{"id":15136,"date":"2024-03-03T15:42:40","date_gmt":"2024-03-03T15:42:40","guid":{"rendered":"https:\/\/scmsgroup.org\/sset\/?page_id=15136"},"modified":"2024-03-03T16:08:11","modified_gmt":"2024-03-03T16:08:11","slug":"cse_publications","status":"publish","type":"page","link":"https:\/\/scmsgroup.org\/sset\/cse_publications\/","title":{"rendered":"cse_publications"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"15136\" class=\"elementor elementor-15136\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-640ebbb7 e-flex e-con-boxed e-con e-parent\" data-id=\"640ebbb7\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5e34f9cf elementor-widget elementor-widget-heading\" data-id=\"5e34f9cf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">CSE Publications\n<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c830a4c e-flex e-con-boxed e-con e-parent\" data-id=\"c830a4c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a767f82 elementor-widget elementor-widget-elementskit-accordion\" data-id=\"a767f82\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"elementskit-accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ekit-wid-con\" >\n        <div class=\"elementskit-accordion accoedion-primary\" id=\"accordion-69d77ebb35d1a\">\n\n            \n                <div class=\"elementskit-card \">\n                    <div class=\"elementskit-card-header\" id=\"primaryHeading-0-a767f82\">\n                        <a href=\"#collapse-38292ad69d77ebb35d1a\" class=\"ekit-accordion--toggler elementskit-btn-link collapsed\" data-ekit-toggle=\"collapse\" data-target=\"#Collapse-38292ad69d77ebb35d1a\" aria-expanded=\"false\" aria-controls=\"Collapse-38292ad69d77ebb35d1a\">\n                            \n                            <span class=\"ekit-accordion-title\">2020- STAFF PUBLICATIONS<\/span>\n\n                            \n                                <div class=\"ekit_accordion_icon_group\">\n                                    <div class=\"ekit_accordion_normal_icon\">\n                                        <!-- Normal Icon -->\n\t\t\t\t\t\t\t\t\t\t<i class=\"icon icon-down-arrow1\"><\/i>                                    <\/div>\n\n                                    <div class=\"ekit_accordion_active_icon\">\n                                        <!-- Active Icon -->\n\t\t\t\t\t\t\t\t\t\t<i class=\"icon icon-up-arrow\"><\/i>                                    <\/div>\n                                <\/div>\n\n                            \n                                                    <\/a>\n                    <\/div>\n\n                    <div id=\"Collapse-38292ad69d77ebb35d1a\" class=\" collapse\" aria-labelledby=\"primaryHeading-0-a767f82\" data-parent=\"#accordion-69d77ebb35d1a\">\n\n                        <div class=\"elementskit-card-body ekit-accordion--content\">\n                            <ul class=\"bullets cselist\"><li>V. P. G., S. Jacob, V. G. Menon, V. Balasubramanian &amp; M. J. Piran, \u201cIoT-powered deep learning brain network for assisting quadriplegic people,\u201d accepted for publication in Computers &amp; Electrical Engineering. [SCIE, SCOPUS, Impact Factor 2.663<\/li><li>Xingwang Li; Mengle Zhao; Ming Zeng; Shahid Mumtaz; Varun G Menon; Zhiguo Ding; Octavia A. Dobre., \"Hardware Impaired Ambient Backscatter NOMA Systems: Reliability and Security,\" in IEEE Transactions on Communications, doi: 10.1109\/TCOMM.2021.3050503. [SCIE, SCOPUS, Impact Factor 5.646<\/li><li>Baofeng Ji; Yanan Wang; Kang Song; Chunguo Li; Hong Wen; Varun G. Menon; Shahid Mumtaz., \"A Survey of Computational Intelligence for 6G: Key Technologies, Applications and Trends,\" in IEEE Transactions on Industrial Informatics, doi: 10.1109\/TII.2021.3052531. [SCIE, SCOPUS, Impact Factor 9.112<\/li><li>M. A. Jan, F. Khan, R. Khan, S. Mastorakis, V. G. Menon, P. Watters &amp; M. Alazab, \u201cA Lightweight Mutual Authentication and Privacy-preservation Scheme for Intelligent Wearable Devices in Industrial-CPS,\u201d in IEEE Transactions on Industrial Informatics, 2020. doi: 10.1109\/TII.2020.3043802 [SCIE, SCOPUS, Impact Factor 9.112<\/li><li>M. Abbasi, A. Najafi, M. Rafiee, M. R. Khosravi, V. G. Menon and G. Muhammad, \"Efficient Flow Processing in 5G-Envisioned SDN-Based Internet of Vehicles Using GPUs,\" in IEEE Transactions on Intelligent Transportation Systems, 2020. doi: 10.1109\/TITS.2020.3038250 [SCIE, SCOPUS, Impact Factor 6.319<\/li><li>X. Xu, B. Shen, S. Ding, G. Srivastava, M. Bilal, M. R. Khosravi, V. G. Menon, M. A. Jan and W. Maoli, \"Service Offloading with Deep Q-Network for Digital Twinning Empowered Internet of Vehicles in Edge Computing,\" in IEEE Transactions on Industrial Informatics, 2020. doi: 10.1109\/TII.2020.3040180 [SCIE, SCOPUS, Impact Factor 9.112 (2020)]<\/li><li>P. G. Shynu, S. R. Nadesh, V. G. Menon, P. Venu, M. Abbasi, M. R. Khosravi, \u201cA secure data deduplication system for integrated cloud-edge networks,\u201d Journal of Cloud Computing, vol. 17, no. 3, 2020. doi: 10.1186\/s13677-020-00214-6 [SCIE, SCOPUS, Impact Factor 2.788 (2020)]<\/li><li>S. Jacob, V. G. Menon, S. Joseph, P. Sehdev \u201cDual-mode power reduction technique for real-time image and video processing board,\u201d Journal of Real-Time Image Processing, 17, 1991\u20132004, 2020. doi:10.1007\/s11554-020-00992-x [SCIE, SCOPUS, Impact Factor 1.968 (2020)]<\/li><li>M. R. Khosravi, V. G. Menon, \u201cIntelligent and pervasive computing for cyber-physical systems,\u201d Journal of Supercomputing, 2020 doi: 10.1007\/s11227-020-03449-x [SCIE, SCOPUS, Impact Factor 2.469 (2020)]<\/li><li>N. Khan, A. Ullah, I. V. G. Menon and S. W. Baik, \u201cSD-Net: Understanding overcrowded scenes in real-time via an efficient dilated convolutional neural network,\u201d Journal of Real-TimeImage Processing, 2020. doi: 10.1007\/s11554-020-01020-8 [SCIE, SCOPUS, Impact Factor 1.968 (2020)]<\/li><li>H. H. Attar, A. A. A. Solyman, A. F. Mohamed, M. R. Khosravi, V. G. Menon, A. K. Bashir, P. Tavallali, \u201cEfficient equalisers for OFDM andDFrFT-OCDM multicarrier systems in mobile E-health video broadcasting with machine learning perspectives,\u201d Physical Communication, 42, 2020. doi: 101173.10.1016\/j.phycom.2020.101173 [SCIE, SCOPUS, Impact Factor 1.594 (2020)]<\/li><li>B. Hazarika, R. Matam, M. Mukherjee, and V. G. Menon, \u201cDIO messages and trickle timer analysis of RPL routing protocol for UAV-assisted data collection in IoT,\u201d In Proceedings of the 2nd ACM MobiCom Workshop on Drone Assisted Wireless Communications for 5G and Beyond (DroneCom '20). Association for Computing Machinery, New York, NY, USA, 86\u201390, 2020.doi:10.1145\/3414045.3415944.<\/li><li>S. Jacob, V. G. Menon, R. Parvathi, P. G. Shynu, F. Shemim, B. Mahapatra, and M. Mukherjee, \u201cIntelligent vehicle collision avoidance system using 5G-enabled drone swarms,\u201d In Proceedings of the 2nd ACM MobiCom Workshop on Drone Assisted Wireless Communications for 5G and Beyond (DroneCom '20). Association for Computing Machinery, New York, NY, USA, 91\u201396, 2020. doi:10.1145\/3414045.3415938.<\/li><li>G. Rathee, N. Jaglan, R. Iqbal, S. P. Lal and V. G. Menon, \u201cA trust analysis scheme for vehicular networks within IoT-oriented Green City. Environmental Technology &amp; Innovation, vol. 20, 101144, 2020. doi:10.1016\/j.eti.2020.101144 [SCIE, SCOPUS, Impact Factor 3.356 (2020)]<\/li><li>H. Zhang, M. Babar, M. U. Tariq, M. A. Jan, V. G. Menon and X.Li, \"SafeCity: Toward Safe and Secured Data Management Design for IoT-Enabled Smart City Planning,\" in IEEE Access, vol. 8, pp.145256-145267, 2020, doi: 10.1109\/ACCESS.2020.3014622. [SCIE, SCOPUS, Impact Factor 3.745 (2020)]<\/li><li>G. Yang, M. A. Jan, V. G. Menon, P. G. Shynu, M. M. Aimal and M. D. Alshehri, \"A Centralized Cluster-Based Hierarchical Approach for Green Communication in a Smart Healthcare System,\" in IEEE Access, vol. 8, pp. 101464-101475, 2020. doi: 10.1109\/ACCESS.2020.2998452. [SCIE, SCOPUS, Impact Factor 3.745 (2020)]<\/li><li>S. Jacob, S. Joseph, V. G. Menon, \u201cA Low-cost Preventive Face Shield and Reusable N95 Compatible Mask for Preventing the Spread of COVID-19\u201d, IEEE Future Direction: Technology Policy &amp; Ethics, June 2020 https:\/\/cmte.ieee.org\/futuredirections\/tech-policy-ethics\/may-2020\/low-cost-preventative-face-shield-and-reusable-n95-compatible-mask\/<\/li><li>Nimmi K., Varun G. Menon, Janet B. and Akshi Kumar. (2020), \"Deep Learning for Next-Generation Inventive Wireless Networks: Issues, Challenges, and Future Directions.\" In Handbook of Research on Emerging Trends and Applications of Machine Learning, IGI Global, 2020, pp. 183-199. doi:10.4018\/978-1-5225-9643-1.ch010.<\/li><li>S. Jacob, V. G. Menon and S. Joseph, \"Depth Information Enhancement using Block Matching and Image Pyramiding Stereo Vision Enabled RGB-D Sensor,\" in IEEE Sensors Journal, vol. 20, no. 10, pp. 5406-5414, 15 May15, 2020. doi: 10.1109\/JSEN.2020.2969324 [SCIE, SCOPUS, IF 3.076 (2020)]<\/li><li>S. Jacob, V. G. Menon, P. G. Shynu, S. K. S. Fathima, B. Mahapatra and S. Joseph, \"Bidirectional Multi-tier Cognitive Swarm Drone 5G Network,\" IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), Toronto, ON, Canada, 2020, pp. 1219-1224, doi: 10.1109\/INFOCOMWKSHPS50562.2020.9162676.