Skip to content

Latest commit

 

History

History
54 lines (44 loc) · 11.6 KB

File metadata and controls

54 lines (44 loc) · 11.6 KB

Amrita TIFAC-CYBER

Year 2016

Scopus-Indexed Conference Proceedings

ID Publication Details
2016C1
Praveen K., Sethumadhavan M. (2016) Ideal Contrast Visual Cryptography for General Access Structures with AND Operation. In: Nagar A., Mohapatra D., Chaki N. (eds) Proceedings of 3rd International Conference on Advanced Computing, Networking and Informatics. Smart Innovation, Systems and Technologies, Vol 44, pp. 309-314. Springer, New Delhi.
2016C2
Amruth M.D., Praveen K. (2016) Android Smudge Attack Prevention Techniques. In: Berretti S., Thampi S., Dasgupta S. (eds) Intelligent Systems Technologies and Applications. Advances in Intelligent Systems and Computing, Vol. 385, pp. 23-31. Springer, Cham.
2016C3
Remya S., Praveen K. (2016) Protecting the Augmented Browser Extension from Mutation Cross-Site Scripting. In: Satapathy S., Raju K., Mandal J., Bhateja V. (eds) Proceedings of the Second International Conference on Computer and Communication Technologies. Advances in Intelligent Systems and Computing, Vol. 379, pp. 215-223. Springer, New Delhi.
2016C4
James M., Srinivasan C., Lakshmy K.V., Sethumadhavan M. (2016) Decrypting Shared Encrypted Data Files Stored in a Cloud Using Dynamic Key Aggregation. In: Senthilkumar M., Ramasamy V., Sheen S., Veeramani C., Bonato A., Batten L. (eds) Computational Intelligence, Cyber Security and Computational Models. Advances in Intelligent Systems and Computing, Vol. 412, pp. 385-392. Springer, Singapore.
2016C5
Kaladharan Y., Mateti P., Jevitha K.P. (2016) An Encryption Technique to Thwart Android Binder Exploits. In: Berretti S., Thampi S., Dasgupta S. (eds) Intelligent Systems Technologies and Applications. Advances in Intelligent Systems and Computing, Vol. 385, pp.13-21. Springer, Cham.
2016C6

Kanakarajan N.K., Muniasamy K. (2016) Improving the Accuracy of Intrusion Detection Using GAR-Forest with Feature Selection. In: Das S., Pal T., Kar S., Satapathy S., Mandal J. (eds) Proceedings of the 4th International Conference on Frontiers in Intelligent Computing: Theory and Applications (FICTA) 2015. Advances in Intelligent Systems and Computing, Vol. 404, pp. 539-547. Springer, New Delhi.
2016C7
Amritha P.P., Sreedivya Muraleedharan M., Rajeev K., Sethumadhavan M. (2016) Steganalysis of LSB Using Energy Function. In: Berretti S., Thampi S., Srivastava P. (eds) Intelligent Systems Technologies and Applications. Advances in Intelligent Systems and Computing, Vol. 384, pp. 549-558. Springer, Cham.
2016C8
Jose A.E., Gireeshkumar T. (2016) Gigabit Network Intrusion Detection System Using Extended Bloom Filter in Reconfigurable Hardware. In: Satapathy S., Raju K., Mandal J., Bhateja V. (eds) Proceedings of the Second International Conference on Computer and Communication Technologies. Advances in Intelligent Systems and Computing, Vol. 379, pp. 11-19. Springer, New Delhi.
2016C9
Anuraj S., Premalatha P., Gireeshkumar T. (2016) High Speed Network Intrusion Detection System Using FPGA. In: Satapathy S., Raju K., Mandal J., Bhateja V. (eds) Proceedings of the Second International Conference on Computer and Communication Technologies. Advances in Intelligent Systems and Computing, Vol. 379, pp. 187-194. Springer, New Delhi.
2016C10

