Publications

2018
Lakra R, John A, Jose J. CARPenter: A Cellular Automata Based Resilient Pentavalent Stream Cipher". 13th International Conference on Cellular Automata for Research and Industry, ACRI 2018. 2018;(DOI: 10.1007/978-3-319-99813-8_32 In book: Cellular Automata):352-363.
2013
Jis J. Expository Study on Sybil Attack counter measures in VANET Anita J. International Journal of Computer Networking,Wireless and Mobile Communications(IJCNWMC). 2013;3(3):51-56.
2012
Jestin J. Host Based Attack Detection using System Calls Anita J. International Conference on Computational Science, Engineering and Information Technology. 2012:7-11.
Jis J. Improving Lifetime of Structured Deployed Wireless Sensor Network using Sleepy Algorithm Anita J. International Conference on Eco-friendly Computing and Communication Systems ICECCS 2012. 2012;CCIS (305):47-53.
Renjith K. SPKP(Split Plaintext Key Pair) Algorithm-A Novel Method for Symmetric Encryption Anita J. International Journal of Computer Applications(0975-8887) on Advanced Computing and Communication technologies for HPC Applications-ACCTHPCA June 2012. 2012;(Special Issue).
Deepthy D. Survey on Data Mining Techniques to enhance Intrusion Detection. In: Anita J International Conference on Computer Communication and Informatics (ICCCI 2012). Coimbatore: IEEE; 2012. p. 1-5.
2011
Jaseena K. An Invisible Zero Watermarking Algorithm using Combined Image and Text for Protecting Tetx Documents Anita J. International Journal on Computer Science and Engineering(IJCSE). 2011;3(6):2265-2272.
Jestin J. Rootkit Detection Mechanism A Survey. In: Anita J Advances in Parallel Distributed Computing. Vol. 203. Springer Berlin Heidelberg; 2011. p. 366-374.
Jaseena K. Text Watermarking using Combined Image and Text for Authentication and Protection Anita J. International Journal of Computer Applications(IJCA). 2011;20(4):8-13.