<\/li><li>S. Jacob, V. G. Menon, S. Joseph, P. G. Vinoj, A. Jolfaei, J. Lukose and G. Raja, \u201cA Novel Spectrum Sharing Scheme using Dynamic Long Short-Term Memory with CP-OFDMA in 5G Networks\" in IEEE Transactions on Cognitive Communications and Networking, 2020. doi: 10.1109\/TCCN.2020.2970697 [SCIE, SCOPUS, IF 4.574 (2020)<\/li><li>S. Jacob, M. Alagirisamy, V. G Menon, M. K. B, NZ Jhanjhi, V. Ponnusamy, S. P. G, V. Balasubramianam., \"An Adaptive and Flexible Brain Energized Full Body Exoskeleton with IoT Edge for Assisting the Paralyzed Patients,\" in IEEE Access, vol. 8, pp. 100721-100731, 2020, doi: 10.1109\/ACCESS.2020.2997727. [SCIE, SCOPUS, Impact Factor 3.745 (2020)]<\/li><li>R. Khan, M. Zakarya, V. Balasubramaniam, M. A. Jan and V. G. Menon, \"Smart Sensing-enabled Decision Support System for Water Scheduling in Orange Orchard,\" in IEEE Sensors Journal, 2020. doi:10.1109\/JSEN.2020.3012511. [SCIE, SCOPUS, Impact Factor 3.073 (2020)]<\/li><li>M. Abbasi, A. Shokrollahi, M. R. Khosravi, V. G. Menon,\u201cHigh-performance flow classification using hybrid clusters in software defined mobile edge computing,\u201d in Computer Communications, vol. 160, pp. 643-660,2020. doi: 10.1016\/j.comcom.2020.07.002 [SCIE, SCOPUS, Impact Factor 2.816 (2020)]<\/li><li>Abbasi, N. Mousavi, M. Rafiee, M. R. Khosravi, and V. G. Menon, \u201cA CRC-Based Classifier Micro-Engine for Efficient Flow Processing in SDN-Based Internet of Things.\" Mobile Information Systems, 2020. doi:10.1155\/2020\/7641073 [SCIE, SCOPUS, IF 1.635 (2020)]<\/li><li>V. G. Menon, S. Jacob, S. Joseph, P. Sehdev, M. R. Khosravi, F.A., \u201cAn IoT-Enabled Intelligent Automobile System for Smart Cities\u201d, Internet of Things. 2020. doi: 10.1016\/j.iot.2020.100213<\/li><li>Ms.Blessy Antony, Asst.Professor ,Department of CSE, presented a paper on , \u201dComparative Study of Various Sybil Detection Algorithms Using Sypy,\u201d in 4th International Conference on Intelligent Computing And Communication (ICICC-2020) , September 2020 and Proceedings will be published in Springer.<\/li><li>Ms.Nisha .S Raj,Asst.Professor ,Department of CSE ,presented a paper titled \"Feedback System in Engineering Academia: A Case Study\" in the International Conference on Research and Innovations in Science, Engineering &amp; Technology (Digital), September 2020.<\/li><li>Ms.Litty Koshy and Ms.Praylashyry ,presented a paper on \u201cCopy-Move Forgery Detection and Performance Analysis of Feature Detectors\u201d, in 9th International Conference on Communication and Signal Processing on 28 July 2020 and Proceedings Published in IEEE Conferences.page-0041-0045<\/li><li>Bino Sebastian, N. M. Unnikrishnan, N. Sebastian and R. Paul, \"Morphological Operators on Hypergraphs for Colour Image Processing,\" 2020 Advanced Computing and Communication Technologies for High Performance Applications (ACCTHPA), Cochin, India, 2020, pp. 217-220, doi: 10.1109\/ACCTHPA49271.2020.9213191.<\/li><\/ul>                        <\/div>\n\n                    <\/div>\n\n                <\/div><!-- .elementskit-card END -->\n\n                \n                <div class=\"elementskit-card \">\n                    <div class=\"elementskit-card-header\" id=\"primaryHeading-1-a767f82\">\n                        <a href=\"#collapse-77d1b2169d77ebb35d1a\" class=\"ekit-accordion--toggler elementskit-btn-link collapsed\" data-ekit-toggle=\"collapse\" data-target=\"#Collapse-77d1b2169d77ebb35d1a\" aria-expanded=\"false\" aria-controls=\"Collapse-77d1b2169d77ebb35d1a\">\n                            \n                            <span class=\"ekit-accordion-title\">2020 STUDENT PUBLICATIONS<\/span>\n\n                            \n                                <div class=\"ekit_accordion_icon_group\">\n                                    <div class=\"ekit_accordion_normal_icon\">\n                                        <!-- Normal Icon -->\n\t\t\t\t\t\t\t\t\t\t<i class=\"icon icon-down-arrow1\"><\/i>                                    <\/div>\n\n                                    <div class=\"ekit_accordion_active_icon\">\n                                        <!-- Active Icon -->\n\t\t\t\t\t\t\t\t\t\t<i class=\"icon icon-up-arrow\"><\/i>                                    <\/div>\n                                <\/div>\n\n                            \n                                                    <\/a>\n                    <\/div>\n\n                    <div id=\"Collapse-77d1b2169d77ebb35d1a\" class=\" collapse\" aria-labelledby=\"primaryHeading-1-a767f82\" data-parent=\"#accordion-69d77ebb35d1a\">\n\n                        <div class=\"elementskit-card-body ekit-accordion--content\">\n                            <ul class=\"bullets cselist\"><li>Christina Roseline,Chaithra C.V,Bijitha Balakrishnan,Bhavyasree P.V and Blessy Antony ,presented a paper on \u201dAnalysis Of Sybil Attacks In Online Social Networks Using Sypy\u201d in 4th International Conference on Intelligent Computing and Communication (ICICC-2020),September 2020 and Proceedings Will Be Published in Springer.<\/li><li>Athul Jeevan Kumar,Harshith,Amal. S and Sindhya K.Nambiar presented a paper on \u201dStatistical and Graph based approach to extractive summarization of Malayalam documents in ICETEST 2020 on 26-27 Novemeber 2020.<\/li><li>Jijina M.T,Litty Koshy and Gayathry Warrier presented a paper on\u201d Detection of Recoloring and Copy-Move Forgery in Digital Images\u201d,in the 5th IEEE International Conference on Research in Computational Intelligence and Communication Networks(ICRCICN 2020) on 26-27 November 2020 in Virtual mode.<\/li><\/ul>                        <\/div>\n\n                    <\/div>\n\n                <\/div><!-- .elementskit-card END -->\n\n                \n                <div class=\"elementskit-card \">\n                    <div class=\"elementskit-card-header\" id=\"primaryHeading-2-a767f82\">\n                        <a href=\"#collapse-dfab3f269d77ebb35d1a\" class=\"ekit-accordion--toggler elementskit-btn-link collapsed\" data-ekit-toggle=\"collapse\" data-target=\"#Collapse-dfab3f269d77ebb35d1a\" aria-expanded=\"false\" aria-controls=\"Collapse-dfab3f269d77ebb35d1a\">\n                            \n                            <span class=\"ekit-accordion-title\">2020-STUDENT<\/span>\n\n                            \n                                <div class=\"ekit_accordion_icon_group\">\n                                    <div class=\"ekit_accordion_normal_icon\">\n                                        <!-- Normal Icon -->\n\t\t\t\t\t\t\t\t\t\t<i class=\"icon icon-down-arrow1\"><\/i>                                    <\/div>\n\n                                    <div class=\"ekit_accordion_active_icon\">\n                                        <!-- Active Icon -->\n\t\t\t\t\t\t\t\t\t\t<i class=\"icon icon-up-arrow\"><\/i>                                    <\/div>\n                                <\/div>\n\n                            \n                                                    <\/a>\n                    <\/div>\n\n                    <div id=\"Collapse-dfab3f269d77ebb35d1a\" class=\" collapse\" aria-labelledby=\"primaryHeading-2-a767f82\" data-parent=\"#accordion-69d77ebb35d1a\">\n\n                        <div class=\"elementskit-card-body ekit-accordion--content\">\n                            <ul class=\"bullets cselist\"><li>Ananya, A. Aswathy, T. R. Amal, P. G. Swathy, P. Vinod, Shojafar Mohammad ,paper titled, \"SysDroid: A Dynamic ML-based Android Malware Analyzer using System Call Traces\", was published in Cluster Computing,The Journal of Networks, Software Tools and Applications,The journal is indexed in SCIE with Impact factor 1.851<\/li><\/ul>                        <\/div>\n\n                    <\/div>\n\n                <\/div><!-- .elementskit-card END -->\n\n                \n                <div class=\"elementskit-card \">\n                    <div class=\"elementskit-card-header\" id=\"primaryHeading-3-a767f82\">\n                        <a href=\"#collapse-f59e06b69d77ebb35d1a\" class=\"ekit-accordion--toggler elementskit-btn-link collapsed\" data-ekit-toggle=\"collapse\" data-target=\"#Collapse-f59e06b69d77ebb35d1a\" aria-expanded=\"false\" aria-controls=\"Collapse-f59e06b69d77ebb35d1a\">\n                            \n                            <span class=\"ekit-accordion-title\">2019-STAFF<\/span>\n\n                            \n                                <div class=\"ekit_accordion_icon_group\">\n                                    <div class=\"ekit_accordion_normal_icon\">\n                                        <!-- Normal Icon -->\n\t\t\t\t\t\t\t\t\t\t<i class=\"icon icon-down-arrow1\"><\/i>                                    <\/div>\n\n                                    <div class=\"ekit_accordion_active_icon\">\n                                        <!-- Active Icon -->\n\t\t\t\t\t\t\t\t\t\t<i class=\"icon icon-up-arrow\"><\/i>                                    <\/div>\n                                <\/div>\n\n                            \n                                                    <\/a>\n                    <\/div>\n\n                    <div id=\"Collapse-f59e06b69d77ebb35d1a\" class=\" collapse\" aria-labelledby=\"primaryHeading-3-a767f82\" data-parent=\"#accordion-69d77ebb35d1a\">\n\n                        <div class=\"elementskit-card-body ekit-accordion--content\">\n                            <ul class=\"bullets cselist\"><li>Sreeja Rajesh, Dr.Varun G Menon, Dr. Sunil Jacob, Dr.Vinod P, Research paper titled, \u201cSecure Brain to Brain Communication with Edge Computing for Assisting Post-Stroke Paralyzed Patients\u201d was published in IEEE Internet of Things Journal, DOI: 10.1109\/JIOT.2019.2951405. The journal is indexed in SCIE, SCOPUS with an impact factor of 9.5.