Prediction of cross-site scripting attack using machine learning algorithms BA Vishnu, KP Jevitha Proceedings of the 2014 International Conference on Interdisciplinary …, 2014 | 59 | 2014 |
Web services attacks and security-a systematic literature review VR Mouli, KP Jevitha Procedia Computer Science 93, 870-877, 2016 | 52 | 2016 |
Security-aware software development life cycle (SaSDLC)-processes and tools AK Talukder, VK Maurya, BG Santhosh, E Jangam, SV Muni, KP Jevitha, ... 2009 IFIP International Conference on Wireless and Optical Communications …, 2009 | 44 | 2009 |
Finite‐state model extraction and visualization from Java program execution J KP, S Jayaraman, B Jayaraman Software: practice and experience 51 (2), 409-437, 2021 | 20 | 2021 |
An automata based approach for the prevention of nosql injections S Joseph, KP Jevitha Security in Computing and Communications: Third International Symposium …, 2015 | 13 | 2015 |
STRIDE based analysis of the chrome browser extensions API PK Akshay Dev, KP Jevitha Proceedings of the 5th International Conference on Frontiers in Intelligent …, 2017 | 11 | 2017 |
A systematic review of security measures for web browser extension vulnerabilities J Arunagiri, S Rakhi, KP Jevitha Proceedings of the International Conference on Soft Computing Systems: ICSCS …, 2016 | 11 | 2016 |
Verification of oauth 2.0 using uppaal KS Jayasri, KP Jevitha, B Jayaraman Social Transformation–Digital Way: 52nd Annual Convention of the Computer …, 2018 | 8 | 2018 |
Runtime verification and vulnerability testing of smart contracts M Abraham, KP Jevitha Advances in Computing and Data Sciences: Third International Conference …, 2019 | 7 | 2019 |
An encryption technique to thwart android binder exploits Y Kaladharan, P Mateti, KP Jevitha Intelligent Systems Technologies and Applications: Volume 2, 13-21, 2016 | 7 | 2016 |
Evaluating the Effectiveness of Conventional Fixes for SQL Injection Vulnerability S Joseph, KP Jevitha Proceedings of 3rd International Conference on Advanced Computing …, 2016 | 5 | 2016 |
CBEAT: Chrome browser extension analysis tool SS Roy, KP Jevitha Security in Computing and Communications: 5th International Symposium, SSCC …, 2017 | 4 | 2017 |
Prevention of PAC file based attack using DHCP snooping KR Atul, KP Jevitha Security in Computing and Communications: 5th International Symposium, SSCC …, 2017 | 4 | 2017 |
Run-time Control Flow Model Extraction of Java Applications G Saravanan, G Subramani, P Akshay, N Kanigolla, KP Jevitha Emerging Research in Computing, Information, Communication and Applications …, 2022 | 3 | 2022 |
Static analysis of Firefox OS privileged applications to detect permission policy violations P Shahanas, KP Jevitha International Journal of Control Theory and Applications 9 (7), 3085-3093, 2016 | 3 | 2016 |
Run-time Model Extraction of a Java-based UAV Controller M Choorakuzil, A Czerniejewski, KP Jevitha, J Swaminathan, L Ziarek, ... Tech. rep. Technical Report, 0 | 2 | |
Formal Analysis of OpenID Connect Protocol Using Tamarin Prover S Naresh, KP Jevitha International Conference on Advances in Electrical and Computer Technologies …, 2020 | 1 | 2020 |
Runtime Verification on Abstract Finite State Models KP Jevitha, B Jayaraman, M Sethumadhavan arXiv preprint arXiv:2406.12715, 2024 | | 2024 |
Security Analysis of OAuth 2.0 Implementation S Sharma, KP Jevitha 2023 Innovations in Power and Advanced Computing Technologies (i-PACT), 1-8, 2023 | | 2023 |
Password Generation Based on Song Lyrics and Its Management E Sai Kishan, M Hemchudaesh, B Gowri Shankar, B Sai Brahadeesh, ... International Conference on Advances in Computing and Data Sciences, 278-290, 2022 | | 2022 |