Sunder N.S., Gireeshkumar T. (2016) Privilege-Based Scoring System Against Cross-Site Scripting Using Machine Learning. In: Dash S., Bhaskar M., Panigrahi B., Das S. (eds) Artificial Intelligence and Evolutionary Computations in Engineering Systems. Advances in Intelligent Systems and Computing, Vol. 394, pp. 591-598. Springer, New Delhi.
2016C11
P. Malathi, T. Gireeshkumar (2016). Relating the Embedding Efficiency of LSB Steganography Techniques in Spatial and Transform Domains, Procedia Computer Science, Vol. 93, pp. 878-885.
2016C12

M. V. Varsha,P. Vinod, K. A. Dhanya (2016). Identification of malicious android app using manifest and opcode features, Journal of Computer Virology and Hacking Techniques, Vol. 13, pp. 125-138. Springer.
2016C13

Bharathula P., Mridula Menon N. (2016) Equitable Machine Learning Algorithms to Probe Over P2P Botnets. In: Das S., Pal T., Kar S., Satapathy S., Mandal J. (eds) Proceedings of the 4th International Conference on Frontiers in Intelligent Computing: Theory and Applications (FICTA) 2015. Advances in Intelligent Systems and Computing, Vol. 404, pp. 13-21. Springer, New Delhi.
2016C14
Rahul Sharma K., Daniel Honc, Frantisek Dusek, Gireesh Kumar T (2016). Frontier Based Multi Robot Area Exploration Using Prioritized Routing. In Proceedings od 30th European Conference on Modelling and Simulation, European Council for Modelling and Simulation, pp. 25-30.

Scopus-Indexed Journal Publications

ID Publication Details
2016J1

P. Megha Mukundan , Sindhu M., Chungath Srinivasan, and M. Sethumadhavan (2016). Hash-One: a lightweight cryptographic hash function, IET Information Security, Vol. 10, No. 5, pp. 225-231.
2016J2
Praveen, I., Rajeev, K., & Sethumadhavan, M. (2016). An Authenticated Key Agreement Scheme using Vector Decomposition. Defence Science Journal, Vol. 66, Issue 6, pp. 594- 599.
2016J3
Amritha, P. P., Sethumadhavan, M., & Krishnan, R. (2016). On the Removal of Steganographic Content from Images. Defence Science Journal, Vol. 66, Issue 6, pp. 574-581.
2016J4
Cusick, T., Lakshmy, K. & Sethumadhavan, M. (2016). Affine equivalence of monomial rotation symmetric Boolean functions: A Pólya’s theorem approach. Journal of Mathematical Cryptology, Vol. 10 (3-4), pp.145-156.
2016J5
Kalpana, K., & Amritha, P. P. (2016). Image Manipulation Detection using Deep Learning in Tensor Flow, International Journal of Control Theory and Applications, Vol. 9, Issue 40, pp. 221-225.
2016J6
Sreedevi M., Praveen I., (2016). Password Authentication Using Vector Decomposition. IJCTA, Vol. 9, Issue 10, pp. 4639-4645.

Scopus-Indexed Book Chapter Publications

ID Publication Details
2016B1
Nidhin D., Praveen I., Praveen K. (2016) Role-Based Access Control for Encrypted Data Using Vector Decomposition. In: Suresh L., Panigrahi B. (eds) Proceedings of the International Conference on Soft Computing Systems. Advances in Intelligent Systems and Computing, Vol. 398, pp. 123-131. Springer, New Delhi.
2016B2
Priya S., Amritha P.P. (2016) Information Hiding in H.264, H.265, and MJPEG. In: Suresh L., Panigrahi B. (eds) Proceedings of the International Conference on Soft Computing Systems. Advances in Intelligent Systems and Computing, Vol. 398, pp. 479-487. Springer, New Delhi.
2016B3
Amritha P.P., Induja K., Rajeev K. (2016) Active Warden Attack on Steganography Using Prewitt Filter. In: Suresh L., Panigrahi B. (eds) Proceedings of the International Conference on Soft Computing Systems. Advances in Intelligent Systems and Computing, Vol. 398, pp. 591-599. Springer, New Delhi.