<\/li><li>Anu V.R, Elizabeth Sherly, \u201cTAR Based Hotspot Prediction in Cloud Data centres\u201d International Journal of Grid computing and High Performance Computing(SCI nindexed),(volume 11: 4 issue(2019))DOI: 10.4018\/IJGHPC.2019070101.<\/li><li>V. P. G., S. Jacob, V. G. Menon, S. Rajesh and M. R. Khosravi (2019), \"Brain-Controlled Adaptive Lower Limb Exoskeleton for Rehabilitation of Post-Stroke Paralyzed,\" in IEEE Access. DOI: 10.1109\/ACCESS.2019.2921375. [SCIE, SCOPUS, IF 4.098 (2019)]<\/li><li>S Rajesh, V Paul, VG Menon, MR Khosravi (2019). A Secure and Efficient Lightweight Symmetric Encryption Scheme for Transfer of Text Files between Embedded IoT Devices. Symmetry, 11(2), 293. DOI:10.3390\/sym11020293 [SCIE, SCOPUS, IF 2.143 (2019)]<\/li><li>Deepa K, Radhamani G, Vinod P, Mohammad Shojafar, Neeraj Kumar and Mauro Conti, Identification of Android malware using refined system calls, In Wiley Concurrency and Computation: Practice and Experience, doi\u00a0<a href=\"https:\/\/web.archive.org\/web\/20220528233348\/https:\/\/onlinelibrary.wiley.com\/doi\/abs\/10.1002\/cpe.5311\" target=\"_blank\" rel=\"noopener\">https:\/\/doi.org\/10.1002\/cpe.5311<\/a><\/li><li>H Naderi, P Vinod, M Conti, S Parsa, MH Alaeiyan, Malware Signature Generation Using Locality Sensitive Hashing, ISEA International Conference on Security &amp; Privacy, 2019.<\/li><li>Varun G. Menon, Mohammad R. Khosravi, (2019), \u201cPreventing hijacked research papers in fake (rogue) journals through social media and databases\u201d, Library Hi Tech News, DOI:10.1108\/LHTN-11-2018-0070 [SCOPUS]<\/li><li>Keerthi K S, Bandana Mahapatra and Varun G Menon, (2019), \u201cInto the World of Underwater Swarm Robotics: Architecture, Communication, Applications and Challenges\u201d, Recent Patents on Computer Science, 12: 1 DOI: 10.2174\/2213275912666181129141638 [SCOPUS]<\/li><li>Samadi, Sadegh, Khosravi, Mohammad, Alzubi, Jafar, Alzubi, Omar &amp; G Menon, Varun. (2019), \u201cOptimum Range of Angle Tracking Radars: A Theoretical Computing\u201d, International Journal of Electrical and Computer Engineering, 9. 1755-1762. DOI: 10.11591\/ijece.v9i3.pp1765-1772 [SCOPUS]<\/li><li>Sonal Ayyappan, C Lakshmi, Varun Menon (2019), \u201cA Secure Reversible Data Hiding System for Embedding EPR in Medical Images\u201d, Current Signal Transduction Therapy,Vol.14, No:1. DOI: 10.2174\/1574362414666190304162411 [SCOPUS]<\/li><li>Sindhya K Nambiar and Soniya Jose presented a paper titled \"POS tagger for Malayalam using Hidden Markov Model\" in the 3rd international conference on Trends in Electronics and Informatics (ICOEI 2019) organised by SCAD College of Engineering and Technology on 23-25 April 2019 at Tirunelveli, India<\/li><li>V. P. G., S. Jacob, V. G. Menon, S. Rajesh and M. R. Khosravi (2019), \"Brain-Controlled Adaptive Lower Limb Exoskeleton for Rehabilitation of Post-Stroke Paralyzed,\" in IEEE Access. DOI: 10.1109\/ACCESS.2019.2921375. [SCIE, SCOPUS, IF 4.098 (2019)]<\/li><li>Jain, Deepak Kumar, Sunil Jacob, Jafar Alzubi, and Varun Menon (2019), \u201cAn efficient and adaptable multimedia system for converting PAL to VGA in real-time video processing\u201d, Journal of Real Time Image Processing, 2019 pp.1-13. DOI:10.1007\/s11554-019-00889-4. [SCIE, SCOPUS, IF 2.588 (2019)]<\/li><li>Rajesh, S., Paul, V., Menon, V. G., &amp; Khosravi, M. R. (2019). A Secure and Efficient Lightweight Symmetric Encryption Scheme for Transfer of Text Files between Embedded IoT Devices. Symmetry, 11(2), 293. DOI:10.3390\/sym11020293 [SCIE, SCOPUS, IF 2.143 (2019)]<\/li><li>Varun G. Menon, Mohammad R. Khosravi, (2019), \u201cPreventing hijacked research papers in fake (rogue) journals through social media and databases\u201d, Library Hi Tech News, DOI:10.1108\/LHTN-11-2018-0070 [SCOPUS]<\/li><li>Keerthi K S, Bandana Mahapatra and Varun G Menon, (2019), \u201cInto the World of Underwater Swarm Robotics: Architecture, Communication, Applications and Challenges\u201d, Recent Patents on Computer Science, 12: 1 DOI: 10.2174\/2213275912666181129141638 [SCOPUS]<\/li><li>Samadi, Sadegh, Khosravi, Mohammad, Alzubi, Jafar, Alzubi, Omar &amp; G Menon, Varun. (2019), \u201cOptimum Range of Angle Tracking Radars: A Theoretical Computing\u201d, International Journal of Electrical and Computer Engineering, 9. 1755-1762. DOI: 10.11591\/ijece.v9i3.pp1765-1772 [SCOPUS]<\/li><li>Sonal Ayyappan, C Lakshmi, Varun Menon (2019), \u201cA Secure Reversible Data Hiding System for Embedding EPR in Medical Images\u201d, Current Signal Transduction Therapy,Vol.14, No:1. DOI: 10.2174\/1574362414666190304162411 [SCOPUS]<\/li><li>Gayathry S Warrier,K.S. Angel Viji,published paper titled\"Spinal Canal Abnormalities in Early Stage Detection of Scoliosis Disease: A Review\",Journal of Advanced Research in Dynamical &amp; Control Systems, Vol. 11, 04-Special Issue, 2019 pp.267-275 ISSN 1943-023X<\/li><li>Litty koshy and S.Pryalashyry presented a paper \u201dA Survey on Video and Image Forgery Techniques\u201din the 1st International Conference on Recent Scientific Research in Engineering and Technology organised by John Cox Memorial CSI Institute of Technology, Thiruvananthapuram, Kerala and TECHOWN on 22 March 2019 .<\/li><li>Varun G Menon (2019), \u201cHijacked journals: what they are and how to avoid them\u201d published in Publons, Clarivate Analytics, 2019, Available online in\u00a0<a href=\"https:\/\/web.archive.org\/web\/20220528233348\/https:\/\/publons.com\/blog\/hijacked-journals-what-they-are-and-how-to-avoid-them\/\">https:\/\/publons.com\/blog\/hijacked-journals-what-they-are-and-how-to-avoid-them\/<\/a><\/li><li>Varun G Menon and Sonali John (2019), \u201cSimulation based Performance Analysis of Location Based Opportunistic Routing Protocols in Underwater Sensor Networks (UWSN) having Communication Voids\u201d, in Proceedings of the 3rd International Conference on Data Management, Analytics &amp; Innovation, Kuala Lumpur, Malaysia.<\/li><li>Menon, V. (2019), \u201cReview on Opportunistic Routing Protocols for Dynamic Ad hoc Networks: Taxonomy, Applications and Future Research Directions\u201d, Preprints. DOI: 10.20944\/preprints201903.0118.v1<\/li><li>Sunil Jacob and Menon, V. (2019), \u201cMEDICO-A Simple IoT Integrated Medical Kiosk for the Rural People\u201d, Preprints. DOI: 10.20944\/preprints201903.0069.v1<\/li><li>Menon, V. (2019), \u201cImproving the Efficiency of Opportunistic Routing in Dynamic Ad Hoc Networks by Eliminating Duplicate Message Forwarding. Preprints. DOI: 10.20944\/preprints201902.0214.v1<\/li><li>Menon, V. G. (2019). Light Weight Secure Encryption Scheme for Internet of Things Network. Encyclopedia.<\/li><li>Menon, V. (2019), \u201cOptimized Opportunistic Routing in Highly Dynamic Ad hoc Networks\u201d. Preprints DOI: 10.20944\/preprints201902.0130.v1<\/li><\/ul>                        <\/div>\n\n                    <\/div>\n\n                <\/div><!-- .elementskit-card END -->\n\n                \n                <div class=\"elementskit-card \">\n                    <div class=\"elementskit-card-header\" id=\"primaryHeading-4-a767f82\">\n                        <a href=\"#collapse-49e21cc69d77ebb35d1a\" class=\"ekit-accordion--toggler elementskit-btn-link collapsed\" data-ekit-toggle=\"collapse\" data-target=\"#Collapse-49e21cc69d77ebb35d1a\" aria-expanded=\"false\" aria-controls=\"Collapse-49e21cc69d77ebb35d1a\">\n                            \n                            <span class=\"ekit-accordion-title\">2019-STUDENT<\/span>\n\n                            \n                                <div class=\"ekit_accordion_icon_group\">\n                                    <div class=\"ekit_accordion_normal_icon\">\n                                        <!-- Normal Icon -->\n\t\t\t\t\t\t\t\t\t\t<i class=\"icon icon-down-arrow1\"><\/i>                                    <\/div>\n\n                                    <div class=\"ekit_accordion_active_icon\">\n                                        <!-- Active Icon -->\n\t\t\t\t\t\t\t\t\t\t<i class=\"icon icon-up-arrow\"><\/i>                                    <\/div>\n                                <\/div>\n\n                            \n                                                    <\/a>\n                    <\/div>\n\n                    <div id=\"Collapse-49e21cc69d77ebb35d1a\" class=\" collapse\" aria-labelledby=\"primaryHeading-4-a767f82\" data-parent=\"#accordion-69d77ebb35d1a\">\n\n                        <div class=\"elementskit-card-body ekit-accordion--content\">\n                            <ul class=\"bullets cselist\"><li>Maria, Mikhiya James, Mruthula M, Vismaya Bhaskaran, Asha S Presented a paper titled \u201c Evasion Attacks on SVM Classifier\u201d at the 9th International Conference on Advances in Computing &amp; Communications, 6-7th Nov 2019, IEEE.<\/li><li>Joffin Joy and Litty Koshy\u201d\u201cRubicrpyt:Image Scrambling Encryption System based on Rubik\u2019s cube Configuration\u201d in the proceeding of 2nd IEEE International Conference on Systems,Computation ,Automation and Networking (ICSCAN-2019) organized by Manakula Vinayagar Institute of Technology,Puducherry on 29th and 30th March 2019.@IEEE 978-1-7281-1524-5, pp 65-72.<\/li><\/ul>                        <\/div>\n\n                    <\/div>\n\n                <\/div><!