Balachandra Muniyal

Orcid: 0000-0002-4839-0082

Affiliations:
  • Manipal Academy of Higher Education, Manipal Institute of Technology, Department of Information and Communication Technology, India


According to our database1, Balachandra Muniyal authored at least 27 papers between 2010 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Identity resilience in the digital health ecosystem: A key recovery-enabled framework.
Comput. Biol. Medicine, December, 2023

Efficient Key Generation Techniques for Wireless Body Area Network.
Int. J. Wirel. Inf. Networks, September, 2023

Identity - Attribute Inference in Online Social Network(s) Using Bio-Inspired Algorithms and Machine Learning Approaches.
J. Mobile Multimedia, 2023

FedBully: A Cross-Device Federated Approach for Privacy Enabled Cyber Bullying Detection using Sentence Encoders.
J. Cyber Secur. Mobil., 2023

2022
A Privacy Preserving Framework to Protect Sensitive Data in Online Social Networks.
J. Cyber Secur. Mobil., 2022

Finding an elite feature for (D)DoS fast detection - Mixed methods research.
Comput. Electr. Eng., 2022

Intrusion Detection Using Federated Learning.
Proceedings of the Applications and Techniques in Information Security, 2022

Modified Blowfish Encryption Algorithm for Wireless Body Area Network.
Proceedings of the Applications and Techniques in Information Security, 2022

2021
Improved Intrusion Detection System using Quantal Response Equilibrium-based Game Model and Rule-based Classification.
Int. J. Commun. Networks Inf. Secur., 2021

An Efficient IDS Framework for DDoS Attacks in SDN Environment.
IEEE Access, 2021

Risk Prediction in Real Estate Investment to Protect Against Asset Bubbles.
Proceedings of the Applications and Techniques in Information Security, 2021

2020
Enhanced Human Action Recognition Using Fusion of Skeletal Joint Dynamics and Structural Features.
J. Robotics, 2020

2019
Automated User Authentication in Wireless Public Key Infrastructure for Mobile Devices Using Aadhar Card.
IEEE Access, 2019

2018
Efficient digital certificate verification in wireless public key infrastructure using enhanced certificate revocation list.
Inf. Secur. J. A Glob. Perspect., 2018

A Comparative Analysis of Different Soft Computing Techniques for Intrusion Detection System.
Proceedings of the Security in Computing and Communications - 6th International Symposium, 2018

A Novel Secret Key Exchange Mechanism for Secure Communication and Data Transfer in Symmetric Cryptosystems.
Proceedings of the Security in Computing and Communications - 6th International Symposium, 2018

Analysis of Execution Time for Encryption During Data Integrity Check in Cloud Environment.
Proceedings of the Security in Computing and Communications - 6th International Symposium, 2018

Query Quality Prediction on Source Code Base Dataset: A Comparative Study.
Proceedings of the 2018 International Conference on Advances in Computing, 2018

Authentication Using Text and Graphical Password.
Proceedings of the 2018 International Conference on Advances in Computing, 2018

Analysis of Data Hiding Methods in Image Steganography.
Proceedings of the 2018 International Conference on Advances in Computing, 2018

Enhanced Authentication and Key Agreement Mechanism Using PKI.
Proceedings of the Applications and Techniques in Information Security, 2018

2017
Multi Class Machine Learning Algorithms for Intrusion Detection - A Performance Study.
Proceedings of the Security in Computing and Communications - 5th International Symposium, 2017

An investigation of classification algorithms for intrusion detection system - A quantitative approach.
Proceedings of the 2017 International Conference on Advances in Computing, 2017

2014
Modeling data races using UML/MARTE profile.
Proceedings of the 2014 International Conference on Advances in Computing, 2014

2012
Wireless Public key Infrastructure for Mobile Phones
CoRR, 2012

Comparison of Certificate Policies for Merging Public Key Infrastructures during Merger and Acquisition of Companies
CoRR, 2012

2010
Design and Implementation of an Efficient Method for Certificate Path Verification in Hierarchical Public Key Infrastructures.
Proceedings of the Information Processing and Management, 2010


  Loading...