Unity Attractors Inspired Programmable Cellular Automata and Barnacles Swarm Optimization-Based Energy Efficient Data Communication for Securing IoT
Authors : Hemalatha P, K Dhanalakshmi
A Trust based mechanism for preventing Noncooperative Eavesdropping in WSN
Authors : Hemalatha P
Publisher : IJIRCCE
Development Of Iot Enabled Voice Recognition Robotic Guide Dog For Visually Impaired People To Enhance The Guiding And Interacting Experience
Authors : Hemalatha P, Dr.K.Dhanalakshmi
Publisher : Elsevier
An Efficient Post Life Organ Donor’s Identification Scheme using Fingerprint Recognition
Authors : Hemalatha P, G.Gnanaprakasam,M.Nivetha Kumari
Publisher : IJARTET
A Trust Based mechanism for preventing compromised and faulty nodes in Wireless Sensor Networks
Authors : Hemalatha P, Dr.K.Dhanalakshmi
Publisher : AENSI
Exploration On Green Communication Technologies For Iot In Health, Education And Industry
Authors : Hemalatha P, K Dhanalakshmi
A survey of various prefetching techniques in P2p video streaming
Authors : Hemalatha P, Giridharan ME
An Ontology-Based Adaptive Personalized E-Learning System, Assisted By Software Agents on Cloud Storage
Authors : Hemalatha P, N Shalini, S Giridharan
An Innovative Android Application for Maritime Border Alert System
Authors : Hemalatha P, D.Kowsalya, Dr.U.Palani
Cardiac Monitoring using Internet of Medical Things
Authors : Hemalatha P, F Anishya, RP KaaviyaPriya
Detecting and Preventing Wormhole Attacks In Wireless Sensor Networks
Authors : Hemalatha P
Publisher : IOSR
Development of IOT Enabled Robotic Guide Dog for visually impaired people to enhance the guiding and interacting experience
Authors : Hemalatha P, K Dhanalakshmi
Cellular Automata Based Energy Efficient Approach for Improving Security in IOT.
Authors : Hemalatha P, K Dhanalakshmi
A review on smart IOT car for accident prevention
Authors : Hemalatha P, S Vimalkumar, J Kalaivani
Farmbot-a smart agriculture assistor using internet of things
Authors : Hemalatha P, K Dhanalakshmi, S Matilda, M BalaAnand
Implementation of data mining techniques for weather report guidance for ships using global positioning system
Authors : Hemalatha P
Monitoring and securing the healthcare data harnessing IOT and blockchain technology
Authors : Hemalatha P
A Novel Approach for Biometric Identification through Palm and Hand Geometry
Authors : Dr. V. Sujitha, CT Subash
Securing UniBiometric Template Using Fuzzy Vault Cryptosystem
Authors : Dr. V. Sujitha, B Sophia, D Chitra
A Review On Biometric Cryptosystem Using Fuzzy Vault
Authors : Dr. V. Sujitha, D. Chitra
Palmprint Authentication Using Fuzzy Vault with Discrete Wavelet Transform
Authors : Dr. V. Sujitha, Dr. D. Chitra
Development of Speech Interface for Challan Application using Speech Recognition
Authors : Dr. V. Sujitha, K.Abinaya K.Tamilselvi, R.Kirubamanohari, S.Gayathiri , M.Nivetha
Mental Health and Psychosocial Aspects of Coronavirus Outbreak in India: A Survey on Psychological perspective on the benefit of college students through Data Mining Tool
Authors : Dr. V. Sujitha, Dr. D.SaravanaPriya, Dr. S. Suresh, Dr. S. Senthil kumar
Psychological Evaluation Of College Students: A Data Mining Approach Using C5.0 Algorithm
Authors : Dr. V. Sujitha, Dr. M. Umaselvi , Dr. D. Saravana priya
VNF-Enabled 5G Network Orchestration Framework for Slice Creation, Isolation and Management
Authors : Dr. V. Sujitha, Thiruvenkadam Srinivasan, Han-Gue Jo, In-Ho Ra
Publisher : MDPI
