If you made any changes in Pure these will be visible here soon.

Research Output 2010 2019

  • 31 Citations
  • 2 h-Index
  • 19 Conference contribution
  • 4 Article
  • 1 Paper
2019

A comparative analysis of different soft computing techniques for intrusion detection system

Varghese, J. E. & Muniyal, B., 01-01-2019, Security in Computing and Communications - 6th International Symposium, SSCC 2018, Revised Selected Papers. Thampi, S. M., Rawat, D. B., Alcaraz Calero, J. M., Madria, S. & Wang, G. (eds.). Springer Verlag, p. 563-577 15 p. (Communications in Computer and Information Science; vol. 969).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Soft computing
Soft Computing
Intrusion detection
Intrusion Detection
Comparative Analysis

Analysis of execution time for encryption during data integrity check in cloud environment

Akshay, K. C. & Muniyal, B., 01-01-2019, Security in Computing and Communications - 6th International Symposium, SSCC 2018, Revised Selected Papers. Thampi, S. M., Rawat, D. B., Alcaraz Calero, J. M., Madria, S. & Wang, G. (eds.). Springer Verlag, p. 617-627 11 p. (Communications in Computer and Information Science; vol. 969).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data Integrity
Encryption
Execution Time
Cryptography
Cloud computing

A novel secret key exchange mechanism for secure communication and data transfer in symmetric cryptosystems

Prakasha, K., Kalkur, R., Acharya, V., Muniyal, B. & Khandelwal, M., 01-01-2019, Security in Computing and Communications - 6th International Symposium, SSCC 2018, Revised Selected Papers. Thampi, S. M., Rawat, D. B., Alcaraz Calero, J. M., Madria, S. & Wang, G. (eds.). Springer Verlag, p. 578-590 13 p. (Communications in Computer and Information Science; vol. 969).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Key Exchange
Secure Communication
Cryptosystem
Data Transfer
Data transfer

Automated User Authentication in Wireless Public Key Infrastructure for Mobile Devices Using Aadhar Card

Prakasha, K., Muniyal, B. & Acharya, V., 01-01-2019, In : IEEE Access. 7, p. 17981-18007 27 p., 8630929.

Research output: Contribution to journalArticle

Mobile devices
Authentication
Analog to digital conversion
Electronic mail
Biometrics
2018

Analysis of Data Hiding Methods in Image Steganography

Akshay, K. C. & Muniyal, B., 30-11-2018, 2018 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2018. Institute of Electrical and Electronics Engineers Inc., p. 2023-2027 5 p. 8554540

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Steganography
Security of data
Cloud computing
Authentication

A study of various varieties of distributed data mining architectures

Paul, S., Shetty, N. P. & Balachandra, 01-01-2018, Information and Decision Sciences - Proceedings of the 6th International Conference on FICTA. Springer Verlag, p. 77-88 12 p. (Advances in Intelligent Systems and Computing; vol. 701).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data mining
Parallel algorithms
Data warehouses
Intrusion detection
Sensor networks

Authentication Using Text and Graphical Password

Joshi, A. M. & Muniyal, B., 30-11-2018, 2018 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2018. Institute of Electrical and Electronics Engineers Inc., p. 381-386 6 p. 8554390

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Authentication
1 Citation (Scopus)

Efficient digital certificate verification in wireless public key infrastructure using enhanced certificate revocation list

Prakasha, K., Muniyal, B., Acharya, V., Krishna, S. & Prakash, S., 04-07-2018, In : Information Security Journal. 27, 4, p. 214-229 16 p.

Research output: Contribution to journalArticle

Public key cryptography
Data transfer
Mobile commerce
Communication
Cryptography

Query Quality Prediction on Source Code Base Dataset: A Comparative Study

Swathi, B. P. & Muniyal, B., 30-11-2018, 2018 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2018. Institute of Electrical and Electronics Engineers Inc., p. 1115-1119 5 p. 8554602

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Decision trees
Support vector machines
Logistics
2017
1 Citation (Scopus)

An investigation of classification algorithms for intrusion detection system - A quantitative approach

Varghese, J. E. & Muniyal, B., 30-11-2017, 2017 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2017. Institute of Electrical and Electronics Engineers Inc., Vol. 2017-January. p. 2045-2051 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Intrusion detection
Classifiers
Principal component analysis
Feature extraction
Decision making

Game theoretic approach towards intrusion detection

Belavagi, M. C. & Muniyal, B., 18-01-2017, Proceedings of the International Conference on Inventive Computation Technologies, ICICT 2016. Institute of Electrical and Electronics Engineers Inc., Vol. 1. 7823193

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Intrusion detection
Datasets
1 Citation (Scopus)

Multi Class Machine Learning Algorithms for Intrusion Detection - A Performance Study