-- .elementskit-card END -->\n\n                \n                <div class=\"elementskit-card \">\n                    <div class=\"elementskit-card-header\" id=\"primaryHeading-5-a767f82\">\n                        <a href=\"#collapse-a7f3fc369d77ebb35d1a\" class=\"ekit-accordion--toggler elementskit-btn-link collapsed\" data-ekit-toggle=\"collapse\" data-target=\"#Collapse-a7f3fc369d77ebb35d1a\" aria-expanded=\"false\" aria-controls=\"Collapse-a7f3fc369d77ebb35d1a\">\n                            \n                            <span class=\"ekit-accordion-title\">2018- STAFF<\/span>\n\n                            \n                                <div class=\"ekit_accordion_icon_group\">\n                                    <div class=\"ekit_accordion_normal_icon\">\n                                        <!-- Normal Icon -->\n\t\t\t\t\t\t\t\t\t\t<i class=\"icon icon-down-arrow1\"><\/i>                                    <\/div>\n\n                                    <div class=\"ekit_accordion_active_icon\">\n                                        <!-- Active Icon -->\n\t\t\t\t\t\t\t\t\t\t<i class=\"icon icon-up-arrow\"><\/i>                                    <\/div>\n                                <\/div>\n\n                            \n                                                    <\/a>\n                    <\/div>\n\n                    <div id=\"Collapse-a7f3fc369d77ebb35d1a\" class=\" collapse\" aria-labelledby=\"primaryHeading-5-a767f82\" data-parent=\"#accordion-69d77ebb35d1a\">\n\n                        <div class=\"elementskit-card-body ekit-accordion--content\">\n                            <ul class=\"bullets cselist\"><li>Anu V.R, Elizabeth Sherly, \u201cSimulated annealing Load Balancing for Cloud Data Centers through Ant Colony Optimization\u201d, International Journal of Engineering Research in Computer Science and Engineering (IJERCE) Volume: 5, issue: 4, April 2018.<\/li><li>Anu V.R, Elizabeth Sherly, \u201cIALM: Interference Aware Live Migration Strategy for Virtual Machines in Cloud Datacenters \u201c, International Springer Conference on Data Management, Analytics and Innovation (ICDMAI), January 2018.<\/li><li>Anu V.R, Elizabeth Sherly, \u201cCost Evaluation of Virtual Machine Live Migration through Bandwidth Analysis\u201d, International Springer Conference on Big data and Cloud Computing (ICBDCC), March 2018.<\/li><li>Sreeja Rajesh, Sunil Jacob, V Paul, \u201cSecure thought transfer and processing using Novel-T algorithm\u201d, Basic and Clinical Pharmacology &amp; Tovicology, ISSN:1742-7843, Volume 123, Issue S3<\/li><li>Menon, V. G., &amp; Prathap, J. (2018). Vehicular Fog Computing: Challenges Applications and Future Directions. In Fog Computing: Breakthroughs in Research and Practice (pp. 220-229). IGI Global. DOI: 10.4018\/978-1-5225-5649-7.ch011 [SCOPUS]<\/li><li>Chandran, V., Sekar, M., Janardhanan, S., Menon, V. (2018), \u201cA numerical study on the influence of mass and stiffness ratios on the vortex induced motion of an elastically mounted cylinder for harnessing power\u2019, Energies, 11, 2580, 2018. DOI:10.3390\/en11102580 [SCIE, SCOPUS, IF 2.707 (2018)]<\/li><li>Vinoj P G, Sunil Jacob and Varun G Menon (2018), \u201cHybrid brain actuated muscle interface for the physically disabled\u201d, Basic &amp; Clinical Pharmacology &amp; Toxicology, Volume 123, No. S3, Wiley [SCI, SCIE, IF 2.659 (2018)<\/li><li>Menon, V. G., &amp; Prathap, J. (2018). Vehicular Fog Computing: Challenges Applications and Future Directions. In Fog Computing: Breakthroughs in Research and Practice (pp. 220-229). IGI Global. DOI: 10.4018\/978-1-5225-5649-7.ch011 [SCOPUS].<\/li><li>Varun G Menon (2018), \"Opportunistic Routing Protocols in Underwater Acoustic Sensor Networks: Issues Challenges and Future Directions\", published in book titled Magnetic and Acoustic Communications: From Theory to Practice edited by Prof. Fei Hu, Taylor and Francis, Taylor and Francis-CRC Press, 2018. ISBN: 9781498799782<\/li><li>Alzubi, J., Jacob, S., Menon, V. G., Joseph, S., &amp; Vinoj, P. G. (2018). A Top-Up Design for PAL to VGA Conversion in Real Time Video Processing System. In 2018 International Symposium on Advanced Electrical and Communication Technologies (ISAECT) (pp. 1-5). IEEE [SCOPUS]<\/li><li>Varun G Menon and Vijay Anavangot (2018), \u201cDistributed Big Data Analytics in the Internet of Signals\u201d 2018 Seventh International Conference on System Modelling &amp; Advancement on Research Trends, UP, India.<\/li><li>Varun G Menon (2018), \"Moving from Topology Dependent to Opportunistic Routing Protocols in Dynamic Wireless Ad Hoc Networks: Challenges and Future Directions\", published in book Algorithms, Methods, and Applications in Mobile Computing and Communications edited by Prof. Agustinus Borgy Waluyo, IGI Global Publishers, 2018. DOI:10.4018\/978-1-5225-5693-0.ch001s<\/li><li>Vinod P, Akka Zemmari, Mauro Conti, \"A machine learning based approach to detect malicious android apps using discriminant system calls\", Future Generation Computer Systems, publisher, Elsevier,\u00a0<a href=\"https:\/\/web.archive.org\/web\/20220528233348\/https:\/\/doi.org\/10.1016\/j.future.2018.11.021\" target=\"_blank\" rel=\"noopener\">https:\/\/doi.org\/10.1016\/j.future.2018.11.021.<\/a><\/li><li>Vinod P, Scheduling Distributed Energy Resource Operation and Daily Power Consumption for a Smart Building to Optimize Economic and Environmental Parameters,Energies EISSN 1996-1073, pp 1348, 2018 ,Published by MDPI (SCI Index), Basel, Switzerland.<\/li><li>Viji Gopal, Varghese Paul, M Sudheep Elayidom, SasiGopalan \u201cAn Encryption based Security Enhancer Tool for IaaS Applications in Cloud Computing\u201d in the proceedings of 3rd IEEE International Conference on Recent Trends in Electronics, Information &amp; Communication Technology 2018 [RTEICT \u201918] in Bangalore on 18-19 May 2018.<\/li><li>R. Hariharan, K.Nimmi, S. Saran Raj \u201cAdvance Security System for Personal Area Using Raspberry Pi\u201d, Volume 118 No. 22 2018, 1777-1781 International Journal of Pure and Applied Mathematics, Scopus indexed<\/li><li>Namratha M, R Hariharan,,Nimmi K, J Sangeetha Priya \u201cSentiment Analysis and Geographical Analysis For Enhancing Security, Volume 118 No. 22 ,2018, 1777-1781, International Journal of Pure and Applied Mathematics, Scopus indexed.<\/li><li>S. Saran Raj, R.Hariharan, K. Nimmi K \u201cInner Clustering Based Rotation using RB Function For PPDM,Volume 118 No. 22 2018, 1777-1781, International Journal of Pure and Applied Mathematics, Scopus indexed.<\/li><li>Sreeja Rajesh, Sunil Jacob, Varghese Paul: Secure thought transfer and processing using Novel\u2010T algorithm, Basic &amp; Clinical Pharmacology &amp; Toxicology (ISSN: 1742-7843),Volume 123,Issue S3,August 2018,Wiley Online Library https:\/\/doi.org\/10.1111\/bcpt.13100<\/li><li>Bhupesh Singh, Prashanth Balasubramanian, Jimmy Mathew and Binu John, presented paper on\" Improving Social Safety with Automobile Pilot Adroitness Analyzer\" in 2nd International Conference on Smart Computing &amp; Informatics (SCI-2018) held on 27-28 JAN 2018,published in in Springer Proceedings of SCI-2018.<\/li><li>Sonal Ayyappan, Dr.C Lakshmi published paper titled \u201cA Review on Reversible Data Hiding Techniques\u201d in International Journal of Applied Engineering Research , Volume 13, Number 5 (2018) pp. 2940-2947<\/li><li>Viji Gopal, Dr. Varghese Paul, Dr. M Sudheep Elayidom, \u201cAn Improved Security Model for the Two Level Authentication Mechanism in Cloud Computing\u201d in Second International Conference on Advanced Information and Communication Technology\u201918 ( ICAIC'18) held at Karpagam College of Engineering, Coimbatore in Mar 2018<\/li><\/ul>                        <\/div>\n\n                    <\/div>\n\n                <\/div><!-- .elementskit-card END -->\n\n                \n                <div class=\"elementskit-card \">\n                    <div class=\"elementskit-card-header\" id=\"primaryHeading-6-a767f82\">\n                        <a href=\"#collapse-fb6a14269d77ebb35d1a\" class=\"ekit-accordion--toggler elementskit-btn-link collapsed\" data-ekit-toggle=\"collapse\" data-target=\"#Collapse-fb6a14269d77ebb35d1a\" aria-expanded=\"false\" aria-controls=\"Collapse-fb6a14269d77ebb35d1a\">\n                            \n                            <span class=\"ekit-accordion-title\">2018 - STUDENT<\/span>\n\n                            \n                                <div class=\"ekit_accordion_icon_group\">\n                                    <div class=\"ekit_accordion_normal_icon\">\n                                        <!-- Normal Icon -->\n\t\t\t\t\t\t\t\t\t\t<i class=\"icon icon-down-arrow1\"><\/i>                                    <\/div>\n\n                                    <div class=\"ekit_accordion_active_icon\">\n                                        <!-- Active Icon -->\n\t\t\t\t\t\t\t\t\t\t<i class=\"icon icon-up-arrow\"><\/i>                                    <\/div>\n                                <\/div>\n\n                            \n                                                    <\/a>\n                    <\/div>\n\n                    <div id=\"Collapse-fb6a14269d77ebb35d1a\" class=\" collapse\" aria-labelledby=\"primaryHeading-6-a767f82\" data-parent=\"#accordion-69d77ebb35d1a\">\n\n                        <div class=\"elementskit-card-body ekit-accordion--content\">\n                            <ul class=\"bullets cselist\"><li>Anagha S, Neenu Sebastian,Rosebell Paul, \u201cA Comparative Study of Performance and Security Issues of Public Key Cryptography and Symmetric Key Cryptography in Reversible Data Hiding\u201d, IBICA 2018, Innovations in Bio-Inspired Computing and Applications , AISC 939 Springer proceedings<\/li><\/ul>                        <\/div>\n\n                    <\/div>\n\n                <\/div><!