Publications


S. Salim and J. JS, "A Literature Survey on Estimating Uncertainty in Deep Learning Models: Ensuring safety in Intelligent Systems," 2023 2nd International Conference on Computational Systems and Communication (ICCSC), Thiruvananthapuram, India, 2023, pp. 1-5, doi: 10.1109/ICCSC56913.2023.10143025.

Swapna. H and Soniya. B, "A Review on News-Content Based Fake News Detection Approaches," 2022 International Conference on Computing, Communication, Security and Intelligent Systems (IC3SIS), Kochi, India, 2022, pp. 1-6, doi: 10.1109/IC3SIS54991.2022.9885447.

R Syama ,C Mala,Context-aware behaviour prediction for autonomous driving: a deep learning approach,International Journal of Pervasive Computing and Communications (2022),ISSN: 1742-7371

Manoj, B.C., Auxillia, D.J. RDAD: An Efficient Distributed Multi-Layered Resource Handler in Jungle Computing. Wireless Pers Commun 122, 845–860 (2022)

Robinson, Reji & Thomas, Ciza. (2021). Low Rate Multi-vector DDoS Attack Detection Using Information Gain Based Feature Selection. 10.1007/978-981-16-0965-7_53.

Syama, R., Mala, C. (2022). A Multi-objective Optimal Trajectory Planning for Autonomous Vehicles Using Dragonfly Algorithm. In: Haldorai, A., Ramu, A., Mohanram, S., Lu, J. (eds) 3rd EAI International Conference on Big Data Innovation for Sustainable Cognitive Computing. EAI/Springer Innovations in Communication and Computing. Springer, Cham.

R Syama ,C Mala(2021)Hidden Markov Model Approach for Behavior Prediction of Surrounding Vehicles for Autonomous Driving,Autonomous Driving and Advanced Driver-Assistance Systems (ADAS)

Ciza Thomas, R.R. Rejimol Robinson(2021),Data Analytics for Detecting DDoS Attacks in Network Traffic,Data Science and Data Analytics

Amal Saji ,Alex Roy,Gokul M S ,Dr Subu Surendran A Virtual Assistant For the Visually Impaired,. Springer June 27, 2021.

Chitharanjan Karat, Radha Senthilkumar,Optimal resource allocation with deep reinforcement learning and greedy adaptive firefly algorithm in cloud computing, Concurrency and Computation: Practice and Experience,29 September 2021 https://doi.org/10.1002/cpe.6657

Karthikeyan, J.C., Sreehari, S., Koshy, J.R., Kavitha, K.V. (2021). Live Acoustic Monitoring of Forests to Detect Illegal Logging and Animal Activity. In: Thampi, S.M., Gelenbe, E., Atiquzzaman, M., Chaudhary, V., Li, KC. (eds) Advances in Computing and Network Communications. Lecture Notes in Electrical Engineering, vol 736. Springer, Singapore. https://doi.org/10.1007/978-981-33-6987-0_8

Anju, S.S., Kavitha, K.V. (2021). Separable Convolution Neural Network for Abnormal Activity Detection in Surveillance Videos. In: Raj, J.S., Iliyasu, A.M., Bestak, R., Baig, Z.A. (eds) Innovative Data Communication Technologies and Application. Lecture Notes on Data Engineering and Communications Technologies, vol 59. Springer, Singapore

Anupama M Nair, Anusha Aji Justus, Arjun Ramesh and Binu Rajan M R.. Event Extraction from Emails. International Journal of Computer Applications 176(41):1-8, July 2020

Athira Sekhar A. S, Dr. Subu Surendran,Deep Learning Based Malayalam Handwritten Character Recognition System,International Journal for Research in Engineering Application & Management (IJREAM),ISSN : 2454-9150 Vol-06, Issue-04, July 202

Anju S.S., Kavitha K.V., “Performance Evaluation of Various Machine Learning Techniques for Human Activity Recognition using Smartphone,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.8, pp.316-319, 2019

Anupama M Nair, Anusha Aji Justus, Arjun Ramesh and Binu Rajan M R.. Event Extraction from Emails. International Journal of Computer Applications 176(41):1-8, July 2020

Athira Sekhar A. S, Dr. Subu Surendran,Deep Learning Based Malayalam Handwritten Character Recognition System,International Journal for Research in Engineering Application & Management (IJREAM),ISSN : 2454-9150 Vol-06, Issue-04, July 202

Anju S.S., Kavitha K.V., “Performance Evaluation of Various Machine Learning Techniques for Human Activity Recognition using Smartphone,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.8, pp.316-319, 2019

Kavitha K V, Athira S Pillai, Disha Dinesh Majithia, “Virtual Assistance Using Chatbots,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.10, pp.77-80, 2019.

