Back close
Block Image

Area of Research

The centre is pursuing various research projects with Govt. agencies in the areas of Encryption, Visual cryptography, Steganalysis, Secure Coding, Web security, Intrusion Detection and Prevention. Our M.Tech students work as interns in premier Security companies in their final semester for completing their thesis work relating theory to practice and become conversant with all aspects of Security – theoretical, developmental, research and operational.

Block Image
  • Cryptography and Cryptanalysis
  • Steganography and Steganalysis
  • Cloud Security
  • Digital Forensics
  • Web Security
  • Mobile Security
  • Information Hiding
  • Machine Learning
  • Visual Cryptography and Secret Sharing
  • Operating System Security
  • Big Data Security
  • Data Base Security
  • Blockchain Technology
  • Cyber Forensics

Sponsored Projects

 

Sl. No R&D PROJECTS Funding Agency
1. Development of Secure and Authenticated Encryption Scheme for Lightweight Applications DeitY
2. Predictive Threat Evaluation in Complex IT Systems DRDO
3. Development of Fast and Effective Cryptographic Techniques ISRO
4. Design and Analysis of Cryptographically Secure Pseudorandom Number Generators DRDO
5. VLSI Development of Finite Field Arithmetic NTRO
6. Next Generation Secure Internet Technologies for Globally Distributed Enterprises DST
7. Analysis of Word Based Stream Ciphers ISRO
8. Error Linear Complexity Measures for Multisequences ISRO
9. Classified Image Transmission Systems SAG, DRDO
10. Indo-Trento Project on Distributed Software Engineering TIFR
11. Hardware based Network Intrusion Detection Systems for High Speed Networks ISRO
12. An ISRO Sponsored Project on Cryptography ISRO
13. Development of Visual Cryptographic Schemes ISRO

Journal Article

SwaRma- A Women Safety Device

Authors : Hemalatha P, S.Kanimozhi,K.Anitha

Publisher : IRJET

Farmbot-a smart agriculture assistor using internet of things

Authors : Hemalatha P, K Dhanalakshmi, S Matilda, M BalaAnand

Development of Speech Interface for Challan Application using Speech Recognition

Authors : Dr. V. Sujitha, K.Abinaya K.Tamilselvi, R.Kirubamanohari, S.Gayathiri , M.Nivetha

VNF-Enabled 5G Network Orchestration Framework for Slice Creation, Isolation and Management

Authors : Dr. V. Sujitha, Thiruvenkadam Srinivasan, Han-Gue Jo, In-Ho Ra

Publisher : MDPI

A Heuristic Fuzzy Based 5G Network Orchestration Framework for Dynamic Virtual Network Embedding

Authors : Dr. V. Sujitha, Srinivasan Thiruvenkadam, Han-Gue Jo, In-Ho Ra

Publisher : MDPI

An E2E Network Slicing Framework for Slice Creation and Deployment Using Machine Learning

Authors : Dr. V. Sujitha, Thiruvenkadam Srinivasan, Han-Gue Jo, In-Ho Ra

Publisher : MDPI

Ensemble Graph Neural Network Model for Classification of Major Depression Disorder using Whole-Brain Functional Connectivity

Authors : Dr. V. Sujitha, Mikhail Votinov, Lisa Wagels, Sangyun Kim, Munseob Lee, Ute Habel, In-Ho Ra, Han-Gue Jo

Publisher : Frontiers

Inter and intra-observer variabilities in the measurement of aqueous flare with a custom-made ocular spot fluorometer

Authors : Sirisha Tadepalli, Dr. Surekha P., Hadiya Farhath Pattan, Bongoni Vishwanath, Prema Padmanabhan, Rachapalle Reddi Sudhir, Abhilash Ravi Kumar, Jyotirmay Biswas, Sangly P Srinivas

Publisher : Investigative Ophthalmology & Visual Science

An intelligent question answering conversational agent using Nave Bayesian classifier

Authors : Dr. Gireesh Kumar T., Niranjan, M., Saipreethy, M. S.

Publisher : Technology Enhanced Education (ICTEE),

Survey on various steganographic algorithms

Authors : Nimmy K., Deepa, R., Thiruppathi, K., & Reshma R

Publisher : Proceedings of International Conference on Information and network technology

A more ecient and faster pairing computation with cryptographic security

Authors : Dr. M. Sethumadhavan, Praveen, I

Publisher : Proceedings of the first international conference on security of internet of things

Rough multisets and information multi-systems

Authors : Girish, K. P., & Jacob John, S

Publisher : Advances in Decision Sciences

Linear Complexity Measures of Binary Multi-sequences

Authors : Dr. M. Sethumadhavan, Sindhu, M

Publisher : International Journal of Computer Applications, 62(16), (pp. 6-10).

An Application of Vector Decom- position Problem in Public Key Cryptography Using Homomorphic Encryption

Authors : Dr. M. Sethumadhavan, Praveen, I

Publisher : proceedings of International Conference on Emerging Research in Computing, Information, Communication and Applications – ERICA 2013 (pp. 328-331).

