Skip to content

Latest commit

 

History

History
54 lines (44 loc) · 12.2 KB

2015.md

File metadata and controls

54 lines (44 loc) · 12.2 KB

Amrita TIFAC-CYBER

Year 2015

Scopus-Indexed Conference Proceedings

ID Publication Details
2015C1
Sabarish B., Karthi R., Gireeshkumar T. (2015) A Survey of Location Prediction Using Trajectory Mining. In: Suresh L., Dash S., Panigrahi B. (eds) Artificial Intelligence and Evolutionary Algorithms in Engineering Systems. Advances in Intelligent Systems and Computing, Vol. 324, pp. 119-127. Springer, New Delhi.
2015C2
Anjana S., Amritha P.P. (2015) A Novel Method for Secure Image Steganography. In: Suresh L., Dash S., Panigrahi B. (eds) Artificial Intelligence and Evolutionary Algorithms in Engineering Systems. Advances in Intelligent Systems and Computing, Vol. 324, pp. 151-158. Springer, New Delhi.
2015C3

Rahul P.K., GireeshKumar T. (2015) A Novel Authentication Framework for Hadoop. In: Suresh L., Dash S., Panigrahi B. (eds) Artificial Intelligence and Evolutionary Algorithms in Engineering Systems. Advances in Intelligent Systems and Computing, Vol. 324, pp. 333-340. Springer, New Delhi.
2015C4
Mohan A.K., Gireesh Kumar T. (2015) Secure Seed-Based Sturdy OTP via Convenient Carry-on Device. In: Suresh L., Dash S., Panigrahi B. (eds) Artificial Intelligence and Evolutionary Algorithms in Engineering Systems. Advances in Intelligent Systems and Computing, Vol. 324, pp. 447-455. Springer, New Delhi.
2015C5
Praveen K., Sasi N. (2015) A (t, n) Secure Sum Multiparty Computation Protocol Using Multivariate Polynomial Secret Sharing Scheme. In: Suresh L., Dash S., Panigrahi B. (eds) Artificial Intelligence and Evolutionary Algorithms in Engineering Systems. Advances in Intelligent Systems and Computing, Vol. 324, pp. 457-463. Springer, New Delhi.
2015C6

Rajeev C., Girish K.P. (2015) Comparative Analysis of Digital Watermarking in Discrete Wavelet Transform and Mojette Transform. In: Suresh L., Dash S., Panigrahi B. (eds) Artificial Intelligence and Evolutionary Algorithms in Engineering Systems. Advances in Intelligent Systems and Computing, Vol. 324, pp. 667-672. Springer, New Delhi.
2015C7

Kumar A.S., Girish K.P. (2015) A Three Factor Authentication System for Smartcard Using Biometric, Visual Cryptography and OTP. In: Suresh L., Dash S., Panigrahi B. (eds) Artificial Intelligence and Evolutionary Algorithms in Engineering Systems. Advances in Intelligent Systems and Computing, Vol. 324, pp. 673-679. Springer, New Delhi.
2015C8

Divya T., Muniasamy K. (2015) Real-Time Intrusion Prediction Using Hidden Markov Model with Genetic Algorithm. In: Suresh L., Dash S., Panigrahi B. (eds) Artificial Intelligence and Evolutionary Algorithms in Engineering Systems. Advances in Intelligent Systems and Computing, Vol. 324, pp. 731-736. Springer, New Delhi.
2015C9

Jayasree N., Amritha P.P. (2015) A Model for the Effective Steganalysis of VoIP. In: Suresh L., Dash S., Panigrahi B. (eds) Artificial Intelligence and Evolutionary Algorithms in Engineering Systems. Advances in Intelligent Systems and Computing, Vol. 325, pp. 379-387. Springer, New Delhi.
2015C10
Devisree G., Praveen K. (2015) Secretly Shared QR Code and Its Applications. In: Suresh L., Dash S., Panigrahi B. (eds) Artificial Intelligence and Evolutionary Algorithms in Engineering Systems. Advances in Intelligent Systems and Computing, Vol. 325, pp. 473-480. Springer, New Delhi.
2015C11
Aparna S., Muniasamy K. (2015) Phish Indicator: An Indication for Phishing Sites. In: Suresh L., Dash S., Panigrahi B. (eds) Artificial Intelligence and Evolutionary Algorithms in Engineering Systems. Advances in Intelligent Systems and Computing, Vol. 325, pp. 481-487. Springer, New Delhi.
2015C12

