Follow
Ms. Anita John
Ms. Anita John
Rajagiri School of Engineering and Technology
Verified email at rajagiritech.edu.in
Title
Cited by
Cited by
Year
Survey on data mining techniques to enhance intrusion detection
DK Denatious, A John
2012 International Conference on Computer Communication and Informatics, 1-5, 2012
912012
Rootkit detection mechanism: A survey
J Joy, A John, J Joy
International Conference on Parallel Distributed Computing Technologies and …, 2011
312011
Text watermarking using combined image and text for authentication and protection
KU Jaseena, A John
International Journal of Computer Applications 20 (4), 8-13, 2011
262011
An invisible zero watermarking algorithm using combined image and text for protecting text documents
KU Jaseena, A John
International Journal on Computer Science and Engineering 3 (6), 2265-2272, 2011
122011
A host based kernel level rootkit detection mechanism using clustering technique
J Joy, A John
International Conference on Computational Science, Engineering and …, 2011
82011
Carpenter: a cellular automata based resilient pentavalent stream cipher
R Lakra, A John, J Jose
Cellular Automata: 13th International Conference on Cellular Automata for …, 2018
72018
PENTAVIUM: potent trivium-like stream cipher using higher radii cellular automata
A John, BC Nandu, A Ajesh, J Jose
Cellular Automata: 14th International Conference on Cellular Automata for …, 2021
62021
Improving lifetime of structured deployed Wireless Sensor Network using sleepy algorithm
JM Jacob, A John
International Conference on Eco-friendly Computing and Communication Systems …, 2012
62012
A novel hash function based on hybrid cellular automata and sponge functions
A John, A Reji, AP Manoj, A Premachandran, B Zachariah, J Jose
Asian Symposium on Cellular Automata Technology, 221-233, 2022
42022
On the design of stream ciphers with Cellular Automata having radius= 2
A John, R Lakra, J Jose
Cryptology ePrint Archive, 2020
32020
Exploring Lightweight S-boxes Using Cellular Automata and Reinforcement Learning
T Ayyagari, A Saji, A John, J Jose
International Conference on Cellular Automata for Research and Industry, 17-28, 2022
12022
Hash Function Design Based on Hybrid Five-Neighborhood Cellular Automata and Sponge Functions.
A John, J Jose
Complex Systems 32 (2), 2023
2023
A Verifiable, Multi-Secret, Multi-Use Secret Sharing Scheme using Sponge functions and Cellular Automata
A John, AP Binoy, EB Samuval, NNR Nath, J Jose
2023
Fault Resistant Trivium-like Stream Cipher Using Higher Radii Cellular Automata.
A John, SAIK MINEESH REDDY, J Jose
Journal of Cellular Automata 16, 2022
2022
A Cellular Automata Based Fault Resistant MICKEY-Like Stream Cipher
A John, J Jose
International Conference on Cellular Automata for Research and Industry, 40-51, 2022
2022
Host based attack detection using system calls
J Joy, A John
Proceedings of the Second International Conference on Computational Science …, 2012
2012
EXPOSITORY STUDY ON SYBIL ATTACK COUNTER MEASURES IN VANET
JISM JACOB, A JOHN
The system can't perform the operation now. Try again later.
Articles 1–17