An E2E Network Slicing Framework for Slice Creation and Deployment Using Machine Learning
Authors : Dr. V. Sujitha, Thiruvenkadam Srinivasan, Han-Gue Jo, In-Ho Ra
Publisher : MDPI
Optimal Resource Allocation for 5G Network Slice Requests Based on Combined PROMETHEE-II and SLE Strategy
Authors : Dr. V. Sujitha, Thiruvenkadam Srinivasan, Han-Gue Jo, In-Ho Ra
Publisher : MDPI
A Heuristic Fuzzy Based 5G Network Orchestration Framework for Dynamic Virtual Network Embedding
Authors : Dr. V. Sujitha, Srinivasan Thiruvenkadam, Han-Gue Jo, In-Ho Ra
Publisher : MDPI
Ensemble Graph Neural Network Model for Classification of Major Depression Disorder using Whole-Brain Functional Connectivity
Authors : Dr. V. Sujitha, Mikhail Votinov, Lisa Wagels, Sangyun Kim, Munseob Lee, Ute Habel, In-Ho Ra, Han-Gue Jo
Publisher : Frontiers
Highly secure palmprint based biometric template using fuzzy vault
Authors : Dr. V. Sujitha, D Chitra
Inter and intra-observer variabilities in the measurement of aqueous flare with a custom-made ocular spot fluorometer
Authors : Sirisha Tadepalli, Dr. Surekha P., Hadiya Farhath Pattan, Bongoni Vishwanath, Prema Padmanabhan, Rachapalle Reddi Sudhir, Abhilash Ravi Kumar, Jyotirmay Biswas, Sangly P Srinivas
Publisher : Investigative Ophthalmology & Visual Science
On the statistical analysis of ZUC, ESPRESSO and Grain V1
Authors : Saurabh Shrivastava, Dr. Lakshmy K. V.
Publisher : International Journal of Computing
Survey on various steganographic algorithms
Authors : Nimmy K., Deepa, R., Thiruppathi, K., & Reshma R
Publisher : Proceedings of International Conference on Information and network technology
Rough multisets and information multi-systems
Authors : Girish, K. P., & Jacob John, S
Publisher : Advances in Decision Sciences
An intelligent question answering conversational agent using Nave Bayesian classifier
Authors : Dr. Gireesh Kumar T., Niranjan, M., Saipreethy, M. S.
Publisher : Technology Enhanced Education (ICTEE),
A more ecient and faster pairing computation with cryptographic security
Authors : Dr. M. Sethumadhavan, Praveen, I
Publisher : Proceedings of the first international conference on security of internet of things
Optimally Locating for Hiding Information in Audio Signal
Authors : Premalatha P., Amritha, P. P
Publisher : International Journal of Computer Applications (0975- 8887), Vol. 65, No.14,(pp. 37-42).
Linear Complexity Measures of Binary Multi-sequences
Authors : Dr. M. Sethumadhavan, Sindhu, M
Publisher : International Journal of Computer Applications, 62(16), (pp. 6-10).
An Application of Vector Decom- position Problem in Public Key Cryptography Using Homomorphic Encryption
Authors : Dr. M. Sethumadhavan, Praveen, I
Publisher : proceedings of International Conference on Emerging Research in Computing, Information, Communication and Applications – ERICA 2013 (pp. 328-331).
A Framework for Analyzing the Security of Chrome Extensions
Authors : Dr. M. Sethumadhavan, Aravind, V
Publisher : Advanced Computing, Networking and Informatics- Volume 2 (pp. 267-272). Springer International Publishing.
Counting rotation symmetric functions using Polyas theorem
Authors : Dr. M. Sethumadhavan, Lakshmy, K. V, Cusick, T. W
Publisher : Discrete Applied Mathematics,
On the Extensions of (k; n)-Visual Cryptographic Schemes
Authors : Dr. M. Sethumadhavan, Praveen, K., Rajeev, K
On the k-error Joint Linear Complex- ity and Error Multisequence over Fq (charFq = p; prime)
Authors : Dr. M. Sethumadhavan, Sindhu, M.
