| ID | Publication Details |
|---|---|
| 2011C1 |
Sharma S., Sreevathsan R., Srikanth M.V.V.N.S., Harshith C., Gireesh Kumar T. (2011) Cognitive Environment for Pervasive Learners. In: Abraham A., Lloret Mauri J., Buford J.F., Suzuki J., Thampi S.M. (eds) Advances in Computing and Communications. ACC 2011. Communications in Computer and Information Science, Vol. 191. pp. 506-515. Springer, Berlin, Heidelberg. |
| 2011C2 |
|
| 2011C3 |
Mallissery S., Praveen K., Sathar S. (2011) Correlation of Alerts Using Prerequisites and Consequences for Intrusion Detection. In: Das V.V., Thankachan N. (eds) Computational Intelligence and Information Technology. CIIT 2011. Communications in Computer and Information Science, Vol 250. pp 662-666. Springer, Berlin, Heidelberg. |
| 2011C4 |
Nath H.V. (2011) Vulnerability Assessment Methods – A Review. In: Wyld D.C., Wozniak M., Chaki N., Meghanathan N., Nagamalai D. (eds) Advances in Network Security and Applications. CNSA 2011. Communications in Computer and Information Science, Vol 196. pp. 1-10. Springer, Berlin, Heidelberg. |
| 2011C5 |
| ID | Publication Details |
|---|---|
| 2011NC1 |
Jagadeesh N., Nandakumar A., Harmya P., Anju S.S. (2011) Secret Image Sharing Using Steganography with Different Cover Images. In: Abraham A., Lloret Mauri J., Buford J.F., Suzuki J., Thampi S.M. (eds) Advances in Computing and Communications. ACC 2011. Communications in Computer and Information Science, Vol 191. pp. 490-497. Springer, Berlin, Heidelberg. |
| 2011NC2 |
Harmya P., Anju S.S., Jagadeesh N., Nandakumar A. (2011) Matrix Embedding Using Random Linear Codes and Its Steganalysis. In: Abraham A., Mauri J.L., Buford J.F., Suzuki J., Thampi S.M. (eds) Advances in Computing and Communications. ACC 2011. Communications in Computer and Information Science, Vol 192. pp. 269-275. Springer, Berlin, Heidelberg. |
| 2011NC3 |
Darsana R., Vijayan A. (2011) Audio Steganography Using Modified LSB and PVD. In: Wyld D.C., Wozniak M., Chaki N., Meghanathan N., Nagamalai D. (eds) Trends in Network and Communications. WeST 2011, NeCoM 2011, WiMoN 2011. Communications in Computer and Information Science, Vol 197. pp. 11-20. Springer, Berlin, Heidelberg. |
| ID | Publication Details |
|---|---|
| 2011NB1 |
Kumar, S. S., Prasad, M. H., & Pilli, S. R. (2011). Extended Time Machine Design using Reconfigurable Computing for Efficient Recording and Retrieval of Gigabit Network Traffic. In In Computer Engineering: Concepts, Methodologies, Tools and Applications. pp. 699-709. IGI Global. |
| 2011NB2 |
Srinivasan, C., Lakshmy, K. V., & Sethumadhavan, M. (2011). Complexity Measures of Cryptographically Secure Boolean Functions. In R. Santanam, M. Sethumad- havan, & M. Virendra (Eds.) Cyber Security, Cyber Crime and Cyber Forensics: Applications and Perspectives. pp. 220-230. IGI Global. |
| 2011NB3 |
Sindhu, M., Sajan, S. K., & Sethumadhavan, M. (2011). Error Linear Complexity Measures of Binary Multisequences. In R. Santanam, M. Sethumadhavan, & M. Virendra (Eds.) Cyber Security, Cyber Crime and Cyber Forensics: Applications and Perspectives. pp. 240-249. IGI Global. |
| 2011NB4 |
Amritha, P. P., & Gireesh, T. K. (2011). A Survey on Digital Image Steganographic Methods. In R. Santanam, M. Sethumadhavan, & M. Virendra (Eds.) Cyber Security, Cyber Crime and Cyber Forensics: Applications and Perspectives. pp. 250-258. IGI Global. |