Optimally Locating for Hiding Information in Audio Signal

Authors : Premalatha P., Amritha, P. P

Publisher : International Journal of Computer Applications (0975- 8887), Vol. 65, No.14,(pp. 37-42).

Counting rotation symmetric functions using Polyas theorem

Authors : Dr. M. Sethumadhavan, Lakshmy, K. V, Cusick, T. W

Publisher : Discrete Applied Mathematics,

On the k-error Joint Linear Complex- ity and Error Multisequence over Fq (charFq = p; prime)

Authors : Dr. M. Sethumadhavan, Sindhu, M.

Publisher : Recent Trends in Computer Networks and Distributed Systems Security (pp. 512-519). Springer Berlin Heidelberg.

A Framework for Analyzing the Security of Chrome Extensions

Authors : Dr. M. Sethumadhavan, Aravind, V

Publisher : Advanced Computing, Networking and Informatics- Volume 2 (pp. 267-272). Springer International Publishing.

Use of Machine Learning Algorithms with SIEM for Attack Prediction

Authors : Anumol, E. T

Publisher : Intelligent Computing, Communication and Devices (pp. 231-235). Springer India.

Comparative Analysis of Digital Watermarking in Discrete Wavelet Transform and Mojette Transform

Authors : Rajeev, Chandini, & Girish, K. P

Publisher : Artificial Intelligence and Evolutionary Algorithms in Engineering Systems (pp. 667-672). Springer India.

Log Analysis Based Intrusion Prediction System

Authors : Menon, R. P

Publisher : Emerging ICT for Bridging the Future Proceedings of the 49th Annual Convention of the Computer Society of India (CSI)

A Filtering Based Android Malware Detection System for Google Play Store

Authors : Andoor, J. T

Publisher : Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014 (pp. 559-566). Springer International Publishing.

Phish Indicator: An Indication for Phishing Sites

Authors : Aparna, S, Muniasamy, K

Publisher : Artificial Intelligence and Evolutionary Algorithms in Engineering Systems (pp. 481-487). Springer India.

A Three Factor Authentication System for Smartcard Using Biometric, Visual Cryptography and OTP

Authors : Kumar, A. S., Girish, K. P

Publisher : Artificial Intelligence and Evolutionary Algorithms in Engineering Systems (pp. 673-679). Springer India.

A Fully Simulatable Oblivious Transfer Scheme Using Vector Decomposition

Authors : Kumar, M; Praveen

Publisher : In Intelligent Computing, Communication and Devices (pp. 131-137). Springer India.

Real-Time Intrusion Prediction Using Hidden Markov Model with Genetic Algorithm

Authors : Divya, T, Muniasamy, K

Publisher : Artificial Intelligence and Evolutionary Algorithms in Engineering Systems (pp. 731-736). Springer India.

On the k-error Joint Linear Complexity and Error Multisequence over F

Authors : Dr. M. Sethumadhavan, M. Sindhu

Publisher : Communications in Computer and Information Science

A distortion free relational database watermarking using patch work method

Authors : Dr. Praveen K., Arun, R, Bose, D. C., & Nath, H. V

Publisher : Advances in Intelligent and Soft Computing

Image Steganographic Scheme Based On Modified Tri-way PVD in Orthogonal Domain

Authors : Dr. Gireesh Kumar T., Alexander, A., Varghese, J., and Johnson, S.

Publisher : Indo-US Conference and Workshop on Cyber Security, Cyber Crime and Cyber Forensics

Mobile Robot Pose Estimation Based on Particle Filters for Multi-dimensional State Spaces

Authors : Dr. Gireesh Kumar T., Divya Udayan, J.a; John, R.M.c; Poornaselvan, K.J.d; Lakshmanan, S.A.a

Publisher : Communications in Computer and Information Science

Low Budget Honeynet Creation and Implementation for Nids and Nips

Authors : Dr. Gireesh Kumar T., Aathira.K.S; Hiran.V.Nath; Thulasi.N. Kutty;

Publisher : (IJCNS) International Journal of Computer and Network Security

Response Time Analysis for Querying Data on Order Preserved Encrypted Buckets

Authors : Ms. Santhya R.

Publisher : International Journal of Control Theory and Applications

Fabrication and performance of hybrid betel nut (Areca Catechu) short fibre/Sansevieria cylindrica (Agavaceae) polypropylene composite

Authors : Mr. Ashok Kumar Mohan, Reddy, G Ramachandra; Reddy, K Hemachandra; Reddy, Y Venkata Mohana; Reddy, P Ranga; Reddy, N Subbarami

Publisher : Ind. J. Mater. Sci

Self Localization of a Mobile Robot in Planetary Terrain

Authors : Dr. Divya Udayan J., Roshy M John, Gireesh Kumar T, KJ Poornaselvan

Publisher : International Journal of Embedded Systems and Computer Engineering

Steganalysis for calibrated and lower embedded uncalibrated images

Authors : Dr. Gireesh Kumar T., Shankar, D.D.; Nath, H.V.

