Balachandra Muniyal
Balachandra Muniyal
Manipal Institute of Technology, Manipal University, Manipal
Verified email at manipal.edu
TitleCited byYear
Performance evaluation of supervised machine learning algorithms for intrusion detection
MC Belavagi, B Muniyal
Procedia Computer Science 89, 117-123, 2016
292016
Security Issues and Challenges in Mobile Computing and M-Commerce
K Prakash, Balachandra
International Journal of Computer Science & Engineering Survey (IJCSES) 6 (2 …, 2015
132015
Characteristic Analysis of VoIP Traffic for Wireless Networks In Comparison with CBR using QualNet Network Simulator
R Ganiga, B Muniyal
International Journal of Computer Applications 50 (11), 2012
62012
Creating virtual hierarchy in peer-to-peer PKI to simplify certificate path discovery
B Muniyal, KV Prema, S Nayak
International Journal of Computer Applications 41 (9), 7-12, 2012
52012
Wireless public key infrastructure for mobile phones
B Muniyal, K Prakash, S Sharma
arXiv preprint arXiv:1212.2563, 2012
42012
An investigation of classification algorithms for intrusion detection system—A quantitative approach
JE Varghese, B Muniyal
2017 International Conference on Advances in Computing, Communications and …, 2017
32017
EPMOS based secure mobile communication in LTE/SAE networks
K Prakash, B Muniyal
2015 International Conference on Applied and Theoretical Computing and …, 2015
22015
Efficient digital certificate verification in wireless public key infrastructure using enhanced certificate revocation list
K Prakasha, B Muniyal, V Acharya, S Krishna, S Prakash
Information Security Journal: A Global Perspective 27 (4), 214-229, 2018
12018
Multi Class Machine Learning Algorithms for Intrusion Detection-A Performance Study
MC Belavagi, B Muniyal
International Symposium on Security in Computing and Communication, 170-178, 2017
12017
Modeling data races using UML/MARTE profile
KC Akshay, A Nayak, B Muniyal
2014 International Conference on Advances in Computing, Communications and …, 2014
12014
Comparison of certificate policies for merging public key infrastructures during merger and acquisition of companies
B Muniyal, KV Prema, M Balachandra
arXiv preprint arXiv:1210.2934, 2012
12012
Automated User Authentication in Wireless Public Key Infrastructure for Mobile Devices Using Aadhar Card
K Prakasha, B Muniyal, V Acharya
IEEE Access 7, 17981-18007, 2019
2019
Enhanced Authentication and Key Agreement Mechanism Using PKI
K Prakasha, P Gowda, V Acharya, B Muniyal, M Khandelwal
International Conference on Applications and Techniques in Information …, 2018
2018
A Novel Secret Key Exchange Mechanism for Secure Communication and Data Transfer in Symmetric Cryptosystems
K Prakasha, R Kalkur, V Acharya, B Muniyal, M Khandelwal
International Symposium on Security in Computing and Communication, 578-590, 2018
2018
Analysis of Execution Time for Encryption During Data Integrity Check in Cloud Environment
KC Akshay, B Muniyal
International Symposium on Security in Computing and Communication, 617-627, 2018
2018
A Comparative Analysis of Different Soft Computing Techniques for Intrusion Detection System
JE Varghese, B Muniyal
International Symposium on Security in Computing and Communication, 563-577, 2018
2018
Analysis of Data Hiding Methods in Image Steganography
KC Akshay, B Muniyal
2018 International Conference on Advances in Computing, Communications and …, 2018
2018
Authentication Using Text and Graphical Password
AM Joshi, B Muniyal
2018 International Conference on Advances in Computing, Communications and …, 2018
2018
Query Quality Prediction on Source Code Base Dataset: A Comparative Study
BP Swathi, B Muniyal
2018 International Conference on Advances in Computing, Communications and …, 2018
2018
A Tokenization System to Secure Critical Data
C Pujari, B Muniyal, A Kulkarni
International Journal of Engineering and Technology (UAE) 7 (41), 126-128, 2018
2018
The system can't perform the operation now. Try again later.
Articles 1–20