Follow
Jinesh M K
Title
Cited by
Cited by
Year
Security and privacy in Internet of things (IoTs): Models, Algorithms, and Implementations
F Hu
CRC Press, 2016
1352016
Security, Trust and Implementation Limitations of Prominent IoT Platforms
S Satyadevan, BS Kalarickal, MK Jinesh
Advances in Intelligent Systems and Computing 328, 85-95, 2014
402014
Secure IoT: An Improbable Reality
N Mannilthodi, J M Kannimoola
International Conference on Internet of Things, Big Data and Security 1, 338-343, 2017
132017
Implementation of Scatternet in an Intelligent IoT Gateway
L Mohan, MK Jinesh, B k, H P, S Sathyadevan
Advances in Intelligent Systems and Computing 338, 2014
82014
A tool to extract onion links from Tor hidden services and identify illegal activities
V Nair, JM Kannimoola
Inventive Computation and Information Technologies: Proceedings of ICICIT …, 2022
62022
A formal modeling approach for QoS in MQTT protocol
E Archana, A Rajeev, A Kuruvila, R Narayankutty, JM Kannimoola
Data Communication and Networks: Proceedings of GUCON 2019, 39-57, 2020
62020
Temporal Constrained Objects: Application and Implementation
J M Kannimoola, B Jayaraman, K Achuthan
Computer Languages, Systems & Structures, 2017
62017
Music recommendation system based on emotion
P Ulleri, SH Prakash, KB Zenith, GS Nair, JM Kannimoola
2021 12th International Conference on Computing Communication and Networking …, 2021
42021
Dynamic Constrained Objects for Vehicular Network Modeling
J M Kannimoola, B Jayaraman, K Achuthan
Formal Methods for Safety and Security: Case Studies for Aerospace …, 2017
42017
Sybil attack detection in vehicular networks
B Jayaraman, JM Kannimoola, K Achuthan
Security and Privacy in Internet of Things (IoTs), 55-72, 2016
42016
Weaponizing Real-world Applications as C2 (Command and Control)
A Sidhardhan, S Keerthana, JM Kannimoola
2023 International Conference on Innovative Data Communication Technologies …, 2023
22023
Formal Verification of IoT Protocol: In Design-Time and Run-Time Perspective
V Geetha Lekshmy, JM Kannimoola
Inventive Communication and Computational Technologies: Proceedings of …, 2021
22021
Future proofing the iot
IW Group
Cloud Security Alliance, 2016
22016
Temporal constrained objects for modelling neuronal dynamics
M Nair, J Manchan Kannimoola, B Jayaraman, B Nair, S Diwakar
PeerJ Computer Science 4, e159, 2018
12018
Run-Time Analysis of Temporal Constrained Objects
JM Kannimoola, B Jayaraman, K Achuthan
Declarative Programming and Knowledge Management: Conference on Declarative …, 2018
12018
Customizing EPCglobal to Fit Local ONS Requirements
S Sathyadevan, CA Akhila, MK Jinesh
Intelligent Computing, Communication and Devices: Proceedings of ICCD 2014 …, 2015
12015
CNN-LSTM Hybrid Model for Enhanced Malware Analysis and Detection
G Karat, JM Kannimoola, N Nair, A Vazhayil, VG Sujadevi, ...
Procedia Computer Science 233, 492-503, 2024
2024
Revolutionizing Education: Exploring the Potential of Blockchain based Incentive Systems
G Karat, JM Kannimoola
2023 7th International Conference on Intelligent Computing and Control …, 2023
2023
Semantics of temporal constrained objects
JM Kannimoola, B Jayaraman, K Achuthan
Journal of Logical and Algebraic Methods in Programming 119, 100632, 2021
2021
Declarative Modeling and Verification of Firewall Rules with Temporal Constrained Objects
J M Kannimoola, B Jayaraman, K Achuthan
2nd Symposium on Application of Formal Methods for Safety & Security of …, 2018
2018
The system can't perform the operation now. Try again later.
Articles 1–20