A blockchain and ipfs based framework for secure research record keeping A Rajalakshmi, K Lakshmy, M Sindhu, P Amritha International Journal of Pure and Applied Mathematics 119 (15), 1437-1442, 2018 | 65 | 2018 |
A compressed video steganography using TPVD AP Sherly, PP Amritha International Journal of Database Management Systems (IJDMS) Vol 2, 764-766, 2010 | 64 | 2010 |
Blockchain Framework for Social Media DRM Based on Secret Sharing M Kripa, AN Mahesh, R Ramaguru, PP Amritha International Conference on Information and Communication Technology for …, 2020 | 18 | 2020 |
On the Removal of Steganographic Content from Images PP Amritha, M Sethumadhavan, R Krishnan Defence Science Journal 66 (6), 574-581, 2016 | 18 | 2016 |
Anti-forensic Approach to Remove Stego Content from Images and Videos PP Amritha, M Sethumadhavan, R Krishnan, SK Pal Journal of Cyber Security and Mobility 8 (3), 295-320, 2019 | 17 | 2019 |
An Investigation on HTTP/2 Security M Suresh, PP Amritha, AK Mohan, VA Kumar Journal of Cyber Security and Mobility 7 (1), 161-189, 2018 | 13 | 2018 |
Steganalysis of LSB Using Energy Function PP Amritha, MS Muraleedharan, K Rajeev, M Sethumadhavan Intelligent Systems Technologies and Applications, 549-558, 2016 | 11 | 2016 |
Opaque Predicate Detection by Static Analysis of Binary Executables RKR Prakash, PP Amritha, M Sethumadhavan International Symposium on Security in Computing and Communication, 250-258, 2017 | 10 | 2017 |
Information Hiding in H. 264, H. 265, and MJPEG S Priya, PP Amritha Proceedings of the International Conference on Soft Computing Systems, 479-487, 2016 | 10 | 2016 |
Detection and Prevention of Attacks on Active Directory Using SIEM S Muthuraj, M Sethumadhavan, PP Amritha, R Santhya International Conference on Information and Communication Technology for …, 2020 | 9 | 2020 |
An integrated fuzzy decision model for prioritization of barriers affecting sustainability adoption within supply chains under unknown weight context R Krishankumar, PP Amritha, KS Ravichandran Operations Management Research 15 (3), 1010-1027, 2022 | 8 | 2022 |
Active Warden Attack on Steganography Using Prewitt Filter PP Amritha, K Induja, K Rajeev Proceedings of the International Conference on Soft Computing Systems, 591-599, 2016 | 8 | 2016 |
A Model for the Effective Steganalysis of VoIP N Jayasree, PP Amritha Artificial Intelligence and Evolutionary Algorithms in Engineering Systems …, 2015 | 8 | 2015 |
An Integrated Variance-COPRAS Approach with Nonlinear Fuzzy Data for Ranking Barriers Affecting Sustainable Operations KNS Ramana, R Krishankumar, MS Trzin, PP Amritha, D Pamucar Sustainability 14 (3), 1093, 2022 | 7 | 2022 |
VPN Network Traffic Classification Using Entropy Estimation and Time-Related Features A Balachandran, PP Amritha IOT with Smart Systems, 509-520, 2022 | 7 | 2022 |
Detection and Prevention of Mirai Attack S Das, PP Amritha, K Praveen Soft Computing and Signal Processing, 79-88, 2021 | 7 | 2021 |
Active Dictionary Attack on WPA3-SAE M Patel, PP Amritha Advances in Computing and Network Communications, 633-641, 2021 | 7 | 2021 |
Video Game DRM: Analysis and Paradigm Solution J Karthik, PP Amritha, M Sethumadhavan 2020 11th International Conference on Computing, Communication and …, 2020 | 7 | 2020 |
Stegware destruction using showering methods S Choudhury, PP Amritha, M Sethumadhavan Int J Innov Technol Explor Eng (IJITEE) 8, 256-259, 2019 | 6 | 2019 |
A Light-Weight Cyber Security Implementation for Industrial SCADA Systems in the Industries 4.0 BR Yogeshwar, M Sethumadhavan, S Srinivasan, PP Amritha International Conference on Information and Communication Technology for …, 2020 | 5 | 2020 |