and Workshop on Cyber Security, Cyber Crime and Cyber Forensics, Aug 19-21, 2009.
Year : 2009