N.S., Ameena and Surendran, Subu, Identification of Malicious Bots in Twitter using Wavelets (August 3, 2019). Proceedings of International Conference on Recent Trends in Computing, Communication & Networking Technologies (ICRTCCNT) 2019.

Soja Salim ,Early Warning System for Dengue Surveillance in Thiruvananthapuram, International Research Journal of Engineering and Technology (IRJET,2019)

Geethu Mohan M J ,Soja Salim ,IoT And Big Data Analytics Approach Using Smart Home Energy Management System,International Research Journal of Engineering and Technology (IRJET),Vol 6 :Issue 5

Radhika S M, Syama R,(2017)Local and global learning method for question answering approach,International Journal of Application or Innovation in Engineering

B Soniya B Feature Selection For Effective BOTNET Detection Based On Periodicity Of Traffic,Lecture Notes in Computer Science (2016)

B. Soniya, M. Wilscy,Detection of randomized bot command and control traffic on an end-point host,Alexandria Engineering Journal,Volume 55, Issue 3,2016,

W. Preethi and M. R. Binu Rajan, "Web service QoS prediction strategies," 2016 International Conference on Research Advances in Integrated Navigation Systems (RAINS), Bangalore, India, 2016, pp. 1-4, doi: 10.1109/RAINS.2016.7764407.

K. V. Kavitha and V. V. Suthan, "Dynamic load balancing in cloud based multimedia system with genetic algorithm," 2016 International Conference on Inventive Computation Technologies (ICICT), Coimbatore, India, 2016, pp. 1-4, doi: 10.1109/INVENTIVE.2016.7824842.

M. Indu and K. V. Kavitha, "Review on text summarization evaluation methods," 2016 International Conference on Research Advances in Integrated Navigation Systems (RAINS), Bangalore, India, 2016, pp. 1-4, doi: 10.1109/RAINS.2016.7764406.

M. Indu and K. V. Kavitha ,A Varied Efficient Approach on Sketch Based Image Retrieval System,International Journal of Engineering and Advanced Technology (IJEAT)ISSN: 2249-8958 (Online), Volume-6 Issue-1, October 2016

Surendran, S., Chithraprasad, D. & Kaimal, M.R. A scalable geometric algorithm for community detection from social networks with incremental update. Soc. Netw. Anal. Min. 6, 90 (2016).

M. Indu and K. V. Kavitha, "Survey on sketch based image retrieval methods," 2016 International Conference on Circuit, Power and Computing Technologies (ICCPCT), Nagercoil, India, 2016, pp. 1-4, doi: 10.1109/ICCPCT.2016.7530359.

K. V. Kavitha and V. V. Suthan, "Dynamic load balancing in cloud based multimedia system with genetic algorithm," 2016 International Conference on Inventive Computation Technologies (ICICT), Coimbatore, India, 2016, pp. 1-4, doi: 10.1109/INVENTIVE.2016.7824842.

T. A. Xavier and R. Rejimoan, "Survey on various resource allocation strategies in cloud," 2016 International Conference on Circuit, Power and Computing Technologies (ICCPCT), Nagercoil, India, 2016, pp. 1-4, doi: 10.1109/ICCPCT.2016.7530351.

G. L. Gopu, K. V. Kavitha and J. Joy, "Service Oriented Architecture based connectivity of automotive ECUs," 2016 International Conference on Circuit, Power and Computing Technologies (ICCPCT), Nagercoil, India, 2016, pp. 1-4, doi: 10.1109/ICCPCT.2016.7530358.

Arun, K., Rejimoan, R. (2018). SDA Algorithm for Network Path Identification. In: Saini, H., Singh, R., Reddy, K. (eds) Innovations in Electronics and Communication Engineering . Lecture Notes in Networks and Systems, vol 7. Springer, Singapore. https://doi.org/10.1007/978-981-10-3812-9_36

Arun K ,Preeja V , Android Malware Detection Techniques- A Survey International Journal of Engineering and Advanced Technology (IJEAT) ISSN: 2249-8958 (Online), Volume-5 Issue-4, April 2016 184

A. H. Shahana and V. Preeja, "Survey on feature subset selection for high dimensional data," 2016 International Conference on Circuit, Power and Computing Technologies (ICCPCT), Nagercoil, India, 2016, pp. 1-4, doi: 10.1109/ICCPCT.2016.7530147.

