Varghese Paul

According to our database1, Varghese Paul authored at least 16 papers between 2012 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Complementary spatial transformer network for real-time 3D object recognition.
J. Real Time Image Process., October, 2023

Tree derived feature importance and Bayesian optimisation for improved multi-class classification of DDoS attacks in software defined networks.
Int. J. Inf. Comput. Secur., 2023

2022
A novel system architecture for secure authentication and data sharing in cloud enabled Big Data Environment.
J. King Saud Univ. Comput. Inf. Sci., 2022

Decentralized blockchain based authentication for secure data sharing in Cloud-IoT.
J. Ambient Intell. Humaniz. Comput., 2022

2021
Enhancing Security in Digital Data using various Function of S-box in Data Encryption Standard Method.
Webology, 2021

2020
Secure Brain-to-Brain Communication With Edge Computing for Assisting Post-Stroke Paralyzed Patients.
IEEE Internet Things J., 2020

2019
A Secure and Efficient Lightweight Symmetric Encryption Scheme for Transfer of Text Files between Embedded IoT Devices.
Symmetry, 2019

Content based image retrieval using deep learning process.
Clust. Comput., 2019

Mathematical modelling of polymer electrolyte membrane fuel cell and fuzzy-based intelligent controllers for performance enhancement.
Comput. Electr. Eng., 2019

Designing an Intelligent Controller for Improving PEM Fuel Cell Efficiency.
Proceedings of the Intelligent Information and Database Systems: Recent Developments, 2019

2017
Parallel phishing attack recognition using software agents.
J. Intell. Fuzzy Syst., 2017

Dynamic colour table: A novel S-box for cryptographic applications.
Int. J. Commun. Syst., 2017

Maintaining connectivity of mobile nodes using MANET gateway nodes.
Int. J. Commun. Networks Distributed Syst., 2017

2015
Unicode-based method for text steganography with malayalam text.
J. Intell. Fuzzy Syst., 2015

2014
An efficient mixed mode and paired cipher text cryptographic algorithm for effective key distribution.
Int. J. Commun. Syst., 2014

2012
SQLStor: Blockage of stored procedure SQL injection attack using dynamic query structure validation.
Proceedings of the 12th International Conference on Intelligent Systems Design and Applications, 2012


  Loading...