Isolating rumors using sentiment analysis V Sivasangari, AK Mohan, K Suthendran, M Sethumadhavan Journal of Cyber Security and Mobility, 181-200, 2018 | 31 | 2018 |
Wireless security auditing: attack vectors and mitigation strategies AK Mohan, M Sethumadhavan Procedia Computer Science 115, 674-682, 2017 | 26 | 2017 |
Neighbor attack detection in internet of things A Thomas, T Gireesh Kumar, AK Mohan Advanced Computational and Communication Paradigms: Proceedings of …, 2018 | 17 | 2018 |
Forensic future of social media analysis using web ontology AK Mohan, D Venkataraman 2017 4th International Conference on Advanced Computing and Communication …, 2017 | 15 | 2017 |
An investigation on HTTP/2 security M Suresh, PP Amritha, AK Mohan, VA Kumar Journal of Cyber Security and Mobility, 161-180, 2018 | 14 | 2018 |
The art of piecewise hashing: a step toward better evidence provability A Gopalakrishnan, E Vineti, AK Mohan, M Sethumadhavan Journal of Cyber Security and Mobility, 109-130, 2018 | 10 | 2018 |
Secure seed-based sturdy OTP via convenient carry-on device AK Mohan, T Gireesh Kumar Artificial Intelligence and Evolutionary Algorithms in Engineering Systems …, 2015 | 10 | 2015 |
A selective generation of hybrid random numbers via android smart phones AK Mohan, N Devi, M Sethumadhavan, R Santhya Int. J. Pure Appl. Math 118 (8), 311-317, 2018 | 8 | 2018 |
Data hiding in slack space revisited RV Thampy, K Praveen, AK Mohan International Journal of Pure and Applied Mathematics 118 (18), 3017-3025, 2018 | 8 | 2018 |
Deceiving attackers in wireless local area networks using decoys AA Kumar, AK Mohan, PP Amritha Journal of Cyber Security and Mobility, 201-214, 2018 | 6 | 2018 |
Holistic analytics of digital artifacts: unique metadata association model AK Mohan, S Madathil, KV Lakshmy International Journal of Digital Crime and Forensics (IJDCF) 13 (5), 78-100, 2021 | 5 | 2021 |
Disk memory forensics: Analysis of memory forensics frameworks flow T Prem, VP Selwin, AK Mohan 2017 Innovations in Power and Advanced Computing Technologies (i-PACT), 1-7, 2017 | 5 | 2017 |
A forensic analysis on the availability of MQTT network traffic NVH Chunduri, AK Mohan Security in Computing and Communications: 8th International Symposium, SSCC …, 2021 | 3 | 2021 |
PeopleXploit--A hybrid tool to collect public data A Anand V, AK Mohan arXiv preprint arXiv:2010.15668, 2020 | 3 | 2020 |
Augmenting technology to address rural sanitation R Vineeth, S Vikash, P Swetha, P Geetha, AK Mohan, K Nandanan ICDSMLA 2019: Proceedings of the 1st International Conference on Data …, 2020 | 3 | 2020 |
†œBehavior and impact of concrete deck slab, shear connector and steel beam in composite bridge†A Mohan, M Tholkapian Int. J. Pure & App. Math 115, 247-255, 2017 | 2 | 2017 |
Jordan center segregation: rumors in social media networks R Krithika, AK Mohan, M Sethumadhavan Security in Computing and Communications: 5th International Symposium, SSCC …, 2017 | 2 | 2017 |
Neural network for cardiac disease classification V Kumar, A Mohan J INST ENG INDIA: ELECTRON & TELECOMMUN ENG J 74, 80-85, 1994 | 1 | 1994 |
PeopleXploit: A hybrid tool to collect public data AK Buvanasri, R Meenakshi, S Karthika, AK Mohan 2020 4th International Conference on Computer, Communication and Signal …, 2020 | | 2020 |
Maintaining the Integrity of Digital Evidence using Piecewise Hashing M Roy, AK Mohan, M Sethumadhavan International Journal of Pure and Applied Mathematics 119 (16), 4073-4077, 2018 | | 2018 |