V. Preeja and A. H. Shahana, "A binary Krill Herd approach based feature selection for high dimensional data," 2016 International Conference on Inventive Computation Technologies (ICICT), Coimbatore, India, 2016, pp. 1-6, doi: 10.1109/INVENTIVE.2016.7824803.

S. Asha, T. Harsha and B. Soniya, "Analysis on botnet detection techniques," 2016 International Conference on Research Advances in Integrated Navigation Systems (RAINS), Bangalore, India, 2016, pp. 1-4, doi: 10.1109/RAINS.2016.7764411.

Arun K. and Rejimoan R., "A survey on network path identification using bio inspired algorithms," 2016 2nd International Conference on Advances in Electrical, Electronics, Information, Communication and Bio-Informatics (AEEICB), Chennai, India, 2016, pp. 387-389, doi: 10.1109/AEEICB.2016.7538314.

H. S. Raju and S. Salim, "An efficient trust model for detecting trusted nodes in peer to peer systems," 2016 International Conference on Emerging Technological Trends (ICETT), Kollam, India, 2016, pp. 1-5, doi: 10.1109/ICETT.2016.7873680.

H. S. Raju and S. Salim, "Reputation and trust management models in peer-to-peer," 2016 International Conference on Research Advances in Integrated Navigation Systems (RAINS), Bangalore, India, 2016, pp. 1-3, doi: 10.1109/RAINS.2016.7764398.

T. S. Greeshma and S. Surendren, "Mining communities in directed graph using wavelets," 2016 International Conference on Inventive Computation Technologies (ICICT), Coimbatore, India, 2016, pp. 1-4, doi: 10.1109/INVENTIVE.2016.7824807.

Soja Salim,Survey on Software Vulnerability Prediction National conference on recent advances in computer engineering and information technology

P. S. Raji and S. Surendran, "RDF approach on social network analysis," 2016 International Conference on Research Advances in Integrated Navigation Systems (RAINS), Bangalore, India, 2016, pp. 1-4, doi: 10.1109/RAINS.2016.7764416.

T. S. Greeshma and S. Surendren, "Mining communities in directed graph using wavelets," 2016 International Conference on Inventive Computation Technologies (ICICT), Coimbatore, India, 2016, pp. 1-4, doi: 10.1109/INVENTIVE.2016.7824807

Surendran, S., Chithraprasad, D. & Kaimal, M.R. A scalable geometric algorithm for community detection from social networks with incremental update. Soc. Netw. Anal. Min. 6, 90 (2016). https://doi.org/10.1007/s13278-016-0399-9

W. Preethi and M. R. B. Rajan, "Survey on different strategies for software reliability prediction," 2016 International Conference on Circuit, Power and Computing Technologies (ICCPCT), Nagercoil, India, 2016, pp. 1-3, doi: 10.1109/ICCPCT.2016.7530124

Deepak K L, Subu Surendran, “A Comparative Study on Network Visualization Techniques”, International Journal of Computer and Advanced Engineering Research (IJCAER), Volume 02– Issue 02, APRIL 2015

“Integillence Based Electric Vehicle Route Planning System”, International Journal of Engineering and Advanced Technology(IJEAT),ISSN:2249-8958,Vol2,August2015.

“Survey on Intelligence based Electric Vehicle Route Planning System”,International Journal of Computer and Advanced Engineering Research(IJCAER),Vol2,April 2015.

Adarsh S S and Kavitha K V, Computational approaches in Human Activity Recognition, International Journal of Computer and Advanced Engineering Research(IJCAER) ,Vol 2- Issue 2, April 2015.

Adarsh S S and Kavitha K V, Review on Aircraft security Monitoring Systems, International Journal of Technology Enhancements and Emerging research v0l3-Issue 7,pp 106-108, July 2015.

Adarsh S S and Kavitha K V, Online Human Detection using HOG and RSCBFD, International Journal of Engineering and Advanced Technology(IJEAT), Vol 4-Issue 6,pp 210-203,Aug 2015.

