Back close
Publications
Network Data Analysis Using Spark

Authors : Swetha, K. V., Shiju Sathyadevan, Bilna, P.

Publisher :Software Engineering in Intelligent Systems: Proceedings of the 4th Computer Science On-line Conference 2015 (CSOC2015), Vol 3: Software Engineering in Intelligent Systems

Publications
Visualization with Charting Library Based on SVG for Amrita Dynamic Dashboard

Authors : R. Meenakshi, G. Jayalekshmi, S. Hariram, Shiju Sathyadevan, Thushara M. G.

Publisher :Procedia Computer Science

Publications
Energy Modeling for Mobile Devices Using Performance Counters

Authors : Sriram Sankaran, Sridhar. R

Publisher :56th International Midwest Symposium on Circuits and Systems

Publications
Securing networked control systems: Modeling attacks and defenses

Authors : J. Jithish, Sriram Sankaran

Publisher :2017 IEEE International Conference on Consumer Electronics-Asia

Publications
Secure IoT: An improbable reality

Authors : Mannilthodi, N., M. K. Jinesh

Publisher :IoTBDS 2017 - Proceedings of the 2nd International Conference on Internet of Things, Big Data and Security, SciTePress,

Publications
A Rule-Based System for Smart Home Energy Prediction

Authors : Jithish, J., Sriram Sankaran

Publisher :Development Aspects of Intelligent Systems (DIAS) co-located with Innovations in Software Engineering 2017

Publications
IRIGNET – Intelligent communication network for power-scarce rural India

Authors : Shiju Sathyadevan, Kallingalthodi, H., N. N. Hari

Publisher :ACWR 2011 - Proceedings of the International Conference on Wireless Technologies for Humanitarian Relief

Publications
Modeling mobile stateful channels in PiZ

Authors : Jayaraj Poroor, Bharat Jayaraman

Publisher :Elsevier

Publications
IDKEYMAN: An Identity-Based Key Management Scheme for Wireless Ad Hoc Body Area Networks

Authors : Sriram Sankaran, Mohammad Iftekhar Husain, Ramalingam Sridhar

Publisher :Proceedings of Annual Symposium on Information Assurance (ASIA)

Publications
Temporal constrained objects: Application and implementation

Authors : M. K. Jinesh, Jayaraman, B., Tambay, P., K. Achuthan

Publisher :Elsevier

Publications
System call authorization in linux by a secure daemon

Authors : Radhakrishnan, V., Narayanan, H., Shiju Sathyadevan

Publisher :ARPN Journal of Engineering and Applied Sciences

Publications
C2L:A Formal Policy Language for Secure Cloud Configurations

Authors : Jayaraj Poroor, Bharat Jayaraman

Publisher :Elsevier

Admissions Apply Now