If you made any changes in Pure these will be visible here soon.

Research Output 2010 2019

  • 36 Citations
  • 2 h-Index
  • 20 Conference contribution
  • 4 Article
  • 1 Paper
Filter
Conference contribution
2019

A comparative analysis of different soft computing techniques for intrusion detection system

Varghese, J. E. & Muniyal, B., 01-01-2019, Security in Computing and Communications - 6th International Symposium, SSCC 2018, Revised Selected Papers. Thampi, S. M., Rawat, D. B., Alcaraz Calero, J. M., Madria, S. & Wang, G. (eds.). Springer Verlag, p. 563-577 15 p. (Communications in Computer and Information Science; vol. 969).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Soft computing
Soft Computing
Intrusion detection
Intrusion Detection
Comparative Analysis

Analysis of execution time for encryption during data integrity check in cloud environment

Akshay, K. C. & Muniyal, B., 01-01-2019, Security in Computing and Communications - 6th International Symposium, SSCC 2018, Revised Selected Papers. Thampi, S. M., Rawat, D. B., Alcaraz Calero, J. M., Madria, S. & Wang, G. (eds.). Springer Verlag, p. 617-627 11 p. (Communications in Computer and Information Science; vol. 969).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data Integrity
Encryption
Execution Time
Cryptography
Cloud computing

A novel secret key exchange mechanism for secure communication and data transfer in symmetric cryptosystems

Prakasha, K., Kalkur, R., Acharya, V., Muniyal, B. & Khandelwal, M., 01-01-2019, Security in Computing and Communications - 6th International Symposium, SSCC 2018, Revised Selected Papers. Thampi, S. M., Rawat, D. B., Alcaraz Calero, J. M., Madria, S. & Wang, G. (eds.). Springer Verlag, p. 578-590 13 p. (Communications in Computer and Information Science; vol. 969).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Key Exchange
Secure Communication
Cryptosystem
Data Transfer
Data transfer
2018

Analysis of Data Hiding Methods in Image Steganography

Akshay, K. C. & Muniyal, B., 30-11-2018, 2018 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2018. Institute of Electrical and Electronics Engineers Inc., p. 2023-2027 5 p. 8554540

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Steganography
Security of data
Cloud computing
Authentication

A study of various varieties of distributed data mining architectures

Paul, S., Shetty, N. P. & Balachandra, 01-01-2018, Information and Decision Sciences - Proceedings of the 6th International Conference on FICTA. Springer Verlag, p. 77-88 12 p. (Advances in Intelligent Systems and Computing; vol. 701).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data mining
Parallel algorithms
Data warehouses
Intrusion detection
Sensor networks

Authentication Using Text and Graphical Password

Joshi, A. M. & Muniyal, B., 30-11-2018, 2018 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2018. Institute of Electrical and Electronics Engineers Inc., p. 381-386 6 p. 8554390

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Authentication

Enhanced authentication and key agreement mechanism using PKI

Prakasha, K., Gowda, P., Acharya, V., Muniyal, B. & Khandelwal, M., 01-01-2018, Applications and Techniques in Information Security - 9th International Conference, ATIS 2018, Proceedings. Chen, Q., Wu, J., Zhang, S., Yuan, C., Batten, L. & Li, G. (eds.). Springer Verlag, p. 40-51 12 p. (Communications in Computer and Information Science; vol. 950).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Key Agreement
Authentication
Encryption
Cryptography
Certificate

Query Quality Prediction on Source Code Base Dataset: A Comparative Study

Swathi, B. P. & Muniyal, B., 30-11-2018, 2018 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2018. Institute of Electrical and Electronics Engineers Inc., p. 1115-1119 5 p. 8554602

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Decision trees
Support vector machines
Logistics
2017
1 Citation (Scopus)

An investigation of classification algorithms for intrusion detection system - A quantitative approach

Varghese, J. E. & Muniyal, B., 30-11-2017, 2017 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2017. Institute of Electrical and Electronics Engineers Inc., Vol. 2017-January. p. 2045-2051 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Intrusion detection
Classifiers
Principal component analysis
Feature extraction
Decision making

Game theoretic approach towards intrusion detection

Belavagi, M. C. & Muniyal, B., 18-01-2017, Proceedings of the International Conference on Inventive Computation Technologies, ICICT 2016. Institute of Electrical and Electronics Engineers Inc., Vol. 1. 7823193