Ansila Henderson and Kavitha K V, Mechanisms for Scalable Image Searching: A Survey , International Journal of Computer and Advanced Engineering Research(IJCAER) ,Vol 2-Issue 2, April 2015.

Ansila Henderson and Kavitha K V,Scalable Image Search System, International Journal of Engineering and Advanced Technology(IJEAT), Vol 4-Issue 6,pp 197-200,Aug 2015.

Parvathi R , Syama R, Search as You Type in Database, International journal of Engineering and Advanced Technology(IJEAT) Volume 4 Issue 6 August 2015

Parvathi R , Syama R, A Survey on Search as You Type in Database, International journal of Computer and Advanced Engineering Research( IJCAER), Volume 02 Issue 03 June 2015

Soja Salim ,Achieving Efficient Ranked Multikeyword Search over Outsourced Cloud Data’ ‘International Journal of Engineering and Advanced Technology (IJEAT)’, Volume-4 , August 2015.

Soja Salim,Review of Video Synopsis Approaches,International Journal of Technology Enhancements and Emerging Engineering Research, VOL 3, ISSUE 5 ISSN 2347-4289

Soja Salim,Improved Approach to Customer Transaction Mining and PredictionInternational Journal of Scientific and Engineering Research (IJSER) - (ISSN 2229-5518).published in IJSER Volume 5, Issue 7 Edition

Safeera N, Chitharanjan K ,Intelligence Based Electric Vehicle Route Planning System,International Journal of Engineering and Advanced Technology (IJEAT) ISSN: 2249-8958 (Online), Volume-4 Issue-6, August 2015

Deepak K L and S. Surendran, "Layering technique for visualizing social networks under force directed placement," 2015 International Conference on Computing and Network Communications (CoCoNet), Trivandrum, India, 2015, pp. 951-959, doi: 10.1109/CoCoNet.2015.7411306.

Sumithra V.S and S. Surendran, "A computational geometric approach for overlapping community (cover) detection in social network," 2015 International Conference on Computing and Network Communications (CoCoNet), Trivandrum, India, 2015, pp. 98- 105, doi: 10.1109/CoCoNet.2015.7411173.

Balram, Soniya, and M. Wilscy. "User Traffic Profile for Traffic Reduction and Effective Bot C&C Detection.", International Journal of Network Security, Vol.16, No.1, PP.37-43,Jan. 2014

Soniya, B., and M. Wilscy. "Fuzzy inference system based on entropy of traffic for bot detection on an endpoint host." Data Science & Engineering (ICDSE), 2014 International Conference on. IEEE, 2014.

Subu Surendran, Anju S R, “A Study on Different Hand Gesture Recognition Techniques”, International Journal of Engineering Research & Technology (IJERT), Vol. 3 Issue 4, April – 2014

Anju S.R., Subu Surendran., "A Study on different Hand Gesture Recognition techniques", International Journal of Engineering Research and Technology, Volume No. 3, Issue 04, April 2014.

Jini Jacob, Subu Surendran, "A survey on various stream authentication techniques", International journal of engineering research and technology, Volume No. 3, Issue 06, June 2014.

Surendran, Subu, D. Chitraprasad, and M. R. Kaimal. "Voronoi Diagram-Based Geometric Approach for Social Network Analysis." Computational Intelligence, Cyber Security and Computational Models. Springer India, 2014. 359-369.

Subu Surendran, Chitraprasad D and Kaimal M.R.. “A Novel Approach for Automatic Detection of Communities from Multi-Dimensional Social Network Data.”, Advances in Computing, Communication and Information Science, Elsevier-2014

Anju S.R., Subu Surendran, "Simple, Efficient and Cost Effective Technology for Fall Detection", Accepted in 5th International Conference on Advances in Computer Sciences, Software Solutions, E-Learning, and Information & Communication Technology-2014.

Jini Jacob, Subu Surendran, "Community detection in social network data based on geometric clustering", Communicated in 5th International Conference on Advances in Computer Sciences, Software Solutions, E-Learning, Information & Communication Technology (ACSEICT - 2014).

Prathibha R.C and Smt. Rejimol Robinson R.R, Classification of Flooding attacks using severity labelling based Machine Learning Techniques, International Journal of Applied Engineering Research (IJAER), pp. 7667-7678, Volume 9, Number 20 (2014)

Prathibha R C and Rejimol Robinson R R. Article: A Comparative Study of Defense Mechanisms against SYN Flooding Attack.International Journal of Computer Applications 98(18):16-21, July 2014

“Clustering using SimHash and Locality Sensitive Hashing in Hadoop-HDFS : An Infrastructure Extension”,ISTE-ACEEE International Journal in Computer Science,Vol1,March2014.