-- .elementskit-card END -->\n\n                \n                <div class=\"elementskit-card \">\n                    <div class=\"elementskit-card-header\" id=\"primaryHeading-7-a767f82\">\n                        <a href=\"#collapse-1dcf64869d77ebb35d1a\" class=\"ekit-accordion--toggler elementskit-btn-link collapsed\" data-ekit-toggle=\"collapse\" data-target=\"#Collapse-1dcf64869d77ebb35d1a\" aria-expanded=\"false\" aria-controls=\"Collapse-1dcf64869d77ebb35d1a\">\n                            \n                            <span class=\"ekit-accordion-title\">2017- STAFF<\/span>\n\n                            \n                                <div class=\"ekit_accordion_icon_group\">\n                                    <div class=\"ekit_accordion_normal_icon\">\n                                        <!-- Normal Icon -->\n\t\t\t\t\t\t\t\t\t\t<i class=\"icon icon-down-arrow1\"><\/i>                                    <\/div>\n\n                                    <div class=\"ekit_accordion_active_icon\">\n                                        <!-- Active Icon -->\n\t\t\t\t\t\t\t\t\t\t<i class=\"icon icon-up-arrow\"><\/i>                                    <\/div>\n                                <\/div>\n\n                            \n                                                    <\/a>\n                    <\/div>\n\n                    <div id=\"Collapse-1dcf64869d77ebb35d1a\" class=\" collapse\" aria-labelledby=\"primaryHeading-7-a767f82\" data-parent=\"#accordion-69d77ebb35d1a\">\n\n                        <div class=\"elementskit-card-body ekit-accordion--content\">\n                            <ul class=\"bullets cselist\"><li>Vinod, P. and Viswalakshmi, P.,\u201d Empirical Evaluation of a System Call-Based Android Malware Detector\u201d, Arabian Journal for Science and Engineering, 2017, pp 1-20,issn=2191-4281,doi=\"10.1007\/s13369-017-2828-0 [SCIE Indexed].<\/li><li>Deepa. K, G.Radhamani, Vinod P , \"Malicious APK analysis with reduced API's \" in Journal of Advanced Research in Dynamic and Control System(Elsevier SCOPUS) in Aug 2017<\/li><li>Varun G Menon and Joe Prathap P. M., \"Vehicular Fog Computing:Challenges, Applications and Future Directions\", International Journal of Vehicular Telematics and Infotainment Systems, IGI Global, vol.1, no.2, pp.15-23, 2017.<\/li><li>Varun G Menon, \"Analyzing the Performance of Random Mobility Models with Opportunistic Routing\", Advances in Wireless and Mobile Communications,vol.10, no.5, pp.1221-1226, 2017.<\/li><li>Varun G Menon and Joe Prathap P M, \"A Review on Efficient Opportunistic Forwarding Techniques used to Handle Communication Voids in Underwater Wireless Sensor Networks, Advances in Wireless and Mobile Communications, vol.10, no.5, pp.1059-1066, 2017.<\/li><li>Varun G Menon and Joe Prathap P M, \u201cMoving From Vehicular Cloud Computing to Vehicular Fog Computing: Issues and Challenges\u201d, International Journal of Computer Science and Engineering, vol. 9, no. 2, pp. 14-18, 2017.<\/li><li>Varun G Menon and Joe Prathap P M, \u201cTowards Optimal Data Delivery in Highly Mobile Wireless Ad Hoc Networks\u201d, International Journal of Computer Science and Engineering, vol. 9, no1, pp. 1-6, 2017.<\/li><\/ul>                        <\/div>\n\n                    <\/div>\n\n                <\/div><!-- .elementskit-card END -->\n\n                \n                <div class=\"elementskit-card \">\n                    <div class=\"elementskit-card-header\" id=\"primaryHeading-8-a767f82\">\n                        <a href=\"#collapse-6e51b1169d77ebb35d1a\" class=\"ekit-accordion--toggler elementskit-btn-link collapsed\" data-ekit-toggle=\"collapse\" data-target=\"#Collapse-6e51b1169d77ebb35d1a\" aria-expanded=\"false\" aria-controls=\"Collapse-6e51b1169d77ebb35d1a\">\n                            \n                            <span class=\"ekit-accordion-title\">2016- STAFF<\/span>\n\n                            \n                                <div class=\"ekit_accordion_icon_group\">\n                                    <div class=\"ekit_accordion_normal_icon\">\n                                        <!-- Normal Icon -->\n\t\t\t\t\t\t\t\t\t\t<i class=\"icon icon-down-arrow1\"><\/i>                                    <\/div>\n\n                                    <div class=\"ekit_accordion_active_icon\">\n                                        <!-- Active Icon -->\n\t\t\t\t\t\t\t\t\t\t<i class=\"icon icon-up-arrow\"><\/i>                                    <\/div>\n                                <\/div>\n\n                            \n                                                    <\/a>\n                    <\/div>\n\n                    <div id=\"Collapse-6e51b1169d77ebb35d1a\" class=\" collapse\" aria-labelledby=\"primaryHeading-8-a767f82\" data-parent=\"#accordion-69d77ebb35d1a\">\n\n                        <div class=\"elementskit-card-body ekit-accordion--content\">\n                            <ul class=\"bullets cselist\"><li>Susmi Jacob, Madhu S Nair,\u201d Image reconstruction from random samples using multiscale regression framework\u201d, published in Elsevier journal of neuro computing,Volume\/issue 189c,pp 95-105, April 2016.<\/li><li>Varun G. Menon, Joe Prathap Pathrose, and Jogi Priya, \u201cEnsuring Reliable Communication in Disaster Recovery Operations with Reliable Routing Technique,\u201d Mobile Information Systems, vol. 2016, Article ID 9141329, 10 pages, 2016. doi:10.1155\/2016\/9141329.<\/li><li>Varun G. Menon and P. M. Joe Prathap, \u201cOpportunistic routing with virtual coordinates to handle communication voids in mobile ad hoc networks,\u201d in Advances in Signal Processing and Intelligent Recognition Systems, pp. 323\u2013334, Springer International, 2016. doi:10.1007\/978-3-319-28658-7_28.<\/li><\/ul>                        <\/div>\n\n                    <\/div>\n\n                <\/div><!-- .elementskit-card END -->\n\n                \n                <div class=\"elementskit-card \">\n                    <div class=\"elementskit-card-header\" id=\"primaryHeading-9-a767f82\">\n                        <a href=\"#collapse-a3f556f69d77ebb35d1a\" class=\"ekit-accordion--toggler elementskit-btn-link collapsed\" data-ekit-toggle=\"collapse\" data-target=\"#Collapse-a3f556f69d77ebb35d1a\" aria-expanded=\"false\" aria-controls=\"Collapse-a3f556f69d77ebb35d1a\">\n                            \n                            <span class=\"ekit-accordion-title\">2016-STUDENTS<\/span>\n\n                            \n                                <div class=\"ekit_accordion_icon_group\">\n                                    <div class=\"ekit_accordion_normal_icon\">\n                                        <!-- Normal Icon -->\n\t\t\t\t\t\t\t\t\t\t<i class=\"icon icon-down-arrow1\"><\/i>                                    <\/div>\n\n                                    <div class=\"ekit_accordion_active_icon\">\n                                        <!-- Active Icon -->\n\t\t\t\t\t\t\t\t\t\t<i class=\"icon icon-up-arrow\"><\/i>                                    <\/div>\n                                <\/div>\n\n                            \n                                                    <\/a>\n                    <\/div>\n\n                    <div id=\"Collapse-a3f556f69d77ebb35d1a\" class=\" collapse\" aria-labelledby=\"primaryHeading-9-a767f82\" data-parent=\"#accordion-69d77ebb35d1a\">\n\n                        <div class=\"elementskit-card-body ekit-accordion--content\">\n                            <ul class=\"bullets cselist\"><li>Jeena Rita K.S, Bini omman \u201cA Technical Assessment on License Plate Detection System\u201d IGI Global Book Chapter,2016<\/li><li>Jithu Raphael, Vinod P, Heterogeneous Opcode Space for Metamorphic Malware Detection, In Springer Arabian Journal for Science and Engineering, 10.1007\/s13369-016-2264-6, pp1-22.<\/li><li>M. V. Varsha, P. Vinod , K. A. Dhanya, Identification of malicious android app using manifest and opcode features, In Springer Journal of Computer Virology and Hacking Techniques, DOI-10.1007\/s11416-016-0277-z, pp2274-2042.<\/li><\/ul>                        <\/div>\n\n                    <\/div>\n\n                <\/div><!-- .elementskit-card END -->\n\n                \n                <div class=\"elementskit-card \">\n                    <div class=\"elementskit-card-header\" id=\"primaryHeading-10-a767f82\">\n                        <a href=\"#collapse-6a7207d69d77ebb35d1a\" class=\"ekit-accordion--toggler elementskit-btn-link collapsed\" data-ekit-toggle=\"collapse\" data-target=\"#Collapse-6a7207d69d77ebb35d1a\" aria-expanded=\"false\" aria-controls=\"Collapse-6a7207d69d77ebb35d1a\">\n                            \n                            <span class=\"ekit-accordion-title\">2015-STAFF<\/span>\n\n                            \n                                <div class=\"ekit_accordion_icon_group\">\n                                    <div class=\"ekit_accordion_normal_icon\">\n                                        <!-- Normal Icon -->\n\t\t\t\t\t\t\t\t\t\t<i class=\"icon icon-down-arrow1\"><\/i>                                    <\/div>\n\n                                    <div class=\"ekit_accordion_active_icon\">\n                                        <!