Follow
Ashok Kumar Mohan
Title
Cited by
Cited by
Year
Wireless security auditing: attack vectors and mitigation strategies
AK Mohan, M Sethumadhavan
Procedia computer science 115, 674-682, 2017
262017
Isolating rumors using sentiment analysis
V Sivasangari, AK Mohan, K Suthendran, M Sethumadhavan
Journal of Cyber Security and Mobility 7 (1), 181-200, 2018
252018
An Investigation on HTTP/2 Security.
M Suresh, PP Amritha, AK Mohan, VA Kumar
J. Cyber Secur. Mobil. 7 (1-2), 161-189, 2018
132018
Forensic future of social media analysis using web ontology
AK Mohan, D Venkataraman
2017 4th International Conference on Advanced Computing and Communication …, 2017
132017
Neighbor attack detection in internet of things
A Thomas, T Gireesh Kumar, AK Mohan
Advanced Computational and Communication Paradigms: Proceedings of …, 2018
122018
The art of piecewise hashing: a step toward better evidence provability
A Gopalakrishnan, E Vineti, AK Mohan, M Sethumadhavan
Journal of Cyber Security and Mobility, 109-130, 2018
102018
Secure seed-based sturdy OTP via convenient carry-on device
AK Mohan, T Gireesh Kumar
Artificial Intelligence and Evolutionary Algorithms in Engineering Systems …, 2015
92015
A selective generation of hybrid random numbers via android smart phones
AK Mohan, N Devi, M Sethumadhavan, R Santhya
Int. J. Pure Appl. Math 118 (8), 311-317, 2018
82018
Data hiding in slack space revisited
RV Thampy, K Praveen, AK Mohan
International Journal of Pure and Applied Mathematics 118 (18), 3017-3025, 2018
62018
Deceiving attackers in wireless local area networks using decoys
AA Kumar, AK Mohan, PP Amritha
Journal of Cyber Security and Mobility, 201-214, 2018
52018
Disk memory forensics: Analysis of memory forensics frameworks flow
T Prem, VP Selwin, AK Mohan
2017 Innovations in Power and Advanced Computing Technologies (i-PACT), 1-7, 2017
52017
Holistic analytics of digital artifacts: unique metadata association model
AK Mohan, S Madathil, KV Lakshmy
International Journal of Digital Crime and Forensics (IJDCF) 13 (5), 78-100, 2021
42021
A forensic analysis on the availability of MQTT network traffic
NVH Chunduri, AK Mohan
Security in Computing and Communications: 8th International Symposium, SSCC …, 2021
32021
PeopleXploit--A hybrid tool to collect public data
A Anand V, AK Mohan
arXiv preprint arXiv:2010.15668, 2020
32020
Augmenting technology to address rural sanitation
R Vineeth, S Vikash, P Swetha, P Geetha, AK Mohan, K Nandanan
ICDSMLA 2019: Proceedings of the 1st International Conference on Data …, 2020
32020
†œBehavior and impact of concrete deck slab, shear connector and steel beam in composite bridgeâ€
A Mohan, M Tholkapian
Int. J. Pure & App. Math 115, 247-255, 2017
22017
Jordan center segregation: rumors in social media networks
R Krithika, AK Mohan, M Sethumadhavan
Security in Computing and Communications: 5th International Symposium, SSCC …, 2017
22017
Neural network for cardiac disease classification
V Kumar, A Mohan
J INST ENG INDIA: ELECTRON & TELECOMMUN ENG J 74, 80-85, 1994
11994
PeopleXploit: A hybrid tool to collect public data
AK Buvanasri, R Meenakshi, S Karthika, AK Mohan
2020 4th International Conference on Computer, Communication and Signal …, 2020
2020
Maintaining the Integrity of Digital Evidence using Piecewise Hashing
M Roy, AK Mohan, M Sethumadhavan
International Journal of Pure and Applied Mathematics 119 (16), 4073-4077, 2018
2018
The system can't perform the operation now. Try again later.
Articles 1–20