Publisher : Recent Trends in Computer Networks and Distributed Systems Security (pp. 512-519). Springer Berlin Heidelberg.
Use of Machine Learning Algorithms with SIEM for Attack Prediction
Authors : Anumol, E. T
Publisher : Intelligent Computing, Communication and Devices (pp. 231-235). Springer India.
A Filtering Based Android Malware Detection System for Google Play Store
Authors : Andoor, J. T
Publisher : Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014 (pp. 559-566). Springer International Publishing.
A Three Factor Authentication System for Smartcard Using Biometric, Visual Cryptography and OTP
Authors : Kumar, A. S., Girish, K. P
Publisher : Artificial Intelligence and Evolutionary Algorithms in Engineering Systems (pp. 673-679). Springer India.
Comparative Analysis of Digital Watermarking in Discrete Wavelet Transform and Mojette Transform
Authors : Rajeev, Chandini, & Girish, K. P
Publisher : Artificial Intelligence and Evolutionary Algorithms in Engineering Systems (pp. 667-672). Springer India.
Phish Indicator: An Indication for Phishing Sites
Authors : Aparna, S, Muniasamy, K
Publisher : Artificial Intelligence and Evolutionary Algorithms in Engineering Systems (pp. 481-487). Springer India.
Real-Time Intrusion Prediction Using Hidden Markov Model with Genetic Algorithm
Authors : Divya, T, Muniasamy, K
Publisher : Artificial Intelligence and Evolutionary Algorithms in Engineering Systems (pp. 731-736). Springer India.
Log Analysis Based Intrusion Prediction System
Authors : Menon, R. P
Publisher : Emerging ICT for Bridging the Future Proceedings of the 49th Annual Convention of the Computer Society of India (CSI)
A Fully Simulatable Oblivious Transfer Scheme Using Vector Decomposition
Authors : Kumar, M; Praveen
Publisher : In Intelligent Computing, Communication and Devices (pp. 131-137). Springer India.
Sequences; Predictability and Linear Complexity Measures
Authors : Dr. M. Sethumadhavan
Publisher : Discrete Mathematics and Its Applications
An algorithm for k-error joint linear complexity of binary multisequences
Authors : Dr. M. Sethumadhavan, Dr. Srinivasan C., Dr. Sindhu M., and Kavitha, C.
Publisher : Journal of Discrete Mathematical Sciences and Cryptography
Image Steganographic Scheme Based On Modified Tri-way PVD in Orthogonal Domain
Authors : Dr. Gireesh Kumar T., Alexander, A., Varghese, J., and Johnson, S.
Publisher : Indo-US Conference and Workshop on Cyber Security, Cyber Crime and Cyber Forensics
Unconditional Steganalysis of JPEG and BMP Images and Its Performance Analysis Using Support Vector Machine
Authors : Dr. Amritha P. P., Dr. Gireeshkumar T., Madathil, A., and
Publisher : Communications in Computer and Information Science
A Survey on Digital Image Steganographic Methods
Authors : Dr. Amritha P. P., Dr. Gireesh Kumar T.
Publisher : Cyber Security, Cyber Crime and Cyber Forensics: Applications and Perspectives
Self Localization of a Mobile Robot in Planetary Terrain
Authors : Dr. Divya Udayan J., Roshy M John, Gireesh Kumar T, KJ Poornaselvan
Publisher : International Journal of Embedded Systems and Computer Engineering
Self Localization and pose estimation of Mobile robot
Authors : Dr. Gireesh Kumar T.
Publisher : International journal of Embedded System and Computer Engineering
Payload Estimation in Universal Steganalysis
Authors : Dr. Amritha P. P., Madathil, A.
Publisher : Defence Science Journal
Mobile Robot Pose Estimation Based on Particle Filters for Multi-dimensional State Spaces
Authors : Dr. Gireeshkumar T., Divya Udayan, J.a; John, R.M.c; Poornaselvan, K.J.d; Lakshmanan, S.A.a
Publisher : Communications in Computer and Information Science
Low Budget Honeynet Creation and Implementation for Nids and Nips
Authors : Dr. Gireesh Kumar T., Aathira.K.S; Hiran.V.Nath; Thulasi.N. Kutty;
Publisher : (IJCNS) International Journal of Computer and Network Security
Fuzzy Support Vector Machine-based Multi-agent Optimal Path Planning Approach to Robotics Environment.
