Skip to content

Latest commit

 

History

History
42 lines (31 loc) · 7.34 KB

File metadata and controls

42 lines (31 loc) · 7.34 KB

Amrita TIFC-CYBER

Year 2011

Scopus-Indexed Conference Proceedings

ID Publication Details
2011C1
Sharma S., Sreevathsan R., Srikanth M.V.V.N.S., Harshith C., Gireesh Kumar T. (2011) Cognitive Environment for Pervasive Learners. In: Abraham A., Lloret Mauri J., Buford J.F., Suzuki J., Thampi S.M. (eds) Advances in Computing and Communications. ACC 2011. Communications in Computer and Information Science, Vol. 191. pp. 506-515. Springer, Berlin, Heidelberg.
2011C2
Shankar D.D., Gireeshkumar T., Nath H.V. (2011) Steganalysis for Calibrated and Lower Embedded Uncalibrated Images. In: Panigrahi B.K., Suganthan P.N., Das S., Satapathy S.C. (eds) Swarm, Evolutionary, and Memetic Computing. SEMCCO 2011. Lecture Notes in Computer Science, Vol. 7077. pp. 294-301. Springer, Berlin, Heidelberg.
2011C3
Mallissery S., Praveen K., Sathar S. (2011) Correlation of Alerts Using Prerequisites and Consequences for Intrusion Detection. In: Das V.V., Thankachan N. (eds) Computational Intelligence and Information Technology. CIIT 2011. Communications in Computer and Information Science, Vol 250. pp 662-666. Springer, Berlin, Heidelberg.
2011C4
Nath H.V. (2011) Vulnerability Assessment Methods – A Review. In: Wyld D.C., Wozniak M., Chaki N., Meghanathan N., Nagamalai D. (eds) Advances in Network Security and Applications. CNSA 2011. Communications in Computer and Information Science, Vol 196. pp. 1-10. Springer, Berlin, Heidelberg.
2011C5
Raj A.S., Srinivasan C. (2011) Analysis of Algebraic Attack on TRIVIUM and Minute Modification to TRIVIUM. In: Wyld D.C., Wozniak M., Chaki N., Meghanathan N., Nagamalai D. (eds) Advances in Network Security and Applications. CNSA 2011. Communications in Computer and Information Science, Vol 196. pp 35-42. Springer, Berlin, Heidelberg.

Non-Scopus Indexed Conference Proceedings

ID Publication Details
2011NC1

Jagadeesh N., Nandakumar A., Harmya P., Anju S.S. (2011) Secret Image Sharing Using Steganography with Different Cover Images. In: Abraham A., Lloret Mauri J., Buford J.F., Suzuki J., Thampi S.M. (eds) Advances in Computing and Communications. ACC 2011. Communications in Computer and Information Science, Vol 191. pp. 490-497. Springer, Berlin, Heidelberg.
2011NC2
Harmya P., Anju S.S., Jagadeesh N., Nandakumar A. (2011) Matrix Embedding Using Random Linear Codes and Its Steganalysis. In: Abraham A., Mauri J.L., Buford J.F., Suzuki J., Thampi S.M. (eds) Advances in Computing and Communications. ACC 2011. Communications in Computer and Information Science, Vol 192. pp. 269-275. Springer, Berlin, Heidelberg.
2011NC3
Darsana R., Vijayan A. (2011) Audio Steganography Using Modified LSB and PVD. In: Wyld D.C., Wozniak M., Chaki N., Meghanathan N., Nagamalai D. (eds) Trends in Network and Communications. WeST 2011, NeCoM 2011, WiMoN 2011. Communications in Computer and Information Science, Vol 197. pp. 11-20. Springer, Berlin, Heidelberg.

Non-Scopus Indexed Book Chapter Publications

ID Publication Details
2011NB1
Kumar, S. S., Prasad, M. H., & Pilli, S. R. (2011). Extended Time Machine Design using Reconfigurable Computing for Efficient Recording and Retrieval of Gigabit Network Traffic. In In Computer Engineering: Concepts, Methodologies, Tools and Applications. pp. 699-709. IGI Global.
2011NB2

Srinivasan, C., Lakshmy, K. V., & Sethumadhavan, M. (2011). Complexity Measures of Cryptographically Secure Boolean Functions. In R. Santanam, M. Sethumad- havan, & M. Virendra (Eds.) Cyber Security, Cyber Crime and Cyber Forensics: Applications and Perspectives. pp. 220-230. IGI Global.
2011NB3

Sindhu, M., Sajan, S. K., & Sethumadhavan, M. (2011). Error Linear Complexity Measures of Binary Multisequences. In R. Santanam, M. Sethumadhavan, & M. Virendra (Eds.) Cyber Security, Cyber Crime and Cyber Forensics: Applications and Perspectives. pp. 240-249. IGI Global.
2011NB4
Amritha, P. P., & Gireesh, T. K. (2011). A Survey on Digital Image Steganographic Methods. In R. Santanam, M. Sethumadhavan, & M. Virendra (Eds.) Cyber Security, Cyber Crime and Cyber Forensics: Applications and Perspectives. pp. 250-258. IGI Global.