Survey on data mining techniques to enhance intrusion detection DK Denatious, A John 2012 International Conference on Computer Communication and Informatics, 1-5, 2012 | 91 | 2012 |
Rootkit detection mechanism: A survey J Joy, A John, J Joy International Conference on Parallel Distributed Computing Technologies and …, 2011 | 31 | 2011 |
Text watermarking using combined image and text for authentication and protection KU Jaseena, A John International Journal of Computer Applications 20 (4), 8-13, 2011 | 26 | 2011 |
An invisible zero watermarking algorithm using combined image and text for protecting text documents KU Jaseena, A John International Journal on Computer Science and Engineering 3 (6), 2265-2272, 2011 | 12 | 2011 |
A host based kernel level rootkit detection mechanism using clustering technique J Joy, A John International Conference on Computational Science, Engineering and …, 2011 | 8 | 2011 |
Carpenter: a cellular automata based resilient pentavalent stream cipher R Lakra, A John, J Jose Cellular Automata: 13th International Conference on Cellular Automata for …, 2018 | 7 | 2018 |
PENTAVIUM: potent trivium-like stream cipher using higher radii cellular automata A John, BC Nandu, A Ajesh, J Jose Cellular Automata: 14th International Conference on Cellular Automata for …, 2021 | 6 | 2021 |
Improving lifetime of structured deployed Wireless Sensor Network using sleepy algorithm JM Jacob, A John International Conference on Eco-friendly Computing and Communication Systems …, 2012 | 6 | 2012 |
A novel hash function based on hybrid cellular automata and sponge functions A John, A Reji, AP Manoj, A Premachandran, B Zachariah, J Jose Asian Symposium on Cellular Automata Technology, 221-233, 2022 | 4 | 2022 |
On the design of stream ciphers with Cellular Automata having radius= 2 A John, R Lakra, J Jose Cryptology ePrint Archive, 2020 | 3 | 2020 |
Exploring Lightweight S-boxes Using Cellular Automata and Reinforcement Learning T Ayyagari, A Saji, A John, J Jose International Conference on Cellular Automata for Research and Industry, 17-28, 2022 | 1 | 2022 |
Hash Function Design Based on Hybrid Five-Neighborhood Cellular Automata and Sponge Functions. A John, J Jose Complex Systems 32 (2), 2023 | | 2023 |
A Verifiable, Multi-Secret, Multi-Use Secret Sharing Scheme using Sponge functions and Cellular Automata A John, AP Binoy, EB Samuval, NNR Nath, J Jose | | 2023 |
Fault Resistant Trivium-like Stream Cipher Using Higher Radii Cellular Automata. A John, SAIK MINEESH REDDY, J Jose Journal of Cellular Automata 16, 2022 | | 2022 |
A Cellular Automata Based Fault Resistant MICKEY-Like Stream Cipher A John, J Jose International Conference on Cellular Automata for Research and Industry, 40-51, 2022 | | 2022 |
Host based attack detection using system calls J Joy, A John Proceedings of the Second International Conference on Computational Science …, 2012 | | 2012 |
EXPOSITORY STUDY ON SYBIL ATTACK COUNTER MEASURES IN VANET JISM JACOB, A JOHN | | |