Back close
Block Image

Area of Research

The centre is pursuing various research projects with Govt. agencies in the areas of Encryption, Visual cryptography, Steganalysis, Secure Coding, Web security, Intrusion Detection and Prevention. Our M.Tech students work as interns in premier Security companies in their final semester for completing their thesis work relating theory to practice and become conversant with all aspects of Security – theoretical, developmental, research and operational.

Block Image
  • Cryptography and Cryptanalysis
  • Steganography and Steganalysis
  • Cloud Security
  • Digital Forensics
  • Web Security
  • Mobile Security
  • Information Hiding
  • Machine Learning
  • Visual Cryptography and Secret Sharing
  • Operating System Security
  • Big Data Security
  • Data Base Security
  • Blockchain Technology
  • Cyber Forensics

Sponsored Projects

 

Sl. No R&D PROJECTS Funding Agency
1. Development of Secure and Authenticated Encryption Scheme for Lightweight Applications DeitY
2. Predictive Threat Evaluation in Complex IT Systems DRDO
3. Development of Fast and Effective Cryptographic Techniques ISRO
4. Design and Analysis of Cryptographically Secure Pseudorandom Number Generators DRDO
5. VLSI Development of Finite Field Arithmetic NTRO
6. Next Generation Secure Internet Technologies for Globally Distributed Enterprises DST
7. Analysis of Word Based Stream Ciphers ISRO
8. Error Linear Complexity Measures for Multisequences ISRO
9. Classified Image Transmission Systems SAG, DRDO
10. Indo-Trento Project on Distributed Software Engineering TIFR
11. Hardware based Network Intrusion Detection Systems for High Speed Networks ISRO
12. An ISRO Sponsored Project on Cryptography ISRO
13. Development of Visual Cryptographic Schemes ISRO

Journal Article

SwaRma- A Women Safety Device

Authors : Hemalatha P, S.Kanimozhi,K.Anitha

Publisher : IRJET

Farmbot-a smart agriculture assistor using internet of things

Authors : Hemalatha P, K Dhanalakshmi, S Matilda, M BalaAnand

Development of Speech Interface for Challan Application using Speech Recognition

Authors : Dr. V. Sujitha, K.Abinaya K.Tamilselvi, R.Kirubamanohari, S.Gayathiri , M.Nivetha

VNF-Enabled 5G Network Orchestration Framework for Slice Creation, Isolation and Management

Authors : Dr. V. Sujitha, Thiruvenkadam Srinivasan, Han-Gue Jo, In-Ho Ra

Publisher : MDPI

An E2E Network Slicing Framework for Slice Creation and Deployment Using Machine Learning

Authors : Dr. V. Sujitha, Thiruvenkadam Srinivasan, Han-Gue Jo, In-Ho Ra

Publisher : MDPI

A Heuristic Fuzzy Based 5G Network Orchestration Framework for Dynamic Virtual Network Embedding

Authors : Dr. V. Sujitha, Srinivasan Thiruvenkadam, Han-Gue Jo, In-Ho Ra

Publisher : MDPI

Ensemble Graph Neural Network Model for Classification of Major Depression Disorder using Whole-Brain Functional Connectivity

Authors : Dr. V. Sujitha, Mikhail Votinov, Lisa Wagels, Sangyun Kim, Munseob Lee, Ute Habel, In-Ho Ra, Han-Gue Jo

Publisher : Frontiers

Inter and intra-observer variabilities in the measurement of aqueous flare with a custom-made ocular spot fluorometer

Authors : Sirisha Tadepalli, Dr. Surekha P., Hadiya Farhath Pattan, Bongoni Vishwanath, Prema Padmanabhan, Rachapalle Reddi Sudhir, Abhilash Ravi Kumar, Jyotirmay Biswas, Sangly P Srinivas

Publisher : Investigative Ophthalmology & Visual Science

Survey on various steganographic algorithms

Authors : Nimmy K., Deepa, R., Thiruppathi, K., & Reshma R

Publisher : Proceedings of International Conference on Information and network technology

Rough multisets and information multi-systems

Authors : Girish, K. P., & Jacob John, S

Publisher : Advances in Decision Sciences

An intelligent question answering conversational agent using Nave Bayesian classifier

Authors : Dr. Gireesh Kumar T., Niranjan, M., Saipreethy, M. S.

Publisher : Technology Enhanced Education (ICTEE),

A more ecient and faster pairing computation with cryptographic security

Authors : Dr. M. Sethumadhavan, Praveen, I

Publisher : Proceedings of the first international conference on security of internet of things

Optimally Locating for Hiding Information in Audio Signal

Authors : Premalatha P., Amritha, P. P

Publisher : International Journal of Computer Applications (0975- 8887), Vol. 65, No.14,(pp. 37-42).

Linear Complexity Measures of Binary Multi-sequences

Authors : Dr. M. Sethumadhavan, Sindhu, M

Publisher : International Journal of Computer Applications, 62(16), (pp. 6-10).