Authors : Dr. M. Sethumadhavan, Dr. Gireeshkumar T., Poornaselvan, K. J
Publisher : Defence Science Journal
A compressed video steganography using TPVD
Authors : Dr. Amritha P. P., A. P. Sherly
Publisher : International Journal of Database Management Systems (IJDMS)
An Advanced Steganographic Scheme with Diamond Encoding and Morphological Neural Network
Authors : Dr. Gireesh Kumar T., S. Sasidharan, .A.P, S., .N.R, K., .Y, A.
Publisher : pp. 3-14
Vulnerability assessment methods – A review
Authors : Nath, H.V
Publisher : Communications in Computer and Information Science
Steganalysis for calibrated and lower embedded uncalibrated images
Authors : Dr. Gireeshkumar T., Shankar, D.D.; Nath, H.V.
Publisher : Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Fabrication and performance of hybrid betel nut (Areca Catechu) short fibre/Sansevieria cylindrica (Agavaceae) polypropylene composite
Authors : Mr. Ashok Kumar Mohan, Reddy, G Ramachandra; Reddy, K Hemachandra; Reddy, Y Venkata Mohana; Reddy, P Ranga; Reddy, N Subbarami
Publisher : Ind. J. Mater. Sci
Error Linear Complexity Measures of Binary Multisequences
Authors : Dr. M. Sethumadhavan, Dr. Sindhu M
Cognitive environment for pervasive learners
Authors : Dr. Gireeshkumar T., Sharma, S.; Sreevathsan, R.; Srikanth, M.V.V.N.S.; Harshith, C.;
Publisher : Communications in Computer and Information Science
Vision based robot navigation for disaster scenarios
Authors : Dr. Gireesh Kumar T., Sudheesh, P;
Publisher : International Journal of Computer Applications
Tracking of nose tip: An alternative for mouse
Authors : Dr. Gireeshkumar T., Poornaselvan, K.J.b; Sattviksharmaa; Gulshankumara; Sreevathsan, R.a
Publisher : Lecture Notes in Computer Science
Multiset topologies induced by multiset relations
Authors : Dr. Johns Shaji Mathew, John, S. J
Publisher : Information Sciences
Measuring diffusion in stream ciphers using statistical testing methods
Authors : Dr. Srinivasan C., Dr. M. Sethumadhavan, Lakshmy K.V.;
Publisher : Defence Science Journal
Foreground Estimation in a Degraded Text document
Authors : Dr. Gireesh Kumar T., Bhuvana I Chandra; Nagarjunavarma, K.
Publisher : International Journal of Computer Applications
A distortion free relational database watermarking using patch work method
Authors : Dr. Praveen K., Arun, R, Bose, D. C., & Nath, H. V
Publisher : Advances in Intelligent and Soft Computing
Survey On Privacy Preserving Data Publishing Of Numerical Sensitive Data
Authors : Ms. Santhya R.
Publisher : International Journal of Emerging Technology Advanced Engineering
Optimally Locating for Hiding Information in Audio Signal
Authors : Dr. Amritha P. P., P. Premalatha
Publisher : International Journal of Computer Applications
Linear Complexity Measures of Binary Multisequences
Authors : Dr. M. Sethumadhavan, Dr. Sindhu M.
Publisher : International Journal of Computer Applications
Comparative Study of Algorithms for Frontier based Area Exploration and Slam for Mobile Robots
Authors : Dr. Gireesh Kumar T., Dayanand, V.; Rahul Sharma
Publisher : International Journal of Computer Applications
Analyzing the Makier Virus
Authors : Dr. Praveen K., Dr. Ritwik M.
Publisher : International Journal of Computer Science
A Novel Cloud Based NIDPS for Smartphones
Authors : Dr. Gireeshkumar T., Pandian, V.A.; Dr. Gireesh K. T.
