Performance Analysis of Compressing Sensing Framework on Interactive Media Content
Authors : Dr. Uma Maheswari S, Vasanthanayaki C
Secure and Enhanced Information Encoding In Matrix Barcode
Authors : Dr. Uma Maheswari S, Vasanthanayaki C
Secure medical health care content protection system with watermark detection for multi cloud computing environment
Authors : Dr. Uma Maheswari S, Dr.C.Vasanthanayaki
Publisher : Springer
Cybersecurity Challenges In Fintech: Assessing Threats And Mitigation Strategies For Financial Institutions
Authors : Dr. Uma Maheswari S, Dr. Gargi Chaudhary, Francis Manna, Mr. Vivek Pandurang Khalane, Dr. E. Muthukumar
PCOScare: Conventional Machine Learning Classifiers for Diagnosing and Prevention
Authors : Dr. Uma Maheswari S, Vaibhav C. Gandhi, Dr. Khyati R. Nirmal, Sudha Rajesh, P. Tharcis, Dhruvi Thakkar
Sustainable groundwater development using semi-supervised learning and community-led total forestry and pasture approach
Authors : Dr. Uma Maheswari S, Anna Alphy, Ganeshkumar Deivasikamani, U. Prakash, Finney Daniel Shadrach, M. Ashok Kumar, S. Manoj
Publisher : Elsevier
Cluster Heat Selection Optimization in WSN Via Genetic Based Evolutionary Algorithm and Secure Data Transmission Using Paillier Homomorphic Cryptosystem
Authors : Dr. Uma Maheswari S, M Yuvaraja, R Priya, J Dhanasekar
Advanced hybrid optimization algorithms for energy efficient cloud resource allocation
Authors : Dr. M.Rohini, Kumar MS, Hussain DM, Manoj SO
Publisher : IEEE
Decoding Parkinson’s Disease: A Deep Learning Approach to Handwriting Diagnosis
Authors : Dr. M.Rohini, K Srinivasan, SO Manoj, RR Abirami
Multiclassifier learning for the early prediction of dementia disease progression from MCI
Authors : Dr. M.Rohini, D Surendran
FWS-DL: forecasting wind speed based on deep learning algorithms
Authors : Dr. M.Rohini, Oswalt Manoj, JP Ananth, B Dhanka, N Pooranam, SR Arumugam
Prognosis of Alzheimer’s Disease Progression from Mild Cognitive Impairment Using Apolipoprotein-E Genotype
Authors : Dr. M.Rohini, D Surendran
Publisher : Springer
BLE Bluetooth Beacon based Solution to Monitor Egress of Alzheimer’s Disease Sufferers from Indoors
Authors : Dr. M.Rohini, Surendran.D
Publisher : Elsevier
Toward Alzheimer’s disease classification through machine learning
Authors : Dr. M.Rohini, Surendran.D
Publisher : Springer
Classification of Neurodegenerative Disease Stages using Ensemble Machine Learning Classifiers
Authors : Dr. M.Rohini, D. Surendran
Publisher : Elsevier
Proactive Visual Cryptographic Schemes for General Access Structures., Multimedia Tools and Applications 82 (2023)
Authors : Dr. Praveen K., Sabyasachi Dutta, Avishek Adhikari, and Sethumadhavan Madathil
Publisher : Springer Nature Link
A novel approach for long term secure storage of Domain independent videos
Authors : Dr. Praveen K., Jina Varghese, Sabyasachi Dutta, and Avishek Adhikari
Publisher : Elsevier
Intelligent Alzheimer’s Diseases Gene Association Prediction Model Using Deep Regulatory Genomic Neural Networks
Authors : Dr. M.Rohini, Oswalt Manoj S, Surendran D
A hybrid streaming analytic model for detection and classification of malware using Artificial Intelligence techniques
Authors : Dr. S. Durga, Daniel E.,Susila N., Seetha S., Sujatha T
Big data analytics in healthcare: A survey
Authors : Dr. S. Durga, Gemson Andrew J
Resource management in clouds: Outlook and reflections
Authors : Dr. S. Durga, Alexander A.A
Context-aware adaptive resource provisioning for mobile clients in intra-cloud environment
Authors : Dr. S. Durga, Mohan S., Dinesh Peter J
Publisher : Springer
Towards Benefiting Both Cloud Users and Service Providers Through Resource Provisioning
Authors : Dr. S. Durga, Mohan S., Dinesh Peter J
A state-of-art review on antenna designs for ingestible application
Authors : Dr. S. Durga, T. Mary Neebha , A. Diana Andrushia, S. Durga