An Application of Vector Decom- position Problem in Public Key Cryptography Using Homomorphic Encryption

Authors : Dr. M. Sethumadhavan, Praveen, I

Publisher : proceedings of International Conference on Emerging Research in Computing, Information, Communication and Applications – ERICA 2013 (pp. 328-331).

A Framework for Analyzing the Security of Chrome Extensions

Authors : Dr. M. Sethumadhavan, Aravind, V

Publisher : Advanced Computing, Networking and Informatics- Volume 2 (pp. 267-272). Springer International Publishing.

Counting rotation symmetric functions using Polyas theorem

Authors : Dr. M. Sethumadhavan, Lakshmy, K. V, Cusick, T. W

Publisher : Discrete Applied Mathematics,

On the k-error Joint Linear Complex- ity and Error Multisequence over Fq (charFq = p; prime)

Authors : Dr. M. Sethumadhavan, Sindhu, M.

Publisher : Recent Trends in Computer Networks and Distributed Systems Security (pp. 512-519). Springer Berlin Heidelberg.

Use of Machine Learning Algorithms with SIEM for Attack Prediction

Authors : Anumol, E. T

Publisher : Intelligent Computing, Communication and Devices (pp. 231-235). Springer India.

A Filtering Based Android Malware Detection System for Google Play Store

Authors : Andoor, J. T

Publisher : Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014 (pp. 559-566). Springer International Publishing.

A Three Factor Authentication System for Smartcard Using Biometric, Visual Cryptography and OTP

Authors : Kumar, A. S., Girish, K. P

Publisher : Artificial Intelligence and Evolutionary Algorithms in Engineering Systems (pp. 673-679). Springer India.

Comparative Analysis of Digital Watermarking in Discrete Wavelet Transform and Mojette Transform

Authors : Rajeev, Chandini, & Girish, K. P

Publisher : Artificial Intelligence and Evolutionary Algorithms in Engineering Systems (pp. 667-672). Springer India.

Phish Indicator: An Indication for Phishing Sites

Authors : Aparna, S, Muniasamy, K

Publisher : Artificial Intelligence and Evolutionary Algorithms in Engineering Systems (pp. 481-487). Springer India.

Real-Time Intrusion Prediction Using Hidden Markov Model with Genetic Algorithm

Authors : Divya, T, Muniasamy, K

Publisher : Artificial Intelligence and Evolutionary Algorithms in Engineering Systems (pp. 731-736). Springer India.

Log Analysis Based Intrusion Prediction System

Authors : Menon, R. P

Publisher : Emerging ICT for Bridging the Future Proceedings of the 49th Annual Convention of the Computer Society of India (CSI)

A Fully Simulatable Oblivious Transfer Scheme Using Vector Decomposition

Authors : Kumar, M; Praveen

Publisher : In Intelligent Computing, Communication and Devices (pp. 131-137). Springer India.

Sequences; Predictability and Linear Complexity Measures

Authors : Dr. M. Sethumadhavan

Publisher : Discrete Mathematics and Its Applications

An algorithm for k-error joint linear complexity of binary multisequences

Authors : Dr. M. Sethumadhavan, Dr. Srinivasan C., Dr. Sindhu M., and Kavitha, C.

Publisher : Journal of Discrete Mathematical Sciences and Cryptography

Image Steganographic Scheme Based On Modified Tri-way PVD in Orthogonal Domain

Authors : Dr. Gireesh Kumar T., Alexander, A., Varghese, J., and Johnson, S.

Publisher : Indo-US Conference and Workshop on Cyber Security, Cyber Crime and Cyber Forensics

A Survey on Digital Image Steganographic Methods

Authors : Dr. Amritha P. P., Dr. Gireesh Kumar T.

Publisher : Cyber Security, Cyber Crime and Cyber Forensics: Applications and Perspectives

Self Localization of a Mobile Robot in Planetary Terrain

Authors : Dr. Divya Udayan J., Roshy M John, Gireesh Kumar T, KJ Poornaselvan

Publisher : International Journal of Embedded Systems and Computer Engineering

Self Localization and pose estimation of Mobile robot

Authors : Dr. Gireesh Kumar T.

Publisher : International journal of Embedded System and Computer Engineering

Payload Estimation in Universal Steganalysis

Authors : Dr. Amritha P. P., Madathil, A.

Publisher : Defence Science Journal

Mobile Robot Pose Estimation Based on Particle Filters for Multi-dimensional State Spaces

Authors : Dr. Gireeshkumar T., Divya Udayan, J.a; John, R.M.c; Poornaselvan, K.J.d; Lakshmanan, S.A.a

Publisher : Communications in Computer and Information Science

Low Budget Honeynet Creation and Implementation for Nids and Nips

Authors : Dr. Gireesh Kumar T., Aathira.K.S; Hiran.V.Nath; Thulasi.N. Kutty;

Publisher : (IJCNS) International Journal of Computer and Network Security

A compressed video steganography using TPVD

Authors : Dr. Amritha P. P., A. P. Sherly

Publisher : International Journal of Database Management Systems (IJDMS)

An Advanced Steganographic Scheme with Diamond Encoding and Morphological Neural Network

Authors : Dr. Gireesh Kumar T., S. Sasidharan, .A.P, S., .N.R, K., .Y, A.

