Admission Hotline

70 347 800 74 , 70 347 800 73

College Code : SCM

CSE Publications

Students/Staff Research Publications

2018- STAFF


  • Vinod P, Akka Zemmari, Mauro Conti, "A machine learning based approach to detect malicious android apps using discriminant system calls", Future Generation Computer Systems, publisher, Elsevier, https://doi.org/10.1016/j.future.2018.11.021.
  • Vinod P, Scheduling Distributed Energy Resource Operation and Daily Power Consumption for a Smart Building to Optimize Economic and Environmental Parameters,Energies EISSN 1996-1073, pp 1348, 2018 ,Published by MDPI (SCI Index), Basel, Switzerland.
  • Viji Gopal, Varghese Paul, M Sudheep Elayidom, SasiGopalan “An Encryption based Security Enhancer Tool for IaaS Applications in Cloud Computing” in the proceedings of 3rd IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology 2018 [RTEICT ’18] in Bangalore on 18-19 May 2018.
  • R. Hariharan, K.Nimmi, S. Saran Raj “Advance Security System for Personal Area Using Raspberry Pi”, Volume 118 No. 22 2018, 1777-1781 International Journal of Pure and Applied Mathematics, Scopus indexed
  • Namratha M, R Hariharan,,Nimmi K, J Sangeetha Priya “Sentiment Analysis and Geographical Analysis For Enhancing Security, Volume 118 No. 22 ,2018, 1777-1781, International Journal of Pure and Applied Mathematics, Scopus indexed.
  • S. Saran Raj, R.Hariharan, K. Nimmi K “Inner Clustering Based Rotation using RB Function For PPDM,Volume 118 No. 22 2018, 1777-1781, International Journal of Pure and Applied Mathematics, Scopus indexed.
  • Sreeja Rajesh, Sunil Jacob, Varghese Paul: Secure thought transfer and processing using Novel‐T algorithm, Basic & Clinical Pharmacology & Toxicology (ISSN: 1742-7843),Volume 123,Issue S3,August 2018,Wiley Online Library https://doi.org/10.1111/bcpt.13100
  • Bhupesh Singh, Prashanth Balasubramanian, Jimmy Mathew and Binu John, presented paper on" Improving Social Safety with Automobile Pilot Adroitness Analyzer" in 2nd International Conference on Smart Computing & Informatics (SCI-2018) held on 27-28 JAN 2018,published in in Springer Proceedings of SCI-2018.
  • Sonal Ayyappan, Dr.C Lakshmi published paper titled “A Review on Reversible Data Hiding Techniques” in International Journal of Applied Engineering Research , Volume 13, Number 5 (2018) pp. 2940-2947
  • Viji Gopal, Dr. Varghese Paul, Dr. M Sudheep Elayidom, “An Improved Security Model for the Two Level Authentication Mechanism in Cloud Computing” in Second International Conference on Advanced Information and Communication Technology’18 ( ICAIC'18) held at Karpagam College of Engineering, Coimbatore in Mar 2018

2017- STAFF


  • Vinod, P. and Viswalakshmi, P.,” Empirical Evaluation of a System Call-Based Android Malware Detector”, Arabian Journal for Science and Engineering, 2017, pp 1-20,issn=2191-4281,doi="10.1007/s13369-017-2828-0 [SCIE Indexed].
  • Deepa. K, G.Radhamani, Vinod P , "Malicious APK analysis with reduced API's " in Journal of Advanced Research in Dynamic and Control System(Elsevier SCOPUS) in Aug 2017
  • Varun G Menon and Joe Prathap P. M., "Vehicular Fog Computing:Challenges, Applications and Future Directions", International Journal of Vehicular Telematics and Infotainment Systems, IGI Global, vol.1, no.2, pp.15-23, 2017.
  • Varun G Menon, "Analyzing the Performance of Random Mobility Models with Opportunistic Routing", Advances in Wireless and Mobile Communications,vol.10, no.5, pp.1221-1226, 2017.
  • Varun G Menon and Joe Prathap P M, "A Review on Efficient Opportunistic Forwarding Techniques used to Handle Communication Voids in Underwater Wireless Sensor Networks, Advances in Wireless and Mobile Communications, vol.10, no.5, pp.1059-1066, 2017.
  • Varun G Menon and Joe Prathap P M, “Moving From Vehicular Cloud Computing to Vehicular Fog Computing: Issues and Challenges”, International Journal of Computer Science and Engineering, vol. 9, no. 2, pp. 14-18, 2017.
  • Varun G Menon and Joe Prathap P M, “Towards Optimal Data Delivery in Highly Mobile Wireless Ad Hoc Networks”, International Journal of Computer Science and Engineering, vol. 9, no1, pp. 1-6, 2017.

