2022C1  |
Jyothi P.D., Lakshmy K.V. (2022) Vuln-Check: A Static Analyzer Framework for Security Parameters in Web. In: Reddy V.S., Prasad V.K., Wang J., Reddy K.T.V. (eds) Soft Computing and Signal Processing. Advances in Intelligent Systems and Computing, vol 1340, pp 233-247. Springer, Singapore. |
2022C2  |
Sreerag M., Sethumadhavan M., Amritha P.P. (2022) Identifying and Mitigating Vulnerabilities of Hardened Windows Operating System. In: Joshi A., Mahmud M., Ragel R.G., Thakur N.V. (eds) Information and Communication Technology for Competitive Strategies (ICTCS 2020). Lecture Notes in Networks and Systems, vol 191, pp 623-632. Springer, Singapore. |
2022C3  |
Balachandran A., Amritha P.P. (2022) VPN Network Traffic Classification Using Entropy Estimation and Time-Related Features. In: Senjyu T., Mahalle P., Perumal T., Joshi A. (eds) IOT with Smart Systems. Smart Innovation, Systems and Technologies, vol 251, pp 509-520. Springer, Singapore. |
2022C4  |
Abhiram D., Harish R., Praveen K. (2022) Zero-Trust Security Implementation Using SDP over VPN. In: Ranganathan G., Fernando X., Shi F. (eds) Inventive Communication and Computational Technologies. Lecture Notes in Networks and Systems, vol 311, pp 267-276. Springer, Singapore. |
2022C5  |
Nair A., Amritha P.P., Sarma V. (2022) Challenging the Network Privacy of Beaker Browser. In: Ranganathan G., Fernando X., Shi F. (eds) Inventive Communication and Computational Technologies. Lecture Notes in Networks and Systems, vol 311, pp 407-417. Springer, Singapore. |
2022C6  |
Thomas A.M., Ramaguru R., Sethumadhavan M. (2022) Distributed Identity and Verifiable Claims Using Ethereum Standards. In: Ranganathan G., Fernando X., Shi F. (eds) Inventive Communication and Computational Technologies. Lecture Notes in Networks and Systems, vol 311, pp 621-636. Springer, Singapore. |
2022C7  |
Abhishek C., Srinivasan C., K.V. L., Anand P.M. (2022) SLAP-IoT: A Secure Lightweight Authentication Protocol for IoT Device. In: Ranganathan G., Fernando X., Shi F. (eds) Inventive Communication and Computational Technologies. Lecture Notes in Networks and Systems, vol 311, pp 811-821. Springer, Singapore. |
2022C8  |
A. M. Thomas, G. A. Kumaran, R. Ramaguru, R. Harish and K. Praveen, "Evaluation of Wireless Access Point Security and Best Practices for Mitigation," 2021 5th International Conference on Electrical, Electronics, Communication, Computer Technologies and Optimization Techniques (ICEECCOT), 2021, pp. 422-427. IEEE |
2022C9  |
Sivadanam Y.L., Ramaguru R., Sethumadhavan M. (2022) Distributed Ledger Framework for an Adaptive University Management System. In: Chaki N., Devarakonda N., Cortesi A., Seetha H. (eds) Proceedings of International Conference on Computational Intelligence and Data Engineering. Lecture Notes on Data Engineering and Communications Technologies, vol 99. pp. 295-306. Springer, Singapore. |
2022C10  |
Vishnu, V., Praveen, K. (2022). Identifying Key Strategies for Reconnaissance in Cybersecurity. In: Agrawal, R., He, J., Shubhakar Pilli, E., Kumar, S. (eds) Cyber Security in Intelligent Computing and Communications. Studies in Computational Intelligence, vol 1007. Springer, Singapore. https://doi.org/10.1007/978-981-16-8012-0_3 |
2022C11  |
Thomas, A.M., Marali, M., Reddy, L. (2022). Identification of Assets in Industrial Control Systems Using Passive Scanning. In: Pandian, A.P., Fernando, X., Haoxiang, W. (eds) Computer Networks, Big Data and IoT. Lecture Notes on Data Engineering and Communications Technologies, vol 117. Springer, Singapore. https://doi.org/10.1007/978-981-19-0898-9_21 |
2022C12  |
Akshita, P., Amritha, P.P. (2022). Enhanced Security Layer for Hardening Image Steganography. In: Saraswat, M., Sharma, H., Balachandran, K., Kim, J.H., Bansal, J.C. (eds) Congress on Intelligent Systems. Lecture Notes on Data Engineering and Communications Technologies, vol 111. Springer, Singapore. https://doi.org/10.1007/978-981-16-9113-3_55 |
2022C13
|
Gowtham Akshaya Kumaran, P., Amritha, P.P. (2022). Real-Time Segregation of Encrypted Data Using Entropy. In: Saraswat, M., Sharma, H., Balachandran, K., Kim, J.H., Bansal, J.C. (eds) Congress on Intelligent Systems. Lecture Notes on Data Engineering and Communications Technologies, vol 111. Springer, Singapore. https://doi.org/10.1007/978-981-16-9113-3_61 |
2022C14  |
Singh, R., Amritha, P.P., Sethumadhavan, M. (2022). Scoring Scheme to Determine the Sensitive Information Level in Surface Web and Dark Web. In: Singh, M., Tyagi, V., Gupta, P.K., Flusser, J., Ören, T. (eds) Advances in Computing and Data Sciences. ICACDS 2022. Communications in Computer and Information Science, vol 1613. Springer, Cham. https://doi.org/10.1007/978-3-031-12638-3_14 |
2022C15  |
S. KK, S. Shrivastava and S. V, Anomaly-based Intrusion Detection using GAN for Industrial Control Systems, 2022 10th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO), 2022, pp. 1-6, doi: 10.1109/ICRITO56286.2022.9964997. |
2022C16  |
Divya, T., Amritha, P. P., & Viswanathan, S. (2022). A model to detect domain names generated by DGA malware Procedia Computer Science, 215, 403-412. https://doi.org/10.1016/j.procs.2022.12.042 |
2022C17  |
Gokul, G., Amritha, P. P., & Venkatraman, S. (2022). Smart wallet for creating sub tokens. Procedia Computer Science, 215, 791-801. https://doi.org/10.1016/j.procs.2022.12.081 |