Publisher : pp. 3-14

Vulnerability assessment methods – A review

Authors : Nath, H.V

Publisher : Communications in Computer and Information Science

Steganalysis for calibrated and lower embedded uncalibrated images

Authors : Dr. Gireeshkumar T., Shankar, D.D.; Nath, H.V.

Publisher : Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

Fabrication and performance of hybrid betel nut (Areca Catechu) short fibre/Sansevieria cylindrica (Agavaceae) polypropylene composite

Authors : Mr. Ashok Kumar Mohan, Reddy, G Ramachandra; Reddy, K Hemachandra; Reddy, Y Venkata Mohana; Reddy, P Ranga; Reddy, N Subbarami

Publisher : Ind. J. Mater. Sci

Cognitive environment for pervasive learners

Authors : Dr. Gireeshkumar T., Sharma, S.; Sreevathsan, R.; Srikanth, M.V.V.N.S.; Harshith, C.;

Publisher : Communications in Computer and Information Science

Vision based robot navigation for disaster scenarios

Authors : Dr. Gireesh Kumar T., Sudheesh, P;

Publisher : International Journal of Computer Applications

Tracking of nose tip: An alternative for mouse

Authors : Dr. Gireeshkumar T., Poornaselvan, K.J.b; Sattviksharmaa; Gulshankumara; Sreevathsan, R.a

Publisher : Lecture Notes in Computer Science

Multiset topologies induced by multiset relations

Authors : Dr. Johns Shaji Mathew, John, S. J

Publisher : Information Sciences

Foreground Estimation in a Degraded Text document

Authors : Dr. Gireesh Kumar T., Bhuvana I Chandra; Nagarjunavarma, K.

Publisher : International Journal of Computer Applications

A distortion free relational database watermarking using patch work method

Authors : Dr. Praveen K., Arun, R, Bose, D. C., & Nath, H. V

Publisher : Advances in Intelligent and Soft Computing

Survey On Privacy Preserving Data Publishing Of Numerical Sensitive Data

Authors : Ms. Santhya R.

Publisher : International Journal of Emerging Technology Advanced Engineering

Optimally Locating for Hiding Information in Audio Signal

Authors : Dr. Amritha P. P., P. Premalatha

Publisher : International Journal of Computer Applications

Linear Complexity Measures of Binary Multisequences

Authors : Dr. M. Sethumadhavan, Dr. Sindhu M.

Publisher : International Journal of Computer Applications

Comparative Study of Algorithms for Frontier based Area Exploration and Slam for Mobile Robots

Authors : Dr. Gireesh Kumar T., Dayanand, V.; Rahul Sharma

Publisher : International Journal of Computer Applications

Analyzing the Makier Virus

Authors : Dr. Praveen K., Dr. Ritwik M.

Publisher : International Journal of Computer Science

A Novel Cloud Based NIDPS for Smartphones

Authors : Dr. Gireeshkumar T., Pandian, V.A.; Dr. Gireesh K. T.

Publisher : Communications in Computer and Information Science

On the k-error Joint Linear Complexity and Error Multisequence over F

Authors : Dr. M. Sethumadhavan, M. Sindhu

Publisher : Communications in Computer and Information Science

Differential Execution Analysis for Obfuscation Reduction

Authors : Robert, R. Reno

Publisher : Springer Berlin Heidelberg.

Counting rotation symmetric functions using Polya’s theorem

Authors : Dr. Lakshmy K. V., Sethumadhavan, M., and Cusick, T. W.

Publisher : Discrete Applied Mathematics

Counting rotation symmetric functions using Polya’s theorem

Authors : Dr. M. Sethumadhavan, Lakshmy K.V.; Thomas W. Cusick

Publisher : Discrete Applied Mathematics

A Novel Method for MP3 Steganalysis

Authors : Premalatha P., Kuriakose, R

Publisher : Intelligent Computing, Communication and Devices: Proceedings of ICCD 2014, Volume 1

A low overhead prevention of android web view abuse attacks

Authors : Dr. Praveen K., K. Jamsheed

Publisher : Communications in Computer and Information Science

A Hybrid Approach for Querying Numeric data in DAS-Model

Authors : Dr. Praveen K., K. R. Arjun

Publisher : International Journal of Control Theory and Applications

Cube Attack on Stream Ciphers using a Modified Linearity Test

Authors : Dr. Srinivasan C., Dr. M. Sethumadhavan, ; Pillai, U.U.; Lakshmy K.V.;

Publisher : Journal of Discrete Mathematical Sciences and Cryptography, Taru Publications

On the removal of steganographic content from images

Authors : Dr. Amritha P. P., Dr. M. Sethumadhavan, Krishnan, R.