2017 - STUDENTS


  • Vinu Philip, Vishnu K Suman, Varun G Menon and Dhanya K A, “A Review on latest Internet of Things based Health care Applications”, International Journal of Computer Science and Information Security, vol.15, no.1, pp. 248-254, 2017.
  • Sankalp Deshkar, Thanseeh R. A. and Varun G Menon, “A Review on IoT based m- Health Systems for Diabetes”, International Journal of Computer Science and Telecommunications,vol. 8, no. 1, pp.13-18, 2017.

2016- STAFF


  • Susmi Jacob, Madhu S Nair,” Image reconstruction from random samples using multiscale regression framework”, published in Elsevier journal of neuro computing,Volume/issue 189c,pp 95-105, April 2016.
  • Varun G. Menon, Joe Prathap Pathrose, and Jogi Priya, “Ensuring Reliable Communication in Disaster Recovery Operations with Reliable Routing Technique,” Mobile Information Systems, vol. 2016, Article ID 9141329, 10 pages, 2016. doi:10.1155/2016/9141329.
  • Varun G. Menon and P. M. Joe Prathap, “Opportunistic routing with virtual coordinates to handle communication voids in mobile ad hoc networks,” in Advances in Signal Processing and Intelligent Recognition Systems, pp. 323–334, Springer International, 2016. doi:10.1007/978-3-319-28658-7_28.

2016-STUDENTS


  • Jeena Rita K.S, Bini omman “A Technical Assessment on License Plate Detection System” IGI Global Book Chapter,2016
  • Jithu Raphael, Vinod P, Heterogeneous Opcode Space for Metamorphic Malware Detection, In Springer Arabian Journal for Science and Engineering, 10.1007/s13369-016-2264-6, pp1-22.
  • M. V. Varsha, P. Vinod , K. A. Dhanya, Identification of malicious android app using manifest and opcode features, In Springer Journal of Computer Virology and Hacking Techniques, DOI-10.1007/s11416-016-0277-z, pp2274-2042.

2015-STAFF


  • Sreeja Rajesh, Varghese Paul presented paper titled “Comparative Study of Security Aspects of Various Symmetric Key Encryption Algorithms”, published in Asian Journal of Engineering and Technology, Volume 03, Issue 04, pp 442-445, August 2015.
  • Vinod P, V.Laxmi, M.S.Gaur, Grijesh Chauhan, “Detecting Malicious Files using Non–Signature based Methods”, published in International Journal of Information and Computer Security ,April 2015
  • Deepa K, G.Radhamani, Vinod P ,presented “Investigation of Feature Selection Methods for Android Malware Analysis” in Procedia Computer Science(Vol 46), February 2015
  • Smitha Naval, Vijay Laxmi, Manoj Singh Gaur, and Vinod P, "An Efficient Block-discriminant Identification of Packed Malware", Sadhana, Published by the Indian Academy of Sciences, ISSN: 0973-7677 (electronic version),August 2015.

2015-STUDENTS


  • Jikku Kuriakose, and Vinod P, "Unknown Metamorphic Malware Detection: Modelling with Fewer Relevant Features and Robust Feature Selection Techniques", published in IAENG International Journal of Computer Science, vol. 42, no. 2, pp139-151,April 2015.
  • Aswini A M and Vinod P “Towards the Detection of Android Malware using Ensemble Features”, published in International Journal of Information Assurance and Security (JIAS), ISSN 1554-1010, April 2015.
  • Athira Azhikoden, Vinod P presented “MetaOpcode Space for Morphed Malware Detection”, in the 11th IEEE International Conference on Innovations in Information Technology 2015 (IIT'15), Dubai, and November 01-03, 2015.
  • Varsha V, Vinod P., Dhanya KA presented “Heterogeneous Feature Space for Android Malware Detection”, In the 8th IEEE International Conference on Contemporary Computing (IC3), 2015, NewDelhi, India.
  • Jithu Raphel, Vinod P presented "Pruned Feature Space for Metamorphic Malware Detection using Markov Blanket", In the 8th IEEE International Conference on Contemporary Computing (IC3), 2015, NewDelhi, India.
  • Vinod P, Meenu Mary John, Dhanya KA presented “Hartley’s Test Ranked Opcodes for Android Malware Analysis”, in the 8th International Conference on Security of Information and Networks, In Technical Cooperation with ACM SIGSAC, September 8-10, 2015 Sochi/Russia, Pages 304-311.
  • Vinod P, Jithu Raphel presented “Information Theoretic Method for Classification of Packed and Encoded Files”, in the 8th International Conference on Security of Information and Networks, In Technical Cooperation with ACM SIGSAC, September 8-10, 2015 Sochi/Russia, Pages 293-303
  • Vinod P, Princy George presented ``Machine Learning Approach for Filtering Spam Emails”, in the 8th International Conference on Security of Information and Networks, In Technical Cooperation with ACM SIGSAC, September 8-10, 2015 Sochi/Russia, Pages 271-274 .
  • Nithil George, Vinod P, presented “Opcode Position Aware Metamorphic Malware Detection”, in 9th Indiacom; 2015 2ndInternational conference on Computing for Sustainable Global Development scheduled for 11th-13th March 2015.