Publisher : Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

Prevention of PAC File Based Attack Using DHCP Snooping

Authors : Jevitha K. P., Atul, K.R.;

Publisher : Communications in Computer and Information Science

Stride based analysis of the chrome browser extensions API

Authors : Jevitha K. P., P. K. Akshay Dev

Publisher : Advances in Intelligent Systems and Computing

Tracking of nose tip: An alternative for mouse

Authors : Dr. Gireesh Kumar T., Poornaselvan, K.J.b; Sattviksharmaa; Gulshankumara; Sreevathsan, R.a

Publisher : Lecture Notes in Computer Science

Survey On Privacy Preserving Data Publishing Of Numerical Sensitive Data

Authors : Ms. Santhya R.

Publisher : International Journal of Emerging Technology Advanced Engineering

Cognitive environment for pervasive learners

Authors : Dr. Gireesh Kumar T., Sharma, S.; Sreevathsan, R.; Srikanth, M.V.V.N.S.; Harshith, C.;

Publisher : Communications in Computer and Information Science

Opaque Predicate Detection by Static Analysis of Binary Executables

Authors : Dr. M. Sethumadhavan, Prakash, R.K.R.; Amritha, P.P.;

Publisher : Communications in Computer and Information Science

Vulnerability assessment methods – A review

Authors : Nath, H.V

Publisher : Communications in Computer and Information Science

A framework for dynamic malware analysis based on behavior artifacts

Authors : Dr. Gireesh Kumar T., Gregory Paul, T.G.;

Publisher : Advances in Intelligent Systems and Computing

Counting rotation symmetric functions using Polya’s theorem

Authors : Dr. M. Sethumadhavan, Lakshmy K.V.; Thomas W. Cusick

Publisher : Discrete Applied Mathematics

Payload Estimation in Universal Steganalysis

Authors : Dr. Amritha P. P., Madathil, A.

Publisher : Defence Science Journal

A Novel Method for MP3 Steganalysis

Authors : Premalatha P., Kuriakose, R

Publisher : Intelligent Computing, Communication and Devices: Proceedings of ICCD 2014, Volume 1

Decrypting Shared Encrypted Data Files Stored in a Cloud Using Dynamic Key Aggregation

Authors : Dr. M. Sethumadhavan, Maria James, Chungath Srinivasan, K. V. Lakshmy

Publisher : Computational Intelligence, Cyber Security and Computational Models: Proceedings of ICC3 2015

A low overhead prevention of android web view abuse attacks

Authors : Dr. Praveen K., K. Jamsheed

Publisher : Communications in Computer and Information Science

A Hybrid Approach for Querying Numeric data in DAS-Model

Authors : Dr. Praveen K., K. R. Arjun

Publisher : International Journal of Control Theory and Applications

An Android Application for Secret Image Sharing with Cloud Storage

Authors : Dr. Praveen K., Dr. M. Sethumadhavan, Indu, G.; Santhya, R.;

Publisher : Communications in Computer and Information Science

Multiset topologies induced by multiset relations

Authors : Dr. Johns Shaji Mathew, John, S. J

Publisher : Information Sciences

An algorithm for k-error joint linear complexity of binary multisequences

Authors : Dr. M. Sethumadhavan, Dr. Srinivasan C., Dr. Sindhu M., and Kavitha, C.

Publisher : Journal of Discrete Mathematical Sciences and Cryptography

Hash-One: a lightweight cryptographic hash function

Authors : Dr. M. Sethumadhavan, Dr. Srinivasan C., Megha, P., and Dr. Sindhu M.

Publisher : IET Information Security, Institution of Engineering and Technology.

Android smudge attack prevention techniques

Authors : Dr. Praveen K., M. D. Amruth

Publisher : Advances in Intelligent Systems and Computing, Springer Verlag,

An encryption technique to thwart android binder exploits

Authors : Jevitha K. P., Ya Kaladharan; Mateti, Pb

Publisher : Advances in Intelligent Systems and Computing, Springer Verlag.

A compressed video steganography using TPVD

Authors : Dr. Amritha P. P., A. P. Sherly

Publisher : International Journal of Database Management Systems (IJDMS)

A Survey on Digital Image Steganographic Methods

Authors : Dr. Amritha P. P., Dr. Gireesh Kumar T.

Publisher : Cyber Security, Cyber Crime and Cyber Forensics: Applications and Perspectives

Active steganalysis on svd-based embedding algorithm

Authors : Dr. Amritha P. P., Dr. M. Sethumadhavan, Ravi, R. P.

Publisher : Advances in Intelligent Systems and Computing

An authenticated key agreement scheme using vector decomposition

Authors : Praveen I., Rajeev, K., and Sethumadhavan, M.

Publisher : Defence Science Journal, Defense Scientific Information and Documentation Centre,

An Advanced Steganographic Scheme with Diamond Encoding and Morphological Neural Network

Authors : Dr. Gireesh Kumar T., S. Sasidharan, .A.P, S., .N.R, K., .Y, A.

