Follow
Jevitha KP
Jevitha KP
Assistant Professor, Amrita University
Verified email at cb.amrita.edu
Title
Cited by
Cited by
Year
Prediction of cross-site scripting attack using machine learning algorithms
BA Vishnu, KP Jevitha
Proceedings of the 2014 International Conference on Interdisciplinary …, 2014
582014
Web services attacks and security-a systematic literature review
VR Mouli, KP Jevitha
Procedia Computer Science 93, 870-877, 2016
512016
Security-aware software development life cycle (SaSDLC)-processes and tools
AK Talukder, VK Maurya, BG Santhosh, E Jangam, SV Muni, KP Jevitha, ...
2009 IFIP International Conference on Wireless and Optical Communications …, 2009
432009
Finite‐state model extraction and visualization from Java program execution
J KP, S Jayaraman, B Jayaraman
Software: practice and experience 51 (2), 409-437, 2021
192021
An automata based approach for the prevention of nosql injections
S Joseph, KP Jevitha
Security in Computing and Communications: Third International Symposium …, 2015
132015
A systematic review of security measures for web browser extension vulnerabilities
J Arunagiri, S Rakhi, KP Jevitha
Proceedings of the International Conference on Soft Computing Systems: ICSCS …, 2016
112016
STRIDE based analysis of the chrome browser extensions API
PK Akshay Dev, KP Jevitha
Proceedings of the 5th International Conference on Frontiers in Intelligent …, 2017
102017
Runtime verification and vulnerability testing of smart contracts
M Abraham, KP Jevitha
Advances in Computing and Data Sciences: Third International Conference …, 2019
72019
An encryption technique to thwart android binder exploits
Y Kaladharan, P Mateti, KP Jevitha
Intelligent Systems Technologies and Applications: Volume 2, 13-21, 2016
72016
Verification of oauth 2.0 using uppaal
KS Jayasri, KP Jevitha, B Jayaraman
Social Transformation–Digital Way: 52nd Annual Convention of the Computer …, 2018
62018
CBEAT: Chrome browser extension analysis tool
SS Roy, KP Jevitha
Security in Computing and Communications: 5th International Symposium, SSCC …, 2017
42017
Prevention of PAC file based attack using DHCP snooping
KR Atul, KP Jevitha
Security in Computing and Communications: 5th International Symposium, SSCC …, 2017
42017
Evaluating the Effectiveness of Conventional Fixes for SQL Injection Vulnerability
S Joseph, KP Jevitha
Proceedings of 3rd International Conference on Advanced Computing …, 2016
42016
Static analysis of Firefox OS privileged applications to detect permission policy violations
P Shahanas, KP Jevitha
International Journal of Control Theory and Applications 9 (7), 3085-3093, 2016
32016
Run-time Control Flow Model Extraction of Java Applications
G Saravanan, G Subramani, P Akshay, N Kanigolla, KP Jevitha
Emerging Research in Computing, Information, Communication and Applications …, 2022
22022
Run-time Model Extraction of a Java-based UAV Controller
M Choorakuzil, A Czerniejewski, KP Jevitha, J Swaminathan, L Ziarek, ...
Tech. rep. Technical Report, 0
2
Formal Analysis of OpenID Connect Protocol Using Tamarin Prover
S Naresh, KP Jevitha
International Conference on Advances in Electrical and Computer Technologies …, 2020
12020
Security Analysis of OAuth 2.0 Implementation
S Sharma, KP Jevitha
2023 Innovations in Power and Advanced Computing Technologies (i-PACT), 1-8, 2023
2023
Password Generation Based on Song Lyrics and Its Management
E Sai Kishan, M Hemchudaesh, B Gowri Shankar, B Sai Brahadeesh, ...
International Conference on Advances in Computing and Data Sciences, 278-290, 2022
2022
Runtime Verification on Abstracted Finite State Models
J KP, B Jayaraman, M Sethumadhavan
Available at SSRN 4258140, 0
The system can't perform the operation now. Try again later.
Articles 1–20