Back close
Publications
Effortless exchange of personal health records using near field communication

Authors : Sujadevi VG, Kumar Twintu H, Arunjith AS, Hrudya P

Publisher : IEEE

Publications
MobAware’-Harnessing Context Awareness Sensors and Cloud for Spontaneous Personal Safety Emergency Help Requests

Authors : Sujadevi VG, Ashok Aravind, Krishnamoorthy Shivsubramani, Shankar Prem, Bharataraju Mani, Keerti Sai, Khyati D

Publisher : Springer Cham

Publications
Total Variation Denoising Based Approach for R-peak Detection in ECG Signals Procedia Computer Science

Authors : S. Sachin Kumar, Neethu Mohan P, K.P. Soman

Publisher : Procedia Computer Science, Elsevier.

Publications
Password reuse behavior: How massive online data breaches impacts personal data in web

Authors : Nithun M, Pal Soumajit, Ashok Aravind, Ajayan Aravind

Publisher : Springer Singapore

Publications
MalJs: Lexical Structural and Behavioral Analysis of Malicious JavaScripts Using Ensemble Classifier

Authors : Surendran K, Aravind Ashok, Srinath N, Kumar Ysudhir, Hrudya P

Publisher : Springer Singapore

Publications
Malsign: Threat analysis of signed and implicitly trusted malicious code

Authors : Pal Soumajit, Krishnan Manu R, Sankar AU Prem, Sasikala Parvathy

Publisher : IEEE

Publications
Evaluating shallow and deep networks for secure shell (ssh) traffic analysis

Authors : Vinayakumar R, Soman KP

Publisher : IEEE

Publications
Modified variational mode decomposition for power line interference removal in ECG signals

Authors : Mohan Neethu, Kumar Sachin, Soman KP, ; Poornachandran, P

Publisher : IJECE

Publications
Breach detection and mitigation of UAVs using deep neural network

Authors : Shijith N, Sujadevi VG, Dharmana Meher Madhu, P. Poornachandran

Publisher : 2017 Recent Developments in Control, Automation Power Engineering (RDCAPE),

Publications
Spoofing technique to counterfeit the GPS receiver on a drone

Authors : Shijith N, Sujadevi VG, Dharmana Meher Madhu, P. Poornachandran

Publisher : 2017 International Conference on Technological Advancements in Power and Energy ( TAP Energy)

Publications
Secure shell (ssh) traffic analysis with flow based features using shallow and deep networks

Authors : Vinayakumar R, Soman KP, Prof. Prabaharan Poornachandran

Publisher : 2017 International Conference on Advances in Computing Communications and Informatics (ICACCI) .

Admissions Apply Now