Back close
Publications
Correlation of Alerts Using Prerequisites and Consequences for Intrusion Detection

Authors : Mallissery, Sanoop, K. Praveen, Sathar, Shahana

Publisher :CIIT 2011

Publications
Cognitive environment for pervasive learners

Authors : Sharma, S., Sreevathsan, R., Srikanth, M.V.V.N.S., Harshith, C., Dr. Gireesh K. T.

Publisher :Communications in Computer and Information Science

Publications
Analysis of Algebraic Attack on TRIVIUM and Minute Modification to TRIVIUM

Authors : Raj, Ashji S., Dr. Srinivasan C.

Publisher :Advances in Network Security and Applications: 4th International Conference, CNSA 2011, Chennai, India, July 15-17, 2011

Publications
Vulnerability assessment methods – A review

Authors : Nath, H.V

Publisher :Communications in Computer and Information Science

Publications
An Efficient Embedding and Restoration Steganographic Scheme for Secure Multimedia Communication

Authors : Dr. Gireesh K. T., Sasidharan, Sapna, N., Karthikha, A.P., Sherly, Y., Avani

Publisher :Proceedings of the 2010 International Conference on Advances in Computer Engineering

Publications
A framework for dynamic malware analysis based on behavior artifacts

Authors : Gregory Paul, T.G., Dr. Gireesh K. T.

Publisher :Advances in Intelligent Systems and Computing

Publications
Using Signature for Hidden Communication Prevention in IP Telephony

Authors : Rahman, Ajvad, P. P. Amritha

Publisher :Artificial Intelligence and Evolutionary Algorithms in Engineering Systems: Proceedings of ICAEES 2014, Volume 2

Publications
A Novel Method for Secure Image Steganography

Authors : Anjana, S., P. P. Amritha

Publisher :Artificial Intelligence and Evolutionary Algorithms in Engineering Systems: Proceedings of ICAEES 2014, Volume 1

Publications
A Survey of Location Prediction Using Trajectory Mining

Authors : B.A. Sabarish, R. Karthi, Dr. Gireesh K. T.

Publisher :Artificial Intelligence and Evolutionary Algorithms in Engineering Systems: Proceedings of ICAEES 2014,

Publications
A Survey on Digital Image Steganographic Methods

Authors : Amritha, P. P, Gireesh, T. K

Publisher :IGI Global

Publications
Role-Based Access Control for Encrypted Data Using Vector Decomposition

Authors : Nidhin, D., I. Praveen, K. Praveen

Publisher :Proceedings of the International Conference on Soft Computing Systems: ICSCS 2015,

Publications
Payload Estimation in Universal Steganalysis

Authors : P. P. Amritha, Madathil, Anoj

Publisher :Defence Science Journal

Admissions Apply Now