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Intrusion detection
Datasets
1 Citation (Scopus)

Multi Class Machine Learning Algorithms for Intrusion Detection - A Performance Study

Belavagi, M. C. & Muniyal, B., 01-01-2017, Security in Computing and Communications - 5th International Symposium, SSCC 2017, Proceedings. Springer Verlag, p. 170-178 9 p. (Communications in Computer and Information Science; vol. 746).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Intrusion detection
Multi-class
Intrusion Detection
Learning algorithms
Learning systems
2016

Design of an Efficient User Authentication Mechanism using Enhanced Version of Otway-Rees Protocol

Krishna, P. K., Muniyal, B. & Bhuva, M. J., 2016, Proceedings of the International Conference on Inventive Computation Technologies, ICICT 2016. Institute of Electrical and Electronics Engineers Inc., Vol. 2016. 7830176

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Confidentiality
Authentication
Redundancy
Defects

Electrocardiogram-kerberos authentication scheme for secure services

Prakasha, K., Muniyal, B., Kavyashree & Deeksha, 2016, Proceedings of the International Conference on Inventive Computation Technologies, ICICT 2016. Institute of Electrical and Electronics Engineers Inc., Vol. 2016. 7830191

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Biometrics
Electrocardiography
Authentication
Network protocols
Servers
2 Citations (Scopus)

EPMOS based secure mobile communication in LTE/SAE networks

Prakash, K. & Muniyal, B., 19-04-2016, Proceedings of the 2015 International Conference on Applied and Theoretical Computing and Communication Technology, iCATccT 2015. Institute of Electrical and Electronics Engineers Inc., p. 101-105 5 p. 7456863

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Mobile commerce
Authentication
3G mobile communication systems
Communication
Mobile telecommunication systems

Multi user authentication protocol using visual sceret sharing

Krishna, P. K., Muniyal, B., Srushti & Shetty, D., 2016, Proceedings of the International Conference on Inventive Computation Technologies, ICICT 2016. Institute of Electrical and Electronics Engineers Inc., Vol. 2016. 7830205

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Authentication
Cryptography
Protect-It

Secure and efficient user authentication using modified Otway Rees protocol in distributed networks

Prakash, K., Muniyal, B., Acharya, V. & Kulal, A., 2016, Intelligent Systems Technologies and Applications 2016. Springer Verlag, Vol. 530. p. 297-302 6 p. (Advances in Intelligent Systems and Computing; vol. 530).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Authentication
Defects
Cryptography
2014

Enhancing PKI for mobile commerce security

Prakash, K., Balachandra, Kumar, C. & Avinash, 17-02-2014, 2014 International Conference on Science Engineering and Management Research, ICSEMR 2014. Institute of Electrical and Electronics Engineers Inc., 7043635

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Mobile commerce
Authentication
Mobile telecommunication systems
Communication systems
Communication
1 Citation (Scopus)

Modeling data races using UML/MARTE profile

Akshay, K. C., Nayak, A. & Muniyal, B., 26-11-2014, Proceedings of the 2014 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2014. Institute of Electrical and Electronics Engineers Inc., p. 238-244 7 p. 6968340

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Unified Modeling Language
Real time systems
Embedded systems
Data structures
Computer simulation
2011
1 Citation (Scopus)

Certificate path verification in peer-to-peer public key infrastructures by constructing DFS spanning tree

Balachandra, Rao, A. & Prema, K. V., 2011, Advances in Computer Science and Information Technology - First International Conference on Computer Science and Information Technology, CCSIT 2011, Proceedings. PART 1 ed. Vol. 131 CCIS. p. 158-167 10 p. (Communications in Computer and Information Science; vol. 131 CCIS, no. PART 1).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Authentication
Data structures
Industry
2010

Design and implementation of an efficient method for certificate path verification in hierarchical public key infrastructures

Balachandra & Prema, K. V., 2010, Information Processing and Management: International Conference on Recent Trends in Business Administration and Information Processing, BAIP 2010, Trivandrum, Kerala, India, March 26-27, 2010. Proceed. Vol. 70. p. 320-324 5 p. (Communications in Computer and Information Science; vol. 70).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Industry
Security systems