Publisher : pp. 3-14

A Selective Generation of Hybrid Random Numbers via Android Smart Phones

Authors : Dr. M. Sethumadhavan, Mr. Ashok Kumar Mohan, Dr. Nirmala Devi M., and Santhya R

Publisher : International Journal of Pure and Applied Mathematics

Counting rotation symmetric functions using Polya’s theorem

Authors : Dr. Lakshmy K. V., Sethumadhavan, M., and Cusick, T. W.

Publisher : Discrete Applied Mathematics

Self Localization and pose estimation of Mobile robot

Authors : Dr. Gireesh Kumar T.

Publisher : International journal of Embedded System and Computer Engineering

On the removal of steganographic content from images

Authors : Dr. Amritha P. P., Dr. M. Sethumadhavan, Krishnan, R.

Publisher : Defence Science Journal, Defense Scientific Information and Documentation Centre, Volume 66, Number 6, p.574-581.

A Novel Cloud Based NIDPS for Smartphones

Authors : Dr. Gireesh Kumar T., Pandian, V.A.; Dr. Gireesh K. T.

Publisher : Communications in Computer and Information Science

Partial Password Authentication using Vector Decomposition

Authors : Praveen I., Dr. M. Sethumadhavan

Publisher : International Journal of Pure and Applied Mathematics

Static and Dynamic Analysis for Android Malware Detection

Authors : Dr. Gireesh Kumar T., Sugunan, K.; Dhanya, K.A.

Publisher : Advances in Big Data and Cloud Computing, Advances in Intelligent Systems and Computing

Spatial Outlier Detection Algorithm for Trajectory Data

Authors : Dr. Sabarish B. A., Dr. R. Karthi, Dr. Gireesh Kumar T.

Publisher : International Journal of Pure and Applied Mathematics

Cube Attack on Stream Ciphers using a Modified Linearity Test

Authors : Dr. Srinivasan C., Dr. M. Sethumadhavan, ; Pillai, U.U.; Lakshmy K.V.;

Publisher : Journal of Discrete Mathematical Sciences and Cryptography, Taru Publications

Data Hiding in Slack Space Revisited

Authors : Mr. Ashok Kumar Mohan, Thampy, R. V., and Praveen, K.

Publisher : International Journal of Pure and Applied Mathematics

The Art of Piecewise Hashing: A step toward better evidence provability

Authors : Dr. M. Sethumadhavan, Mr. Ashok Kumar Mohan, A. Gopalakrishnan, Vineti, E.

Publisher : Journal of Cyber Security and Mobility

String based Feature Representation for Trajectory Clustering

Authors : Dr. Sabarish B. A., Dr. R. Karthi, Dr. Gireesh Kumar T.

Publisher : International Journal of Embedded and Real-Time Communication Systems (IJERTCS)

Ransomware Analysis Using Reverse Engineering

Authors : Dr. Gireesh Kumar T., Naveen, S.;

Publisher : Communications in Computer and Information Science

Opportunistic Mobile Social Networks: Architecture, Privacy, Security Issues and Future Directions

Authors : Dr. Gireesh Kumar T., Vidhya Lakshmi, V.R.;

Publisher : International Journal of Electrical and Computer Engineering

Privilege-based scoring system against cross-site scripting using machine learning

Authors : Dr. Gireesh Kumar T., Sunder, N.S.;

Publisher : Advances in Intelligent Systems and Computing

Differential Execution Analysis for Obfuscation Reduction

Authors : Robert, R. Reno

Publisher : Springer Berlin Heidelberg.

Advance Persistent Threat Detection Using Long Short Term Memory (LSTM) Neural Networks

Authors : Dr. Gireesh Kumar T., Sai Charan, P.V.; Mohan Anand, P.

Publisher : Communications in Computer and Information Science

Affine equivalence of monomial rotation symmetric Boolean functions: A Pólya’s theorem approach

Authors : Dr. Lakshmy K. V., T. W. Cusick, and Sethumadhavan, M.

Publisher : Journal of Mathematical Cryptology, Walter de Gruyter GmbH.

Visual cryptographic schemes using combined Boolean operations

Authors : Dr. Praveen K., Sethumadhavan, M., and Krishnan, R.

Publisher : Journal of Discrete Mathematical Sciences and Cryptography

Vision based robot navigation for disaster scenarios

Authors : Dr. Gireesh Kumar T., Sudheesh, P;

Publisher : International Journal of Computer Applications

Analyzing the Makier Virus

Authors : Dr. Praveen K., Dr. Ritwik M.

Publisher : International Journal of Computer Science

Comparative Study of Algorithms for Frontier based Area Exploration and Slam for Mobile Robots

Authors : Dr. Gireesh Kumar T., Dayanand, V.; Rahul Sharma

Publisher : International Journal of Computer Applications

Linear Complexity Measures of Binary Multisequences

Authors : Dr. M. Sethumadhavan, Dr. Sindhu M.