Publisher : Defence Science Journal, Defense Scientific Information and Documentation Centre, Volume 66, Number 6, p.574-581.

Privilege-based scoring system against cross-site scripting using machine learning

Authors : Dr. Gireeshkumar T., Sunder, N.S.;

Publisher : Advances in Intelligent Systems and Computing

Hash-One: a lightweight cryptographic hash function

Authors : Dr. M. Sethumadhavan, Dr. Srinivasan C., Megha, P., and Dr. Sindhu M.

Publisher : IET Information Security, Institution of Engineering and Technology.

An encryption technique to thwart android binder exploits

Authors : Jevitha K. P., Ya Kaladharan; Mateti, Pb

Publisher : Advances in Intelligent Systems and Computing, Springer Verlag.

Decrypting Shared Encrypted Data Files Stored in a Cloud Using Dynamic Key Aggregation

Authors : Dr. M. Sethumadhavan, Maria James, Chungath Srinivasan, K. V. Lakshmy

Publisher : Computational Intelligence, Cyber Security and Computational Models: Proceedings of ICC3 2015

An authenticated key agreement scheme using vector decomposition

Authors : Praveen I., Rajeev, K., and Sethumadhavan, M.

Publisher : Defence Science Journal, Defense Scientific Information and Documentation Centre,

Android smudge attack prevention techniques

Authors : Dr. Praveen K., M. D. Amruth

Publisher : Advances in Intelligent Systems and Computing, Springer Verlag,

Affine equivalence of monomial rotation symmetric Boolean functions: A Pólya’s theorem approach

Authors : Dr. Lakshmy K. V., T. W. Cusick, and Sethumadhavan, M.

Publisher : Journal of Mathematical Cryptology, Walter de Gruyter GmbH.

Visual cryptographic schemes using combined Boolean operations

Authors : Dr. Praveen K., Sethumadhavan, M., and Krishnan, R.

Publisher : Journal of Discrete Mathematical Sciences and Cryptography

Stride based analysis of the chrome browser extensions API

Authors : Jevitha K. P., P. K. Akshay Dev

Publisher : Advances in Intelligent Systems and Computing

Response Time Analysis for Querying Data on Order Preserved Encrypted Buckets

Authors : Ms. Santhya R.

Publisher : International Journal of Control Theory and Applications

Prevention of PAC File Based Attack Using DHCP Snooping

Authors : Jevitha K. P., Atul, K.R.;

Publisher : Communications in Computer and Information Science

Opaque Predicate Detection by Static Analysis of Binary Executables

Authors : Dr. M. Sethumadhavan, Prakash, R.K.R.; Amritha, P.P.;

Publisher : Communications in Computer and Information Science

A framework for dynamic malware analysis based on behavior artifacts

Authors : Dr. Gireeshkumar T., Gregory Paul, T.G.;

Publisher : Advances in Intelligent Systems and Computing

An Android Application for Secret Image Sharing with Cloud Storage

Authors : Dr. Praveen K., Dr. M. Sethumadhavan, Indu, G.; Santhya, R.;

Publisher : Communications in Computer and Information Science

Active steganalysis on svd-based embedding algorithm

Authors : Dr. Amritha P. P., Dr. M. Sethumadhavan, Ravi, R. P.

Publisher : Advances in Intelligent Systems and Computing

Static and Dynamic Analysis for Android Malware Detection

Authors : Dr. Gireeshkumar T., Sugunan, K.; Dhanya, K.A.

Publisher : Advances in Big Data and Cloud Computing, Advances in Intelligent Systems and Computing

Spatial Outlier Detection Algorithm for Trajectory Data

Authors : Dr. Sabarish B. A., Dr. R. Karthi, Dr. Gireesh Kumar T.

Publisher : International Journal of Pure and Applied Mathematics

A Selective Generation of Hybrid Random Numbers via Android Smart Phones

Authors : Dr. M. Sethumadhavan, Mr. Ashok Kumar Mohan, Dr. Nirmala Devi M., and Santhya R

Publisher : International Journal of Pure and Applied Mathematics

Partial Password Authentication using Vector Decomposition

Authors : Praveen I., Dr. M. Sethumadhavan

Publisher : International Journal of Pure and Applied Mathematics

Data Hiding in Slack Space Revisited

Authors : Mr. Ashok Kumar Mohan, Thampy, R. V., and Praveen, K.

Publisher : International Journal of Pure and Applied Mathematics

Clustering of trajectory data using hierarchical approaches

Authors : Dr. Sabarish B. A., Dr. R. Karthi, Dr. Gireeshkumar T.

Publisher : Lecture Notes in Computational Vision and Biomechanics

The Art of Piecewise Hashing: A step toward better evidence provability

Authors : Dr. M. Sethumadhavan, Mr. Ashok Kumar Mohan, A. Gopalakrishnan, Vineti, E.

