Papers Published in Journals 2013-14 |
- "A Secure and Optimized Proximity Mobile Payment Framework with Formal Verification"
-- International Journal of E-Services and Mobile Applications, Vol. 6, No. 1, pp. 66-92, March 2014, by Shaik Shakeel, Ahamad, V.N. Sastry and Siba K. Udgata.
|
- "A New Algorithm to Compute Pareto-Optimal Paths in a Multi-Objective Fuzzy Weighted Network"
-- OPSEARCH (Springer Journal), Vol. 50, No. 3, pp. 297-318, September 2013, by K. Karun Kumar and V.N. Sastry.
|
- "Secure Mobile Payment Framework based on UICC with Formal Verification"
-- International Journal of Computational Science and Engineering, Inderscience Publications (Special Issue on 'Future Trends in Security Issues in Internet and Web Applications'), Vol. 9, No. 4, pp. 355-370, 2014, by Ahamad, S.S., Sastry, V.N. and Udgata, S.K.
|
- "New Route Discovery Design for Routing Misbehavior Prevention in Multi-hop Wireless Sensor Networks"
-- International Journal of Autonomous and Adaptive Communication System (Special Issues on Recent Advances in Wireless Sensor Networks: Trust, Reputation, Security and Privacy), Vol. 7, No.3, 2014, by Kavitha Ammayappan, Atul Negi and V.N. Sastry.
|
Dr. V. Ravi, Professor |
- "Multi-objective Constrained Optimization of Data Envelopment Analysis by Differential Evolution"
-- International Journal of Information and Decision Sciences (Accepted), Vol. 6, No. 4, 2014, by N. Ankaiah and V. Ravi.
|
- "Churn Prediction using Comprehensible Support Vector Machine: An Analytical CRM Application"
-- Applied Soft Computing, Vol. 19, pp. 31-40, June 2014, by M. A. H. Farquad, V. Ravi and S. Bapi Raju.
|
- "A Novel, Computational Intelligence Based Online Data Imputation Method: An Application to Banking"
-- Journal of Information Processing Society, Vol. 9, No. 4, pp. 633-650, December 2013, by K. J. Nishanth and V. Ravi.
|
- "Cash Demand Forecasting in ATMs by Clustering and Neural Networks"
-- European Journal of Operational Research, Vol. 232, No. 2, pp. 383-392, January 16, 2014, by K. Venkatesh, V. Ravi, Anita Prinzie and Dirk Van den Poel.
|
- "Association Rule Mining using Binary Particle Swarm Optimization"
-- Engineering Applications of Artificial Intelligence, Vol. 26, No. 8, pp. 1832-1840, September 30, 2013, by K. N. V. D. Sarath and V. Ravi.
|
- "Hybrid Classification and Regression Models via Particle Swarm Optimization Auto Associative Neural Network based Nonlinear PCA"
-- International Journal of Hybrid Intelligent Systems, Vol. 10, No. 3, pp. 137-149, July 2013, by V. Ravi, M. Pandey and N. Naveen.
|
Dr. B. M. Mehtre, Associate Professor |
- "A Modern Approach to Cyber Security Analysis Using Vulnerability Assessment and Penetration Testing"
-- International Journal of Electronics Communication and Computer Engineering, Vol. 4, No. 6, pp. 47 – 52, November 2013, by Sugandh Shah and B.M. Mehtre.
|
- "An Automated Network Security Checking and Alert System: A New Framework"
-- ICTACT Journal on Communication Technology, Vol. 4, No. 3, pp. 778-784, September 2013, by Vivek Kumar Yadav, B M Mehtre.
|
Dr. M. V. N. K. Prasad, Associate Professor |
- "Fingerprint Template Protection Using Multiline Neighboring Relation"
-- Expert Systems with Applications (Accepted), Vol. 41, No. 14, pp. 6114–6122, 2014, by Munaga V. V N K Prasad and C Santosh Kumar.
|
- "Minimum Spanning Tree (MST) Based Techniques for Generation of Cancelable Fingerprint Templates"
-- International Journal of Pattern Recognition and Artificial Intelligence (Accepted), Vol. 28, No. 6, 2014, by Munaga V N K Prasad, P. Swathi, C. R. Rao and B. L. Deekshatulu.
|
- "A Secure Palmprint Authentication System using Chaotic Mixing and Watermarking"
-- International Journal of Biometrics(IJBM)(Accepted), Vol. 6, No. 1, 2014, by Munaga V. N. K. Prasad and Ilaiah Kavati.
