关注
Jevitha KP
Jevitha KP
Assistant Professor, Amrita University
在 cb.amrita.edu 的电子邮件经过验证
标题
引用次数
引用次数
年份
Prediction of cross-site scripting attack using machine learning algorithms
BA Vishnu, KP Jevitha
Proceedings of the 2014 International Conference on Interdisciplinary …, 2014
592014
Web services attacks and security-a systematic literature review
VR Mouli, KP Jevitha
Procedia Computer Science 93, 870-877, 2016
522016
Security-aware software development life cycle (SaSDLC)-processes and tools
AK Talukder, VK Maurya, BG Santhosh, E Jangam, SV Muni, KP Jevitha, ...
2009 IFIP International Conference on Wireless and Optical Communications …, 2009
442009
Finite‐state model extraction and visualization from Java program execution
J KP, S Jayaraman, B Jayaraman
Software: practice and experience 51 (2), 409-437, 2021
202021
An automata based approach for the prevention of nosql injections
S Joseph, KP Jevitha
Security in Computing and Communications: Third International Symposium …, 2015
132015
STRIDE based analysis of the chrome browser extensions API
PK Akshay Dev, KP Jevitha
Proceedings of the 5th International Conference on Frontiers in Intelligent …, 2017
112017
A systematic review of security measures for web browser extension vulnerabilities
J Arunagiri, S Rakhi, KP Jevitha
Proceedings of the International Conference on Soft Computing Systems: ICSCS …, 2016
112016
Verification of oauth 2.0 using uppaal
KS Jayasri, KP Jevitha, B Jayaraman
Social Transformation–Digital Way: 52nd Annual Convention of the Computer …, 2018
82018
Runtime verification and vulnerability testing of smart contracts
M Abraham, KP Jevitha
Advances in Computing and Data Sciences: Third International Conference …, 2019
72019
An encryption technique to thwart android binder exploits
Y Kaladharan, P Mateti, KP Jevitha
Intelligent Systems Technologies and Applications: Volume 2, 13-21, 2016
72016
Evaluating the Effectiveness of Conventional Fixes for SQL Injection Vulnerability
S Joseph, KP Jevitha
Proceedings of 3rd International Conference on Advanced Computing …, 2016
52016
CBEAT: Chrome browser extension analysis tool
SS Roy, KP Jevitha
Security in Computing and Communications: 5th International Symposium, SSCC …, 2017
42017
Prevention of PAC file based attack using DHCP snooping
KR Atul, KP Jevitha
Security in Computing and Communications: 5th International Symposium, SSCC …, 2017
42017
Run-time Control Flow Model Extraction of Java Applications
G Saravanan, G Subramani, P Akshay, N Kanigolla, KP Jevitha
Emerging Research in Computing, Information, Communication and Applications …, 2022
32022
Static analysis of Firefox OS privileged applications to detect permission policy violations
P Shahanas, KP Jevitha
International Journal of Control Theory and Applications 9 (7), 3085-3093, 2016
32016
Run-time Model Extraction of a Java-based UAV Controller
M Choorakuzil, A Czerniejewski, KP Jevitha, J Swaminathan, L Ziarek, ...
Tech. rep. Technical Report, 0
2
Formal Analysis of OpenID Connect Protocol Using Tamarin Prover
S Naresh, KP Jevitha
International Conference on Advances in Electrical and Computer Technologies …, 2020
12020
Runtime Verification on Abstract Finite State Models
KP Jevitha, B Jayaraman, M Sethumadhavan
arXiv preprint arXiv:2406.12715, 2024
2024
Security Analysis of OAuth 2.0 Implementation
S Sharma, KP Jevitha
2023 Innovations in Power and Advanced Computing Technologies (i-PACT), 1-8, 2023
2023
Password Generation Based on Song Lyrics and Its Management
E Sai Kishan, M Hemchudaesh, B Gowri Shankar, B Sai Brahadeesh, ...
International Conference on Advances in Computing and Data Sciences, 278-290, 2022
2022
系统目前无法执行此操作,请稍后再试。
文章 1–20