Publisher : Communications in Computer and Information Science
On the k-error Joint Linear Complexity and Error Multisequence over F
Authors : Dr. M. Sethumadhavan, M. Sindhu
Publisher : Communications in Computer and Information Science
Differential Execution Analysis for Obfuscation Reduction
Authors : Robert, R. Reno
Publisher : Springer Berlin Heidelberg.
Counting rotation symmetric functions using Polya’s theorem
Authors : Dr. Lakshmy K. V., Sethumadhavan, M., and Cusick, T. W.
Publisher : Discrete Applied Mathematics
Counting rotation symmetric functions using Polya’s theorem
Authors : Dr. M. Sethumadhavan, Lakshmy K.V.; Thomas W. Cusick
Publisher : Discrete Applied Mathematics
Biometric Authentication via Facial Recognition
Authors : Dr. M. Sethumadhavan, K. Nimmy
Publisher : (2014)
A Novel Method for MP3 Steganalysis
Authors : Premalatha P., Kuriakose, R
Publisher : Intelligent Computing, Communication and Devices: Proceedings of ICCD 2014, Volume 1
A low overhead prevention of android web view abuse attacks
Authors : Dr. Praveen K., K. Jamsheed
Publisher : Communications in Computer and Information Science
A Hybrid Approach for Querying Numeric data in DAS-Model
Authors : Dr. Praveen K., K. R. Arjun
Publisher : International Journal of Control Theory and Applications
Cube Attack on Stream Ciphers using a Modified Linearity Test
Authors : Dr. Srinivasan C., Dr. M. Sethumadhavan, ; Pillai, U.U.; Lakshmy K.V.;
Publisher : Journal of Discrete Mathematical Sciences and Cryptography, Taru Publications
On the removal of steganographic content from images
Authors : Dr. Amritha P. P., Dr. M. Sethumadhavan, Krishnan, R.
Publisher : Defence Science Journal, Defense Scientific Information and Documentation Centre, Volume 66, Number 6, p.574-581.
Privilege-based scoring system against cross-site scripting using machine learning
Authors : Dr. Gireeshkumar T., Sunder, N.S.;
Publisher : Advances in Intelligent Systems and Computing
Hash-One: a lightweight cryptographic hash function
Authors : Dr. M. Sethumadhavan, Dr. Srinivasan C., Megha, P., and Dr. Sindhu M.
Publisher : IET Information Security, Institution of Engineering and Technology.
An encryption technique to thwart android binder exploits
Authors : Jevitha K. P., Ya Kaladharan; Mateti, Pb
Publisher : Advances in Intelligent Systems and Computing, Springer Verlag.
Decrypting Shared Encrypted Data Files Stored in a Cloud Using Dynamic Key Aggregation
Authors : Dr. M. Sethumadhavan, Maria James, Chungath Srinivasan, K. V. Lakshmy
Publisher : Computational Intelligence, Cyber Security and Computational Models: Proceedings of ICC3 2015
An authenticated key agreement scheme using vector decomposition
Authors : Praveen I., Rajeev, K., and Sethumadhavan, M.
Publisher : Defence Science Journal, Defense Scientific Information and Documentation Centre,
Android smudge attack prevention techniques
Authors : Dr. Praveen K., M. D. Amruth
Publisher : Advances in Intelligent Systems and Computing, Springer Verlag,
Affine equivalence of monomial rotation symmetric Boolean functions: A Pólya’s theorem approach
Authors : Dr. Lakshmy K. V., T. W. Cusick, and Sethumadhavan, M.
Publisher : Journal of Mathematical Cryptology, Walter de Gruyter GmbH.
Wireless Security Auditing: Attack Vectors and Mitigation Strategies
Authors : Dr. M. Sethumadhavan, Mr. Ashok Kumar Mohan, A, A. Devi
Publisher : Procedia Computer Science
Visual cryptographic schemes using combined Boolean operations
Authors : Dr. Praveen K., Sethumadhavan, M., and Krishnan, R.
