Back close
Publications
Detecting the network attack vectors on SCADA systems

Authors : R. S. Ramachandruni , Poornachandran, P

Publisher :International Conference on Advances in Computing, Communications and Informatics, ICACCI

Publications
Effectiveness of Email Address Obfuscation on Internet Innovations in Computer Science and Engineering

Authors : Raj Deepak, Pal Soumajit, Ashok Aravind

Publisher :Springer Singapore

Publications
Security maturity in NoSQL databases – Are they secure enough to haul the modern IT applications?

Authors : Srinivas, S.a, Nair, A.b

Publisher :2015 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2015

Publications
Foreword

Authors : Dr. Krishnashree Achuthan

Publisher :ACM International Conference Proceeding Series

Publications
Re-architecture of Database Software Stack with Planner Module for Query Optimization in a cloud Environment

Authors : Kandasamy, K., Dr. Krishnashree Achuthan

Publisher :ACM International Conference Proceeding Series

Publications
Adsvm: Pre-processor plug-in using support vector machine algorithm for snort

Authors : George, A.a, Poornachandran, P.b, Dr. M. R. Kaimal

Publisher :ACM International Conference Proceeding Series

Publications
Implementation of Scatternet in an Intelligent IoT Gateway

Authors : Mohan, Lakshmi, Mohan, Lakshmi, M. K. Jinesh, M. K. Jinesh, Bipin, K., Bipin, K., Harikrishnan, P., Harikrishnan, P., Shiju Sathyadevan, Shiju Sathyadevan

Publisher :Emerging ICT for Bridging the Future - Proceedings of the 49th Annual Convention of the Computer Society of India CSI Volume 2, Springer International Publishing

Publications
Implementing Scatternet to Enhance Bluetooth Communication Capability

Authors : Shiju Sathyadevan, Lakshmi, Bipin, M. K. Jinesh

Publisher :CSI Hyderabad

Publications
Design for Prevention of Intranet Information Leakage via Emails

Authors : Manmadhan, Neenu, N. N. Hari, Jayaraj Poroor, Achuthan, Krishnashree

Publisher :Security in Computing and Communications: Second International Symposium, SSCC 2014, Proceedings of Communications in Computer and Information Science

Publications
Using Attribute-Based Access Control for Remote Healthcare Monitoring

Authors : Ray, I., Alangot, B., Nair, S., Dr. Krishnashree Achuthan

Publisher :2017 4th International Conference on Software Defined Systems,

Publications
IDKEYMAN: An Identity-Based Key Management Scheme for Wireless Ad Hoc Body Area Networks

Authors : Sriram Sankaran, Mohammad Iftekhar Husain, Ramalingam Sridhar

Publisher :Proceedings of Annual Symposium on Information Assurance (ASIA)

Publications
A Survey of Security Protocols in WSN and Overhead Evaluation

Authors : Shiju Sathyadevan, Prabhakaranl, Subi, Bipin, K.

Publisher :Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014: Volume 2

Admissions Apply Now