Back close

Statistics

50+

50+

Patents
20192

20192

Books
12000

12000

Book
Chapters
4219

4219

Journal
Publications /
Scopus Indexed
216

216

Conference
Proceedings
9281

9281

Other
Publications
Publications
An Application of Vector Decom- position Problem in Public Key Cryptography Using Homomorphic Encryption

Authors : Dr. M. Sethumadhavan, Praveen, I

Publisher :proceedings of International Conference on Emerging Research in Computing, Information, Communication and Applications - ERICA 2013 (pp. 328-331).

Publications
A Framework for Analyzing the Security of Chrome Extensions

Authors : Dr. M. Sethumadhavan, Aravind, V

Publisher :Advanced Computing, Networking and Informatics- Volume 2 (pp. 267-272). Springer International Publishing.

Publications
Counting rotation symmetric functions using Polyas theorem

Authors : Dr. M. Sethumadhavan, Lakshmy, K. V, Cusick, T. W

Publisher :Discrete Applied Mathematics,

Publications
On the k-error Joint Linear Complex- ity and Error Multisequence over Fq (charFq = p; prime)

Authors : Dr. M. Sethumadhavan, Sindhu, M.

Publisher :Recent Trends in Computer Networks and Distributed Systems Security (pp. 512-519). Springer Berlin Heidelberg.

Publications
Use of Machine Learning Algorithms with SIEM for Attack Prediction

Authors : Anumol, E. T

Publisher :Intelligent Computing, Communication and Devices (pp. 231-235). Springer India.

Publications
A Filtering Based Android Malware Detection System for Google Play Store

Authors : Andoor, J. T

Publisher :Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014 (pp. 559-566). Springer International Publishing.

Publications
A Three Factor Authentication System for Smartcard Using Biometric, Visual Cryptography and OTP

Authors : Kumar, A. S., Girish, K. P

Publisher :Artificial Intelligence and Evolutionary Algorithms in Engineering Systems (pp. 673-679). Springer India.

Publications
Comparative Analysis of Digital Watermarking in Discrete Wavelet Transform and Mojette Transform

Authors : Rajeev, Chandini, & Girish, K. P

Publisher :Artificial Intelligence and Evolutionary Algorithms in Engineering Systems (pp. 667-672). Springer India.

Publications
Phish Indicator: An Indication for Phishing Sites

Authors : Aparna, S, Muniasamy, K

Publisher :Artificial Intelligence and Evolutionary Algorithms in Engineering Systems (pp. 481-487). Springer India.

Publications
Real-Time Intrusion Prediction Using Hidden Markov Model with Genetic Algorithm

Authors : Divya, T, Muniasamy, K

Publisher :Artificial Intelligence and Evolutionary Algorithms in Engineering Systems (pp. 731-736). Springer India.

Publications
Log Analysis Based Intrusion Prediction System

Authors : Menon, R. P

Publisher :Emerging ICT for Bridging the Future Proceedings of the 49th Annual Convention of the Computer Society of India (CSI)

Admissions Apply Now