“Survey on Different Types of Cloud Operating Systems”, published in International Journal of Engineering Research and Technology(IJERT),Vol3,e-ISSN:2278-0181,April 2014.

“SIFT and DWT based Video Sequence Matching Method for Copy Detection”, International Journal for Computer Applications(0975-8887)Vol99,No.13,Aug14.

“Rule Based Labeling and Max Entropy based Learning for Mining Wishes from User Reviews”, International Journal of Applied Engineering Research(IJAER)ISSN 0973- 4562,Vol9,No.20(2014)pp.7699-7704.

Liya Thomas, Syama R, Survey on Mareduce Scheduling Algorithms, International journal of Computer Applications (0975-8887), Volume 93-No 23 June 2014

Liya Thomas , Syama R, Ontology Based Video Annotation and Retrieval System, International journal of Emeging Technology and Advanced Engineering, Volume 4 Issue 7 July 2014

Karthia Srendran, Syama R, A comparative study on various approaches to Anti Random Testing, International journal of Engineering, Research and Technology(IJERT), Volume 3 Issue 4 April 2014

Fingerprint Privacy Protection Techniques: A Comparative Study’, JCSE International Journal of Computer Sciences and Engineering Open Access, 30-07-2014

Fingerprint Combinations for Privacy Protection: A Performance Analysis ‘ International Journal of Computer Applications ,Volume 103 – No.6, October 2014

A Survey on Network Traffic Classification Techniques International Journal of Engineering Research & Technology (IJERT) Vol. 3 Issue 3, March – 2014

Lekshmi R ,Binu Rajan M R ,Survey on Different Machine Learning Techniques for Software Effort Estimation,International Journal For Computer Applications

Daniel, Akhila.Preeja V “A Novel Technique for Automatic Road Distress Detection and Analysis.” (2014)

Reena P ,Binu Rajan M R ,A Novel Feature Subset Selection Algorithm for Software Defect Prediction,International Journal of Computer Applications (0975 – 8887) Volume 100 – No.17, August 2014

Reena P ,Binu Rajan M R ,Software Defect Prediction System –Decision Tree Algorithm With Two Level Data Preprocessing,International Journal of Engineering Research & Technology (IJERT)

Thomas, Liya and R. Syama. “Ontology Based Video Annotation and Retrieval System.” (2014).

Thomas, Liya and R. Syama,Survey on Mareduce Scheduling Algorithms,International Journal of Computer Applications (0975 – 8887) Volume 95– No.23, June 2014

Chandra, V.S. ,Rejimoan R (2014). Maximum Entropy based Natural Language Interface for Relational Database.

Soniya, B., and M. Wilscy. "Using entropy of traffic features to identify bot infected hosts." Intelligent Computational Systems (RAICS), 2013 IEEE Recent Advances in. IEEE, 2013.

Devika K, Subu Surendran, “An Overview of Web Data Extraction Techniques”, International Journal of Scientific Engineering and Technology, Volume 2, Issue 4, pp : 278 – 287.

Dhanyamol Antony, Subu Surendran, “Satellite Image Registration and Image Stitching” International Journal of Computer Science & Engineering Technology (IJCSET), Vol. 4 No. 02, 2013, pp: 62-66

Neethu C V, Subu Surendran, Review of Spatial Clustering Methods, International Journal of Information Technology Infrastructure (IJITI), Volume 2, No. 2, March- April 2013, ISSN 2320 2629.

Neethu C V, Subu Surendran, A New Approach For Spatial Pattern Analysis, International Journal of Computational Engineering Research (IJCER),Volume 4, August 2013, ISSN 2250 3005.

Nishana S S and Subu Surendran, “Structure Preserving Embedding Based Face Recognition”, International Journal of Engineering and Innovative Technology (IJEIT), Volume 3, Issue 1 (July 2013

Nishana. S. S and Subu Surendran, “ A Survey on Visual Search Reranking “International Journal of Computer Science and Engineering Technology, vol 4, No 5 , May 2013.

