Back close
Publications
CoxMo (1− x) S2 intermixed reduced graphene oxide as efficient counter electrode materials for high-performance dye-sensitized solar cells.

Citation : Senthilkumar, R., Ramakrishnan, S., Balu, M., Batabyal, S. K., Yoo, D. J., Kumaresan, D., &Kothurkar ...

Publications
Dip to Drink: Solar Photocatalytic Reduction of Cr (VI) Using Fibrous Red Phosphorus Immobilized Quartz Sand as “Dip-Catalyst”

Citation : Smera, R., Roshith, M., Ramasubramanian, S., & Kumar, D. V. R. (2022). Dip to Drink: Solar Photocata ...

Publications
Blackhole Attack Detection in Wireless Sensor Network Using Backpropagation Algorithm

Citation : A. A N, S. C B and R. N. T, "Blackhole Attack Detection in Wireless Sensor Network Using Backpropaga ...

Publisher :IEEE

Publications
Cardiac Tamponade after Video-Assisted Thoracoscopy Surgical Diaphragmatic Plication

Citation : Nagarjuna Panidapu MD, DM, Devika Poduval MD, DM, Bhakti Patil MD, Rohik Micka Radhakrishnan MS, MCH ...

Publisher :Annals of Thoracic Surgery Short Reports

Publications
Aiding Time-Dependent Laser Ablation to Direct 1T-MoS2 for an Improved Hydrogen Evolution Reaction

Citation : Mathankumar, M., Karthick, K., Nanda Kumar, A. K., Kundu, S., &Balasubramanian, S. (2021). Aiding Ti ...

Publisher :ACS Sustainable Chemistry & Engineering

Publications
Protecting SDN from DDoS Attacks Using AI Techniques

Citation : A. B, S. Babu and L. V. Namboothiri, "Protecting SDN from DDoS Attacks Using AI Techniques," 2023 14 ...

Publisher :IEEE

Publications
Enhanced Image Steganography with PVD and Edge Detection

Citation : Vishnu, B. & Sajeesh, Sandeep & Namboothiri, Leena. (2020). Enhanced Image Steganography with PVD an ...

Publisher :IEEE

Publications
Reinforce NIDS Using GAN to Detect U2R and R2L Attacks

Citation : Sreerag, V., Aswin, S., Menon, A.A., Namboothiri, L.V. (2022). Reinforce NIDS Using GAN to Detect U2 ...

Publisher :Springer Link

Publications
Implementing the Comparative Analysis of AES and DES Crypt Algorithm in Cloud Computing

Citation : Reshma, R.S., Anjusha, P.P., Anisha, G.S. (2022). Implementing the Comparative Analysis of AES and D ...

Publications
Enabling Identity-Based Data Security with Cloud

Citation : Sundaresan, A., Vinod, M., Nair, S.M., Rajalakshmi, V.R. (2022). Enabling Identity-Based Data Securi ...

Publisher :Springer Link

Publications
Prediction and Analysis of Air Pollution Using Machine Learning

Citation : Murali, M., Satish, M. & Rajalakshmi, V.R. Prediction and Analysis of Air Pollution Using Machine Le ...

Publisher :Springer Link

Publications
The Enforcement of Context Aware System Security Protocols with the Aid of Multi Factor Authentication

Citation : S. E. Jose, P. V. Nayana and N. S. Nair, "The Enforcement of Context Aware System Security Protocols ...

Publisher :IEEE

Admissions Apply Now