Back close
Publications
Comparative Analysis of Digital Watermarking in Discrete Wavelet Transform and Mojette Transform

Authors : Rajeev, Chandini, , Girish, K. P

Publisher : Artificial Intelligence and Evolutionary Algorithms in Engineering Systems (pp. 667-672). Springer India.

Publications
Log Analysis Based Intrusion Prediction System

Authors : Menon, R. P

Publisher : Emerging ICT for Bridging the Future Proceedings of the 49th Annual Convention of the Computer Society of India (CSI)

Publications
A Filtering Based Android Malware Detection System for Google Play Store

Authors : Andoor, J. T

Publisher : Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014 (pp. 559-566). Springer International Publishing.

Publications
Phish Indicator: An Indication for Phishing Sites

Authors : Aparna, S,, Muniasamy, K

Publisher : Artificial Intelligence and Evolutionary Algorithms in Engineering Systems (pp. 481-487). Springer India.

Publications
A Three Factor Authentication System for Smartcard Using Biometric, Visual Cryptography and OTP

Authors : Kumar, A. S, Girish, K. P

Publisher : Artificial Intelligence and Evolutionary Algorithms in Engineering Systems (pp. 673-679). Springer India.

Publications
A Fully Simulatable Oblivious Transfer Scheme Using Vector Decomposition

Authors : Kumar M, Praveen

Publisher : In Intelligent Computing, Communication and Devices (pp. 131-137). Springer India.

Publications
Real-Time Intrusion Prediction Using Hidden Markov Model with Genetic Algorithm

Authors : Divya, T.,, Muniasamy, K

Publisher : Artificial Intelligence and Evolutionary Algorithms in Engineering Systems (pp. 731-736). Springer India.

Publications
Active Steganalysis on SVDBased Embedding Algorithm

Authors : Amritha P. P., , Ravi R. P. , Sethumadhavan M

Publisher : Proceedings of the 5th International Conference on Frontiers in Intelligent Computing

Publications
Gigabit Network Intrusion Detection System Using Extended Bloom Filter in Re-configurable Hardware

Authors : Akshay Eldho Jose, T. Gireeshkumar

Publisher : Proceedings of the Second International Conference on Computer and Communication Technologies

Publications
Towards Ensuring Trustworthiness in Cyber-Physical Systems: A Game-Theoretic Approach

Authors : Jithish J.; , Sriram Sankaran, Krishnashree Achuthan

Publisher : International Conference on COMmunication Systems NETworkS (COMSNETS)

Publications
Towards a Lightweight Blockchain Platform for Critical Infrastructure Protection

Authors : S. Jerin, , Sriram Sankaran , Saraswat, V

Publisher : IEEE 40th International Conference on Distributed Computing Systems (ICDCS)

Publications
A Framework for Evaluation of Software Obfuscation Tools for Embedded Devices

Authors : Anjali J. Suresh; , Sriram Sankaran

Publisher : Applications and Techniques in Information Security, Springer Singapore, Singapore (2020)

Admissions Apply Now