Year : 2024
On the Design of a Searchable Encryption Protocol for Keyword Search using Proactive Secret Sharing
Cite this Research Publication : Praveen K, Gabriel Anand K S, Indranil Ghosh Ray, Avishek Adhikari, Sabyasachi Datta and Arnab Kumar Biswas, On the Design of a Searchable Encryption Protocol for Keyword Search using Proactive Secret Sharing, 20th IEEE International Conference on e-Science 2024, Osaka, Japa
Publisher : IEEE
Year : 2023
A Novel Fragile Zero Software Watermarking Algorithm for Tamper Detection
Cite this Research Publication : Sathya Jothi, S.P., Praveen, K., Amritha, P.P., A Novel Fragile Zero Software Watermarking Algorithm for Tamper Detection, ICOEI 2023, IEEE Xplore.
Publisher : IEEE
Year : 2023
Detection of Log4j Attack in SDN Environment
Cite this Research Publication : Abilesh Raja, G., Harish, R., Praveen, K., Patel, M., Detection of Log4j Attack in SDN Environment, Lecture Notes in Networks and Systems (2023), Springer.
Publisher : Springer
Year : 2023
Classifying DNS over HTTPS Malicious/Benign Traffic Using Deep Learning Models
Cite this Research Publication : Mandar Chougule, Praveen, K., Amritha P.P, Sangeetha Viswanathan, K.S Ravichandran, M. Sethumadhavan, Masoumeh Rahimi and Amir H Gandomi., Classifying DNS over HTTPS Malicious/Benign Traffic using Deep Learning Models, 10th International Conference on Soft Computing and Machine Intelligence (ISCMI 2023), Mexico, IEEE Xplore.
Publisher : IEEE
Year : 2022
Prevention of Phishing Attacks Using QR Code Safe Authentication
Cite this Research Publication : M. Taraka Rama Mokshagna Teja, Praveen, K., Prevention of Phishing Attacks Using QR Code Safe Authentication, Inventive Communication and Computational Technologies 2022, Lecture Notes in Networks and Systems, Springer.
Publisher : Springer
Year : 2022
Zero-Trust Security Implementation Using SDP over VPN
Cite this Research Publication : Abhiram D., Harish R., Praveen, K., Zero-Trust Security Implementation Using SDP over VPN, Inventive Communication and Computational Technologies 2022, Lecture Notes in Networks and Systems, Springer.
Publisher : Springer
Year : 2022
Identifying Key Strategies for Reconnaissance in Cyber Security
Cite this Research Publication : Vishnu, V., Praveen, K., Identifying Key Strategies for Reconnaissance in Cyber Security, Studies in Computational Intelligence (2022), Springer.
Publisher : Springer
Year : 2021
Dynamic Watermarking Using Python AST
Cite this Research Publication : V. Vivekananthan, Praveen, K., M. Sethumadhavan., Dynamic Watermarking Using Python AST, Proceedings of International Conference on Advances in Computer Engineering and Communication Systems (2021), Springer
Publisher : Springer
Year : 2021
(t, k, n)-Deterministic Extended Visual Secret Sharing Scheme Using Combined Boolean Operations
Cite this Research Publication : L. Chandana Priya, Praveen, K., (t, k, n)-Deterministic Extended Visual Secret Sharing Scheme Using Combined Boolean Operations, Data Science and Computational Intelligence 2021, Communications in Computer and Information Science, Springer.
Publisher : Springer
Year : 2021
Evaluation of Wireless Access Point Security and Best Practices for Mitigation
Cite this Research Publication : A. M. Thomas, G. A. Kumaran, R. Ramaguru, R. Harish and K. Praveen, Evaluation of Wireless Access Point Security and Best Practices for Mitigation, 2021 5th International Conference on Electrical, Electronics, Communication, Computer Technologies and Optimization Techniques (ICEECCOT), Mysuru, India, 2021
Publisher : IEEE
Year : 2020
Application of Visual Cryptography Scheme in Software Watermarking
Cite this Research Publication : R. M. Jacob, Praveen, K., Amritha. P.P., Application of Visual Cryptography Scheme in Software Watermarking, ICOEI 2020, IEEE Xplore
Publisher : IEEE
Year : 2020
Towards the Detection of Phishing Attacks
Cite this Research Publication : Athulya. A.A., Praveen, K., Towards the Detection of Phishing Attacks, ICOEI 2020, IEEE Xplore.