Publisher : Journal of Cyber Security and Mobility

String based Feature Representation for Trajectory Clustering

Authors : Dr. Sabarish B. A., Dr. R. Karthi, Dr. Gireeshkumar T.

Publisher : International Journal of Embedded and Real-Time Communication Systems (IJERTCS)

Ransomware Analysis Using Reverse Engineering

Authors : Dr. Gireeshkumar T., Naveen, S.;

Publisher : Communications in Computer and Information Science

Opportunistic Mobile Social Networks: Architecture, Privacy, Security Issues and Future Directions

Authors : Dr. Gireeshkumar T., Vidhya Lakshmi, V.R.;

Publisher : International Journal of Electrical and Computer Engineering

Efficient Android Malware Scanner using Hybrid Analysis

Authors : Dr. Gireeshkumar T., K.A. Dhanya;

Publisher : International Journal of Recent Technology and Engineering (IJRTE)

Advance Persistent Threat Detection Using Long Short Term Memory (LSTM) Neural Networks

Authors : Dr. Gireeshkumar T., Sai Charan, P.V.; Mohan Anand, P.

Publisher : Communications in Computer and Information Science

Conference Paper

Revolutionizing secure commercialization in agriculture using blockchain technology

Authors : Hemalatha P, K Kiruba, J Manikandan, M Madhin, Raj S Mohan

Publisher : IEEE

A chatbot mobile quarantine app for stress relief

Authors : Hemalatha P, S Sriram, J Manikandan, G Leema Roselin

Publisher : IEEE

Border Security System for Fishermen using Radio Frequency Technique with Live Streaming

Authors : Dr. V. Sujitha, V Anandhan, S Anukeerthana, AS Dhanusriya, M Manibharathi

Publisher : IEEE

Selection of Apt Renewable Energy Source for Smart Cities using Generalized Orthopair Fuzzy Information

Authors : Dr. Sangeetha Viswanathan, R. Krishankumar, Pratibha Rani, K. S. Ravichandran, Amir H. Gandomi

Publisher : IEEE

Image Steganographic Scheme Based On Modied Triway PVD in Orthogonal Domain

Authors : Dr. Gireesh Kumar T., Anna Alexander, Jina Varghese, Sneha Johnson

Publisher : Indo-US Conference and Workshop on Cyber Security, Cyber Crime and Cyber Forensics, Aug 19-21, 2009.

Gigabit Network Intrusion Detection System Using Extended Bloom Filter in Re-configurable Hardware

Authors : Dr. Gireeshkumar T., Akshay Eldho Jose

Publisher : Proceedings of the Second International Conference on Computer and Communication Technologies

Active Steganalysis on SVDBased Embedding Algorithm

Authors : Dr. M. Sethumadhavan, Amritha P. P, Ravi R. P

Publisher : Proceedings of the 5th International Conference on Frontiers in Intelligent Computing

Prevention of Fault Attacks in ASCON Authenticated Cipher Using Cellular Automata

Authors : Ambili Kakkad Narayanan, Joseph Jacob, Jossy Joseph, M. K. Abinshad,Email ,Jimmy Jose

Publisher : Conference International Conference on Cellular Automata for Research and Industry

Strengthening ACORN Authenticated Cipher with Cellular Automata

Authors : Ambili Kakkad Narayanan, Jossy Joseph,Joseph Jacob, M. K. Abinshad, Email, Jimmy Jose

Publisher : Conference International Conference on Cellular Automata for Research and Industry

Trust Based Intrusion Detection System to Detect Insider Attacks in IoT Systems

Authors : Ambili Kakkad Narayanan, Jimmy Jose

Publisher : Book Information Science and Applications

Feature based steganalysis using wavelet decomposition and magnitude statistics

Authors : Dr. Gireeshkumar T., Jithin, R.; Shankar, D.D.

Publisher : ACE 2010 – 2010 International Conference on Advances in Computer Engineering

An Efficient Embedding and Restoration Steganographic Scheme for Secure Multimedia Communication

Authors : Dr. Gireeshkumar T., Sasidharan, Sapna; N., Karthikha; A.P., Sherly; Y., Avani

Publisher : Proceedings of the 2010 International Conference on Advances in Computer Engineering

Student centric design for cyber security knowledge empowerment

Authors : A. Joshi, Ramani, V., Murali, H., Krishnan, R., Mithra, Z., and Pavithran, V

Publisher : ICTEE

Reconciliation engine and metric for network vulnerability assessment

Authors : Dr. M. Sethumadhavan, H. Va Nath, and Gangadharan, Kb

Publisher : ACM International Conference Proceeding Series

A More Efficient and Faster Pairing Computation with Cryptographic Security

Authors : Praveen I., Dr. M. Sethumadhavan

Publisher : Proceedings of the First International Conference on Security of Internet of Things

An intelligent question answering conversational agent using Naïve Bayesian classifier

Authors : Dr. Gireeshkumar T., Niranjan, M.a; Saipreethy, M.S.a; Kumar, T.G.b

Publisher : ICTEE

Multi-Level Steganography for Smart phones

Authors : Dr. Amritha P. P., V. A. C

Publisher : Networks Soft Computing (ICNSC), 2014 First International Conference on

High Speed Network Intrusion Detection System Using FPGA

Authors : Dr. Gireeshkumar T., Anuraj, S.; P. Premalatha;

Publisher : Proceedings of the Second International Conference on Computer and Communication Technologies: IC3T 2015

Frontier based multi robot area exploration using prioritized routing

Authors : Dr. Gireeshkumar T., Rahul, S.K.; Honc, D.; Dušek, F.; Herrmann F.; Rose O.; Manitz M.

