Performance evaluation of supervised machine learning algorithms for intrusion detection MC Belavagi, B Muniyal Procedia Computer Science 89, 117-123, 2016 | 42 | 2016 |
Security Issues and Challenges in Mobile Computing and M-Commerce K Prakash, Balachandra International Journal of Computer Science & Engineering Survey (IJCSES) 6 (2 …, 2015 | 13 | 2015 |
Characteristic Analysis of VoIP Traffic for Wireless Networks In Comparison with CBR using QualNet Network Simulator R Ganiga, B Muniyal International Journal of Computer Applications 50 (11), 2012 | 10 | 2012 |
Wireless public key infrastructure for mobile phones B Muniyal, K Prakash, S Sharma arXiv preprint arXiv:1212.2563, 2012 | 5 | 2012 |
Creating virtual hierarchy in peer-to-peer PKI to simplify certificate path discovery B Muniyal, KV Prema, S Nayak International Journal of Computer Applications 41 (9), 7-12, 2012 | 5 | 2012 |
An investigation of classification algorithms for intrusion detection system—A quantitative approach JE Varghese, B Muniyal 2017 International Conference on Advances in Computing, Communications and …, 2017 | 4 | 2017 |
Efficient digital certificate verification in wireless public key infrastructure using enhanced certificate revocation list K Prakasha, B Muniyal, V Acharya, S Krishna, S Prakash Information Security Journal: A Global Perspective 27 (4), 214-229, 2018 | 2 | 2018 |
Multi Class Machine Learning Algorithms for Intrusion Detection-A Performance Study MC Belavagi, B Muniyal International Symposium on Security in Computing and Communication, 170-178, 2017 | 2 | 2017 |
EPMOS based secure mobile communication in LTE/SAE networks K Prakash, B Muniyal 2015 International Conference on Applied and Theoretical Computing and …, 2015 | 2 | 2015 |
Automated User Authentication in Wireless Public Key Infrastructure for Mobile Devices Using Aadhar Card K Prakasha, B Muniyal, V Acharya IEEE Access 7, 17981-18007, 2019 | 1 | 2019 |
Modeling data races using UML/MARTE profile KC Akshay, A Nayak, B Muniyal 2014 International Conference on Advances in Computing, Communications and …, 2014 | 1 | 2014 |
Comparison of certificate policies for merging public key infrastructures during merger and acquisition of companies B Muniyal, KV Prema, M Balachandra arXiv preprint arXiv:1210.2934, 2012 | 1 | 2012 |
Multiple intrusion detection in RPL based networks. MC Belavagi, B Muniyal International Journal of Electrical & Computer Engineering (2088-8708) 10, 2020 | | 2020 |
Enhanced authentication and key exchange for end to end security in mobile commerce using wireless public key infrastructure K Prakasha, B Muniyal, V Acharya Information Discovery and Delivery, 2019 | | 2019 |
Enhanced Authentication and Key Agreement Mechanism Using PKI K Prakasha, P Gowda, V Acharya, B Muniyal, M Khandelwal International Conference on Applications and Techniques in Information …, 2018 | | 2018 |
A Novel Secret Key Exchange Mechanism for Secure Communication and Data Transfer in Symmetric Cryptosystems K Prakasha, R Kalkur, V Acharya, B Muniyal, M Khandelwal International Symposium on Security in Computing and Communication, 578-590, 2018 | | 2018 |
Analysis of Execution Time for Encryption During Data Integrity Check in Cloud Environment KC Akshay, B Muniyal International Symposium on Security in Computing and Communication, 617-627, 2018 | | 2018 |
A Comparative Analysis of Different Soft Computing Techniques for Intrusion Detection System JE Varghese, B Muniyal International Symposium on Security in Computing and Communication, 563-577, 2018 | | 2018 |
Analysis of Data Hiding Methods in Image Steganography KC Akshay, B Muniyal 2018 International Conference on Advances in Computing, Communications and …, 2018 | | 2018 |
Authentication Using Text and Graphical Password AM Joshi, B Muniyal 2018 International Conference on Advances in Computing, Communications and …, 2018 | | 2018 |