|
- "Hand Vein Authentication System using Connected Minutiae Neighbors"
-- International Journal of Trust Management in Computing and Communications (IJTMCC)(Accepted), Vol. 2, No. 3, 2014, by Munaga V. N. K. Prasad, Ilaiah Kavati.
|
Dr. Rajarshi Pal, Assistant Professor |
- "A Framework of Digital Cheque: A Prospect in Payment System in India"
-- The Indian Banker, Vol. I, No. 5, pp. 28-32, December 2013, by R. Pal and V. Naveenchandra.
|
Papers Published in Conferences 2013-14 |
Dr. V. Ravi, Professor |
- "Evolving Clustering Based Data Imputation"
-- IEEE-International Conference on Circuit, Power and Computing Technologies, Kanyakumari, India, March 20-21, 2014, by C. Gautam and V. Ravi.
|
- "Particle Swarm Optimization and Covariance Matrix-based Data Imputation"
-- IEEE-International Conference on Computational Intelligence and Computing Research, Madurai, India, December 26-28, 2013, by M. Krishna and V. Ravi.
|
- "Malware Detection by Text and Data Mining"
-- IEEE-International Conference on Computational Intelligence and Computing Research, Madurai, India, December 26-28, 2013, by G. G. S. Kumar and V. Ravi.
|
- "Text and Data Mining to Detect Phishing Websites and Spam Emails"
-- 4th International Conference, SEMCCO, Chennai, India, December 19-21, 2013, by M. Pandey and V. Ravi.
|
- "Phishing Detection using PSOAANN based Single Class Classifier"
-- 6th International Conference on Emerging Trends in Engineering and Technology (IEEE-ICETET), Nagpur, India, December 16-18, 2013, by M. Pandey and V. Ravi.
|
- "Quantification of Balanced Scorecard using Crisp and Fuzzy Multi-attribute Decision Making: Application to Banking"
-- 6th International Conference on Emerging Trends in Engineering and Technology (IEEE-ICETET), Nagpur, India, December 16-18, 2013, by U. Shivakumar, V. Ravi and T. R. Venkateswaran.
|
Dr. V. Ravi, Professor & Dr. G. R. Gangadharan, Assistant Professor |
- "Resource Demand Prediction in Multitenant Service Clouds"
-- International Conference on Cloud Computing in Emerging Markets (IEEE-CCEM), Bangalore, India, October 16-18, 2013, by M. Verma, G.R. Gangadharan, V Ravi and N. Narendra.
|
- "Ranking of Cloud Services using Fuzzy Multi-attribute Decision Making"
-- International Conference on Fuzzy Systems (FUZZ-IEEE), Hyderabad, India, July 07-10, 2013 by U. Shivakumar, V. Ravi and G. R. Gangadharan.
|
Dr. B. M. Mehtre, Associate Professor |
- "Static Malware Analysis Using Machine Learning Methods"
-- 2nd International Conference on Security in Computer Networks and Distributed Systems (SNDS-2014), Trivandrum, India, Vol. 420, pp. 440-450, March 13-14, 2014, by Hiran V Nath and Babu M. Mehtre.
|
- "DoS and DDoS Attacks: Impact, Analysis and Countermeasures"
-- IET National Conference on Advances in Computing, Networking and Security (NCACNS'13), December 22-23, 2013, Nanded, Maharashtra, pp. 93-98, by Nikhil Tripathi and B. M. Mehtre.
|
- "A Lifecycle Based Approach for Malware Analysis"
-- 4th International Conference on Communication Systems and Network Technologies (IEEE-CSNT), April 07-09, 2014, Bhopal, India, pp. 767-771, by Sudhir Kumar Pandey and B. M. Mehtre.
|
- "Performance of Malware Detection Tools: A Comparison"
-- 3rd International Conference on Advanced Communication, Control and Computing Technologies (IEEE-ICACCCT), May 08-10, 2014, Tamilnadu, India, by Sudhir Kumar Pandey and B. M. Mehtre.
|
- "Forensic Analysis of Wickr Application on Android Devices"
-- 4th International Conference on Computational Intelligence and Computing Research (IEEE-ICCIC), December 26-28, 2013, Enathi, Tamilnadu, India, pp. 01-06, by Tarun Mehrotra and B. M. Mehtre.
|
- "An ICMP based Secondary Cache Approach for the Detection and Prevention of ARP Poisoning"
-- 4th International Conference on Computational Intelligence and Computing Research (IEEE-ICCIC), December 26-28, 2013, Enathi, Madurai, Tamilnadu, pp. 01-06, by Nikhil Tripathi and B. M. Mehtre.