Publisher : Proceedings – 30th European Conference on Modelling and Simulation, ECMS 2016, European Council for Modelling and Simulation, p.25-30

Equitable machine learning algorithms to probe over P2P botnets

Authors : Mridula Menon N, Bharathula P

Publisher : Advances in Intelligent Systems and Computing, Springer Verlag.

Sum Chain Based Approach against Session Hijacking in MPTCP

Authors : Dr. M. Sethumadhavan, Akash Krishnan, V.; Amritha, P.P.

Publisher : Procedia Computer Science

On federated and proof of validation based consensus algorithms in blockchain

Authors : Ambili Kakkad Narayanan, M. Sindhu and M. Sethumadhavan

Publisher : IOP Conference Series: Materials Science and Engineering

CBEAT: Chrome Browser Extension Analysis Tool

Authors : Jevitha K. P., Roy, Sudakshina Singha;

Publisher : Security in Computing and Communications, Springer Singapore.

Neighbor Attack Detection in Internet of Things

Authors : Dr. Gireeshkumar T., Thomas, Arun

Publisher : Advanced Computational and Communication Paradigms

Facial Expression Classification Using Machine Learning Approach: A Review

Authors : Baskar A., Dr. Gireeshkumar T.

Publisher : Advances in Intelligent Systems and Computing

Disk memory forensics: Analysis of memory forensics frameworks flow

Authors : Mr. Ashok Kumar Mohan

Publisher : 2017 Innovations in Power and Advanced Computing Technologies, i-PACT 2017

Conference Proceedings

Agent Based Ground Flight Control Using Type-2 Fuzzy Logic And Hybrid Ant Colony Optimization To A Dynamic Environment

Authors : Dr. Gireeshkumar T., Poornaselvan.K.J,; Vijayan. V.P

Publisher : First International Conference on Emerging Trends in Engineering and Technology

Non linear secret sharing for gray scale images

Authors : Dr. Amritha P. P., Dr. Lakshmy K. V., A. Nandakumar, and Talluri, V. S.

Publisher : Procedia Engineering

An Application of Vector Decomposition problem in Public key Cryptography using homomarphic Encryption

Authors : Dr. Praveen K., Dr. M. Sethumadhavan

Publisher : International Conference on Emerging Research in Computing Information Communication and Applications

On the k-error Joint Linear Complexity and Error Multisequence over F q (char F q= p, prime)

Authors : Dr. M. Sethumadhavan, M. Sindhu

Publisher : Recent Trends in Computer Networks and Distributed Systems Security, Springer Berlin Heidelberg

A Framework for Analysing the Security of Chrome Extensions

Authors : Dr. M. Sethumadhavan, V. Aravind

Publisher : Advanced Computing, Networking and Informatics

On the Extensions of (k, n)*-Visual Cryptographic Schemes

Authors : Dr. Praveen K., Dr. M. Sethumadhavan, Rajeev, K.

Publisher : In Recent Trends in Computer Networks and Distributed Systems Security

Ideal Contrast Visual Cryptography for General Access Structures with AND Operation.

Authors : Dr. Praveen K., Dr. M. Sethumadhavan

Publisher : In Proceedings of 3rd International Conference on Advanced Computing, Networking and Informatics: ICACNI 2015, Springer India.

Book Chapter

Assessment Of An Ant-Inspired Algorithm For Path Planning’, Biomimicry for Materials

Authors : Dr. Sangeetha Viswanathan, R. Krishankumar, K. S. Ravichandran, Amir H. Gandomi

Publisher : Elsevier

Agent based ground ight control using type-2 fuzzy logic and hybrid ant colony optimization to a dynamic environment

Authors : Dr. Gireesh Kumar T., Poornaselvan, K. J., Vijayan, V. P

Publisher : Emerging Trends in Engineering and Technology, 2008. ICETET’08. First International Conference on (pp. 343-348). IEEE.

An algorithm for k-error joint linear complexity of binary multi-sequences

Authors : Dr. M. Sethumadhavan, M. Sindhu , Chungath Srinivasan , C. Kavitha

Publisher : Journal of Discrete Mathematical Sciences and Cryptography

Feature Based Classification System for JPEG Steganalysis

Authors : Dr. Gireeshkumar T., Shankar, D. D, Jithin, R

Publisher : Conference Proceedings RTCSP (Vol.10), (pp. 1 – 4).

