Cloud based medical image exchange-security challenges SG Shini, T Thomas, K Chithraranjan Procedia Engineering 38, 3454-3461, 2012 | 97 | 2012 |
A TAN based hybrid model for android malware detection R Surendran, T Thomas, S Emmanuel Journal of Information Security and Applications 54, 102483, 2020 | 85 | 2020 |
Cloud based e-governance system: A survey KK Smitha, T Thomas, K Chitharanjan Procedia Engineering 38, 3816-3823, 2012 | 85 | 2012 |
Joint watermarking scheme for multiparty multilevel DRM architecture T Thomas, S Emmanuel, AV Subramanyam, MS Kankanhalli IEEE Transactions on Information Forensics and Security 4 (4), 758-767, 2009 | 70 | 2009 |
Machine learning approaches in cyber security analytics T Thomas, AP Vijayaraghavan, S Emmanuel Springer, 2020 | 55 | 2020 |
Graph convolutional networks for android malware detection with system call graphs TS John, T Thomas, S Emmanuel 2020 Third ISEA Conference on Security and Privacy (ISEA-ISAP), 162-170, 2020 | 39 | 2020 |
Gsdroid: Graph signal based compact feature representation for android malware detection R Surendran, T Thomas, S Emmanuel Expert Systems with Applications 159, 113581, 2020 | 38 | 2020 |
Handbook of research on cloud computing and big data applications in IoT BB Gupta, DP Agrawal IGI Global, 2019 | 38 | 2019 |
Towards generating secure keys for braid cryptography KH Ko, JW Lee, T Thomas Designs, Codes and Cryptography 45, 317-333, 2007 | 32 | 2007 |
Security issues of media sharing in social cloud KS Gayathri, T Thomas, J Jayasudha Procedia engineering 38, 3806-3815, 2012 | 31 | 2012 |
A novel phishing page detection mechanism using html source code comparison and cosine similarity S Roopak, T Thomas 2014 Fourth International Conference on Advances in Computing and …, 2014 | 29 | 2014 |
Privacy enabled digital rights management without trusted third party assumption LL Win, T Thomas, S Emmanuel IEEE Transactions on Multimedia 14 (3), 546-554, 2012 | 29 | 2012 |
Group signature schemes using braid groups T Thomas, AK Lal arXiv preprint cs/0602063, 2006 | 29 | 2006 |
Machine learning and cybersecurity T Thomas, A P. Vijayaraghavan, S Emmanuel, T Thomas, ... Machine Learning Approaches in Cyber Security Analytics, 37-47, 2020 | 26 | 2020 |
Finger vein identification based on minutiae feature extraction with spurious minutiae removal P Prabhakar, T Thomas 2013 third international conference on advances in computing and …, 2013 | 25 | 2013 |
On Existence of Common Malicious System Call Codes in Android Malware Families R Surendran, T Thomas, S Emmanuel IEEE Transactions on Reliability 70 (1), 248-260, 2020 | 24 | 2020 |
A Zero-knowledge Undeniable Signature Scheme in Non-abelian Group Setting. T Thomas, AK Lal Int. J. Netw. Secur. 6 (3), 265-269, 2008 | 22 | 2008 |
Secure two-party protocols for point inclusion problem T Thomas arXiv preprint arXiv:0705.4185, 2007 | 21 | 2007 |
A privacy preserving content distribution mechanism for DRM without trusted third parties LL Win, T Thomas, S Emmanuel 2011 IEEE international conference on multimedia and expo, 1-6, 2011 | 19 | 2011 |
Applications of decision trees T Thomas, A P. Vijayaraghavan, S Emmanuel, T Thomas, ... Machine learning approaches in cyber security analytics, 157-184, 2020 | 17 | 2020 |