Back close
Publications
Performance Analysis and Improvement Using LFSR in the Pipelined Key Scheduling Section

Authors : Sruthi PV, Ajai AS Remya, Poornachandran Prabaharan

Publisher : Springer Berlin Heidelberg

Publications
Secure authentication in multimodal biometric systems using cryptographic hash functions

Authors : Ashok Aravind, Krishnasree Achuthan

Publisher : Springer Berlin Heidelberg

Publications
DVM based scalable and adaptive multipath routing in MANET for emergency rescue application

Authors : Ramesh M. V, Prabaharan. P, Shameem Ansar, A Rekha

Publisher : WOCC

Publications
Ensemble Learning Approach for Author Profiling

Authors : Surendran K, Gressel Gilad, Thara S, Hrudya P, Ashok Aravind

Publisher : CLEF

Publications
Adsvm: Pre-processor plug-in using support vector machine algorithm

Authors : George Annie, Kaimal M Ramachandra

Publisher : IEEE

Publications
Ensemble learning approach for author profiling Notebook for PAN

Authors : Gressel Gilad, Hrudya P, Surendran K, Thara S, Aravind A

Publisher : CLEF

Publications
Digital image forgery detection on artificially blurred images

Authors : Hrudya P, Lekha S Nair, Adithya SM, Unni Reshma

Publisher : IEEE

Publications
DVM based multipath routing in MANET for different scalable and adaptive environment

Authors : A. Shameem Ansar, P. Prabaharan , M. V. Ramesh, P. Rekha

Publisher : IEEE

Publications
An efficient classification model for detecting advanced persistent threat

Authors : Chandran Saranya, Hrudya P

Publisher : IEEE

Publications
Internet of Vulnerable Things (IoVT): Detecting Vulnerable SOHO Routers

Authors : Sreeram R, Krishnan Manu R, Pal Soumajit, Sankar AU Prem, Ashok Aravind

Publisher : 14th International Conference on Information Technology, ICIT

Publications
Audio data authentication with pmu data and ewt Procedia Technology

Authors : Premjith B, Neethu Mohan P, Soman KP

Publisher : Elsevier

Admissions Apply Now