A construction of p-ary balanced sequence with large k-error linear complexity

Authors : Dr. M. Sethumadhavan, C. Yogha Lakxmie; C. Vijayagovindan

Publisher : Journal of Discrete Mathematical Sciences and Cryptography

A Multi-agent Optimal Path Planning Approach to Robotics Environment

Authors : Dr. Gireeshkumar T., Vijayan.V.P.

Publisher : International Conference on Computational Intelligence and Multimedia Applications

A Novel Approach for Compressed Video Steganography

Authors : Dr. Amritha P. P., A. P. Sherly, Sasidharan, S., and Raj, A. S.

Publisher : Recent Trends in Network Security and Applications: Third International Conference, CNSA 2010, Chennai, India, July 23-25, 2010. Proceedings

Network Intrusion Detection System Based On Machine Learning Algorithms

Authors : Dr. Gireesh Kumar T., Vipin Das, V. Das, Pathak, V., Sharma, S., ,, .Srikanth, M. V. V. N. S.

Publisher : IJCSIT

Feature based Classification System for Image Steganalysis

Authors : Dr. Gireesh Kumar T., D. D.Shankar

Publisher : International Conference on Computer Communication and Network

Complexity Measures of Cryptographically Secure Boolean Functions

Authors : Dr. Srinivasan C., Dr. M. Sethumadhavan, ;Lakshmy K.V.

Publisher : Cyber Security, Cyber Crime and Cyber Forensics: Applications and Perspectives

Analysis of Algebraic Attack on TRIVIUM and Minute Modification to TRIVIUM

Authors : Dr. Srinivasan C., A. S. Raj

Publisher : Advances in Network Security and Applications: 4th International Conference, CNSA 2011, Chennai, India, July 15-17, 2011

Block Dependency Feature Based Classification Scheme for Uncalibrated Image Steganalysis

Authors : Dr. Praveen K., Dr. Gireeshkumar T., D. D. Shankar, Jithin, R., and Raj, A. S.

Publisher : Springer Berlin Heidelberg

Results on (2, n) Visual Cryptographic Scheme

Authors : Dr. Praveen K., Dr. M. Sethumadhavan

Publisher : Security in Computing and Communications: Second International Symposium, SSCC 2014, Delhi, India, September 24-27, 2014. Proceedings

A Probabilistic Essential Visual Cryptographic Scheme for Plural Secret Images

Authors : Dr. Praveen K., Dr. M. Sethumadhavan

Publisher : Advanced Computing, Networking and Informatics- Volume 2: Wireless Networks and Security Proceedings of the Second International Conference on Advanced Computing, Networking and Informatics (ICACNI-2014)

Using Signature for Hidden Communication Prevention in IP Telephony

Authors : Dr. Amritha P. P., A. Rahman

Publisher : Artificial Intelligence and Evolutionary Algorithms in Engineering Systems: Proceedings of ICAEES 2014, Volume 2

A (t, n) Secure Sum Multiparty Computation Protocol Using Multivariate Polynomial Secret Sharing Scheme

Authors : Dr. Praveen K., Sasi, N.

Publisher : Artificial Intelligence and Evolutionary Algorithms in Engineering Systems: Proceedings of ICAEES 2014, Volume 1

A Survey of Location Prediction Using Trajectory Mining

Authors : Dr. Sabarish B. A., Dr. R. Karthi, Dr. Gireeshkumar T.

Publisher : Artificial Intelligence and Evolutionary Algorithms in Engineering Systems: Proceedings of ICAEES 2014,

Secure Seed-Based Sturdy OTP via Convenient Carry-on Device

Authors : Dr. Gireeshkumar T., Mohan, A. K

Publisher : Artificial Intelligence and Evolutionary Algorithms in Engineering Systems: Proceedings of ICAEES 2014, Volume 1

Secretly Shared QR Code and Its Applications

Authors : Dr. Praveen K., G. S. Devisree

Publisher : Artificial Intelligence and Evolutionary Algorithms in Engineering Systems: Proceedings of ICAEES 2014, Volume 2

A Probabilistic Method Toward SLAM for Mobile Robotic Systems

Authors : Dr. Gireesh Kumar T., Anoop, R. S.; Saisuriyaa, G.

Publisher : Intelligent Computing, Communication and Devices: Proceedings of ICCD 2014, Volume 1

A Novel Method for Secure Image Steganography

Authors : Dr. Amritha P. P., S. Anjana

Publisher : Artificial Intelligence and Evolutionary Algorithms in Engineering Systems: Proceedings of ICAEES 2014, Volume 1

A Novel Authentication Framework for Hadoop

Authors : Dr. Gireeshkumar T., Rahul, P. K.;

Publisher : Artificial Intelligence and Evolutionary Algorithms in Engineering Systems: Proceedings of ICAEES 2014, Volume 1

A Model for the Effective Steganalysis of VoIP

Authors : Dr. Amritha P. P., N. Jayasree

Publisher : Artificial Intelligence and Evolutionary Algorithms in Engineering Systems: Proceedings of ICAEES 2014, Volume 2

An Autonomous Obstacle Avoiding and Target Recognition Robotic System Using Kinect

Authors : Dr. Gireeshkumar T., Velayudhan, Anoop;

Publisher : Intelligent Computing, Communication and Devices: Proceedings of ICCD 2014, Volume 1

Steganalysis of LSB Using Energy Function

Authors : Dr. Amritha P. P., Dr. M. Sethumadhavan, Muraleedharan, S., and Rajeev, K.