Belavagi, M. C. & Muniyal, B., 01-01-2017, Security in Computing and Communications - 5th International Symposium, SSCC 2017, Proceedings. Springer Verlag, p. 170-178 9 p. (Communications in Computer and Information Science; vol. 746).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Intrusion detection
Multi-class
Intrusion Detection
Learning algorithms
Learning systems
2016

Design of an Efficient User Authentication Mechanism using Enhanced Version of Otway-Rees Protocol

Krishna, P. K., Muniyal, B. & Bhuva, M. J., 2016, Proceedings of the International Conference on Inventive Computation Technologies, ICICT 2016. Institute of Electrical and Electronics Engineers Inc., Vol. 2016. 7830176

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Confidentiality
Authentication
Redundancy
Defects

Electrocardiogram-kerberos authentication scheme for secure services

Prakasha, K., Muniyal, B., Kavyashree & Deeksha, 2016, Proceedings of the International Conference on Inventive Computation Technologies, ICICT 2016. Institute of Electrical and Electronics Engineers Inc., Vol. 2016. 7830191

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Biometrics
Electrocardiography
Authentication
Network protocols
Servers
2 Citations (Scopus)

EPMOS based secure mobile communication in LTE/SAE networks

Prakash, K. & Muniyal, B., 19-04-2016, Proceedings of the 2015 International Conference on Applied and Theoretical Computing and Communication Technology, iCATccT 2015. Institute of Electrical and Electronics Engineers Inc., p. 101-105 5 p. 7456863

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Mobile commerce
Authentication
3G mobile communication systems
Communication
Mobile telecommunication systems
1 Citation (Scopus)

Interception of black-hole attacks in mobile AD-HOC networks

Balachandra & Shetty, N. P., 01-01-2016.

Research output: Contribution to conferencePaper

Mobile ad hoc networks
Electric Power Supplies
Equipment and Supplies
Routing algorithms
Administrative Personnel

Multi user authentication protocol using visual sceret sharing

Krishna, P. K., Muniyal, B., Srushti & Shetty, D., 2016, Proceedings of the International Conference on Inventive Computation Technologies, ICICT 2016. Institute of Electrical and Electronics Engineers Inc., Vol. 2016. 7830205

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Authentication
Cryptography
Protect-It
22 Citations (Scopus)

Performance Evaluation of Supervised Machine Learning Algorithms for Intrusion Detection

Belavagi, M. C. & Muniyal, B., 2016, In : Procedia Computer Science. 89, p. 117-123 7 p.

Research output: Contribution to journalArticle

Intrusion detection
Learning algorithms
Learning systems
Network security
Support vector machines

Secure and efficient user authentication using modified Otway Rees protocol in distributed networks

Prakash, K., Muniyal, B., Acharya, V. & Kulal, A., 2016, Intelligent Systems Technologies and Applications 2016. Springer Verlag, Vol. 530. p. 297-302 6 p. (Advances in Intelligent Systems and Computing; vol. 530).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Authentication
Defects
Cryptography
2014

Enhancing PKI for mobile commerce security

Prakash, K., Balachandra, Kumar, C. & Avinash, 17-02-2014, 2014 International Conference on Science Engineering and Management Research, ICSEMR 2014. Institute of Electrical and Electronics Engineers Inc., 7043635

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Mobile commerce
Authentication
Mobile telecommunication systems
Communication systems
Communication
1 Citation (Scopus)

Modeling data races using UML/MARTE profile

Akshay, K. C., Nayak, A. & Muniyal, B., 26-11-2014, Proceedings of the 2014 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2014. Institute of Electrical and Electronics Engineers Inc., p. 238-244 7 p. 6968340

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Unified Modeling Language
Real time systems
Embedded systems
Data structures
Computer simulation
2011
1 Citation (Scopus)

Certificate path verification in peer-to-peer public key infrastructures by constructing DFS spanning tree

Balachandra, Rao, A. & Prema, K. V., 2011, Advances in Computer Science and Information Technology - First International Conference on Computer Science and Information Technology, CCSIT 2011, Proceedings. PART 1 ed. Vol. 131 CCIS. p. 158-167 10 p. (Communications in Computer and Information Science; vol. 131 CCIS, no. PART 1).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Authentication
Data structures
Industry
2010
1 Citation (Scopus)

An efficient method to merge hierarchical public key infrastructures

Muniyal, B. & Reddy, P. K. V., 2010, In : International Journal of Computers and Applications. 32, 4, p. 442-446 5 p.

Research output: Contribution to journalArticle

Merging
Industry
Costs

Design and implementation of an efficient method for certificate path verification in hierarchical public key infrastructures

Balachandra & Prema, K. V., 2010, Information Processing and Management: International Conference on Recent Trends in Business Administration and Information Processing, BAIP 2010, Trivandrum, Kerala, India, March 26-27, 2010. Proceed. Vol. 70. p. 320-324 5 p. (Communications in Computer and Information Science; vol. 70).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Industry
Security systems