|
- "A Reliable Strategy for Proactive Self Defence in Cyber Space using VAPT Tools and Techniques"
-- International Conference of Computational Intelligence and Computing Research (IEEE-ICCIC), December 26-28, 2013, Enathi, India, pp. 01-06, by Sugandh Shah and B.M. Mehtre.
|
- "A Modern Approach to Cyber Security Analysis using Vulnerability Assessment and Penetration Testing"
-- CSI National Conference on Research Trends in Computer Science and Technology (NCRTCST), November 2013, Hyderabad, India, pp. 01-06, by Sugandh Shah and B.M. Mehtre.
|
- "Vulnerability Assessment and Penetration Testing (VAPT) Techniques for Cyber Defence"
-- National Conference on Advances in Computing, Networking and Security (IET-NCACNS), December 2013, Nanded, India, pp. 105 – 111, by Sugandh Shah and B.M. Mehtre.
|
- "An Automated Approach to Vulnerability Assessment and Penetration Testing using Net-Nirikshak 1.0"
-- International Conference on Advanced Communication, Control and Computing Technologies (IEEE-ICACCCT), May 2014, Ramanathapuram, India, by Sugandh Shah and B.M. Mehtre.
|
- "Forensic Artifacts of flareGet Download Manager"
-- 5th International Conference on Digital Forensics & Cyber Crime (ICDF2C); September 25–27, 2013, Moscow, Russia, by Prachi Goel and BM Mehtre.
|
- "Mozilla Firefox Browsing Artifacts in 3 Different Anti-Forensics Modes"
-- 5th International Conference on Digital Forensics & Cyber Crime (ICDF2C), September 25–27, 2013, Moscow, Russia, by Deepak Gupta and BM Mehtre.
|
- "Recent Trends in Collection of Software Forensics Artifacts: Issues and Challenges"
-- International Symposium on Security in Computing and Communications (SSCC'13), August 20-22, 2013, Mysore, India, by Deepak Gupta and BM Mehtre.
|
- "Forensics Analysis of Sandboxie Artifacts"
-- International Symposium on Security in Computing and Communications (SSCC'13); August 22-24, 2013, Mysore, India, by Deepak Gupta and BM Mehtre.
|
Dr. M. V. N. K. Prasad, Associate Professor |
- "Palmprint Recognition Using Fusion of 2D-Gabor and 2D Log-Gabor Features"
-- 2nd International Conference on Security in Computer Networks and Distributed Systems (SNDS-2014), Trivandrum, India, March 13-14, 2014, pp. 202-210, by Munaga V. N. K. Prasad, Ilaiah Kavati and Adinarayana. B.
|
- "A New Indexing Method for Biometric Databases using Match Scores and Decision Level Fusion"
-- International Conference on Advanced Computing, Networking, and Informatics (ICACNI-2014), June 24-26, 2014, Kolkata, India, pp. 493-500, by Ilaiah Kavati, Munaga V. N. K. Prasad and Chakravarthy Bhagvati.
|
- "A Novel Coding Method for Indexing Hand-based Biometric Databases"
-- International Conference on Artificial Intelligence and Evolutionary Algorithms in Engineering Systems (ICAEES-2014), Springer (Accepted), April 22-23, 2014, Kumaracoil, India, by Ilaiah Kavati, Munaga V. N. K. Prasad and Chakravarthy Bhagvati.
|
- "Comparative Study of Visual Secret Sharing Schemes"
-- 8th International Conference on Image and Signal Processing (ICISP-2014), Springer (Accepted), June 30-July 02, 2014, Normandy, France, by Maroti Deshmukh and Munaga V N K Prasad.
|
- "User-friendly (n; n) Tagged Visual Cryptography (TVC) based on Random Grids"
-- 8th International Conference on Image and Signal Processing (ICISP-2014), Springer (Accepted), June 30-July 02, 2014, Normandy, France, by Lingaraj Meher and Munaga V N K Prasad.
|
- "Vein Pattern Indexing Using Texture and Hierarchical Decomposition of Delaunay Triangulation"
-- International Symposium on Security in Computing and Communications (SSCC-13), Mysore, India, August 22-24, 2013, by Ilaiah Kavati, Munaga .V. N. K. Prasad and Chakravarthy Bhagvati.
