Ashok Kumar Mohan
Title
Cited by
Cited by
Year
Wireless security auditing: attack vectors and mitigation strategies
AK Mohan, M Sethumadhavan
Procedia computer science 115, 674-682, 2017
102017
The Art of Piecewise Hashing: A Step Toward Better Evidence Provability
A Gopalakrishnan, E Vineti, AK Mohan, M Sethumadhavan
Journal of Cyber Security and Mobility 7 (1), 109-130, 2018
62018
Isolating rumors using sentiment analysis
V Sivasangari, AK Mohan, K Suthendran, M Sethumadhavan
Journal of Cyber Security and Mobility 7 (1), 181-200, 2018
62018
Secure seed-based sturdy OTP via convenient carry-on device
AK Mohan, TG Kumar
Artificial Intelligence and Evolutionary Algorithms in Engineering Systems …, 2015
62015
A selective generation of hybrid random numbers via android smart phones
AK Mohan, N Devi, M Sethumadhavan, R Santhya
Int. J. Pure Appl. Math 118 (8), 311-317, 2018
42018
Forensic future of social media analysis using web ontology
AK Mohan, D Venkataraman
2017 4th International Conference on Advanced Computing and Communication …, 2017
42017
An investigation on HTTP/2 security
M Suresh, PP Amritha, AK Mohan, VA Kumar
Journal of Cyber Security and Mobility 7 (1), 161-189, 2018
32018
Disk memory forensics: Analysis of memory forensics frameworks flow
T Prem, VP Selwin, AK Mohan
2017 Innovations in Power and Advanced Computing Technologies (i-PACT), 1-7, 2017
32017
Data Hiding in Slack Space Revisited
RV Thampy, K Praveen, AK Mohan
International Journal of Pure and Applied Mathematics 118 (18), 3017-3025, 2018
22018
Neighbor Attack Detection in Internet of Things
A Thomas, TG Kumar, AK Mohan
Advanced Computational and Communication Paradigms, 187-196, 2018
22018
Jordan center segregation: rumors in social media networks
R Krithika, AK Mohan, M Sethumadhavan
International Symposium on Security in Computing and Communication, 146-158, 2017
22017
Behavior and impact of concrete deck slab, shear connector and steel beam in composite bridge
A Mohan, M Tholkapian
Int. J. Pure & App. Math 115, 247-255, 2017
22017
Deceiving attackers in wireless local area networks using decoys
AA Kumar, AK Mohan, PP Amritha
Journal of Cyber Security and Mobility 7 (1), 201-214, 2018
12018
PeopleXploit--A hybrid tool to collect public data
A Anand V, AK Mohan
arXiv preprint arXiv:2010.15668, 2020
2020
Augmenting Technology to Address Rural Sanitation
R Vineeth, S Vikash, P Swetha, P Geetha, AK Mohan, K Nandanan
ICDSMLA 2019, 1723-1730, 2020
2020
Gathering Hazy Dots In Favour Of Digital Evidences
R Aishwarya, AK Mohan, M Sethumadhavan
International Journal of Pure and Applied Mathematics 119 (16), 4063-4072, 2018
2018
Maintaining the Integrity of Digital Evidence using Piecewise Hashing
M Roy, AK Mohan, M Sethumadhavan
International Journal of Pure and Applied Mathematics 119 (16), 4073-4077, 2018
2018
The system can't perform the operation now. Try again later.
Articles 1–17