Publisher : International Journal of Computer Applications

Optimally Locating for Hiding Information in Audio Signal

Authors : Dr. Amritha P. P., P. Premalatha

Publisher : International Journal of Computer Applications

Clustering of trajectory data using hierarchical approaches

Authors : Dr. Sabarish B. A., Dr. R. Karthi, Dr. Gireesh Kumar T.

Publisher : Lecture Notes in Computational Vision and Biomechanics

Foreground Estimation in a Degraded Text document

Authors : Dr. Gireesh Kumar T., Bhuvana I Chandra; Nagarjunavarma, K.

Publisher : International Journal of Computer Applications

Efficient Android Malware Scanner using Hybrid Analysis

Authors : Dr. Gireesh Kumar T., K.A. Dhanya;

Publisher : International Journal of Recent Technology and Engineering (IJRTE)

Sequences; Predictability and Linear Complexity Measures

Authors : Dr. M. Sethumadhavan

Publisher : Discrete Mathematics and Its Applications

Conference Paper

A chatbot mobile quarantine app for stress relief

Authors : Hemalatha P, S Sriram, J Manikandan, G Leema Roselin

Publisher : IEEE

Revolutionizing secure commercialization in agriculture using blockchain technology

Authors : Hemalatha P, K Kiruba, J Manikandan, M Madhin, Raj S Mohan

Publisher : IEEE

Border Security System for Fishermen using Radio Frequency Technique with Live Streaming

Authors : Dr. V. Sujitha, V Anandhan, S Anukeerthana, AS Dhanusriya, M Manibharathi

Publisher : IEEE

Selection of Apt Renewable Energy Source for Smart Cities using Generalized Orthopair Fuzzy Information

Authors : Dr. Sangeetha Viswanathan, R. Krishankumar, Pratibha Rani, K. S. Ravichandran, Amir H. Gandomi

Publisher : IEEE

Image Steganographic Scheme Based On Modied Triway PVD in Orthogonal Domain

Authors : Dr. Gireesh Kumar T., Anna Alexander, Jina Varghese, Sneha Johnson

Publisher : Indo-US Conference and Workshop on Cyber Security, Cyber Crime and Cyber Forensics, Aug 19-21, 2009.

Active Steganalysis on SVDBased Embedding Algorithm

Authors : Dr. M. Sethumadhavan, Amritha P. P, Ravi R. P

Publisher : Proceedings of the 5th International Conference on Frontiers in Intelligent Computing

Gigabit Network Intrusion Detection System Using Extended Bloom Filter in Re-configurable Hardware

Authors : Dr. Gireeshkumar T., Akshay Eldho Jose

Publisher : Proceedings of the Second International Conference on Computer and Communication Technologies

Prevention of Fault Attacks in ASCON Authenticated Cipher Using Cellular Automata

Authors : Ambili Kakkad Narayanan, Joseph Jacob, Jossy Joseph, M. K. Abinshad,Email ,Jimmy Jose

Publisher : Conference International Conference on Cellular Automata for Research and Industry

Trust Based Intrusion Detection System to Detect Insider Attacks in IoT Systems

Authors : Ambili Kakkad Narayanan, Jimmy Jose

Publisher : Book Information Science and Applications

Strengthening ACORN Authenticated Cipher with Cellular Automata

Authors : Ambili Kakkad Narayanan, Jossy Joseph,Joseph Jacob, M. K. Abinshad, Email, Jimmy Jose

Publisher : Conference International Conference on Cellular Automata for Research and Industry

A More Efficient and Faster Pairing Computation with Cryptographic Security

Authors : Praveen I., Dr. M. Sethumadhavan

Publisher : Proceedings of the First International Conference on Security of Internet of Things

Sum Chain Based Approach against Session Hijacking in MPTCP

Authors : Dr. M. Sethumadhavan, Akash Krishnan, V.; Amritha, P.P.

Publisher : Procedia Computer Science

Feature based steganalysis using wavelet decomposition and magnitude statistics

Authors : Dr. Gireesh Kumar T., Jithin, R.; Shankar, D.D.

Publisher : ACE 2010 – 2010 International Conference on Advances in Computer Engineering

An Efficient Embedding and Restoration Steganographic Scheme for Secure Multimedia Communication

Authors : Dr. Gireesh Kumar T., Sasidharan, Sapna; N., Karthikha; A.P., Sherly; Y., Avani

Publisher : Proceedings of the 2010 International Conference on Advances in Computer Engineering

Reconciliation engine and metric for network vulnerability assessment

Authors : Dr. M. Sethumadhavan, H. Va Nath, and Gangadharan, Kb

Publisher : ACM International Conference Proceeding Series

On federated and proof of validation based consensus algorithms in blockchain

Authors : Ambili Kakkad Narayanan, M. Sindhu and M. Sethumadhavan

Publisher : IOP Conference Series: Materials Science and Engineering

Multi-Level Steganography for Smart phones

Authors : Dr. Amritha P. P., V. A. C

Publisher : Networks Soft Computing (ICNSC), 2014 First International Conference on

Equitable machine learning algorithms to probe over P2P botnets

Authors : Mridula Menon N, Bharathula P

Publisher : Advances in Intelligent Systems and Computing, Springer Verlag.

