2016C1  |
Praveen K., Sethumadhavan M. (2016) Ideal Contrast Visual Cryptography for General Access Structures with AND Operation. In: Nagar A., Mohapatra D., Chaki N. (eds) Proceedings of 3rd International Conference on Advanced Computing, Networking and Informatics. Smart Innovation, Systems and Technologies, Vol 44, pp. 309-314. Springer, New Delhi. |
2016C2  |
Amruth M.D., Praveen K. (2016) Android Smudge Attack Prevention Techniques. In: Berretti S., Thampi S., Dasgupta S. (eds) Intelligent Systems Technologies and Applications. Advances in Intelligent Systems and Computing, Vol. 385, pp. 23-31. Springer, Cham. |
2016C3  |
Remya S., Praveen K. (2016) Protecting the Augmented Browser Extension from Mutation Cross-Site Scripting. In: Satapathy S., Raju K., Mandal J., Bhateja V. (eds) Proceedings of the Second International Conference on Computer and Communication Technologies. Advances in Intelligent Systems and Computing, Vol. 379, pp. 215-223. Springer, New Delhi. |
2016C4  |
James M., Srinivasan C., Lakshmy K.V., Sethumadhavan M. (2016) Decrypting Shared Encrypted Data Files Stored in a Cloud Using Dynamic Key Aggregation. In: Senthilkumar M., Ramasamy V., Sheen S., Veeramani C., Bonato A., Batten L. (eds) Computational Intelligence, Cyber Security and Computational Models. Advances in Intelligent Systems and Computing, Vol. 412, pp. 385-392. Springer, Singapore. |
2016C5  |
Kaladharan Y., Mateti P., Jevitha K.P. (2016) An Encryption Technique to Thwart Android Binder Exploits. In: Berretti S., Thampi S., Dasgupta S. (eds) Intelligent Systems Technologies and Applications. Advances in Intelligent Systems and Computing, Vol. 385, pp.13-21. Springer, Cham. |
2016C6  |
Kanakarajan N.K., Muniasamy K. (2016) Improving the Accuracy of Intrusion Detection Using GAR-Forest with Feature Selection. In: Das S., Pal T., Kar S., Satapathy S., Mandal J. (eds) Proceedings of the 4th International Conference on Frontiers in Intelligent Computing: Theory and Applications (FICTA) 2015. Advances in Intelligent Systems and Computing, Vol. 404, pp. 539-547. Springer, New Delhi. |
2016C7  |
Amritha P.P., Sreedivya Muraleedharan M., Rajeev K., Sethumadhavan M. (2016) Steganalysis of LSB Using Energy Function. In: Berretti S., Thampi S., Srivastava P. (eds) Intelligent Systems Technologies and Applications. Advances in Intelligent Systems and Computing, Vol. 384, pp. 549-558. Springer, Cham. |
2016C8  |
Jose A.E., Gireeshkumar T. (2016) Gigabit Network Intrusion Detection System Using Extended Bloom Filter in Reconfigurable Hardware. In: Satapathy S., Raju K., Mandal J., Bhateja V. (eds) Proceedings of the Second International Conference on Computer and Communication Technologies. Advances in Intelligent Systems and Computing, Vol. 379, pp. 11-19. Springer, New Delhi. |
2016C9  |
Anuraj S., Premalatha P., Gireeshkumar T. (2016) High Speed Network Intrusion Detection System Using FPGA. In: Satapathy S., Raju K., Mandal J., Bhateja V. (eds) Proceedings of the Second International Conference on Computer and Communication Technologies. Advances in Intelligent Systems and Computing, Vol. 379, pp. 187-194. Springer, New Delhi. |
2016C10  |
Sunder N.S., Gireeshkumar T. (2016) Privilege-Based Scoring System Against Cross-Site Scripting Using Machine Learning. In: Dash S., Bhaskar M., Panigrahi B., Das S. (eds) Artificial Intelligence and Evolutionary Computations in Engineering Systems. Advances in Intelligent Systems and Computing, Vol. 394, pp. 591-598. Springer, New Delhi. |
2016C11  |
P. Malathi, T. Gireeshkumar (2016). Relating the Embedding Efficiency of LSB Steganography Techniques in Spatial and Transform Domains, Procedia Computer Science, Vol. 93, pp. 878-885. |
2016C12  |
M. V. Varsha,P. Vinod, K. A. Dhanya (2016). Identification of malicious android app using manifest and opcode features, Journal of Computer Virology and Hacking Techniques, Vol. 13, pp. 125-138. Springer. |
2016C13  |
Bharathula P., Mridula Menon N. (2016) Equitable Machine Learning Algorithms to Probe Over P2P Botnets. In: Das S., Pal T., Kar S., Satapathy S., Mandal J. (eds) Proceedings of the 4th International Conference on Frontiers in Intelligent Computing: Theory and Applications (FICTA) 2015. Advances in Intelligent Systems and Computing, Vol. 404, pp. 13-21. Springer, New Delhi. |
2016C14  |
Rahul Sharma K., Daniel Honc, Frantisek Dusek, Gireesh Kumar T (2016). Frontier Based Multi Robot Area Exploration Using Prioritized Routing. In Proceedings od 30th European Conference on Modelling and Simulation, European Council for Modelling and Simulation, pp. 25-30. |