Publisher : IEEE
Year : 2020
Role Mining in Distributed Firewall Using Matrix Factorization Methods
Cite this Research Publication : Aravind. D. D., Praveen, K., Role Mining in Distributed Firewall Using Matrix Factorization Methods, ICOEI 2020, IEEE Xplore.
Publisher : IEEE
Year : 2020
Application of Secret Sharing Scheme in Software Watermarking
Cite this Research Publication : Aiswarya K.K., Praveen, K., Amritha P.P., Sethumadhavan M., Application of Secret Sharing Scheme in Software Watermarking, ICTIS 2020. Smart Innovation, Systems and Technologies, Springer.
Publisher : Springer
Year : 2019
Fraud Detection in Medical Insurance Claim with Privacy Preserving Data Publishing in TLS-N Using Blockchain
Cite this Research Publication : Mohan, Thanusree, Praveen, K., Fraud Detection in Medical Insurance Claim with Privacy Preserving Data Publishing in TLS-N Using Blockchain, ICACDS 2019, Communications in Computer and Information Science, Springer.
Publisher : Springer
Year : 2019
Data Obfuscation Using Secret Sharing
Cite this Research Publication : Sidhardhan, Manasa, Praveen, K., Data Obfuscation Using Secret Sharing, ICAICR 2019, Communications in Computer and Information Science, Springer.
Publisher : Springer
Year : 2019
PUF Authentication using Visual Secret Sharing Scheme
Cite this Research Publication : Naveen, Devarapalli, Praveen, K., PUF Authentication using Visual Secret Sharing Scheme, ICACCS 2019, IEEE Xplore.
Publisher : IEEE
Year : 2019
Variant of Nearest Neighborhood Fingerprint Storage System by Reducing Redundancies
Cite this Research Publication : Anjana, K., Praveen, K., et al., Variant of Nearest Neighborhood Fingerprint Storage System by Reducing Redundancies, Intelligent Systems, Technologies and Applications 2019, Advances in Intelligent Systems and Computing, Springer.
Publisher : Springer
Year : 2019
Preserving the Privacy of Audio File Using Ideal Secret Sharing Scheme with Cloud Storage
Cite this Research Publication : Mohan, Meghna Ashoka, T. V. Jayakumar, Praveen, K., Preserving the Privacy of Audio File Using Ideal Secret Sharing Scheme with Cloud Storage, ICSCSP 2019, Advances in Intelligent Systems and Computing, Springer.
Publisher : Springer
Year : 2018
Cheating Immune Visual Cryptographic Scheme with Reduced Pixel Expansion
Cite this Research Publication : Praveen, K., M. Sethumadhavan., Cheating immune visual cryptographic scheme with reduced pixel expansion, Progress in Advanced Computing and Intelligent Engineering 2018, Advances in Intelligent Systems and Computing, Springer.
Publisher : Advances in Intelligent Systems and Computing
Year : 2017
On The Extension Of Xor Step Construction For Optimal Contrast Grey Level Visual Cryptography
Cite this Research Publication : Praveen, K., M. Sethumadhavan., On the extension of XOR step construction for optimal contrast grey level visual cryptography, ICACCI 2017. IEEE Xplore.
Publisher : IEEE
Year : 2017
OR Operation Based Deterministic Extended Visual Cryptography Using Complementary Cover Images
Cite this Research Publication : Praveen, K., G. Indhu,M. Sethumadhavan., OR Operation Based Deterministic Extended Visual Cryptography Using Complementary Cover Images, ISTA 2017, Advances in Intelligent Systems and Computing, Springer.
Publisher : Springer