2014-STAFF


  • Asha S , Sreeraj M, Jayasree K published a paper titled ”A Transformation Invariant Framework for Video Copy Sub Sequence Identification”, International Journal of Computer Applications, march 2014.
  • Remya S and Jency Thomas ”A Novel Approach For Mixed Noise Removal Using ROR Statistics Combined with ACWM and Non Local Means Filter” is published in the International Journal for Computer Applications volume-86-No17, January 2014.

2014-STUDENTS


  • Josin Thomas, Vinod P, Nisha S Raj “Towards Spam Mail Detection using Robust Feature Evaluated with Feature Selection Techniques”, published in International Journal of Engineering and Technology (IJET), Vol 6 No 5 Oct-Nov 2014, ISSN : 0975-4024, pp:2144-2157
  • Bincy Thomas, Vinod P, Dhanya K A,”Multiclass Emotion Extraction from Sentences”, published in International Journal of Scientific & Engineering Research, Volume 5, Issue 2, and February-2014 12 ISSN 2229-5518.
  • Nimmy Cleetus, Dhanya K A., “Rule induction Using Ant Miner Algorithm” ,published in IJSER journal, Volume 5, Issue 2, ISSN 2229-5518 MES College Marampally, 6th&7th January 2014
  • Aswini AM, Vinod P presented “Android Malware Analysis using Ensemble features”, International Conference on Security, Privacy and Applied Cryptographic Engineering (SPACE 2014), 20th-22nd October, 2014, pp: 308-313
  • Rincy Rapheal, Vinod P. and Bini Omman presented “X-ANOVA and X-Utest Features for Android Malware Analysis”, IEEE International Workshop on Cyber-Physical Systems and Social Computing (CSSC-2014) in conjunction with Third International Conference on Advances in Computing, Communications and Informatics, 24-27 September, 2014.
  • Asmitha K.A and Vinod P presented “Linux Malware Detection using non-Parametric Statistical methods”, IEEE International Workshop on Cyber-Physical Systems and Social Computing (CSSC-2014) in conjunction with Third International Conference on Advances in Computing, Communications and Informatics, 24-27 September, 2014.
  • Jikku Kuriakose and Vinod P presented “Metamorphic Virus Detection using Feature Selection Techniques”, Fifth IEEE International Conference on Computer and Communication Technology, (ICCCT-2015), and September 26 to 28, 2014.
  • Silpa Sebastian, Sonal Ayappan, Vinod P presented “Framework for Design of Graybot in Social-Network”, in the Second International Symposium on Women in Computing and Informatics (WCI-2014), 24-27 September, 2014.
  • Bincy Thomas, Dhanya K A, Vinod P presented “Exploration of Robust Features for Multiclass Emotion Classification”, in the third International Symposium on Natural Language Processing (NLP'14), 24-27 September, 2014.
  • Jikku Kuriakose, Vinod P presented “Towards the Detection of Undetectable Metamorphic Malware”, in the 7th ACM International Conference on Security of Information and Networks, September, 9-11, 2014, Glasgow/UK.
  • Jikku Kuriakose, Vinod P presented “Discriminant Features for Metamorphic Malware Detection”, In Seventh IEEE International Conference on Contemporary Computing, Jaypee Institute of Information Technology & University of Florida, August 7-9, 2014, and pp: 406-411.
  • Bincy Thomas, Dhanya K A, Vinod P, presented “Synthesized Feature Space for Multiclass Emotion Classification”, in the International Conference on Networks & Soft Computing (ICNSC 2014), 19-20 August, 2014, pp: 188-192.
  • Bincy Thomas, Dhanya K A, Vinod P presented “Machine Learning Approach for Emotion Extraction from Sentences”, In proceedings of Second International Conference on Emerging Research in Computing, Information, Communication and Applications, ERCICA2014, August 1st and 2nd, 2014, Elsevier.
  • Josin Thomas, Nisha S Raj, Vinod P presented “Robust Chi-square Features for Identifying Spam Emails”, In proceedings of Second International Conference on Emerging Research in Computing, Information, Communication and Applications, ERCICA2014, August 1st and 2nd, 2014, Elsevier.
  • Silpa Sebastian, Sonal Ayyappan, Vinod P, presented “Graybot: Java based Botnet”, IEEE International Conference on Advances in Engineering and Technology, ICAET-2014, EGS Pillay Engineering College, Nagapattinam, ISBN 978-1-4799-4949-6, May 2nd and 3rd – 2014 .
  • Julie Baby, Kannan T, Vinod P, Viji Gopal, presented “Distance Indices for the Detection of Similarity in C Programs”, In 3rd IEEE International Conference on Computation of Power, Energy, Information and Communication, April 16th – 17th, 2014.
  • Asmitha K.A, Vinod P presented A Machine Learning Approach for Linux Malware Detection”, In Proc. of IEEE and Scopus Indexed International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT-2014), 07-08th February, 2014, pp:825-830.
  • Silpa Sebastian, Sonal Ayyappan, Vinod P presented “JBot: Java Based Botnet”, In International Conference on ADVANCES IN INFORMATION TECHNOLOGY & NETWORKING (ICATN‘14)`, Dr.G. R. Damodaran College of Science, (Autonomous, affiliated to Bharathiar University, re-accredited at the ‘A’ grade level by the NAAC, 22nd January 2014.
  • Shahana P.H, Bini Omman, Vinod P, presented “Gender Classification of Blog Authors”, In International Conference on ADVANCES IN INFORMATION TECHNOLOGY & NETWORKING (ICATN‘14), Dr.G. R. Damodaran College of Science, and (Autonomous, affiliated to Bharathiar University, re-accredited at the ‘A’ grade level by the NAAC, 22nd January 2014

