Skip to content

Latest commit

 

History

History
56 lines (41 loc) · 12.6 KB

File metadata and controls

56 lines (41 loc) · 12.6 KB

Amrita TIFC-CYBER

Year 2022

Scopus-Indexed Conference Proceedings

ID Publication Details
2022C1
Jyothi P.D., Lakshmy K.V. (2022) Vuln-Check: A Static Analyzer Framework for Security Parameters in Web. In: Reddy V.S., Prasad V.K., Wang J., Reddy K.T.V. (eds) Soft Computing and Signal Processing. Advances in Intelligent Systems and Computing, vol 1340, pp 233-247. Springer, Singapore.
2022C2
Sreerag M., Sethumadhavan M., Amritha P.P. (2022) Identifying and Mitigating Vulnerabilities of Hardened Windows Operating System. In: Joshi A., Mahmud M., Ragel R.G., Thakur N.V. (eds) Information and Communication Technology for Competitive Strategies (ICTCS 2020). Lecture Notes in Networks and Systems, vol 191, pp 623-632. Springer, Singapore.
2022C3
Balachandran A., Amritha P.P. (2022) VPN Network Traffic Classification Using Entropy Estimation and Time-Related Features. In: Senjyu T., Mahalle P., Perumal T., Joshi A. (eds) IOT with Smart Systems. Smart Innovation, Systems and Technologies, vol 251, pp 509-520. Springer, Singapore.
2022C4

