Skip to content

Latest commit

 

History

History
48 lines (40 loc) · 13.2 KB

File metadata and controls

48 lines (40 loc) · 13.2 KB

Amrita TIFC-CYBER

Year 2021

Scopus-Indexed Conference Proceedings

ID Publication Details
2021C1

Aiswarya K.K., Praveen K., Amritha P.P., Sethumadhavan M. (2021) Application of Secret Sharing Scheme in Software Watermarking. In: Senjyu T., Mahalle P.N., Perumal T., Joshi A. (eds) Information and Communication Technology for Intelligent Systems. ICTIS 2020. Smart Innovation, Systems and Technologies, Vol. 195. pp 345-353. Springer, Singapore.
2021C2

Kripa M., Nidhin Mahesh A., Ramaguru R., Amritha P.P. (2021) Blockchain Framework for Social Media DRM Based on Secret Sharing. In: Senjyu T., Mahalle P.N., Perumal T., Joshi A. (eds) Information and Communication Technology for Intelligent Systems. ICTIS 2020. Smart Innovation, Systems and Technologies, Vol. 195. pp 451-458. Springer, Singapore.
2021C3

Yogeshwar B.R., Sethumadhavan M., Srinivasan S.,Amritha P.P. (2021) A Light-Weight Cyber Security Implementation for Industrial SCADA Systems in the Industries 4.0. In: Senjyu T., Mahalle P.N., Perumal T., Joshi A. (eds) Information and Communication Technology for Intelligent Systems. ICTIS 2020. Smart Innovation, Systems and Technologies, Vol. 196. pp. 463-472. Springer, Singapore.
2021C4

Muthuraj S., Sethumadhavan M., Amritha P.P., Santhya R. (2021) Detection and Prevention of Attacks on Active Directory Using SIEM. In: Senjyu T., Mahalle P.N., Perumal T., Joshi A. (eds) Information and Communication Technology for Intelligent Systems. ICTIS 2020. Smart Innovation, Systems and Technologies, Vol. 196. pp. 533-541. Springer, Singapore.
2021C5
Vivekananthan V., Praveen K., Sethumadhavan M. (2021) Dynamic Watermarking Using Python AST. In: Kiran Mai C., Kiranmayee B.V., Favorskaya M.N., Chandra Satapathy S., Raju K.S. (eds) Proceedings of International Conference on Advances in Computer Engineering and Communication Systems. Learning and Analytics in Intelligent Systems, vol 20. Springer, Singapore.
2021C6