-- Active Icon -->\n\t\t\t\t\t\t\t\t\t\t<i class=\"icon icon-up-arrow\"><\/i>                                    <\/div>\n                                <\/div>\n\n                            \n                                                    <\/a>\n                    <\/div>\n\n                    <div id=\"Collapse-6a7207d69d77ebb35d1a\" class=\" collapse\" aria-labelledby=\"primaryHeading-10-a767f82\" data-parent=\"#accordion-69d77ebb35d1a\">\n\n                        <div class=\"elementskit-card-body ekit-accordion--content\">\n                            <ul class=\"bullets cselist\"><li>Sreeja Rajesh, Varghese Paul presented paper titled \u201cComparative Study of Security Aspects of Various Symmetric Key Encryption Algorithms\u201d, published in Asian Journal of Engineering and Technology, Volume 03, Issue 04, pp 442-445, August 2015.<\/li><li>Vinod P, V.Laxmi, M.S.Gaur, Grijesh Chauhan, \u201cDetecting Malicious Files using Non\u2013Signature based Methods\u201d, published in International Journal of Information and Computer Security ,April 2015<\/li><li>Deepa K, G.Radhamani, Vinod P ,presented \u201cInvestigation of Feature Selection Methods for Android Malware Analysis\u201d in Procedia Computer Science(Vol 46), February 2015<\/li><li>Smitha Naval, Vijay Laxmi, Manoj Singh Gaur, and Vinod P, \"An Efficient Block-discriminant Identification of Packed Malware\", Sadhana, Published by the Indian Academy of Sciences, ISSN: 0973-7677 (electronic version),August 2015.<\/li><\/ul>                        <\/div>\n\n                    <\/div>\n\n                <\/div><!-- .elementskit-card END -->\n\n                \n                <div class=\"elementskit-card \">\n                    <div class=\"elementskit-card-header\" id=\"primaryHeading-11-a767f82\">\n                        <a href=\"#collapse-25926e469d77ebb35d1a\" class=\"ekit-accordion--toggler elementskit-btn-link collapsed\" data-ekit-toggle=\"collapse\" data-target=\"#Collapse-25926e469d77ebb35d1a\" aria-expanded=\"false\" aria-controls=\"Collapse-25926e469d77ebb35d1a\">\n                            \n                            <span class=\"ekit-accordion-title\">2015-STUDENTS<\/span>\n\n                            \n                                <div class=\"ekit_accordion_icon_group\">\n                                    <div class=\"ekit_accordion_normal_icon\">\n                                        <!-- Normal Icon -->\n\t\t\t\t\t\t\t\t\t\t<i class=\"icon icon-down-arrow1\"><\/i>                                    <\/div>\n\n                                    <div class=\"ekit_accordion_active_icon\">\n                                        <!-- Active Icon -->\n\t\t\t\t\t\t\t\t\t\t<i class=\"icon icon-up-arrow\"><\/i>                                    <\/div>\n                                <\/div>\n\n                            \n                                                    <\/a>\n                    <\/div>\n\n                    <div id=\"Collapse-25926e469d77ebb35d1a\" class=\" collapse\" aria-labelledby=\"primaryHeading-11-a767f82\" data-parent=\"#accordion-69d77ebb35d1a\">\n\n                        <div class=\"elementskit-card-body ekit-accordion--content\">\n                            <ul class=\"bullets cselist\"><li>Jikku Kuriakose, and Vinod P, \"Unknown Metamorphic Malware Detection: Modelling with Fewer Relevant Features and Robust Feature Selection Techniques\", published in IAENG International Journal of Computer Science, vol. 42, no. 2, pp139-151,April 2015.<\/li><li>Aswini A M and Vinod P \u201cTowards the Detection of Android Malware using Ensemble Features\u201d, published in International Journal of Information Assurance and Security (JIAS), ISSN 1554-1010, April 2015.<\/li><li>Athira Azhikoden, Vinod P presented \u201cMetaOpcode Space for Morphed Malware Detection\u201d, in the 11th IEEE International Conference on Innovations in Information Technology 2015 (IIT'15), Dubai, and November 01-03, 2015.<\/li><li>Varsha V, Vinod P., Dhanya KA presented \u201cHeterogeneous Feature Space for Android Malware Detection\u201d, In the 8th IEEE International Conference on Contemporary Computing (IC3), 2015, NewDelhi, India.<\/li><li>Jithu Raphel, Vinod P presented \"Pruned Feature Space for Metamorphic Malware Detection using Markov Blanket\", In the 8th IEEE International Conference on Contemporary Computing (IC3), 2015, NewDelhi, India.<\/li><li>Vinod P, Meenu Mary John, Dhanya KA presented \u201cHartley\u2019s Test Ranked Opcodes for Android Malware Analysis\u201d, in the 8th International Conference on Security of Information and Networks, In Technical Cooperation with ACM SIGSAC, September 8-10, 2015 Sochi\/Russia, Pages 304-311.<\/li><li>Vinod P, Jithu Raphel presented \u201cInformation Theoretic Method for Classification of Packed and Encoded Files\u201d, in the 8th International Conference on Security of Information and Networks, In Technical Cooperation with ACM SIGSAC, September 8-10, 2015 Sochi\/Russia, Pages 293-303<\/li><li>Vinod P, Princy George presented ``Machine Learning Approach for Filtering Spam Emails\u201d, in the 8th International Conference on Security of Information and Networks, In Technical Cooperation with ACM SIGSAC, September 8-10, 2015 Sochi\/Russia, Pages 271-274 .<\/li><li>Nithil George, Vinod P, presented \u201cOpcode Position Aware Metamorphic Malware Detection\u201d, in 9th Indiacom; 2015 2ndInternational conference on Computing for Sustainable Global Development scheduled for 11th-13th March 2015.<\/li><li>\u00a0<\/li><\/ul>                        <\/div>\n\n                    <\/div>\n\n                <\/div><!-- .elementskit-card END -->\n\n                \n                <div class=\"elementskit-card \">\n                    <div class=\"elementskit-card-header\" id=\"primaryHeading-12-a767f82\">\n                        <a href=\"#collapse-4bec6c069d77ebb35d1a\" class=\"ekit-accordion--toggler elementskit-btn-link collapsed\" data-ekit-toggle=\"collapse\" data-target=\"#Collapse-4bec6c069d77ebb35d1a\" aria-expanded=\"false\" aria-controls=\"Collapse-4bec6c069d77ebb35d1a\">\n                            \n                            <span class=\"ekit-accordion-title\">2014-STAFF<\/span>\n\n                            \n                                <div class=\"ekit_accordion_icon_group\">\n                                    <div class=\"ekit_accordion_normal_icon\">\n                                        <!-- Normal Icon -->\n\t\t\t\t\t\t\t\t\t\t<i class=\"icon icon-down-arrow1\"><\/i>                                    <\/div>\n\n                                    <div class=\"ekit_accordion_active_icon\">\n                                        <!-- Active Icon -->\n\t\t\t\t\t\t\t\t\t\t<i class=\"icon icon-up-arrow\"><\/i>                                    <\/div>\n                                <\/div>\n\n                            \n                                                    <\/a>\n                    <\/div>\n\n                    <div id=\"Collapse-4bec6c069d77ebb35d1a\" class=\" collapse\" aria-labelledby=\"primaryHeading-12-a767f82\" data-parent=\"#accordion-69d77ebb35d1a\">\n\n                        <div class=\"elementskit-card-body ekit-accordion--content\">\n                            <ul class=\"bullets cselist\"><li>Asha S , Sreeraj M, Jayasree K published a paper titled \u201dA Transformation Invariant Framework for Video Copy Sub Sequence Identification\u201d, International Journal of Computer Applications, march 2014.<\/li><li>Remya S and Jency Thomas \u201dA Novel Approach For Mixed Noise Removal Using ROR Statistics Combined with ACWM and Non Local Means Filter\u201d is published in the International Journal for Computer Applications volume-86-No17, January 2014.<\/li><\/ul>                        <\/div>\n\n                    <\/div>\n\n                <\/div><!-- .elementskit-card END -->\n\n                \n                <div class=\"elementskit-card \">\n                    <div class=\"elementskit-card-header\" id=\"primaryHeading-13-a767f82\">\n                        <a href=\"#collapse-a4c690f69d77ebb35d1a\" class=\"ekit-accordion--toggler elementskit-btn-link collapsed\" data-ekit-toggle=\"collapse\" data-target=\"#Collapse-a4c690f69d77ebb35d1a\" aria-expanded=\"false\" aria-controls=\"Collapse-a4c690f69d77ebb35d1a\">\n                            \n                            <span class=\"ekit-accordion-title\">2014-STUDENTS<\/span>\n\n                            \n                                <div class=\"ekit_accordion_icon_group\">\n                                    <div class=\"ekit_accordion_normal_icon\">\n                                        <!-- Normal Icon -->\n\t\t\t\t\t\t\t\t\t\t<i class=\"icon icon-down-arrow1\"><\/i>                                    <\/div>\n\n                                    <div class=\"ekit_accordion_active_icon\">\n                                        <!-- Active Icon -->\n\t\t\t\t\t\t\t\t\t\t<i class=\"icon icon-up-arrow\"><\/i>                                    <\/div>\n                                <\/div>\n\n                            \n                                                    <\/a>\n                    <\/div>\n\n                    <div id=\"Collapse-a4c690f69d77ebb35d1a\" class=\" collapse\" aria-labelledby=\"primaryHeading-13-a767f82\" data-parent=\"#accordion-69d77ebb35d1a\">\n\n                        <div class=\"elementskit-card-body ekit-accordion--content\">\n                            <ul class=\"bullets cselist\"><li>Josin Thomas, Vinod P, Nisha S Raj \u201cTowards Spam Mail Detection using Robust Feature Evaluated with Feature Selection Techniques\u201d, published in International Journal of Engineering and Technology (IJET), Vol 6 No 5 Oct-Nov 2014, ISSN : 0975-4024, pp:2144-2157<\/li><li>Bincy Thomas, Vinod P, Dhanya K A,\u201dMulticlass Emotion Extraction from Sentences\u201d, published in International Journal of Scientific &amp; Engineering Research, Volume 5, Issue 2, and February-2014 12 ISSN 2229-5518.