Abhiram D., Harish R., Praveen K. (2022) Zero-Trust Security Implementation Using SDP over VPN. In: Ranganathan G., Fernando X., Shi F. (eds) Inventive Communication and Computational Technologies. Lecture Notes in Networks and Systems, vol 311, pp 267-276. Springer, Singapore.
2022C5
Nair A., Amritha P.P., Sarma V. (2022) Challenging the Network Privacy of Beaker Browser. In: Ranganathan G., Fernando X., Shi F. (eds) Inventive Communication and Computational Technologies. Lecture Notes in Networks and Systems, vol 311, pp 407-417. Springer, Singapore.
2022C6
Thomas A.M., Ramaguru R., Sethumadhavan M. (2022) Distributed Identity and Verifiable Claims Using Ethereum Standards. In: Ranganathan G., Fernando X., Shi F. (eds) Inventive Communication and Computational Technologies. Lecture Notes in Networks and Systems, vol 311, pp 621-636. Springer, Singapore.
2022C7
Abhishek C., Srinivasan C., K.V. L., Anand P.M. (2022) SLAP-IoT: A Secure Lightweight Authentication Protocol for IoT Device. In: Ranganathan G., Fernando X., Shi F. (eds) Inventive Communication and Computational Technologies. Lecture Notes in Networks and Systems, vol 311, pp 811-821. Springer, Singapore.
2022C8
A. M. Thomas, G. A. Kumaran, R. Ramaguru, R. Harish and K. Praveen, "Evaluation of Wireless Access Point Security and Best Practices for Mitigation," 2021 5th International Conference on Electrical, Electronics, Communication, Computer Technologies and Optimization Techniques (ICEECCOT), 2021, pp. 422-427. IEEE
2022C9
Sivadanam Y.L., Ramaguru R., Sethumadhavan M. (2022) Distributed Ledger Framework for an Adaptive University Management System. In: Chaki N., Devarakonda N., Cortesi A., Seetha H. (eds) Proceedings of International Conference on Computational Intelligence and Data Engineering. Lecture Notes on Data Engineering and Communications Technologies, vol 99. pp. 295-306. Springer, Singapore.
2022C10
Vishnu, V., Praveen, K. (2022). Identifying Key Strategies for Reconnaissance in Cybersecurity. In: Agrawal, R., He, J., Shubhakar Pilli, E., Kumar, S. (eds) Cyber Security in Intelligent Computing and Communications. Studies in Computational Intelligence, vol 1007. Springer, Singapore. https://doi.org/10.1007/978-981-16-8012-0_3
2022C11
Thomas, A.M., Marali, M., Reddy, L. (2022). Identification of Assets in Industrial Control Systems Using Passive Scanning. In: Pandian, A.P., Fernando, X., Haoxiang, W. (eds) Computer Networks, Big Data and IoT. Lecture Notes on Data Engineering and Communications Technologies, vol 117. Springer, Singapore. https://doi.org/10.1007/978-981-19-0898-9_21
2022C12
Akshita, P., Amritha, P.P. (2022). Enhanced Security Layer for Hardening Image Steganography. In: Saraswat, M., Sharma, H., Balachandran, K., Kim, J.H., Bansal, J.C. (eds) Congress on Intelligent Systems. Lecture Notes on Data Engineering and Communications Technologies, vol 111. Springer, Singapore. https://doi.org/10.1007/978-981-16-9113-3_55
2022C13
Gowtham Akshaya Kumaran, P., Amritha, P.P. (2022). Real-Time Segregation of Encrypted Data Using Entropy. In: Saraswat, M., Sharma, H., Balachandran, K., Kim, J.H., Bansal, J.C. (eds) Congress on Intelligent Systems. Lecture Notes on Data Engineering and Communications Technologies, vol 111. Springer, Singapore. https://doi.org/10.1007/978-981-16-9113-3_61
2022C14
Singh, R., Amritha, P.P., Sethumadhavan, M. (2022). Scoring Scheme to Determine the Sensitive Information Level in Surface Web and Dark Web. In: Singh, M., Tyagi, V., Gupta, P.K., Flusser, J., Ören, T. (eds) Advances in Computing and Data Sciences. ICACDS 2022. Communications in Computer and Information Science, vol 1613. Springer, Cham. https://doi.org/10.1007/978-3-031-12638-3_14
2022C15
S. KK, S. Shrivastava and S. V, Anomaly-based Intrusion Detection using GAN for Industrial Control Systems, 2022 10th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO), 2022, pp. 1-6, doi: 10.1109/ICRITO56286.2022.9964997.
2022C16
Divya, T., Amritha, P. P., & Viswanathan, S. (2022). A model to detect domain names generated by DGA malware Procedia Computer Science, 215, 403-412. https://doi.org/10.1016/j.procs.2022.12.042
2022C17
Gokul, G., Amritha, P. P., & Venkatraman, S. (2022). Smart wallet for creating sub tokens. Procedia Computer Science, 215, 791-801. https://doi.org/10.1016/j.procs.2022.12.081

Scopus-Indexed Journal Publication

ID Publication Details
2022J1

Ramana KNSV, Krishankumar R, Trzin MS, Amritha PP, Pamucar D. An Integrated Variance-COPRAS Approach with Nonlinear Fuzzy Data for Ranking Barriers Affecting Sustainable Operations. Sustainability. 2022; 14(3):1093.

Non-Scopus Indexed Journal Publication

ID Publication Details
2022NJ1


Anuhya G, Ramaguru R (2022). Open-Source Cryptocurrency Forensic Framework. Digital 4N6. Vol. IV, Issue I. pp. 20-26. Digital 4N6.
2022NJ2

Sangeetha, V., Krishankumar, R., Ravichandran, K. S., & Gandomi, A. H. (2022). Assessment of an ant-inspired algorithm for path planning. In Biomimicry for Materials, Design and Habitats (pp. 247-265). Elsevier.
2022NJ3

Ajay Balaji, Kowshik Hurshan (2022). Cloud Forensics. Digital 4N6. Vol. IV, Issue II. pp. 6-10. Digital 4N6.
2022NJ4


Pillai Anjali Anilkumar, Anirudh Srinivas Balaji (2022). OSINT For Cryptocurrency Forensics. Digital 4N6. Vol. IV, Issue II. pp. 17-23. Digital 4N6.