2013-STAFF


  • Sreeja Rajesh presented Paper titled “Protection from Application Layer DDOS Attacks for Popular Websites ” , published in International Journal of Computer and Electrical Engineering (IJCEE), Vol 5, No. 6, pp. 555-558, December 2013.
  • Varun G Menon, Joe Prathap P M ,published the paper titled,” Performance of various Routing Protocols in Mobile Ad Hoc Networks-A Survey” in the Research Journal of Applied Sciences, Engineering and Technology ,December 2013,indexed in Elsevier scopus.
  • Sreeja Rajesh, Shadeeda Nalakath presented Paper titled “Ranking Spatial Data by Quality Preferences”, published in International Journal of Engineering and Advanced Technology (IJEAT), Vol 3, Issue 2,pp 172-176, December2013
  • Smita Naval, M.S.Gaur, V.Laxmi, Vinod P presented “SPADE: Signature based Packer Detection”, In Symposium on Information Security (SIS 2013), BITS Pilani, Hyderabad campus, November 15-16, 2013, Best poster.
  • Jency Thomas and Remya S ”PLOW filter for colour Images” is published in the International Journal for Computer Applications volume -79 No13 ,October 2013
  • Sreeja Rajesh ,Mridhula R presented Paper titled “Group Key Management Techniques “ in Fifth International Conference on Advances in Recent Technologies in Communication & Computing ARTCom 2013 ,published in Proceedings of Elsevier(September 2013).
  • Asha S, Sreeraj M published a paper titled ,”State-of-the-art: Transformation invariant Descriptors”, IJSER, Volume 4 August 2013
  • Varun G Menon, Joe Prathap P M ,published the paper titled ,”Performance analysis of geographic routing protocols in highly mobile ad hoc networks”, in the Journal of Theoretical and Applied Information Technology indexed in Elsevier Scopus, August 2013
  • Varun G Menon, Teenu Tony, Sreekala C S, Vibin Johny, Eldho Elias, published the paper titled “Performance Analysis of Traditional Topology based Routing protocols in Mobile Ad Hoc networks” in The International Journal of Computer Science and Applications. Volume 2 No.01, March 2013, ISSN-2278-1080.
  • Arshey M, C Balakrishnan published paper titled “Prevention Strategies and Network Intrusion Prevention Techniques for DoS attacks” in International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE), Volume 2, Issue 2, February 2013.
  • Arshey M and C Balakrishnan published paper titled “Adaptive Defense Strategy: Immunizing Shared Channel Network from DOS Attacks” in International Journal of Emerging Technology and Advanced Engineering (IJETAE), Volume 3, Special Issue 1, January 2013.
  • Sreeja Rajesh presented Paper titled “Monitoring & Detecting the Application Layer DDOS Attacks that affects Popular Websites”, published in IFRSA’S International Journal of Computing (IIJC), Vol 3, Issue 1, pp 47-51, January 2013.
  • Varun G Menon, Joe Prathap P M , Jogi Priya P M, published the paper titled, “Analyzing the behaviour and Performance of Greedy Perimeter Stateless Routing Protocol in Highly Dynamic Mobile Ad Hoc Networks”, in Life Science Journal, 2013

2013-STUDENTS


  • Asmitha K.A, Vinod P, presented “A Machine Learning Approach for Linux Malware Detection”, In Symposium on Information Security (SIS 2013), BITS Pilani, Hyderabad campus, November 15-16, 2013.