Back close
Publications
Enhanced Facilitation of Biotechnology Education in Developing Nations via Virtual Labs: Analysis, Implementation and Case-studies

Authors : Diwakar S, Achuthan K, Prema Nedungadi, Bipin G. Nair

Publisher : International Journal of Computer Theory and Engineering

Publications
A Novel Method for Secure Image Steganography

Authors : Anjana, S., P. P. Amritha

Publisher : Artificial Intelligence and Evolutionary Algorithms in Engineering Systems: Proceedings of ICAEES 2014, Volume 1

Publications
A framework for dynamic malware analysis based on behavior artifacts

Authors : Gregory Paul, T.G., Dr. Gireesh K. T.

Publisher : Advances in Intelligent Systems and Computing

Publications
Modeling Diffusion of Blended Labs for Science Experiments among Undergraduate Engineering Student

Authors : Raghu Raman, Dr. Krishnashree Achuthan, Prof. Prema Nedungadi, M Ramesh

Publisher : AFRICOMM 2013, Springer Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (LNICST) .

Publications
Integrating Collaboration and Accessibility for Deploying Virtual Labs using VLCAP

Authors : Raghu Raman, Prema Nedungadi, Dr. Krishnashree Achuthan, Dr. Shyam Diwakar

Publisher : International Transaction Journal of Engineering, Management, & Applied Sciences & Technologies.

Publications
A Survey of Location Prediction Using Trajectory Mining

Authors : B.A. Sabarish, R. Karthi, Dr. Gireesh K. T.

Publisher : Artificial Intelligence and Evolutionary Algorithms in Engineering Systems: Proceedings of ICAEES 2014,

Publications
Kloud – A virtual elastic knowledge cloud: A centralized directory based approach for education content aggregation

Authors : Shiju Sathyadevan

Publisher : Proceedings - 2012 IEEE International Conference on Technology Enhanced Education, ICTEE 2012

Publications
Dynamic Constrained Objects for Vehicular Network Modeling

Authors : M. K. Jinesh, Jayaraman, Bharat, Dr. Krishnashree Achuthan

Publisher : Formal Methods for Safety and Security: Case Studies for Aerospace Applications

Publications
Learning Cyber Security Through Gamification

Authors : Boopathi, K, Sreejith, S, Bithin, A

Publisher : Indian Journal of Science and Technology

Publications
Role-Based Access Control for Encrypted Data Using Vector Decomposition

Authors : Nidhin, D., I. Praveen, K. Praveen

Publisher : Proceedings of the International Conference on Soft Computing Systems: ICSCS 2015,

Publications
Payload Estimation in Universal Steganalysis

Authors : P. P. Amritha, Madathil, Anoj

Publisher : Defence Science Journal

Publications
Equitable machine learning algorithms to probe over P2P botnets

Authors : Bharathula P, Mridula Menon N

Publisher : Advances in Intelligent Systems and Computing, Springer Verlag.

Admissions Apply Now