Year : 2025
Understanding Cybercrime: A Study of Malware Analysis, Phishing Attacks, and Sentiment Trends
Cite this Research Publication : U. Kumaran, Sreeraag G, Advik Narendran, V. P. Meena, Sushil Kumar Gupta, Abhishek Appaji, Understanding Cybercrime: A Study of Malware Analysis, Phishing Attacks, and Sentiment Trends, 2025 International Conference on Intelligent and Innovative Technologies in Computing, Electrical and Electronics (IITCEE), IEEE, 2025, https://doi.org/10.1109/iitcee64140.2025.10915529
Publisher : IEEE
Year : 2023
Stiffness Analysis for the Prediction of Fake News through Online Digital Networks in India
Cite this Research Publication : G Sreeraag, P G Shynu, Stiffness Analysis for the Prediction of Fake News through Online Digital Networks in India, 2023 International Conference on Advances in Intelligent Computing and Applications (AICAPS), IEEE, 2023, https://doi.org/10.1109/aicaps57044.2023.10074518
Publisher : IEEE
Year : 2022
The SEPNS Model of Rumor Propagation in Social Networks
Cite this Research Publication : Greeshma N. Gopal, G. Sreerag, Binsu C. Kovoor, The SEPNS Model of Rumor Propagation in Social Networks, Lecture Notes in Networks and Systems, Springer Nature Singapore, 2022, https://doi.org/10.1007/978-981-16-5640-8_52
Publisher : Springer Nature Singapore
Year : 2022
A Comparative Analysis of Tweets from the South Indian States based on COVID-19 Omicron wave
Cite this Research Publication : G Sreeraag, P G Shynu, A Comparative Analysis of Tweets from the South Indian States based on COVID-19 Omicron wave, 2022 International Conference on Computing, Communication, Security and Intelligent Systems (IC3SIS), IEEE, 2022, https://doi.org/10.1109/ic3sis54991.2022.9885333
Publisher : IEEE
Year : 2016
A novel scheme for authenticated secured de-duplication with identity based encryption in cloud
Cite this Research Publication : Reshma N.S, Greeshma N. Gopal, Sreeraag G, A novel scheme for authenticated secured de-duplication with identity based encryption in cloud, 2016 International Conference on Information Science (ICIS), IEEE, 2016, https://doi.org/10.1109/infosci.2016.7845332
Publisher : IEEE