Back close
Publications
Towards the Detection of Phishing Attacks

Citation : Athulya. A.A., Praveen, K., Towards the Detection of Phishing Attacks, ICOEI 2020, IEEE Xplore.

Publisher :IEEE

Publications
Role Mining in Distributed Firewall Using Matrix Factorization Methods

Citation : Aravind. D. D., Praveen, K., Role Mining in Distributed Firewall Using Matrix Factorization Methods, ...

Publisher :IEEE

Publications
Application of Secret Sharing Scheme in Software Watermarking

Citation : Aiswarya K.K., Praveen, K., Amritha P.P., Sethumadhavan M., Application of Secret Sharing Scheme in ...

Publisher :Springer

Publications
Dynamic Watermarking Using Python AST

Citation : V. Vivekananthan, Praveen, K., M. Sethumadhavan., Dynamic Watermarking Using Python AST, Proceedings ...

Publisher :Springer

Publications
(t, k, n)-Deterministic Extended Visual Secret Sharing Scheme Using Combined Boolean Operations

Citation : L. Chandana Priya, Praveen, K., (t, k, n)-Deterministic Extended Visual Secret Sharing Scheme Using ...

Publisher :Springer

Publications
Prevention of Phishing Attacks Using QR Code Safe Authentication

Citation : M. Taraka Rama Mokshagna Teja, Praveen, K., Prevention of Phishing Attacks Using QR Code Safe Authen ...

Publisher :Springer

Publications
Zero-Trust Security Implementation Using SDP over VPN

Citation : Abhiram D., Harish R., Praveen, K., Zero-Trust Security Implementation Using SDP over VPN, Inventive ...

Publisher :Springer

Publications
Identifying Key Strategies for Reconnaissance in Cyber Security

Citation : Vishnu, V., Praveen, K., Identifying Key Strategies for Reconnaissance in Cyber Security, Studies in ...

Publisher :Springer

Publications
A Novel Fragile Zero Software Watermarking Algorithm for Tamper Detection

Citation : Sathya Jothi, S.P., Praveen, K., Amritha, P.P., A Novel Fragile Zero Software Watermarking Algorithm ...

Publisher :IEEE

Publications
Detection of Log4j Attack in SDN Environment

Citation : Abilesh Raja, G., Harish, R., Praveen, K., Patel, M., Detection of Log4j Attack in SDN Environment, ...

Publisher :Springer

Publications
Classifying DNS over HTTPS Malicious/Benign Traffic Using Deep Learning Models

Citation : Mandar Chougule, Praveen, K., Amritha P.P, Sangeetha Viswanathan, K.S Ravichandran, M. Sethumadhavan ...

Publisher :IEEE

Publications
On the Design of a Searchable Encryption Protocol for Keyword Search using Proactive Secret Sharing

Citation : Praveen K, Gabriel Anand K S, Indranil Ghosh Ray, Avishek Adhikari, Sabyasachi Datta and Arnab Kumar ...

Publisher :IEEE

Admissions Apply Now