An Optimal Machine Learning Classifier for Cloud Based Web URL Phishing Detection
Authors : Dr. S. Durga, Daniel E., Durga S., Sushila S
Proximity-based cloud resource provisioning for deep learning applications in smart healthcare
Authors : Dr. S. Durga, Mohan S., Dinesh Peter J
A novel request state aware resource provisioning and intelligent resource capacity prediction in hybrid mobile cloud
Authors : Dr. S. Durga, Daniel E., Leelipushpam P
Publisher : Springer
Resource Provisioning Techniques in Multi-Access Edge Computing Environments: Outlook, Expression, and Beyond
Authors : Dr. S. Durga, Daniel E., Onesimu J. A., Sei Y
PDSCM: Packet Delivery Assured Secure Channel Selection for Multicast Routing in Wireless Mesh Networks
Authors : Dr. S. Durga, Daniel E., Eunice R J
SmartCardio: Advancing cardiac risk prediction through Internet of Things and edge cloud intelligence
Authors : Dr. S. Durga, Daniel E, Andrew J, Bhat R
Security Analysis of OAuth 2.0 Implementation
Authors : Dr. Jevitha K. P., Swarag Sharma
Publisher : IEEE
Runtime verification on abstract finite state models
Authors : Dr. Jevitha K. P., K.P. Jevitha, Bharat Jayaraman, M. Sethumadhavan
Position Identification Using Dihedral Symmetric Boolean Functions
Authors : Rajeev K, M Sethumadhavan and Amritha P P
ALGAES: An Authenticated Lattice-based Generic Asymmetric Encryption Scheme
Authors : Dr. Aravind Vishnu S. S., M. Sethumadhavan, and K. V. Lakshmy.
An efficient composable 1-out-of-2 oblivious transfer scheme using vector decomposition
Authors : Dr. Aravind Vishnu S. S., I Praveen and M Sethumadhavan.
An IND-CCA2 secure certificateless hybrid signcryption
Authors : Dr. Aravind Vishnu S. S., I Praveen, and M Sethumadhavan
Publisher : Springer Nature Link
An Internet of Things-based Efficient Solution for Smart Farming
Authors : Dr. Senthilkumar M., Sreejith K, R Akshaya
Publisher : Elsevier
Inter and intra-observer variabilities in the measurement of aqueous flare with a custom-made ocular spot fluorometer
Authors : Sirisha Tadepalli, Dr. Surekha P., Hadiya Farhath Pattan, Bongoni Vishwanath, Prema Padmanabhan, Rachapalle Reddi Sudhir, Abhilash Ravi Kumar, Jyotirmay Biswas, Sangly P Srinivas
Publisher : Investigative Ophthalmology & Visual Science
On the statistical analysis of ZUC, ESPRESSO and Grain V1
Authors : Saurabh Shrivastava, Dr. Lakshmy K. V.
Publisher : International Journal of Computing
Survey on various steganographic algorithms
Authors : Nimmy K., Deepa, R., Thiruppathi, K., & Reshma R
Publisher : Proceedings of International Conference on Information and network technology
Rough multisets and information multi-systems
Authors : Girish, K. P., & Jacob John, S
Publisher : Advances in Decision Sciences
An intelligent question answering conversational agent using Nave Bayesian classifier
Authors : Dr. Gireesh Kumar T., Niranjan, M., Saipreethy, M. S.
Publisher : Technology Enhanced Education (ICTEE),
A more ecient and faster pairing computation with cryptographic security
Authors : Dr. M. Sethumadhavan, Praveen, I
Publisher : Proceedings of the first international conference on security of internet of things
Optimally Locating for Hiding Information in Audio Signal
Authors : Premalatha P., Amritha, P. P
Publisher : International Journal of Computer Applications (0975- 8887), Vol. 65, No.14,(pp. 37-42).
Linear Complexity Measures of Binary Multi-sequences
Authors : Dr. M. Sethumadhavan, Sindhu, M
Publisher : International Journal of Computer Applications, 62(16), (pp. 6-10).
An Application of Vector Decom- position Problem in Public Key Cryptography Using Homomorphic Encryption
Authors : Dr. M. Sethumadhavan, Praveen, I
Publisher : proceedings of International Conference on Emerging Research in Computing, Information, Communication and Applications – ERICA 2013 (pp. 328-331).