Publisher : Intelligent Systems Technologies and Applications.

Role-Based Access Control for Encrypted Data Using Vector Decomposition

Authors : Praveen I., Dr. Praveen K., D. Nidhin

Publisher : Proceedings of the International Conference on Soft Computing Systems: ICSCS 2015,

Protecting the Augmented Browser Extension from Mutation Cross-Site Scripting

Authors : Dr. Praveen K., S. Remya

Publisher : Proceedings of the Second International Conference on Computer and Communication Technologies: IC3T 2015.

Information Hiding in H.264, H.265, and MJPEG

Authors : Dr. Amritha P. P., S. Priya

Publisher : Proceedings of the International Conference on Soft Computing Systems: ICSCS 2015.

Gigabit Network Intrusion Detection System Using Extended Bloom Filter in Reconfigurable Hardware

Authors : Dr. Gireeshkumar T., Jose, Akshay Eldho;

Publisher : Proceedings of the Second International Conference on Computer and Communication Technologies: IC3T 2015.

Active Warden Attack on Steganography Using Prewitt Filter

Authors : Dr. Amritha P. P., Induja, K., and Rajeev, K.

Publisher : Proceedings of the International Conference on Soft Computing Systems: ICSCS 2015, Volume 2, Springer India, Number 398, New Delhi, p.591–599

Jordan Center Segregation: Rumors in Social Media Networks

Authors : Mr. Ashok Kumar Mohan, R. Krithika, and Sethumadhavan, M

Publisher : Security in Computing and Communications: 5th International Symposium, SSCC 2017, Manipal, India, September 13–16, 2017, Proceedings

A Survey on Digital Image Steganographic Methods

Authors : Dr. Gireesh Kumar T., P. P. Amritha

Publisher : IGI Global

Book

Discrete Mathematics and Its Applications

Authors : Dr. M. Sethumadhavan

Publisher : Alpha Science Int’l Ltd

Other

Investigations on Methods Evolved for Protecting Sensitive Data

Publisher : International Advanced Research Journal In Science, Engineering And Technology (IARJSET)

A Fully Simulatable Oblivios Transfer Scheme using Vector Decomposition

Publisher : International Conference on Intelligent computing, Communication and Devices (ICCD-2014), Advances in Intelligent Systems and Computing

From Facebook to Safebook : Review on Methods For Social Network Data Protection

Publisher : International Advanced Research journal in Science, Engineering and Technology (IARJSET)

Certain Investigations On Securing Moving Data Objects

Publisher : International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

SMScala: An android service manager component against malicious service launch in scala

Publisher : International Journal of Applied Engineering Research

A real time scoring system to detect and report malicious domains

Publisher : International Journal of Applied Engineering Research

Investigations On Method Developed For Effective Discovery Of Functional Dependencies

Publisher : International Journal of Innovative Research in Science, Engineering and Technology (IJIRCCE)

Identification of malicious android app using manifest and opcode features

Publisher : Journal of Computer Virology and Hacking Techniques

A Quasigroup Based Synchronous Stream Cipher for Lightweight Applications

Publisher : Communications in Computer and Information Science

Adding Continuous Proactive Forensics to Android

Publisher : Communications in Computer and Information Science

A Modern approach to identify the fake news using machine learning

Publisher : International Journal of Pure and Applied Mathematics

Malware capturing and detection in dionaea honeypot

Publisher : 2017 Innovations in Power and Advanced Computing Technologies, i-PACT 2017

Maintaining the integrity of digital evidence using piecewise hashing

Publisher : International Journal of Pure and Applied Mathematics

An investigation on HTTP/2 security

Publisher : Journal of Cyber Security and Mobility

Destroying steganography usage over HTTPS

Publisher : International Journal of Pure and Applied Mathematics

Defensive coding framework

Publisher : International Journal of Pure and Applied Mathematics

Cheating Immune Visual Cryptographic Scheme with Reduced Pixel Expansion

Publisher : Advances in Intelligent Systems and Computing

An approach for hiding in GSM Communication

Publisher : International Journal of Pure and Applied Mathematics

A study on the Corda and Ripple blockchain platforms

Publisher : Advances in Intelligent Systems and Computing

IoT: Security Challenges and Mitigations

Publisher : International Journal of Recent Technology and Engineering (IJRTE)

Abnormal user pattern detection using semi-structured server log file analysis

Publisher : Smart Innovation, Systems and Technologies

Admissions Apply Now