|
- "Hand Vein Authentication System using Dynamic ROI"
-- International Symposium on Security in Computing and Communications (SSCC-13), Mysore, India, August 22-24, 2013, by Munaga .V. N. K. Prasad, Ilaiah Kavati and Kanavu Ravindra.
|
- "Extraction of Dynamic Region of Interest (ROI) for Palmprint"
-- 3rd International Conference on Advances in Computing and Information Technology (ACITY 2013) (Accepted), Kochi, India, August 29-31, 2013, by Yatam Laxmi Malathilatha and Munaga. V. N. K. Prasad.
|
Dr. Rajarshi Pal, Assistant Professor |
- "Detecting Tampered Cheque Images in Cheque Truncation System Using Difference Expansion based Watermarking"
-- Proc. of 4th IEEE International Advance Computing Conference, pp. 1041-1047, Gurgaon, India, February 21-22, 2014, by S. Kota and R. Pal.
|
- "Detection of Manipulated Cheque Images in Cheque Truncation System Using Mismatch in Pixels"
-- Proc. of International Conference on Business and Information Management, Durgapur, India, January 09-11, 2014, by M. Rajender and R. Pal.
|
- "Image Steganography using Single Digit Sum with Varying Base"
-- Proc. of IEEE International Conference on Electronics, Computing and Communication Technologies, Bangalore, India, January 06-07, 2014, pp. 01-05, by C. Balakrishna, V. Naveenchandra and R. Pal.
|
- "Image Steganography using Generalized Base Single Digit Sum (GB-SDS)"
-- Proc. of IEEE-INDICON, Mumbai, India, December 13-15, 2013, pp. 01-04, by C. Balakrishna, V. Naveenchandra and R. Pal.
|
Papers Published in Books / Book Chapters 2013-14 |
Dr. V. Ravi, Professor & Dr. M. V. N. K. Prasad, Associate Professor |
- "Digital Watermarking Techniques for Images – Survey"
-- in Book: "Encyclopedia of Business Analytics and Optimization", James W. (Eds.), IGI Global, pp.737-746, 2014, by Channapragada R. S. G. Rao, V. Ravi, Munaga. V. N. K. Prasad and E. V. Gopal.
|
- "Watermarking Using Intelligent Methods – Survey"
-- in Book: "Encyclopedia of Business Analytics and Optimization", James W. (Eds.), IGI Global, pp.2675-2684, 2014, by Channapragada R. S. G. Rao, V. Ravi, Munaga. V. N. K. Prasad and E. V. Gopal.
|
- "Watermarking Using Artificial Intelligence Techniques"
-- in Book: "Encyclopedia of Business Analytics and Optimization", James W. (Eds.), IGI Global, pp.2665-2674, 2014, by Channapragada R. S. G. Rao, V. Ravi, Munaga. V. N. K. Prasad and E. V. Gopal.
|
Dr. M. V. N. K. Prasad, Associate Professor |
- "Biometric Authentication Based on Hand Vein Pattern"
-- in Book: "Research Developments in Biometrics and Video Processing Techniques", IGI Global, pp. 52-64, 2014, by Munaga V. N. K. Prasad and Ilaiah Kavati.
|
Dr. G. R. Gangadharan, Assistant Professor |
- "Legal Implications of Social Networks"
-- in Book: "Encyclopedia of Social Network Analysis and Mining", Springer 2014, by Davide Maria Parrilli and G. R. Gangadharan.
|
- "Applying Open Innovation Strategies to e-Government for Better Public Services"
-- in Book: "E-Government Success Factors and Measures: Theories, Concepts, and Methodologies", IGI Global, pp. 308-331, 2014, by Georgousopoulos Christos, Ziouvelou Xenia, Ramfos Antonis, Kokkinakos Panagiotis, Anshu Jain, G. R. Gangadharan and Taher Yehia.
|
Dr. Rajarshi Pal, Assistant Professor |
- "Computational Models of Visual Attention: A Survey"
-- in Book: "Recent Advances in Computer Vision and Image Processing: Methodologies and Applications", (R. Srivastava, S. K. Singh, and K.K. Shukla eds.), IGI Global, pp. 54-76, September 2013, by R. Pal.
|
Framework and Guidelines for Banking Sector 2013-14 |
Dr. V. Ravi, Professor & Dr. N. Raghu Kisore, Assistant Professor |
- "Data Quality Framework for Indian Banking Sector, Data Quality Framework for Indian Banking Sector"
-- IDRBT Publication, February 2014, by Dr. V. Ravi, Dr. N. Raghu Kisore & Team.
|