CBEAT: Chrome Browser Extension Analysis Tool

Authors : Jevitha K. P., Roy, Sudakshina Singha;

Publisher : Security in Computing and Communications, Springer Singapore.

Student centric design for cyber security knowledge empowerment

Authors : A. Joshi, Ramani, V., Murali, H., Krishnan, R., Mithra, Z., and Pavithran, V

Publisher : ICTEE

High Speed Network Intrusion Detection System Using FPGA

Authors : Dr. Gireesh Kumar T., Anuraj, S.; P. Premalatha;

Publisher : Proceedings of the Second International Conference on Computer and Communication Technologies: IC3T 2015

An intelligent question answering conversational agent using Naïve Bayesian classifier

Authors : Niranjan, M.a; Saipreethy, M.S.a; Kumar, T.G.b

Publisher : ICTEE

Neighbor Attack Detection in Internet of Things

Authors : Dr. Gireesh Kumar T., Mr. Ashok Kumar Mohan, Thomas, Arun

Publisher : Advanced Computational and Communication Paradigms

Disk memory forensics: Analysis of memory forensics frameworks flow

Authors : Mr. Ashok Kumar Mohan

Publisher : 2017 Innovations in Power and Advanced Computing Technologies, i-PACT 2017

Facial Expression Classification Using Machine Learning Approach: A Review

Authors : Baskar A., Dr. Gireesh Kumar T.

Publisher : Advances in Intelligent Systems and Computing

Frontier based multi robot area exploration using prioritized routing

Authors : Dr. Gireesh Kumar T., Rahul, S.K.; Honc, D.; Dušek, F.; Herrmann F.; Rose O.; Manitz M.

Publisher : Proceedings – 30th European Conference on Modelling and Simulation, ECMS 2016, European Council for Modelling and Simulation, p.25-30

Conference Proceedings

Non linear secret sharing for gray scale images

Authors : Dr. Amritha P. P., Dr. Lakshmy K. V., A. Nandakumar, and Talluri, V. S.

Publisher : Procedia Engineering

Ideal Contrast Visual Cryptography for General Access Structures with AND Operation.

Authors : Dr. Praveen K., Dr. M. Sethumadhavan

Publisher : In Proceedings of 3rd International Conference on Advanced Computing, Networking and Informatics: ICACNI 2015, Springer India.

Agent Based Ground Flight Control Using Type-2 Fuzzy Logic And Hybrid Ant Colony Optimization To A Dynamic Environment

Authors : Dr. Gireesh Kumar T., Poornaselvan.K.J,; Vijayan. V.P

Publisher : First International Conference on Emerging Trends in Engineering and Technology

On the k-error Joint Linear Complexity and Error Multisequence over F q (char F q= p, prime)

Authors : Dr. M. Sethumadhavan, M. Sindhu

Publisher : Recent Trends in Computer Networks and Distributed Systems Security, Springer Berlin Heidelberg

On the Extensions of (k, n)*-Visual Cryptographic Schemes

Authors : Dr. Praveen K., Dr. M. Sethumadhavan, Rajeev, K.

Publisher : In Recent Trends in Computer Networks and Distributed Systems Security

A Framework for Analysing the Security of Chrome Extensions

Authors : Dr. M. Sethumadhavan, V. Aravind

Publisher : Advanced Computing, Networking and Informatics

An Application of Vector Decomposition problem in Public key Cryptography using homomarphic Encryption

Authors : Dr. Praveen K., Dr. M. Sethumadhavan

Publisher : International Conference on Emerging Research in Computing Information Communication and Applications

Book Chapter

Assessment Of An Ant-Inspired Algorithm For Path Planning’, Biomimicry for Materials

Authors : Dr. Sangeetha Viswanathan, R. Krishankumar, K. S. Ravichandran, Amir H. Gandomi

Publisher : Elsevier

Agent based ground ight control using type-2 fuzzy logic and hybrid ant colony optimization to a dynamic environment

Authors : Dr. Gireesh Kumar T., Poornaselvan, K. J., Vijayan, V. P

Publisher : Emerging Trends in Engineering and Technology, 2008. ICETET’08. First International Conference on (pp. 343-348). IEEE.

Feature Based Classification System for JPEG Steganalysis

Authors : Dr. Gireeshkumar T., Shankar, D. D, Jithin, R

Publisher : Conference Proceedings RTCSP (Vol.10), (pp. 1 – 4).

An algorithm for k-error joint linear complexity of binary multi-sequences

Authors : Dr. M. Sethumadhavan, M. Sindhu , Chungath Srinivasan , C. Kavitha

Publisher : Journal of Discrete Mathematical Sciences and Cryptography

A Novel Approach for Compressed Video Steganography

Authors : Dr. Amritha P. P., A. P. Sherly, Sasidharan, S., and Raj, A. S.