Publisher : Journal of Discrete Mathematical Sciences and Cryptography
Stride based analysis of the chrome browser extensions API
Authors : Jevitha K. P., P. K. Akshay Dev
Publisher : Advances in Intelligent Systems and Computing
Response Time Analysis for Querying Data on Order Preserved Encrypted Buckets
Authors : Ms. Santhya R.
Publisher : International Journal of Control Theory and Applications
Prevention of PAC File Based Attack Using DHCP Snooping
Authors : Jevitha K. P., Atul, K.R.;
Publisher : Communications in Computer and Information Science
Opaque Predicate Detection by Static Analysis of Binary Executables
Authors : Dr. M. Sethumadhavan, Prakash, R.K.R.; Amritha, P.P.;
Publisher : Communications in Computer and Information Science
A framework for dynamic malware analysis based on behavior artifacts
Authors : Dr. Gireeshkumar T., Gregory Paul, T.G.;
Publisher : Advances in Intelligent Systems and Computing
An Android Application for Secret Image Sharing with Cloud Storage
Authors : Dr. Praveen K., Dr. M. Sethumadhavan, Indu, G.; Santhya, R.;
Publisher : Communications in Computer and Information Science
Active steganalysis on svd-based embedding algorithm
Authors : Dr. Amritha P. P., Dr. M. Sethumadhavan, Ravi, R. P.
Publisher : Advances in Intelligent Systems and Computing
Static and Dynamic Analysis for Android Malware Detection
Authors : Dr. Gireeshkumar T., Sugunan, K.; Dhanya, K.A.
Publisher : Advances in Big Data and Cloud Computing, Advances in Intelligent Systems and Computing
Spatial Outlier Detection Algorithm for Trajectory Data
Authors : Dr. Sabarish B. A., Dr. R. Karthi, Dr. Gireesh Kumar T.
Publisher : International Journal of Pure and Applied Mathematics
A Selective Generation of Hybrid Random Numbers via Android Smart Phones
Authors : Dr. M. Sethumadhavan, Mr. Ashok Kumar Mohan, Dr. Nirmala Devi M., and Santhya R
Publisher : International Journal of Pure and Applied Mathematics
Partial Password Authentication using Vector Decomposition
Authors : Praveen I., Dr. M. Sethumadhavan
Publisher : International Journal of Pure and Applied Mathematics
Data Hiding in Slack Space Revisited
Authors : Mr. Ashok Kumar Mohan, Thampy, R. V., and Praveen, K.
Publisher : International Journal of Pure and Applied Mathematics
Clustering of trajectory data using hierarchical approaches
Authors : Dr. Sabarish B. A., Dr. R. Karthi, Dr. Gireeshkumar T.
Publisher : Lecture Notes in Computational Vision and Biomechanics
The Art of Piecewise Hashing: A step toward better evidence provability
Authors : Dr. M. Sethumadhavan, Mr. Ashok Kumar Mohan, A. Gopalakrishnan, Vineti, E.
Publisher : Journal of Cyber Security and Mobility
String based Feature Representation for Trajectory Clustering
Authors : Dr. Sabarish B. A., Dr. R. Karthi, Dr. Gireeshkumar T.
Publisher : International Journal of Embedded and Real-Time Communication Systems (IJERTCS)
Ransomware Analysis Using Reverse Engineering
Authors : Dr. Gireeshkumar T., Naveen, S.;
Publisher : Communications in Computer and Information Science
Opportunistic Mobile Social Networks: Architecture, Privacy, Security Issues and Future Directions
Authors : Dr. Gireeshkumar T., Vidhya Lakshmi, V.R.;
Publisher : International Journal of Electrical and Computer Engineering
Efficient Android Malware Scanner using Hybrid Analysis
Authors : Dr. Gireeshkumar T., K.A. Dhanya;
Publisher : International Journal of Recent Technology and Engineering (IJRTE)
Advance Persistent Threat Detection Using Long Short Term Memory (LSTM) Neural Networks
Authors : Dr. Gireeshkumar T., Sai Charan, P.V.; Mohan Anand, P.
Publisher : Communications in Computer and Information Science