Multi-Channel Man-in-the-Middle Attacks Against Protected Wi-Fi Networks: A State of the Art Review M Thankappan, H Rifà-Pous, C Garrigues Expert systems with Applications 210 (C), 2022 | 22 | 2022 |
Modified bidirectional DC-DC Boost converter fed three-phase four-wire PV-DVR N Kanagaraj, M Ramasamy, H Rezk, T Manesh Journal of Testing and Evaluation 48 (4), 3087-3115, 2020 | 21 | 2020 |
A method of detecting sql injection attack to secure web applications S Manmadhan, T Manesh International Journal of Distributed and Parallel Systems 3 (6), 1, 2012 | 20 | 2012 |
Image Authentication by content preserving Robust Image Hashing using Local and Global features Manesh T, Lima S. Abraham Varghese ICICT, the International Conference on Information and Communication …, 2015 | 19* | 2015 |
Network Forensic Investigation of HTTPS Protocol Manesh T, Brijith B, Bhraguram TM, Bhadran VK International Journal of Modern Engineering Research 3 (5), 3096-3106, 2013 | 16 | 2013 |
SQLStor: Blockage of stored procedure SQL injection attack using dynamic query structure validation S Mamadhan, T Manesh, V Paul Intelligent Systems Design and Applications (ISDA), 2012 12th International …, 2012 | 15 | 2012 |
VoIP Forensic Analyzer T, Manesh,Mohamed M International Journal of Advanced Computer Science and Applications - See …, 2016 | 14* | 2016 |
An improved approach towards network forensic investigation of HTTP and FTP protocols T Manesh, B Brijith, MP Singh International Conference on Parallel Distributed Computing Technologies and …, 2011 | 11 | 2011 |
Forensic Framework for Skype Communication MM Sha, T Manesh, SMA El-atty Intelligent Systems Technologies and Applications, 197-211, 2015 | 4* | 2015 |
Forensic investigation framework for VoIP protocol T Manesh, SM Abd El-atty, MM Sha, B Brijith, K Vivekanandan 2015 First International Conference on Anti-Cybercrime (ICACC), 1-7, 2015 | 3 | 2015 |
SSL based Webmail Forensic Engine T Manesh, Bhadran V K International Journal of Advanced Computer Science and Applications, 8 (1 …, 2017 | 2 | 2017 |
Denoising multi-coil magnetic resonance imaging using nonlocal means on extended LMMSE V Soumya, A Varghese, T Manesh, KN Neetha Advances in Signal Processing and Intelligent Recognition Systems …, 2015 | 2 | 2015 |
A Framework for Evaluating the QoS and Cost of Web Services Based on Its Functional Performance MM Sha, T Manesh, AMM Ahmed World Academy of Science, Engineering and Technology, International Journal …, 2015 | 2 | 2015 |
Forensic investigation framework for P2P protocol T Manesh, MM Sha, K Vivekanandan 2014 International Conference on Control, Instrumentation, Communication and …, 2014 | 2 | 2014 |
A signature-based wireless intrusion detection system framework for multi-channel man-in-the-middle attacks against protected Wi-Fi networks M Thankappan, H Rifà-Pous, C Garrigues IEEE Access, 2024 | 1 | 2024 |
Level Based Anomaly Detection of Brain MR Images Using Modified Local Binary Pattern A Varghese, T Manesh, K Balakrishnan, JS George Intelligent Systems Technologies and Applications, 485-495, 2015 | 1 | 2015 |
SQL Injection Attack Solutions: A Review S Manmadhan, T Manesh, V Paul International Journal of Scientific & Engineering Research 4 (8), 2013 | 1 | 2013 |
Correction to: Multi-channel Man-in-the-Middle Attacks Against Protected Wi-Fi Networks and Their Attack Signatures M Thankappan, H Rifà-Pous, C Garrigues International Conference on Computer, Communication, and Signal Processing …, 2023 | | 2023 |
Multi-Channel Man-in-the-Middle attacks against protected Wi-Fi networks and their attack signatures M Thankappan, H Rifà-Pous, C Garrigues International Conference on Computer, Communication, and Signal Processing …, 2023 | | 2023 |
Recommended articles T Choudhary, J Sarangapani, Z Wang, F Wang, G Shi, M Thankappan, ... Future Generation Computer Systems 135, 44-56, 2022 | | 2022 |