<\/li><li>Nimmy Cleetus, Dhanya K A., \u201cRule induction Using Ant Miner Algorithm\u201d ,published in IJSER journal, Volume 5, Issue 2, ISSN 2229-5518 MES College Marampally, 6th&amp;7th January 2014<\/li><li>Aswini AM, Vinod P presented \u201cAndroid Malware Analysis using Ensemble features\u201d, International Conference on Security, Privacy and Applied Cryptographic Engineering (SPACE 2014), 20th-22nd October, 2014, pp: 308-313<\/li><li>Rincy Rapheal, Vinod P. and Bini Omman presented \u201cX-ANOVA and X-Utest Features for Android Malware Analysis\u201d, IEEE International Workshop on Cyber-Physical Systems and Social Computing (CSSC-2014) in conjunction with Third International Conference on Advances in Computing, Communications and Informatics, 24-27 September, 2014.<\/li><li>Asmitha K.A and Vinod P presented \u201cLinux Malware Detection using non-Parametric Statistical methods\u201d, IEEE International Workshop on Cyber-Physical Systems and Social Computing (CSSC-2014) in conjunction with Third International Conference on Advances in Computing, Communications and Informatics, 24-27 September, 2014.<\/li><li>Jikku Kuriakose and Vinod P presented \u201cMetamorphic Virus Detection using Feature Selection Techniques\u201d, Fifth IEEE International Conference on Computer and Communication Technology, (ICCCT-2015), and September 26 to 28, 2014.<\/li><li>Silpa Sebastian, Sonal Ayappan, Vinod P presented \u201cFramework for Design of Graybot in Social-Network\u201d, in the Second International Symposium on Women in Computing and Informatics (WCI-2014), 24-27 September, 2014.<\/li><li>Bincy Thomas, Dhanya K A, Vinod P presented \u201cExploration of Robust Features for Multiclass Emotion Classification\u201d, in the third International Symposium on Natural Language Processing (NLP'14), 24-27 September, 2014.<\/li><li>Jikku Kuriakose, Vinod P presented \u201cTowards the Detection of Undetectable Metamorphic Malware\u201d, in the 7th ACM International Conference on Security of Information and Networks, September, 9-11, 2014, Glasgow\/UK.<\/li><li>Jikku Kuriakose, Vinod P presented \u201cDiscriminant Features for Metamorphic Malware Detection\u201d, In Seventh IEEE International Conference on Contemporary Computing, Jaypee Institute of Information Technology &amp; University of Florida, August 7-9, 2014, and pp: 406-411.<\/li><li>Bincy Thomas, Dhanya K A, Vinod P, presented \u201cSynthesized Feature Space for Multiclass Emotion Classification\u201d, in the International Conference on Networks &amp; Soft Computing (ICNSC 2014), 19-20 August, 2014, pp: 188-192.<\/li><li>Bincy Thomas, Dhanya K A, Vinod P presented \u201cMachine Learning Approach for Emotion Extraction from Sentences\u201d, In proceedings of Second International Conference on Emerging Research in Computing, Information, Communication and Applications, ERCICA2014, August 1st and 2nd, 2014, Elsevier.<\/li><li>Josin Thomas, Nisha S Raj, Vinod P presented \u201cRobust Chi-square Features for Identifying Spam Emails\u201d, In proceedings of Second International Conference on Emerging Research in Computing, Information, Communication and Applications, ERCICA2014, August 1st and 2nd, 2014, Elsevier.<\/li><li>Silpa Sebastian, Sonal Ayyappan, Vinod P, presented \u201cGraybot: Java based Botnet\u201d, IEEE International Conference on Advances in Engineering and Technology, ICAET-2014, EGS Pillay Engineering College, Nagapattinam, ISBN 978-1-4799-4949-6, May 2nd and 3rd \u2013 2014 .<\/li><li>Julie Baby, Kannan T, Vinod P, Viji Gopal, presented \u201cDistance Indices for the Detection of Similarity in C Programs\u201d, In 3rd IEEE International Conference on Computation of Power, Energy, Information and Communication, April 16th \u2013 17th, 2014.<\/li><li>Asmitha K.A, Vinod P presented A Machine Learning Approach for Linux Malware Detection\u201d, In Proc. of IEEE and Scopus Indexed International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT-2014), 07-08th February, 2014, pp:825-830.<\/li><li>Silpa Sebastian, Sonal Ayyappan, Vinod P presented \u201cJBot: Java Based Botnet\u201d, In International Conference on ADVANCES IN INFORMATION TECHNOLOGY &amp; NETWORKING (ICATN\u201814)`, Dr.G. R. Damodaran College of Science, (Autonomous, affiliated to Bharathiar University, re-accredited at the \u2018A\u2019 grade level by the NAAC, 22nd January 2014.<\/li><li>Shahana P.H, Bini Omman, Vinod P, presented \u201cGender Classification of Blog Authors\u201d, In International Conference on ADVANCES IN INFORMATION TECHNOLOGY &amp; NETWORKING (ICATN\u201814), Dr.G. R. Damodaran College of Science, and (Autonomous, affiliated to Bharathiar University, re-accredited at the \u2018A\u2019 grade level by the NAAC, 22nd January 2014<\/li><\/ul>                        <\/div>\n\n                    <\/div>\n\n                <\/div><!-- .elementskit-card END -->\n\n                \n                <div class=\"elementskit-card \">\n                    <div class=\"elementskit-card-header\" id=\"primaryHeading-14-a767f82\">\n                        <a href=\"#collapse-0c8c34669d77ebb35d1a\" class=\"ekit-accordion--toggler elementskit-btn-link collapsed\" data-ekit-toggle=\"collapse\" data-target=\"#Collapse-0c8c34669d77ebb35d1a\" aria-expanded=\"false\" aria-controls=\"Collapse-0c8c34669d77ebb35d1a\">\n                            \n                            <span class=\"ekit-accordion-title\">2013-STAFF<\/span>\n\n                            \n                                <div class=\"ekit_accordion_icon_group\">\n                                    <div class=\"ekit_accordion_normal_icon\">\n                                        <!-- Normal Icon -->\n\t\t\t\t\t\t\t\t\t\t<i class=\"icon icon-down-arrow1\"><\/i>                                    <\/div>\n\n                                    <div class=\"ekit_accordion_active_icon\">\n                                        <!-- Active Icon -->\n\t\t\t\t\t\t\t\t\t\t<i class=\"icon icon-up-arrow\"><\/i>                                    <\/div>\n                                <\/div>\n\n                            \n                                                    <\/a>\n                    <\/div>\n\n                    <div id=\"Collapse-0c8c34669d77ebb35d1a\" class=\" collapse\" aria-labelledby=\"primaryHeading-14-a767f82\" data-parent=\"#accordion-69d77ebb35d1a\">\n\n                        <div class=\"elementskit-card-body ekit-accordion--content\">\n                            <ul class=\"bullets cselist\"><li>Sreeja Rajesh presented Paper titled \u201cProtection from Application Layer DDOS Attacks for Popular Websites \u201d , published in International Journal of Computer and Electrical Engineering (IJCEE), Vol 5, No. 6, pp. 555-558, December 2013.<\/li><li>Varun G Menon, Joe Prathap P M ,published the paper titled,\u201d Performance of various Routing Protocols in Mobile Ad Hoc Networks-A Survey\u201d in the Research Journal of Applied Sciences, Engineering and Technology ,December 2013,indexed in Elsevier scopus.<\/li><li>Sreeja Rajesh, Shadeeda Nalakath presented Paper titled \u201cRanking Spatial Data by Quality Preferences\u201d, published in International Journal of Engineering and Advanced Technology (IJEAT), Vol 3, Issue 2,pp 172-176, December2013<\/li><li>Smita Naval, M.S.Gaur, V.Laxmi, Vinod P presented \u201cSPADE: Signature based Packer Detection\u201d, In Symposium on Information Security (SIS 2013), BITS Pilani, Hyderabad campus, November 15-16, 2013, Best poster.<\/li><li>Jency Thomas and Remya S \u201dPLOW filter for colour Images\u201d is published in the International Journal for Computer Applications volume -79 No13 ,October 2013<\/li><li>Sreeja Rajesh ,Mridhula R presented Paper titled \u201cGroup Key Management Techniques \u201c in Fifth International Conference on Advances in Recent Technologies in Communication &amp; Computing ARTCom 2013 ,published in Proceedings of Elsevier(September 2013).<\/li><li>Asha S, Sreeraj M published a paper titled ,\u201dState-of-the-art: Transformation invariant Descriptors\u201d, IJSER, Volume 4 August 2013<\/li><li>Varun G Menon, Joe Prathap P M ,published the paper titled ,\u201dPerformance analysis of geographic routing protocols in highly mobile ad hoc networks\u201d, in the Journal of Theoretical and Applied Information Technology indexed in Elsevier Scopus, August 2013<\/li><li>Varun G Menon, Teenu Tony, Sreekala C S, Vibin Johny, Eldho Elias, published the paper titled \u201cPerformance Analysis of Traditional Topology based Routing protocols in Mobile Ad Hoc networks\u201d in The International Journal of Computer Science and Applications. Volume 2 No.01, March 2013, ISSN-2278-1080.<\/li><li>Arshey M, C Balakrishnan published paper titled \u201cPrevention Strategies and Network Intrusion Prevention Techniques for DoS attacks\u201d in International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE), Volume 2, Issue 2, February 2013.<\/li><li>Arshey M and C Balakrishnan published paper titled \u201cAdaptive Defense Strategy: Immunizing Shared Channel Network from DOS Attacks\u201d in International Journal of Emerging Technology and Advanced Engineering (IJETAE), Volume 3, Special Issue 1, January 2013.<\/li><li>Sreeja Rajesh presented Paper titled \u201cMonitoring &amp; Detecting the Application Layer DDOS Attacks that affects Popular Websites\u201d, published in IFRSA\u2019S International Journal of Computing (IIJC), Vol 3, Issue 1, pp 47-51, January 2013.