A Framework for Analyzing the Security of Chrome Extensions
Authors : Dr. M. Sethumadhavan, Aravind, V
Publisher : Advanced Computing, Networking and Informatics- Volume 2 (pp. 267-272). Springer International Publishing.
Counting rotation symmetric functions using Polyas theorem
Authors : Dr. M. Sethumadhavan, Lakshmy, K. V, Cusick, T. W
Publisher : Discrete Applied Mathematics,
On the Extensions of (k; n)-Visual Cryptographic Schemes
Authors : Dr. M. Sethumadhavan, Praveen, K., Rajeev, K
On the k-error Joint Linear Complex- ity and Error Multisequence over Fq (charFq = p; prime)
Authors : Dr. M. Sethumadhavan, Sindhu, M.
Publisher : Recent Trends in Computer Networks and Distributed Systems Security (pp. 512-519). Springer Berlin Heidelberg.
Use of Machine Learning Algorithms with SIEM for Attack Prediction
Authors : Anumol, E. T
Publisher : Intelligent Computing, Communication and Devices (pp. 231-235). Springer India.
A Filtering Based Android Malware Detection System for Google Play Store
Authors : Andoor, J. T
Publisher : Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014 (pp. 559-566). Springer International Publishing.
A Three Factor Authentication System for Smartcard Using Biometric, Visual Cryptography and OTP
Authors : Kumar, A. S., Girish, K. P
Publisher : Artificial Intelligence and Evolutionary Algorithms in Engineering Systems (pp. 673-679). Springer India.
Comparative Analysis of Digital Watermarking in Discrete Wavelet Transform and Mojette Transform
Authors : Rajeev, Chandini, & Girish, K. P
Publisher : Artificial Intelligence and Evolutionary Algorithms in Engineering Systems (pp. 667-672). Springer India.
Phish Indicator: An Indication for Phishing Sites
Authors : Aparna, S, Muniasamy, K
Publisher : Artificial Intelligence and Evolutionary Algorithms in Engineering Systems (pp. 481-487). Springer India.
Real-Time Intrusion Prediction Using Hidden Markov Model with Genetic Algorithm
Authors : Divya, T, Muniasamy, K
Publisher : Artificial Intelligence and Evolutionary Algorithms in Engineering Systems (pp. 731-736). Springer India.
Log Analysis Based Intrusion Prediction System
Authors : Menon, R. P
Publisher : Emerging ICT for Bridging the Future Proceedings of the 49th Annual Convention of the Computer Society of India (CSI)
A Fully Simulatable Oblivious Transfer Scheme Using Vector Decomposition
Authors : Kumar, M; Praveen
Publisher : In Intelligent Computing, Communication and Devices (pp. 131-137). Springer India.
Finite-state model extraction and visualization from Java program execution
Authors : Dr. Swaminathan J., Dr. Bharat Jayaraman, Dr. M. Sethumadhavan, Dr. Jevitha K. P.
Publisher : Wiley
Sequences; Predictability and Linear Complexity Measures
Authors : Dr. M. Sethumadhavan
Publisher : Discrete Mathematics and Its Applications
An algorithm for k-error joint linear complexity of binary multisequences
Authors : Dr. M. Sethumadhavan, Dr. Chungath Srinivasan, Dr. Sindhu M., and Kavitha, C.
Publisher : Journal of Discrete Mathematical Sciences and Cryptography
Image Steganographic Scheme Based On Modified Tri-way PVD in Orthogonal Domain
Authors : Dr. Gireesh Kumar T., Alexander, A., Varghese, J., and Johnson, S.
Publisher : Indo-US Conference and Workshop on Cyber Security, Cyber Crime and Cyber Forensics
Unconditional Steganalysis of JPEG and BMP Images and Its Performance Analysis Using Support Vector Machine
Authors : Dr. Amritha P. P., Dr. Gireeshkumar T., Madathil, A., and
Publisher : Communications in Computer and Information Science
A Survey on Digital Image Steganographic Methods
Authors : Dr. Amritha P. P., Dr. Gireesh Kumar T.
Publisher : Cyber Security, Cyber Crime and Cyber Forensics: Applications and Perspectives
Self Localization of a Mobile Robot in Planetary Terrain
Authors : Dr. Divya Udayan J., Roshy M John, Gireesh Kumar T, KJ Poornaselvan
Publisher : International Journal of Embedded Systems and Computer Engineering
Self Localization and pose estimation of Mobile robot
Authors : Dr. Gireesh Kumar T.
