Back close
Publications
A Model for the Effective Steganalysis of VoIP

Authors : Jayasree, N., P. P. Amritha

Publisher : Artificial Intelligence and Evolutionary Algorithms in Engineering Systems: Proceedings of ICAEES 2014, Volume 2

Publications
Lightweight Security Framework For IoTs Using Identity Based Cryptography

Authors : Sriram Sankaran

Publisher : International Conference on Advances in Computing, Communications and Informatics (ICACCI), IEEE, Jaipur, India.

Publications
Student centric design for cyber security knowledge empowerment

Authors : Joshi, A., Ramani, V., Murali, H., Krishnan, R., Mithra, Z., Pavithran, V.

Publisher : ICTEE

Publications
Multiset topologies induced by multiset relations

Authors : Girish, K.P.a, John, S.J.b

Publisher : Information Sciences

Publications
Implementing and Deploying Magnetic Material Testing as an Online Laboratory

Authors : R. Radhamani, D. Kumar, Dr. Krishnashree Achuthan, Dr. Bipin G. Nair, Dr. Shyam Diwakar

Publisher : Intelligent Systems Technologies and Applications 2016, Springer International Publishing, Cham.

Publications
Remote triggered photovoltaic solar cell lab: Effective implementation strategies for Virtual Labs

Authors : J Freeman, Nagarajan, Akshay, Parangan, Mithula, Kumar, Dhanush, Dr. Shyam Diwakar, Dr. Krishnashree Achuthan

Publisher : IEEE

Publications
Augmented reflective learning and knowledge retention perceived among students in classrooms involving virtual laboratories

Authors : Krishnashree Achuthan, Saneesh P. Francis , Dr. Shyam Diwakar

Publisher : Education and Information Technologies .

Publications
Steganalysis of LSB Using Energy Function

Authors : P. P. Amritha, Sreedivya Muraleedharan, M., K. Rajeev, Dr. M. Sethumadhavan

Publisher : Intelligent Systems Technologies and Applications.

Publications
Active Warden Attack on Steganography Using Prewitt Filter

Authors : P. P. Amritha, Induja, K., K. Rajeev

Publisher : Proceedings of the International Conference on Soft Computing Systems: ICSCS 2015, Volume 2, Springer India, Number 398, New Delhi, p.591–599

Publications
Android smudge attack prevention techniques

Authors : Amruth, M.D., K. Praveen

Publisher : Advances in Intelligent Systems and Computing, Springer Verlag,

Publications
Protecting the Augmented Browser Extension from Mutation Cross-Site Scripting

Authors : Remya, S., K. Praveen

Publisher : Proceedings of the Second International Conference on Computer and Communication Technologies: IC3T 2015.

Publications
Proposal of browser by exploiting the proficiency of V8 for large data visualization

Authors : Shiju Sathyadevan, Jaison, P.J.b, Sankar, G.b

Publisher : International Journal of Applied Engineering Research

Admissions Apply Now