<\/li><li>Varun G Menon, Joe Prathap P M , Jogi Priya P M, published the paper titled, \u201cAnalyzing the behaviour and Performance of Greedy Perimeter Stateless Routing Protocol in Highly Dynamic Mobile Ad Hoc Networks\u201d, in Life Science Journal, 2013<\/li><\/ul>                        <\/div>\n\n                    <\/div>\n\n                <\/div><!-- .elementskit-card END -->\n\n                \n                <div class=\"elementskit-card \">\n                    <div class=\"elementskit-card-header\" id=\"primaryHeading-15-a767f82\">\n                        <a href=\"#collapse-36b015369d77ebb35d1a\" class=\"ekit-accordion--toggler elementskit-btn-link collapsed\" data-ekit-toggle=\"collapse\" data-target=\"#Collapse-36b015369d77ebb35d1a\" aria-expanded=\"false\" aria-controls=\"Collapse-36b015369d77ebb35d1a\">\n                            \n                            <span class=\"ekit-accordion-title\">2013-STUDENTS<\/span>\n\n                            \n                                <div class=\"ekit_accordion_icon_group\">\n                                    <div class=\"ekit_accordion_normal_icon\">\n                                        <!-- Normal Icon -->\n\t\t\t\t\t\t\t\t\t\t<i class=\"icon icon-down-arrow1\"><\/i>                                    <\/div>\n\n                                    <div class=\"ekit_accordion_active_icon\">\n                                        <!-- Active Icon -->\n\t\t\t\t\t\t\t\t\t\t<i class=\"icon icon-up-arrow\"><\/i>                                    <\/div>\n                                <\/div>\n\n                            \n                                                    <\/a>\n                    <\/div>\n\n                    <div id=\"Collapse-36b015369d77ebb35d1a\" class=\" collapse\" aria-labelledby=\"primaryHeading-15-a767f82\" data-parent=\"#accordion-69d77ebb35d1a\">\n\n                        <div class=\"elementskit-card-body ekit-accordion--content\">\n                            <ul class=\"bullets cselist\"><li>Asmitha K.A, Vinod P, presented \u201cA Machine Learning Approach for Linux Malware Detection\u201d, In Symposium on Information Security (SIS 2013), BITS Pilani, Hyderabad campus, November 15-16, 2013.<\/li><\/ul>                        <\/div>\n\n                    <\/div>\n\n                <\/div><!-- .elementskit-card END -->\n\n                                        <\/div>\n    <\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>CSE Publications 2020- STAFF PUBLICATIONS V. P. G., S. Jacob, V. G. Menon, V. Balasubramanian &amp; M. J. Piran, \u201cIoT-powered deep learning brain network for assisting quadriplegic people,\u201d accepted for publication in Computers &amp; Electrical Engineering. [SCIE, SCOPUS, Impact Factor 2.663 Xingwang Li; Mengle Zhao; Ming Zeng; Shahid Mumtaz; Varun G Menon; Zhiguo Ding; Octavia [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-15136","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>cse_publications - SCMS SSET<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/scmsgroup.org\/sset\/cse_publications\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"cse_publications - SCMS SSET\" \/>\n<meta property=\"og:description\" content=\"CSE Publications 2020- STAFF PUBLICATIONS V. P. G., S. Jacob, V. G. Menon, V. Balasubramanian &amp; M. J. Piran, \u201cIoT-powered deep learning brain network for assisting quadriplegic people,\u201d accepted for publication in Computers &amp; Electrical Engineering. [SCIE, SCOPUS, Impact Factor 2.663 Xingwang Li; Mengle Zhao; Ming Zeng; Shahid Mumtaz; Varun G Menon; Zhiguo Ding; Octavia [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/scmsgroup.org\/sset\/cse_publications\/\" \/>\n<meta property=\"og:site_name\" content=\"SCMS SSET\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/scms.sset\" \/>\n<meta property=\"article:modified_time\" content=\"2024-03-03T16:08:11+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@SCMSCochin1\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"25 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/scmsgroup.org\\\/sset\\\/cse_publications\\\/\",\"url\":\"https:\\\/\\\/scmsgroup.org\\\/sset\\\/cse_publications\\\/\",\"name\":\"cse_publications - SCMS SSET\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/scmsgroup.org\\\/sset\\\/#website\"},\"datePublished\":\"2024-03-03T15:42:40+00:00\",\"dateModified\":\"2024-03-03T16:08:11+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/scmsgroup.org\\\/sset\\\/cse_publications\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/scmsgroup.org\\\/sset\\\/cse_publications\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/scmsgroup.org\\\/sset\\\/cse_publications\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/scmsgroup.org\\\/sset\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"cse_publications\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/scmsgroup.org\\\/sset\\\/#website\",\"url\":\"https:\\\/\\\/scmsgroup.org\\\/sset\\\/\",\"name\":\"SCMS School of Engineering and Technology\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/scmsgroup.org\\\/sset\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/scmsgroup.org\\\/sset\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/scmsgroup.org\\\/sset\\\/#organization\",\"name\":\"SCMS School of Engineering and Technology\",\"url\":\"https:\\\/\\\/scmsgroup.org\\\/sset\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/scmsgroup.org\\\/sset\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/scmsgroup.org\\\/sset\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/sset-1.png\",\"contentUrl\":\"https:\\\/\\\/scmsgroup.org\\\/sset\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/sset-1.png\",\"width\":250,\"height\":100,\"caption\":\"SCMS School of Engineering and Technology\"},\"image\":{\"@id\":\"https:\\\/\\\/scmsgroup.org\\\/sset\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/scms.sset\",\"https:\\\/\\\/x.com\\\/SCMSCochin1\",\"https:\\\/\\\/www.instagram.com\\\/ssetinsta\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"cse_publications - SCMS SSET","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/scmsgroup.org\/sset\/cse_publications\/","og_locale":"en_US","og_type":"article","og_title":"cse_publications - SCMS SSET","og_description":"CSE Publications 2020- STAFF PUBLICATIONS V. P. G., S. Jacob, V. G. Menon, V. Balasubramanian &amp; M. J. Piran, \u201cIoT-powered deep learning brain network for assisting quadriplegic people,\u201d accepted for publication in Computers &amp; Electrical Engineering. [SCIE, SCOPUS, Impact Factor 2.663 Xingwang Li; Mengle Zhao; Ming Zeng; Shahid Mumtaz; Varun G Menon; Zhiguo Ding; Octavia [&hellip;]","og_url":"https:\/\/scmsgroup.org\/sset\/cse_publications\/","og_site_name":"SCMS SSET","article_publisher":"https:\/\/www.facebook.com\/scms.sset","article_modified_time":"2024-03-03T16:08:11+00:00","twitter_card":"summary_large_image","twitter_site":"@SCMSCochin1","twitter_misc":{"Est. reading time":"25 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/scmsgroup.org\/sset\/cse_publications\/","url":"https:\/\/scmsgroup.org\/sset\/cse_publications\/","name":"cse_publications - SCMS SSET","isPartOf":{"@id":"https:\/\/scmsgroup.org\/sset\/#website"},"datePublished":"2024-03-03T15:42:40+00:00","dateModified":"2024-03-03T16:08:11+00:00","breadcrumb":{"@id":"https:\/\/scmsgroup.org\/sset\/cse_publications\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/scmsgroup.org\/sset\/cse_publications\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/scmsgroup.org\/sset\/cse_publications\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/scmsgroup.org\/sset\/"},{"@type":"ListItem","position":2,"name":"cse_publications"}]},{"@type":"WebSite","@id":"https:\/\/scmsgroup.org\/sset\/#website","url":"https:\/\/scmsgroup.org\/sset\/","name":"SCMS School of Engineering and Technology","description":"","publisher":{"@id":"https:\/\/scmsgroup.org\/sset\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/scmsgroup.org\/sset\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/scmsgroup.org\/sset\/#organization","name":"SCMS School of Engineering and Technology","url":"https:\/\/scmsgroup.org\/sset\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/scmsgroup.org\/sset\/#\/schema\/logo\/image\/","url":"https:\/\/scmsgroup.org\/sset\/wp-content\/uploads\/2023\/08\/sset-1.png","contentUrl":"https:\/\/scmsgroup.org\/sset\/wp-content\/uploads\/2023\/08\/sset-1.png","width":250,"height":100,"caption":"SCMS School of Engineering and Technology"},"image":{"@id":"https:\/\/scmsgroup.org\/sset\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/scms.sset","https:\/\/x.com\/SCMSCochin1","https:\/\/www.instagram.com\/ssetinsta\/"]}]}},"_links":{"self":[{"href":"https:\/\/scmsgroup.org\/sset\/wp-json\/wp\/v2\/pages\/15136","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/scmsgroup.org\/sset\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/scmsgroup.org\/sset\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/scmsgroup.org\/sset\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/scmsgroup.org\/sset\/wp-json\/wp\/v2\/comments?post=15136"}],"version-history":[{"count":7,"href":"https:\/\/scmsgroup.org\/sset\/wp-json\/wp\/v2\/pages\/15136\/revisions"}],"predecessor-version":[{"id":15144,"href":"https:\/\/scmsgroup.org\/sset\/wp-json\/wp\/v2\/pages\/15136\/revisions\/15144"}],"wp:attachment":[{"href":"https:\/\/scmsgroup.org\/sset\/wp-json\/wp\/v2\/media?parent=15136"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}