Follow
Tony Thomas Kallivayalil
Tony Thomas Kallivayalil
Associate Professor and Associate Dean, Kerala University of Digital Sciences, Innovation and
Verified email at duk.ac.in
Title
Cited by
Cited by
Year
A TAN based hybrid model for android malware detection
R Surendran, T Thomas, S Emmanuel
Journal of Information Security and Applications 54, 102483, 2020
1132020
Cloud based medical image exchange-security challenges
SG Shini, T Thomas, K Chithraranjan
Procedia Engineering 38, 3454-3461, 2012
1032012
Cloud based e-governance system: A survey
KK Smitha, T Thomas, K Chitharanjan
Procedia Engineering 38, 3816-3823, 2012
932012
Machine learning approaches in cyber security analytics
T Thomas, AP Vijayaraghavan, S Emmanuel
Springer, 2019
782019
Joint watermarking scheme for multiparty multilevel DRM architecture
T Thomas, S Emmanuel, AV Subramanyam, MS Kankanhalli
IEEE Transactions on Information Forensics and Security 4 (4), 758-767, 2009
712009
Graph convolutional networks for android malware detection with system call graphs
TS John, T Thomas, S Emmanuel
2020 Third ISEA Conference on Security and Privacy (ISEA-ISAP), 162-170, 2020
562020
Gsdroid: Graph signal based compact feature representation for android malware detection
R Surendran, T Thomas, S Emmanuel
Expert Systems with Applications 159, 113581, 2020
492020
Handbook of research on cloud computing and big data applications in IoT
BB Gupta, DP Agrawal
IGI global, 2019
422019
On Existence of Common Malicious System Call Codes in Android Malware Families
R Surendran, T Thomas, S Emmanuel
IEEE Transactions on Reliability 70 (1), 248-260, 2020
362020
Towards generating secure keys for braid cryptography
KH Ko, JW Lee, T Thomas
Designs, Codes and Cryptography 45, 317-333, 2007
352007
Machine learning and cybersecurity
T Thomas, A P. Vijayaraghavan, S Emmanuel, T Thomas, ...
Machine Learning Approaches in Cyber Security Analytics, 37-47, 2020
322020
Applications of decision trees
T Thomas, A P. Vijayaraghavan, S Emmanuel, T Thomas, ...
Machine learning approaches in cyber security analytics, 157-184, 2020
322020
Privacy enabled digital rights management without trusted third party assumption
LL Win, T Thomas, S Emmanuel
IEEE Transactions on Multimedia 14 (3), 546-554, 2012
322012
Security issues of media sharing in social cloud
KS Gayathri, T Thomas, J Jayasudha
Procedia engineering 38, 3806-3815, 2012
322012
Group signature schemes using braid groups
T Thomas, AK Lal
arXiv preprint cs/0602063, 2006
312006
A novel phishing page detection mechanism using html source code comparison and cosine similarity
S Roopak, T Thomas
2014 Fourth International Conference on Advances in Computing and …, 2014
292014
Finger vein pulsation-based biometric recognition
A Krishnan, T Thomas, D Mishra
IEEE Transactions on Information Forensics and Security 16, 5034-5044, 2021
252021
Finger vein identification based on minutiae feature extraction with spurious minutiae removal
P Prabhakar, T Thomas
2013 third international conference on advances in computing and …, 2013
252013
A Zero-knowledge Undeniable Signature Scheme in Non-abelian Group Setting.
T Thomas, AK Lal
Int. J. Netw. Secur. 6 (3), 265-269, 2008
242008
Secure two-party protocols for point inclusion problem
T Thomas
arXiv preprint arXiv:0705.4185, 2007
212007
The system can't perform the operation now. Try again later.
Articles 1–20