Rahman A., Amritha P.P. (2015) Using Signature for Hidden Communication Prevention in IP Telephony. In: Suresh L., Dash S., Panigrahi B. (eds) Artificial Intelligence and Evolutionary Algorithms in Engineering Systems. Advances in Intelligent Systems and Computing, Vol. 325, pp. 489-494. Springer, New Delhi.
2015C13

Anumol E.T. (2015) Use of Machine Learning Algorithms with SIEM for Attack Prediction. In: Jain L., Patnaik S., Ichalkaranje N. (eds) Intelligent Computing, Communication and Devices. Advances in Intelligent Systems and Computing, Vol. 308, pp. 231-235. Springer, New Delhi.
2015C14
Anoop R.S., Gireeshkumar T., Saisuriyaa G. (2015) A Probabilistic Method Toward SLAM for Mobile Robotic Systems. In: Jain L., Patnaik S., Ichalkaranje N. (eds) Intelligent Computing, Communication and Devices. Advances in Intelligent Systems and Computing, Vol. 308, pp. 285-291. Springer, New Delhi.
2015C15
Kuriakose R., Premalatha P. (2015) A Novel Method for MP3 Steganalysis. In: Jain L., Patnaik S., Ichalkaranje N. (eds) Intelligent Computing, Communication and Devices. Advances in Intelligent Systems and Computing, Vol. 308, pp. 605-611. Springer, New Delhi.
2015C16
Velayudhan A., Gireeshkumar T. (2015) An Autonomous Obstacle Avoiding and Target Recognition Robotic System Using Kinect. In: Jain L., Patnaik S., Ichalkaranje N. (eds) Intelligent Computing, Communication and Devices. Advances in Intelligent Systems and Computing, Vol. 308, pp. 643-649. Springer, New Delhi.
2015C17
Kumar M., Praveen I. (2015) A Fully Simulatable Oblivious Transfer Scheme Using Vector Decomposition. In: Jain L., Patnaik S., Ichalkaranje N. (eds) Intelligent Computing, Communication and Devices. Advances in Intelligent Systems and Computing, Vol. 309, pp. 131-137. Springer, New Delhi.
2015C18
Menon R.P. (2015) Log Analysis Based Intrusion Prediction System. In: Satapathy S., Govardhan A., Raju K., Mandal J. (eds) Emerging ICT for Bridging the Future - Proceedings of the 49th Annual Convention of the Computer Society of India (CSI) Volume 1. Advances in Intelligent Systems and Computing, Vol. 337, pp. 409-416. Springer, Cham.
2015C19

Andoor J.T. (2015) A Filtering Based Android Malware Detection System for Google PlayStore. In: Satapathy S., Biswal B., Udgata S., Mandal J. (eds) Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014. Advances in Intelligent Systems and Computing, Vol. 327, pp. 559-566. Springer, Cham.
2015C20
K. J., K. P. (2015) A Low Overhead Prevention of Android WebView Abuse Attacks. In: Abawajy J., Mukherjea S., Thampi S., Ruiz-Martínez A. (eds) Security in Computing and Communications. SSCC 2015. Communications in Computer and Information Science, Vol. 536, pp. 530-537. Springer, Cham.

Scopus-Indexed Journal Publications

ID Publication Details
2015J1
Chungath Srinivasan, Utkarsh Umesan Pillai, K.V. Lakshmy, & M. Sethumadhavan (2015). Cube attack on stream ciphers using a modified linearity test. Journal of Discrete Mathematical Sciences and Cryptography, Vol. 18, No. 3, pp. 301-311.
2015J2 KR, A., & Praveen K. (2015). A Hybrid Approach for Querying Numeric data in DAS-Model. International Journal of Control Theory and Applications, Vol. 8, No. 5, pp. 2077-2083.

Non-Scopus Indexed Journal Publications

ID Publication Details
2015NJ1
Sreenitha N (2015). SMScala: An Android Service Manager Component Against Malicious Service Launch In Scala. International Journal of Applied Engineering Research, Vol. 10, No. 19, pp. 40531-40534.
2015NJ2
Jayakrishnan M. (2015). A real time scoring system to detect and report malicious domains. International Journal of Applied Engineering Research, Vol. 10, No. 69, pp. 192-197.