Skip to content

Latest commit

 

History

History
55 lines (44 loc) · 11.2 KB

File metadata and controls

55 lines (44 loc) · 11.2 KB

Amrita TIFAC-CYBER

Year 2018

Scopus-Indexed Conference Proceedings

ID Publication Details
2018C1
Praveen, K., Indhu, G., & Sethumadhavan, M. (2018). OR Operation Based Deterministic Extended Visual Cryptography Using Complementary Cover Images. In: Thampi S., Mitra S., Mukhopadhyay J., Li KC., James A., Berretti S. (eds). The International Symposium on Intelligent Systems Technologies and Applications. Vol. 683. pp. 308-316. Springer, Cham.
2018C2
Praveen K., Sethumadhavan M. (2018) Cheating Immune Visual Cryptographic Scheme with Reduced Pixel Expansion. In: Saeed K., Chaki N., Pati B., Bakshi S., Mohapatra D. (eds) Progress in Advanced Computing and Intelligent Engineering. Advances in Intelligent Systems and Computing, Vol 563. pp. 257-265. Springer, Singapore.
2018C3
Thomas A., Gireesh Kumar T., Mohan A.K. (2018) Neighbor Attack Detection in Internet of Things. In: Bhattacharyya S., Chaki N., Konar D., Chakraborty U., Singh C. (eds) Advanced Computational and Communication Paradigms. Advances in Intelligent Systems and Computing, Vol 706. pp. 187-196. Springer, Singapore.
2018C4
Srinivas T.M., Amritha P.P. (2018) Real Time Audio Steganographic Countermeasure. In: Satapathy S., Bhateja V., Raju K., Janakiramaiah B. (eds) Data Engineering and Intelligent Computing. Advances in Intelligent Systems and Computing. Vol 542. pp. 293-300. Springer, Singapore.
2018C5
Baskar A., Gireesh Kumar T. (2018) Facial Expression Classification Using Machine Learning Approach: A Review. In: Satapathy S., Bhateja V., Raju K., Janakiramaiah B. (eds) Data Engineering and Intelligent Computing. Advances in Intelligent Systems and Computing, Vol 542. pp. 337-345. Springer, Singapore.
2018C6
Neethu R., Sindhu M., Srinivasan C. (2018) XUBA: An Authenticated Encryption Scheme. In: Satapathy S., Bhateja V., Raju K., Janakiramaiah B. (eds) Data Engineering and Intelligent Computing. Advances in Intelligent Systems and Computing. Vol. 542. pp. 647-655. Springer, Singapore.
2018C7
Vinodhini R.E., Malathi P., Gireesh Kumar T. (2018) An Improved Approach for Securing Document Images Using Dual Cover. In: Thampi S., Krishnan S., Corchado Rodriguez J., Das S., Wozniak M., Al-Jumeily D. (eds) Advances in Signal Processing and Intelligent Recognition Systems. SIRS 2017. Advances in Intelligent Systems and Computing, Vol 678. pp. 155-166. Springer, Cham.

Scopus-Indexed Journal Publications

ID Publication Details
2018J1
Kumar, M., Sindhu M, Sethumadhavan M, & Lakshmy K V. (2018). Distributed Human Interaction Proof for Public Blockchain Platform. International Journal of Engineering & Technology, Vol. 7, No. 3.34, pp. 885-889.
2018J2

Suresh, M., Amritha, P. P., Mohan, A. K., & Kumar, V. A. (2018). An investigation on HTTP/2 security. Journal of Cyber Security and Mobility, Vol. 7, Issue 1-2, pp. 161-180.
2018J3
Kumar, A. A., Mohan, A. K., & Amritha, P. P. (2018). Deceiving attackers in wireless local area networks using decoys. Journal of Cyber Security and Mobility, Vol. 7, Issue 1-2, pp. 201-214.
2018J4

Sivasangari, V., Mohan, A. K., Sethumadhavan, M., & Suthendran, K. (2018). Isolating rumors using sentiment analysis. Journal of Cyber Security and Mobility, Vol. 7, Issue 1-2, pp. 181-200.

Scopus-Indexed Book Chapter Publications

ID Publication Details
2018B1
Sabarish B.A., Karthi R., Gireeshkumar T. (2018) Clustering of Trajectory Data Using Hierarchical Approaches. In: Hemanth D., Smys S. (eds) Computational Vision and Bio Inspired Computing. Lecture Notes in Computational Vision and Biomechanics, Vol 28. pp.215-226 Springer, Cham.
2018B2

Sugunan K., Gireesh Kumar T.,& Dhanya K.A. (2018) Static and Dynamic Analysis for Android Malware Detection. Advances in Big Data and Cloud Computing. Advances in Intelligent Systems and Computing, Vol 645, pp.147-155, Springer, Singapore

Non-Scopus Indexed Journal Publications

ID Publication Details
2018NJ1
Vinodhini, R. E., P. Malathi, Vimalkumar K and T. Gireesh Kumar (2018). A Highly Secured Image Steganography Using Bernoullis Chaotic map and Binary hamming code. International Journal of Pure and Applied Mathematics, Vol. 118, Issue 7, pp. 159-164
2018NJ2
A Sabarish, R Karthi and T Gireesh Kumar. (2018). Spatial Outlier Detection Algorithm For Trajectory Data. International Journal of Pure and Applied Mathematics. Vol. 118, No. 7, pp. 325-331.
2018NJ3
Praveen, I., & Sethumadhavan, M. (2018). Partial Password Authentication using Vector Decomposition. International Journal of Pure and Applied Mathematics. Vol. 118, No. 7 Special Issue, pp. 381-385
2018NJ4
Durga, S., Amritha, P.P. (2018). Defensive coding framework. International Journal of Pure and Applied Mathematics. Vol. 118, No. 8 Special Issue, pp. 303-309.
2018NJ5

Mohan, A.K., Nirmala Devi, M., Sethumadhavan, M., & Santhya, R. (2018). A selective generation of hybrid random numbers via Android smart phones. International Journal of Pure and Applied Mathematics. Vol 118, No. 8 Special Issue, pp. 311-316.
2018NJ6
Rajalakshmi A, Lakshmy K V, Sindhu M , & Amritha P P (2018). A Blockchain and IPFS based Framework for secure Research Record Keeping. International Journal of Pure and Applied Mathematics. Vol. 119, No. 15, pp. 1437-1442.
2018NJ7
K Rajeev, M Sethumadhavan, & K V Lakshmy (2018). Results on Dihedral Symmetric Boolean Functions. International Journal of Pure and Applied Mathematics. Vol. 119, No. 15, pp. 3233-3238.
2018NJ8
Sajana P., Sindhu M., & M. Sethumadhavan (2018). On Blockchain Applications: Hyper-ledger Fabric And Ethereum. International Journal of Pure and Applied Mathematics. Vol. 118, No. 18, pp. 2965-2970.
2018NJ9
Gireesh Kumar T, Harikrishnan V N (2018). Advanced Persistent Threat Analysis using Splunk. International Journal of Pure and Applied Mathematics. Vol. 118, No. 20, pp. 3761-3768.