Publisher : Recent Trends in Network Security and Applications: Third International Conference, CNSA 2010, Chennai, India, July 23-25, 2010. Proceedings

Feature based Classification System for Image Steganalysis

Authors : Dr. Gireesh Kumar T., D. D.Shankar

Publisher : International Conference on Computer Communication and Network

Secure Seed-Based Sturdy OTP via Convenient Carry-on Device

Authors : Dr. Gireesh Kumar T., Mr. Ashok Kumar Mohan

Publisher : Artificial Intelligence and Evolutionary Algorithms in Engineering Systems: Proceedings of ICAEES 2014, Volume 1

A Novel Authentication Framework for Hadoop

Authors : Dr. Gireesh Kumar T., Rahul, P. K.;

Publisher : Artificial Intelligence and Evolutionary Algorithms in Engineering Systems: Proceedings of ICAEES 2014, Volume 1

A Probabilistic Method Toward SLAM for Mobile Robotic Systems

Authors : Dr. Gireesh Kumar T., Anoop, R. S.; Saisuriyaa, G.

Publisher : Intelligent Computing, Communication and Devices: Proceedings of ICCD 2014, Volume 1

Block Dependency Feature Based Classification Scheme for Uncalibrated Image Steganalysis

Authors : Dr. Praveen K., Dr. Gireesh Kumar T., D. D. Shankar, Jithin, R., and Raj, A. S.

Publisher : Springer Berlin Heidelberg

Network Intrusion Detection System Based On Machine Learning Algorithms

Authors : Dr. Gireesh Kumar T., Vipin Das, V. Das, Pathak, V., Sharma, S., ,, .Srikanth, M. V. V. N. S.

Publisher : IJCSIT

Analysis of Algebraic Attack on TRIVIUM and Minute Modification to TRIVIUM

Authors : Dr. Srinivasan C., A. S. Raj

Publisher : Advances in Network Security and Applications: 4th International Conference, CNSA 2011, Chennai, India, July 15-17, 2011

Jordan Center Segregation: Rumors in Social Media Networks

Authors : Mr. Ashok Kumar Mohan, R. Krithika, and Sethumadhavan, M

Publisher : Security in Computing and Communications: 5th International Symposium, SSCC 2017, Manipal, India, September 13–16, 2017, Proceedings

Using Signature for Hidden Communication Prevention in IP Telephony

Authors : Dr. Amritha P. P., A. Rahman

Publisher : Artificial Intelligence and Evolutionary Algorithms in Engineering Systems: Proceedings of ICAEES 2014, Volume 2

A Novel Method for Secure Image Steganography

Authors : Dr. Amritha P. P., S. Anjana

Publisher : Artificial Intelligence and Evolutionary Algorithms in Engineering Systems: Proceedings of ICAEES 2014, Volume 1

Secretly Shared QR Code and Its Applications

Authors : Dr. Praveen K., G. S. Devisree

Publisher : Artificial Intelligence and Evolutionary Algorithms in Engineering Systems: Proceedings of ICAEES 2014, Volume 2

A (t, n) Secure Sum Multiparty Computation Protocol Using Multivariate Polynomial Secret Sharing Scheme

Authors : Dr. Praveen K., Sasi, N.

Publisher : Artificial Intelligence and Evolutionary Algorithms in Engineering Systems: Proceedings of ICAEES 2014, Volume 1

A Survey of Location Prediction Using Trajectory Mining

Authors : Dr. Sabarish B. A., Dr. R. Karthi, Dr. Gireesh Kumar T.

Publisher : Artificial Intelligence and Evolutionary Algorithms in Engineering Systems: Proceedings of ICAEES 2014,

A Survey on Digital Image Steganographic Methods

Authors : Dr. Gireesh Kumar T., P. P. Amritha

Publisher : IGI Global

Role-Based Access Control for Encrypted Data Using Vector Decomposition

Authors : Praveen I., Dr. Praveen K., D. Nidhin

Publisher : Proceedings of the International Conference on Soft Computing Systems: ICSCS 2015,

Gigabit Network Intrusion Detection System Using Extended Bloom Filter in Reconfigurable Hardware

Authors : Dr. Gireesh Kumar T., Jose, Akshay Eldho;

Publisher : Proceedings of the Second International Conference on Computer and Communication Technologies: IC3T 2015.

A Model for the Effective Steganalysis of VoIP

Authors : Dr. Amritha P. P., N. Jayasree

Publisher : Artificial Intelligence and Evolutionary Algorithms in Engineering Systems: Proceedings of ICAEES 2014, Volume 2

Steganalysis of LSB Using Energy Function

Authors : Dr. Amritha P. P., Dr. M. Sethumadhavan, Muraleedharan, S., and Rajeev, K.

Publisher : Intelligent Systems Technologies and Applications.

