Back close
Publications
Equitable machine learning algorithms to probe over P2P botnets

Authors : Bharathula P, Mridula Menon N

Publisher :Advances in Intelligent Systems and Computing, Springer Verlag.

Publications
A Novel Method for MP3 Steganalysis

Authors : Kuriakose, Rinu, P. Premalatha

Publisher :Intelligent Computing, Communication and Devices: Proceedings of ICCD 2014, Volume 1

Publications
Decrypting Shared Encrypted Data Files Stored in a Cloud Using Dynamic Key Aggregation

Authors : James, Maria, Srinivasan, Chungath, Lakshmy K.V., Sethumadhavan, M.

Publisher :Computational Intelligence, Cyber Security and Computational Models: Proceedings of ICC3 2015

Publications
High Speed Network Intrusion Detection System Using FPGA

Authors : Anuraj, S., P. Premalatha, Dr. Gireesh K. T.

Publisher :Proceedings of the Second International Conference on Computer and Communication Technologies: IC3T 2015

Publications
Multiset topologies induced by multiset relations

Authors : Girish, K.P.a, John, S.J.b

Publisher :Information Sciences

Publications
Steganalysis of LSB Using Energy Function

Authors : P. P. Amritha, Sreedivya Muraleedharan, M., K. Rajeev, Dr. M. Sethumadhavan

Publisher :Intelligent Systems Technologies and Applications.

Publications
Active Warden Attack on Steganography Using Prewitt Filter

Authors : P. P. Amritha, Induja, K., K. Rajeev

Publisher :Proceedings of the International Conference on Soft Computing Systems: ICSCS 2015, Volume 2, Springer India, Number 398, New Delhi, p.591–599

Publications
Ideal Contrast Visual Cryptography for General Access Structures with AND Operation.

Authors : K. Praveen, Dr. M. Sethumadhavan

Publisher :In Proceedings of 3rd International Conference on Advanced Computing, Networking and Informatics: ICACNI 2015, Springer India.

Publications
Android smudge attack prevention techniques

Authors : Amruth, M.D., K. Praveen

Publisher :Advances in Intelligent Systems and Computing, Springer Verlag,

Publications
Protecting the Augmented Browser Extension from Mutation Cross-Site Scripting

Authors : Remya, S., K. Praveen

Publisher :Proceedings of the Second International Conference on Computer and Communication Technologies: IC3T 2015.

Publications
An encryption technique to thwart android binder exploits

Authors : Kaladharan, Y.a, Mateti, P.b, K. P. Jevitha

Publisher :Advances in Intelligent Systems and Computing, Springer Verlag.

Publications
Error Linear Complexity Measures of Binary Multisequences

Authors : Dr. Sindhu M., Dr. M. Sethumadhavan

Admissions Apply Now