Publisher : International journal of Embedded System and Computer Engineering
Payload Estimation in Universal Steganalysis
Authors : Dr. Amritha P. P., Madathil, A.
Publisher : Defence Science Journal
Mobile Robot Pose Estimation Based on Particle Filters for Multi-dimensional State Spaces
Authors : Dr. Gireeshkumar T., Divya Udayan, J.a; John, R.M.c; Poornaselvan, K.J.d; Lakshmanan, S.A.a
Publisher : Communications in Computer and Information Science
Low Budget Honeynet Creation and Implementation for Nids and Nips
Authors : Dr. Gireesh Kumar T., Aathira.K.S; Hiran.V.Nath; Thulasi.N. Kutty;
Publisher : (IJCNS) International Journal of Computer and Network Security
Fuzzy Support Vector Machine-based Multi-agent Optimal Path Planning Approach to Robotics Environment.
Authors : Dr. M. Sethumadhavan, Dr. Gireeshkumar T., Poornaselvan, K. J
Publisher : Defence Science Journal
A compressed video steganography using TPVD
Authors : Dr. Amritha P. P., A. P. Sherly
Publisher : International Journal of Database Management Systems (IJDMS)
An Advanced Steganographic Scheme with Diamond Encoding and Morphological Neural Network
Authors : Dr. Gireesh Kumar T., S. Sasidharan, .A.P, S., .N.R, K., .Y, A.
Publisher : pp. 3-14
Vulnerability assessment methods – A review
Authors : Nath, H.V
Publisher : Communications in Computer and Information Science
Steganalysis for calibrated and lower embedded uncalibrated images
Authors : Dr. Gireeshkumar T., Shankar, D.D.; Nath, H.V.
Publisher : Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Fabrication and performance of hybrid betel nut (Areca Catechu) short fibre/Sansevieria cylindrica (Agavaceae) polypropylene composite
Authors : Mr. Ashok Kumar Mohan, Reddy, G Ramachandra; Reddy, K Hemachandra; Reddy, Y Venkata Mohana; Reddy, P Ranga; Reddy, N Subbarami
Publisher : Ind. J. Mater. Sci
Error Linear Complexity Measures of Binary Multisequences
Authors : Dr. M. Sethumadhavan, Dr. Sindhu M
Cognitive environment for pervasive learners
Authors : Dr. Gireeshkumar T., Sharma, S.; Sreevathsan, R.; Srikanth, M.V.V.N.S.; Harshith, C.;
Publisher : Communications in Computer and Information Science
Vision based robot navigation for disaster scenarios
Authors : Dr. Gireesh Kumar T., Sudheesh, P;
Publisher : International Journal of Computer Applications
Tracking of nose tip: An alternative for mouse
Authors : Dr. Gireeshkumar T., Poornaselvan, K.J.b; Sattviksharmaa; Gulshankumara; Sreevathsan, R.a
Publisher : Lecture Notes in Computer Science
Multiset topologies induced by multiset relations
Authors : Dr. Johns Shaji Mathew, John, S. J
Publisher : Information Sciences
Measuring diffusion in stream ciphers using statistical testing methods
Authors : Dr. Chungath Srinivasan, Dr. M. Sethumadhavan, Lakshmy K.V.;
Publisher : Defence Science Journal
Foreground Estimation in a Degraded Text document
Authors : Dr. Gireesh Kumar T., Bhuvana I Chandra; Nagarjunavarma, K.
Publisher : International Journal of Computer Applications
A distortion free relational database watermarking using patch work method
Authors : Dr. Praveen K., Arun, R, Bose, D. C., & Nath, H. V
Publisher : Advances in Intelligent and Soft Computing
Survey On Privacy Preserving Data Publishing Of Numerical Sensitive Data
Authors : Ms. Santhya R.
Publisher : International Journal of Emerging Technology Advanced Engineering
Optimally Locating for Hiding Information in Audio Signal
Authors : Dr. Amritha P. P., P. Premalatha
Publisher : International Journal of Computer Applications
Linear Complexity Measures of Binary Multisequences
Authors : Dr. M. Sethumadhavan, Dr. Sindhu M.
Publisher : International Journal of Computer Applications
Comparative Study of Algorithms for Frontier based Area Exploration and Slam for Mobile Robots
Authors : Dr. Gireesh Kumar T., Dayanand, V.; Rahul Sharma
Publisher : International Journal of Computer Applications
Analyzing the Makier Virus
Authors : Dr. Praveen K., Dr. Ritwik M.
