Back close
Publications
A Filtering Based Android Malware Detection System for Google Play Store

Authors : Andoor, J. T

Publisher :Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014 (pp. 559-566). Springer International Publishing.

Publications
Phish Indicator: An Indication for Phishing Sites

Authors : Aparna, S,, Muniasamy, K

Publisher :Artificial Intelligence and Evolutionary Algorithms in Engineering Systems (pp. 481-487). Springer India.

Publications
A Three Factor Authentication System for Smartcard Using Biometric, Visual Cryptography and OTP

Authors : Kumar, A. S, Girish, K. P

Publisher :Artificial Intelligence and Evolutionary Algorithms in Engineering Systems (pp. 673-679). Springer India.

Publications
A Fully Simulatable Oblivious Transfer Scheme Using Vector Decomposition

Authors : Kumar M, Praveen

Publisher :In Intelligent Computing, Communication and Devices (pp. 131-137). Springer India.

Publications
Real-Time Intrusion Prediction Using Hidden Markov Model with Genetic Algorithm

Authors : Divya, T.,, Muniasamy, K

Publisher :Artificial Intelligence and Evolutionary Algorithms in Engineering Systems (pp. 731-736). Springer India.

Publications
Active Steganalysis on SVDBased Embedding Algorithm

Authors : Amritha P. P., , Ravi R. P. , Sethumadhavan M

Publisher :Proceedings of the 5th International Conference on Frontiers in Intelligent Computing

Publications
Gigabit Network Intrusion Detection System Using Extended Bloom Filter in Re-configurable Hardware

Authors : Akshay Eldho Jose, T. Gireeshkumar

Publisher :Proceedings of the Second International Conference on Computer and Communication Technologies

Publications
WO3 passivation layer-coated nanostructured TiO2: An efficient defect engineered photoelectrode for dye sensitized solar cell

Authors : Shantikumar V Nair, Arya Babu, Arya Vasanth, Mariyappan Shanmugam

Publisher :Journal of Semiconductors,

Publications
A distortion free relational database watermarking using patch work method

Authors : Arun, R., Praveen, K., Chandra Bose, D., Nath, H.V.

Publisher :Advances in Intelligent and Soft Computing

Publications
Unconditional Steganalysis of JPEG and BMP Images and Its Performance Analysis Using Support Vector Machine

Authors : P. P. Amritha, Madathil, A., Dr. Gireesh K. T.

Publisher :Communications in Computer and Information Science

Publications
A Novel Approach for Compressed Video Steganography

Authors : Sherly, A. P., Sasidharan, Sapna, Raj, Ashji S., P. P. Amritha

Publisher :Recent Trends in Network Security and Applications: Third International Conference, CNSA 2010, Chennai, India, July 23-25, 2010. Proceedings

Publications
Low Budget Honeynet Creation and Implementation for Nids and Nips

Authors : Aathira.K.S, Hiran.V.Nath, Thulasi.N. Kutty, Dr. Gireesh K. T.

Publisher :(IJCNS) International Journal of Computer and Network Security

Admissions Apply Now