A comprehensive but not complicated survey on quantum computing PS Menon, M Ritwik IERI Procedia 10, 144-152, 2014 | 8 | 2014 |
A Malware Variant Resistant To Traditional Analysis Techniques R Murali, A Ravi, H Agarwal 2020 International Conference on Emerging Trends in Information Technology …, 2020 | 2 | 2020 |
Localizing Assets in an Indoor Environment Using Sensor Fusion R Murali, D Nachimuthu, DV SenthilKumar, MS Pandian, D Krishnen International Conference on Advances in Computing, Communications and …, 2018 | 2 | 2018 |
A Novel Advertisement Recommendation System For Online Video Portals S Soundappan, R ShajiKumar, M Ritwik, S Chithra, TM Sakthie Vishanth International Journal of Applied Engineering Research (IJAER) 10 (11), 28903 …, 2015 | 2 | 2015 |
Analyzing the Makier Virus R Murali, K Praveen International Journal of Computer Science Issues 10 (2), 530-533, 2013 | 2* | 2013 |
Optimal feature selection for non-network malware classification KMS ManiArasuSekar, P Swaminathan, R Murali 2020 International Conference on Inventive Computation Technologies (ICICT …, 2020 | 1 | 2020 |
Enhancing Digital Well-being using Opinion Mining and Sentiment Classifiers R Murali, A Ravi, H Agarwal 2020 International Conference on Inventive Computation Technologies (ICICT …, 2020 | | 2020 |
5th International Conference on Inventive Computation Technologies (ICICT-2020) 26-28 February 2020 MG Kambalimath, MS Kakkasageri, BA Patel, A Parikh, Z Wu, S Qi, ... | | 2020 |
A Conceptual Direction on Automatically Evolving Computer Malware using Genetic and Evolutionary Algorithms R Murali, CS Velayutham 2020 International Conference on Inventive Computation Technologies (ICICT …, 2020 | | 2020 |
A preliminary investigation into automatically evolving computer viruses using evolutionary algorithms R Murali, C Shunmuga Velayutham Journal of Intelligent & Fuzzy Systems 38 (5), 6517 – 6526, 2020 | | 2020 |
A Simple and Robust End-to-End Encryption Architecture for Anonymous and Secure Whistleblowing H Jayakrishnan, R Murali 2019 Twelfth International Conference on Contemporary Computing (IC3), 2019 | | 2019 |
Identifying third-party-influenced vulnerabilities in Massively Multi-player Online Role-playing Games HV Kumar, M Ritwik, AM Nair International Conference on Advances in Applied Engineering and Technology …, 2015 | | 2015 |
Approach for securing images transmitted over smart grid using Elliptic Curve Cryptography M Pallavi, M Ritwik International Journal of Applied Engineering Research (IJAER) 10 (73), 136-140, 2015 | | 2015 |