Information Hiding in H.264, H.265, and MJPEG

Authors : Dr. Amritha P. P., S. Priya

Publisher : Proceedings of the International Conference on Soft Computing Systems: ICSCS 2015.

Active Warden Attack on Steganography Using Prewitt Filter

Authors : Dr. Amritha P. P., Induja, K., and Rajeev, K.

Publisher : Proceedings of the International Conference on Soft Computing Systems: ICSCS 2015, Volume 2, Springer India, Number 398, New Delhi, p.591–599

Protecting the Augmented Browser Extension from Mutation Cross-Site Scripting

Authors : Dr. Praveen K., S. Remya

Publisher : Proceedings of the Second International Conference on Computer and Communication Technologies: IC3T 2015.

Complexity Measures of Cryptographically Secure Boolean Functions

Authors : Dr. Srinivasan C., Dr. M. Sethumadhavan, ;Lakshmy K.V.

Publisher : Cyber Security, Cyber Crime and Cyber Forensics: Applications and Perspectives

An Autonomous Obstacle Avoiding and Target Recognition Robotic System Using Kinect

Authors : Dr. Gireesh Kumar T., Velayudhan, Anoop;

Publisher : Intelligent Computing, Communication and Devices: Proceedings of ICCD 2014, Volume 1

Results on (2, n) Visual Cryptographic Scheme

Authors : Dr. Praveen K., Dr. M. Sethumadhavan

Publisher : Security in Computing and Communications: Second International Symposium, SSCC 2014, Delhi, India, September 24-27, 2014. Proceedings

A Probabilistic Essential Visual Cryptographic Scheme for Plural Secret Images

Authors : Dr. Praveen K., Dr. M. Sethumadhavan

Publisher : Advanced Computing, Networking and Informatics- Volume 2: Wireless Networks and Security Proceedings of the Second International Conference on Advanced Computing, Networking and Informatics (ICACNI-2014)

A construction of p-ary balanced sequence with large k-error linear complexity

Authors : Dr. M. Sethumadhavan, C. Yogha Lakxmie; C. Vijayagovindan

Publisher : Journal of Discrete Mathematical Sciences and Cryptography

A Multi-agent Optimal Path Planning Approach to Robotics Environment

Authors : Dr. Gireesh Kumar T., Vijayan.V.P.

Publisher : International Conference on Computational Intelligence and Multimedia Applications

Book

Discrete Mathematics and Its Applications

Authors : Dr. M. Sethumadhavan

Publisher : Alpha Science Int’l Ltd

Other

Certain Investigations On Securing Moving Data Objects

Publisher : International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

From Facebook to Safebook : Review on Methods For Social Network Data Protection

Publisher : International Advanced Research journal in Science, Engineering and Technology (IARJSET)

Investigations on Methods Evolved for Protecting Sensitive Data

Publisher : International Advanced Research Journal In Science, Engineering And Technology (IARJSET)

A Quasigroup Based Synchronous Stream Cipher for Lightweight Applications

Publisher : Communications in Computer and Information Science

A study on the Corda and Ripple blockchain platforms

Publisher : Advances in Intelligent Systems and Computing

A Modern approach to identify the fake news using machine learning

Publisher : International Journal of Pure and Applied Mathematics

Malware capturing and detection in dionaea honeypot

Publisher : 2017 Innovations in Power and Advanced Computing Technologies, i-PACT 2017

Maintaining the integrity of digital evidence using piecewise hashing

Publisher : International Journal of Pure and Applied Mathematics

Adding Continuous Proactive Forensics to Android

Publisher : Communications in Computer and Information Science

A real time scoring system to detect and report malicious domains

Publisher : International Journal of Applied Engineering Research

SMScala: An android service manager component against malicious service launch in scala

Publisher : International Journal of Applied Engineering Research

Destroying steganography usage over HTTPS

Publisher : International Journal of Pure and Applied Mathematics

Defensive coding framework

Publisher : International Journal of Pure and Applied Mathematics

An approach for hiding in GSM Communication

Publisher : International Journal of Pure and Applied Mathematics

An investigation on HTTP/2 security

Publisher : Journal of Cyber Security and Mobility

IoT: Security Challenges and Mitigations

Publisher : International Journal of Recent Technology and Engineering (IJRTE)

Investigations On Method Developed For Effective Discovery Of Functional Dependencies

Publisher : International Journal of Innovative Research in Science, Engineering and Technology (IJIRCCE)

Identification of malicious android app using manifest and opcode features

Publisher : Journal of Computer Virology and Hacking Techniques

A Fully Simulatable Oblivios Transfer Scheme using Vector Decomposition

Publisher : International Conference on Intelligent computing, Communication and Devices (ICCD-2014), Advances in Intelligent Systems and Computing

Cheating Immune Visual Cryptographic Scheme with Reduced Pixel Expansion

Publisher : Advances in Intelligent Systems and Computing

Abnormal user pattern detection using semi-structured server log file analysis

Publisher : Smart Innovation, Systems and Technologies

Admissions Apply Now