Dhanya K.A., Dheesha O.K., Gireesh Kumar T., Vinod P. (2021) Detection of Obfuscated Mobile Malware with Machine Learning and Deep Learning Models. In: Thampi S.M., Piramuthu S., Li KC., Berretti S., Wozniak M., Singh D. (eds) Machine Learning and Metaheuristics Algorithms, and Applications. SoMMA 2020. Communications in Computer and Information Science, Vol. 1366. pp. 221-231. Springer, Singapore.
2021C7
Chunduri N.V.H., Mohan A.K. (2021) A Forensic Analysis on the Availability of MQTT Network Traffic. In: Thampi S.M., Wang G., Rawat D.B., Ko R., Fan CI. (eds) Security in Computing and Communications. SSCC 2020. Communications in Computer and Information Science, Vol. 1364. pp. 262-274. Springer, Singapore.
2021C8
Sangeerth, P. S., & Lakshmy, K. V. (2021). Blockchain based Smart Contracts in Automation of Shipping Ports. In 6th International Conference on Inventive Computation Technologies (ICICT). pp. 1248-1253. IEEE.
2021C9
Harish R., Kumar A.A., Kumar V.A., Amritha P.P. (2021) Facilitating Cryptojacking Through Internet Middle Boxes. In: Sengodan T., Murugappan M., Misra S. (eds) Advances in Electrical and Computer Technologies. Lecture Notes in Electrical Engineering, Vol. 711. pp 41-52. Springer, Singapore.
2021C10
Naresh S., Jevitha K.P. (2021) Formal Analysis of OpenID Connect Protocol Using Tamarin Prover. In: Sengodan T., Murugappan M., Misra S. (eds) Advances in Electrical and Computer Technologies. Lecture Notes in Electrical Engineering, vol 711. pp 297-309 Springer, Singapore
2021C11
Ajay A., Amritha P.P., Sethumadhavan M. (2021) Automated WPA2 Cracking Using Improved Dictionary and WPS Pin Attack. In: Sengodan T., Murugappan M., Misra S. (eds) Advances in Electrical and Computer Technologies. Lecture Notes in Electrical Engineering, vol 711. pp 323-334. Springer, Singapore.
2021C12
Venkata Bhaskara Sastry T., Amritha P.P. (2021) Bluetooth Low Energy Devices: Attacks and Mitigations. In: Sengodan T., Murugappan M., Misra S. (eds) Advances in Electrical and Computer Technologies. Lecture Notes in Electrical Engineering, vol 711. pp 381-389 Springer, Singapore.
2021C13
Patel M., Amritha P., Sam jasper R. (2021) Active Dictionary Attack on WPA3-SAE. In: Thampi S.M., Gelenbe E., Atiquzzaman M., Chaudhary V., Li KC. (eds) Advances in Computing and Network Communications. Lecture Notes in Electrical Engineering, Vol. 735. pp 633-641. Springer, Singapore.
2021C14
Das S., Amritha P.P., Praveen K. (2021) Detection and Prevention of Mirai Attack. In: Reddy V.S., Prasad V.K., Wang J., Reddy K.T.V. (eds) Soft Computing and Signal Processing. Advances in Intelligent Systems and Computing, vol 1325. pp 79-88 Springer, Singapore.
2021C15
Sowmya K., Srinivasan C., Lakshmy K.V., Kumar Bansal T. (2021) A Secure Protocol for the Delivery of Firmware Updates over the Air in IoT Devices. In: Reddy V.S., Prasad V.K., Wang J., Reddy K.T.V. (eds) Soft Computing and Signal Processing. Advances in Intelligent Systems and Computing, vol 1325. pp 213-224. Springer, Singapore.
2021C16
Anjum S., Ramaguru R., Sethumadhavan M. (2021) Medical Records Management Using Distributed Ledger and Storage. In: Singh M., Tyagi V., Gupta P.K., Flusser J., Ören T., Sonawane V.R. (eds) Advances in Computing and Data Sciences. ICACDS 2021. Communications in Computer and Information Science, vol 1441. pp 52-62. Springer, Cham.
2021C17
Patel M., Amritha P.P. (2021) Binary Decision Tree Based Packet Queuing Schema for Next Generation Firewall. In: Singh M., Tyagi V., Gupta P.K., Flusser J., Ören T., Sonawane V.R. (eds) Advances in Computing and Data Sciences. ICACDS 2021. Communications in Computer and Information Science, vol 1440. pp 224-233. Springer, Cham.
2021C18
Bhargavi K.V.L., Srinivasan C., Lakshmy K.V. (2021) Panther: A Sponge Based Lightweight Authenticated Encryption Scheme. In: Adhikari A., Küsters R., Preneel B. (eds) Progress in Cryptology – INDOCRYPT 2021. Lecture Notes in Computer Science, vol 13143. Springer, Cham.
2019C19
Chandana Priya L., Praveen K. (2021) (t, k, n)-Deterministic Extended Visual Secret Sharing Scheme Using Combined Boolean Operations. In: Venugopal K.R., Shenoy P.D., Buyya R., Patnaik L.M., Iyengar S.S. (eds) Data Science and Computational Intelligence. ICInPro 2021. Communications in Computer and Information Science, vol 1483. pp 66-77. Springer, Cham.

Scopus-Indexed Journal Publications

ID Publication Details
2021J1
Vishnu, S. A., Praveen, I., & Sethumadhavan, M. (2021). An IND-CCA2 Secure Certificateless Hybrid Signcryption. Wireless Personal Communications, pp. 1-20.
2021J2
Shrivastava, S., Lakshmy, K. V., & Srinivasan, C. (2021). On the Statistical Analysis of ZUC, Espresso and Grain v1. International Journal of Computing, Vol 20 Issue 3, pp. 384-390.
2021J3
KP, J., Jayaraman, S., Jayaraman, B. & M Sethumadhavan (2021). Finite‐state model extraction and visualization from Java program execution. Software: Practice and Experience, Vol 51 Issue 2, pp. 409-437.
2021J4
Mohan, A. K., Madathil, S., & Lakshmy K. V.,. (2021). Holistic Analytics of Digital Artifacts: Unique Metadata Association Model. International Journal of Digital Crime and Forensics (IJDCF), 13(5), 78-100.