Year : 2020
Finite-state model extraction and visualization from Java program execution
Cite this Research Publication : K.P. Jevitha, J. Swaminathan, B. Jayaraman, M. Sethumadhavan, “Finite-state model extraction and visualization from Java program execution”, Software: Practice and Experience, vol. 51, pp. 409-437, 2021. DOI: https://doi.org/10.1002/spe.2910
Publisher : Wiley
Year : 2017
Stride based analysis of the chrome browser extensions API
Cite this Research Publication : P. K. Akshay Dev and Jevitha, K. P., “Stride based analysis of the chrome browser extensions API”, Advances in Intelligent Systems and Computing, vol. 516, pp. 169-178, 2017.
Publisher : Advances in Intelligent Systems and Computing
Year : 2017
Prevention of PAC File Based Attack Using DHCP Snooping
Cite this Research Publication : K. R. Atul and Jevitha, K. P., “Prevention of PAC File Based Attack Using DHCP Snooping”, Communications in Computer and Information Science, vol. 746, pp. 195-204, 2017.
Publisher : Communications in Computer and Information Science
Year : 2016
Static analysis of Firefox OS privileged applications to detect permission policy violations
Cite this Research Publication : S. P and Jevitha, K. P., “Static analysis of Firefox OS privileged applications to detect permission policy violations”, International Journal of Control Theory and Applications, vol. 9, no. 7, pp. 3085-3093, 2016.
Publisher : International Journal of Control Theory and Applications, International Science Press, Volume 9, Issue 7, p.3085-3093 .
Year : 2016
An encryption technique to thwart android binder exploits
Cite this Research Publication : Ya Kaladharan, Mateti, Pb, and Jevitha, K. P., “An encryption technique to thwart android binder exploits”, Advances in Intelligent Systems and Computing, vol. 385, pp. 13-21, 2016.
Publisher : Advances in Intelligent Systems and Computing, Springer Verlag.
Year : 2015
An automata based approach for the prevention of NOSQL injections
Cite this Research Publication :
S. Joseph and Jevitha, K. P., “An automata based approach for the prevention of NOSQL injections”, Communications in Computer and Information Science, vol. 536, pp. 538-546, 2015.
Publisher : Communications in Computer and Information Science
Year : 2014
Web Services Attacks and Security- A Systematic Literature Review
Cite this Research Publication : V. R. Mouli and Jevitha, K. P., “Web Services Attacks and Security- A Systematic Literature Review”, Procedia Computer Science, vol. 93, pp. 870-877, 2014.
Publisher : Procedia Computer Science, Elsevier.