Publisher : International Journal of Computer Science
A Novel Cloud Based NIDPS for Smartphones
Authors : Dr. Gireeshkumar T., Pandian, V.A.; Dr. Gireesh K. T.
Publisher : Communications in Computer and Information Science
On the k-error Joint Linear Complexity and Error Multisequence over F
Authors : Dr. M. Sethumadhavan, M. Sindhu
Publisher : Communications in Computer and Information Science
Differential Execution Analysis for Obfuscation Reduction
Authors : Robert, R. Reno
Publisher : Springer Berlin Heidelberg.
Counting rotation symmetric functions using Polya’s theorem
Authors : Dr. Lakshmy K. V., Sethumadhavan, M., and Cusick, T. W.
Publisher : Discrete Applied Mathematics
Counting rotation symmetric functions using Polya’s theorem
Authors : Dr. M. Sethumadhavan, Lakshmy K.V.; Thomas W. Cusick
Publisher : Discrete Applied Mathematics
Biometric Authentication via Facial Recognition
Authors : Dr. M. Sethumadhavan, K. Nimmy
Publisher : (2014)
A Novel Method for MP3 Steganalysis
Authors : Premalatha P., Kuriakose, R
Publisher : Intelligent Computing, Communication and Devices: Proceedings of ICCD 2014, Volume 1
A low overhead prevention of android web view abuse attacks
Authors : Dr. Praveen K., K. Jamsheed
Publisher : Communications in Computer and Information Science
A Hybrid Approach for Querying Numeric data in DAS-Model
Authors : Dr. Praveen K., K. R. Arjun
Publisher : International Journal of Control Theory and Applications
Cube Attack on Stream Ciphers using a Modified Linearity Test
Authors : Dr. Chungath Srinivasan, Dr. M. Sethumadhavan, ; Pillai, U.U.; Lakshmy K.V.;
Publisher : Journal of Discrete Mathematical Sciences and Cryptography, Taru Publications
On the removal of steganographic content from images
Authors : Dr. Amritha P. P., Dr. M. Sethumadhavan, Krishnan, R.
Publisher : Defence Science Journal, Defense Scientific Information and Documentation Centre, Volume 66, Number 6, p.574-581.
Privilege-based scoring system against cross-site scripting using machine learning
Authors : Dr. Gireeshkumar T., Sunder, N.S.;
Publisher : Advances in Intelligent Systems and Computing
Hash-One: a lightweight cryptographic hash function
Authors : Dr. M. Sethumadhavan, Dr. Chungath Srinivasan, Megha, P., and Dr. Sindhu M.
Publisher : IET Information Security, Institution of Engineering and Technology.
An encryption technique to thwart android binder exploits
Authors : Dr. Jevitha K. P., Ya Kaladharan; Mateti, Pb
Publisher : Advances in Intelligent Systems and Computing, Springer Verlag.
Decrypting Shared Encrypted Data Files Stored in a Cloud Using Dynamic Key Aggregation
Authors : Dr. M. Sethumadhavan, Maria James, Chungath Srinivasan, K. V. Lakshmy
Publisher : Computational Intelligence, Cyber Security and Computational Models: Proceedings of ICC3 2015
An authenticated key agreement scheme using vector decomposition
Authors : Praveen I., Rajeev K, Sethumadhavan, M.
Publisher : Defence Science Journal, Defense Scientific Information and Documentation Centre,
Android smudge attack prevention techniques
Authors : Dr. Praveen K., M. D. Amruth
Publisher : Advances in Intelligent Systems and Computing, Springer Verlag,
Affine equivalence of monomial rotation symmetric Boolean functions: A Pólya’s theorem approach
Authors : Dr. Lakshmy K. V., T. W. Cusick, and Sethumadhavan, M.
Publisher : Journal of Mathematical Cryptology, Walter de Gruyter GmbH.
Wireless Security Auditing: Attack Vectors and Mitigation Strategies
Authors : Dr. M. Sethumadhavan, Mr. Ashok Kumar Mohan, A, A. Devi
Publisher : Procedia Computer Science
Visual cryptographic schemes using combined Boolean operations
Authors : Dr. Praveen K., Sethumadhavan, M., and Krishnan, R.
