Manipal Institute of Technology, Manipal
Professor, Computer Science
My co-authors include
Dr Mruthyunjaya H S
A meta data mining framework for botnet analysis
International Journal of Computers and Applications
Chroot Hardening Through System Calls Modification
Chatbot for university related FAQs
Extracting quality relations from categorical data using modified qube algorithm
Fitness function to find game equilibria using genetic algorithms
Multi-modality face recognition: An information theoretic approach
Neural network approach for vision-based track navigation using low-powered computers o...
Word based thematic game on Indian mythology
Safe buzz: adaptive security for multi-agents through situational awareness
International Journal of Autonomous and Adaptive Communications Systems
Context based interesting tweet recommendation framework
Intelligence analysis of Tay Twitter bot
Path independent real time points of interest detection in road networks
Identification of causal relationships among clinical variables for cancer diagnosis us...
Identification of gene network motifs for cancer disease diagnosis
Mutual fund performance prediction
Unemployment rates forecasting using supervised neural networks
Image sentiment analysis using deep convolutional neural networks with domain specific ...
Natural language image descriptor
Anti-scraping application development
Is That Twitter Hashtag Worth Reading
Is Stack Overflow Overflowing With Questions and Tags
Smart card based password authentication and user anonymity scheme using ECC and stegan...
Differential private random forest
Threat Analysis and malicious user detection in reputation systems using Mean Bisector ...
Detection of User Cluster with Suspicious Activity in Online Social Networking Sites
Contextual information based recommender system using Singular Value Decomposition
Detection and filtering of collaborative malicious users in reputation system using qua...
Alert-BDI: BDI model with adaptive alertness through situational awareness
Optimal Neural Network Architecture for Stock Market Forecasting
Stock Market Prediction Accuracy Analysis Using Kappa Measure
Aware-BDI: An Extension of the BDI Model Incorporating Situational Awareness
Ownership authentication transfer protocol for ubiquitous computing devices
Model Checking Zero Knowledge System
Enhanced mining association rule algorithm with reduced time & space complexity
Modelling and Verification of Extensible Authentication Protocol Using Spin Model Checker
International Journal of Network Security & Its Applications
Modeling two way concurrent buffer system using timed automata in UPPAAL
Erroneous state detection in piecewise FIFO system
Differentiated QoS with Modified C/I based scheduling algorithm
Modeling and Verification of Agent based Adaptive Traffic Signal using Symbolic Model V...
International Journal of Computer Applications
Privacy preserving and ownership authentication in ubiquitous computing devices using s...
Symbolic verification of web crawler functionality and its properties
Web opinion mining for social networking sites
Decoding robustness performance comparison for QR and data matrix code
Modeling & verification of Sliding Window Protocol with data loss and intruder detectio...
Formal verification of the Extensible Authentication Protocol using SPIN
Design and development of a desktop monitoring system
Modeling and Verification of Fiat-Shamir Zero Knowledge Authentication Protocol
Cloud Based Application Development for Accessing Restaurant Information on Mobile Devi...
International Journal of UbiComp
Is OAuth flawless?
Modeling and Verification of Kerberos Protocol Using Symbolic Model Verifier
Symbolic Verification of a Strength Based Multi-Agent Argumentation Scheme
International Journal of Artificial Intelligence & Applications
Modeling and Verification of Inter Realm Authentication in Kerberos Using Symbolic Mode...
Logical Modeling and Verification of a Strength Based Multi-agent Argumentation Scheme ...
Modeling and Verification of Server Aided Verification Protocol Using NuSMV
Modeling and Verification of Chess Game Using NuSMV
Cloud Based Application Development for Mobile Devices for Accessing LBS
Physical Layer Authentication in Wired and Wireless Communication Systems
Modeling freshness concept to overcome Replay attack in Kerberos protocol using NuSMV
Protecting location privacy in Augmented Reality using k-anonymization and pseudo-id
Model checking message exchange in Location Based Services
Securing location privacy in Augmented Reality
Exact schedulability analysis of global multi-processor IUF scheduling using symbolic m...
A generalized closed form relation for BER of QPSK/M-QAM over fading channel