Publisher : Journal of Discrete Mathematical Sciences and Cryptography
Stride based analysis of the chrome browser extensions API
Authors : Dr. Jevitha K. P., P. K. Akshay Dev
Publisher : Advances in Intelligent Systems and Computing
Response Time Analysis for Querying Data on Order Preserved Encrypted Buckets
Authors : Ms. Santhya R.
Publisher : International Journal of Control Theory and Applications
Prevention of PAC File Based Attack Using DHCP Snooping
Authors : Dr. Jevitha K. P., Atul, K.R.;
Publisher : Communications in Computer and Information Science
Opaque Predicate Detection by Static Analysis of Binary Executables
Authors : Dr. M. Sethumadhavan, Prakash, R.K.R.; Amritha, P.P.;
Publisher : Communications in Computer and Information Science
A framework for dynamic malware analysis based on behavior artifacts
Authors : Dr. Gireeshkumar T., Gregory Paul, T.G.;
Publisher : Advances in Intelligent Systems and Computing
An Android Application for Secret Image Sharing with Cloud Storage
Authors : Dr. Praveen K., Dr. M. Sethumadhavan, Indu, G.; Santhya, R.;
Publisher : Communications in Computer and Information Science
Active steganalysis on svd-based embedding algorithm
Authors : Dr. Amritha P. P., Dr. M. Sethumadhavan, Ravi, R. P.
Publisher : Advances in Intelligent Systems and Computing
Static and Dynamic Analysis for Android Malware Detection
Authors : Dr. Gireeshkumar T., Sugunan, K.; Dhanya, K.A.
Publisher : Advances in Big Data and Cloud Computing, Advances in Intelligent Systems and Computing
Spatial Outlier Detection Algorithm for Trajectory Data
Authors : Dr. Sabarish B. A., Dr. R. Karthi, Dr. Gireesh Kumar T.
Publisher : International Journal of Pure and Applied Mathematics
A Selective Generation of Hybrid Random Numbers via Android Smart Phones
Authors : Dr. M. Sethumadhavan, Mr. Ashok Kumar Mohan, Dr. Nirmala Devi M., and Santhya R
Publisher : International Journal of Pure and Applied Mathematics
Results on dihedral symmetric boolean functions
Authors : Rajeev K, M Sethumadhavan and Lakshmy K V
Publisher : International Journal of Pure and Applied Mathematics
Partial Password Authentication using Vector Decomposition
Authors : Praveen I., Dr. M. Sethumadhavan
Publisher : International Journal of Pure and Applied Mathematics
Data Hiding in Slack Space Revisited
Authors : Mr. Ashok Kumar Mohan, Thampy, R. V., and Praveen, K.
Publisher : International Journal of Pure and Applied Mathematics
Clustering of trajectory data using hierarchical approaches
Authors : Dr. Sabarish B. A., Dr. R. Karthi, Dr. Gireeshkumar T.
Publisher : Lecture Notes in Computational Vision and Biomechanics
The Art of Piecewise Hashing: A step toward better evidence provability
Authors : Dr. M. Sethumadhavan, Mr. Ashok Kumar Mohan, A. Gopalakrishnan, Vineti, E.
Publisher : Journal of Cyber Security and Mobility
String based Feature Representation for Trajectory Clustering
Authors : Dr. Sabarish B. A., Dr. R. Karthi, Dr. Gireeshkumar T.
Publisher : International Journal of Embedded and Real-Time Communication Systems (IJERTCS)
Ransomware Analysis Using Reverse Engineering
Authors : Dr. Gireeshkumar T., Naveen, S.;
Publisher : Communications in Computer and Information Science
Opportunistic Mobile Social Networks: Architecture, Privacy, Security Issues and Future Directions
Authors : Dr. Gireeshkumar T., Vidhya Lakshmi, V.R.;
Publisher : International Journal of Electrical and Computer Engineering
Efficient Android Malware Scanner using Hybrid Analysis
Authors : Dr. Gireeshkumar T., K.A. Dhanya;
Publisher : International Journal of Recent Technology and Engineering (IJRTE)
Advance Persistent Threat Detection Using Long Short Term Memory (LSTM) Neural Networks
Authors : Dr. Gireeshkumar T., Sai Charan, P.V.; Mohan Anand, P.
Publisher : Communications in Computer and Information Science
Deterministic extended visual cryptographic schemes for general access structures with OR-AND and XOR-AND operations
Authors : Dr. Praveen K., Kanakkath, P., Madathil, S. & Krishnan, R
Publisher : Springer