Nishana S S and Subu Surendran, “Graph Embedding and Dimensionality Reduction – A Survey”, International Journal of Computer Science & Engineering Technology (IJCSET), Vol. 4 No. 01 Jan 2013, ISSN: 2229-3345.

Deepthi S, Subu Surendran, “Map Overlay and Zooming of Satellite Images”, International Journal of Computer Science & Engineering Technology (IJCSET), Vol. 4, pp. 57-61, 2013.

“Locality Sensitive Hashing based Clustering in Hadoop-HDFS: An Infrastructure Extension”, Proceeding of IEEE International Conference on Circuit, Power and Computing Technologies(ICCPCT’13),pp.1243-1249,March2013.

“A Review on Hadoop-HDFS Infrastructure Extensions”, Proceeding of IEEE Conference on Information and Communication Technology(ICT’13)pp.132-137,April 2013.

Kavitha K V, Saritha R , VinodChandra S S, Computational Prediction of Continuous B- Cell Epitopes using Random Forest Classifier; Fourth International IEEE Conference on Computing, Communication and Networking Technologies (ICCCNT), pp 1-5,July 2013.

Kavitha K V, Saritha R . Support Vector Machine based Prognostication of Linear B-Cell Epitopes; 14th National Conference on Technological Trends, College of Engineering,Pp 43-46, Aug 2013.

Devika K Syama R, An overview of AUTOSAR multicore operating system Implement ation, International journal of innovative research in Science Engineering And Technology, Volume 2 Issue 7 July 2013

B. Soniya and M. Wilscy, “Host-Based Bot Detection Using Destination White- Lists for User’s Profile”, Advances in Computing and Information Technology, Proceedings of the Fifth International Conference on Network Security & Applications (CNSA-2012), July 13-15, Springer, 2012

Marfa M., Subu Surendran , Sabu M. Thampi and Radhakrishnan T, .CACHE BASED APPROACH FOR IMPROVING LOCATION BASED QUERY PROCESSING IN MOBILE ENVIRONMENT,Proc. International Conference on Security of Internet of Things (SECURIT’12), August 17-19, 2012, Kerala, India [ACM].

RR Rejimol Robinson, C Thomas,,Evaluation of mitigation methods for distributed denial of service attacks,Industrial Electronics and Applications (ICIEA), 2012 7th IEEE Conference on Industrial Electronics and Applications (ICIEA)

ViniVidyadharan and Subu Surendran, AUTOMATIC IMAGE REGISTRATION USING SIFT-NCC International conference on Advanced Computing & Communication Technologies for High Performance Applications 21st June 2012- 23rd June 2012 IC ACCTHPA 2012

Merlin George, and Rejimol Robinson R.R, “A Novel Stereo Matching Technique for Radiometric Changes using Normalized Cross Correlation,” Proc. IEEE International Conference on Data Science and Engineering, July 2012.

Merlin George and Rejimol Robinson R.R. Article: Real Time Stereo Matching for Radiometric Changes. IJCA Special Issue on Advanced Computing and Communication Technologies for HPC Applications ACCTHPCA (4):23-28, July 2012. Published by Foundation of Computer Science, New York, USA.

Rashmi S Nair,Rejimol Robinson R R,Evaluation of Image Compression algorithmsIJCA Special Issue on Advanced Computing and Communication Technologies for HPC Applications ACCTHPCA (4): July 2012. Published by Foundation of Computer Science, New York, USA.

Rashmi S Nair,Rejimol Robinson R R,Survey of Various Watermarking Techniques for Providing Authentication and Integrity, The First International Conference on Information Technology Convergence and Services (ITCS 2012)

Neethu C V, Rejimol Robinson R R, A Survey of Techniques for Answering Top- K Queries, Global Journal of Computer Science and Technology

Jisha Krishnan, Rejimol Robinson R R,”Detection Of Rheumatoid Arthritis Affecting Lungs”Journal of current Engineering Research,Volume 3 ,issue 5,PP 39 -45

Cloud Based E-Governance System: A Survey”, International Conference on Modeling, Optimization and Computing (ICMOC 2012), Procedia Engineering, Vol38,pp.3816-3823,2012.

“Secure Cloud Based Medical Data Exchange Using Attribute based Encryption” IJCA special issue on Advanced Computing and Communication Technologies for HPC applications (ACCTHPC (2):36-42, July 2012).Published by Foundation of Computer Science,Newyork,USA.

Rashmi S Nair and Rejimol Robinson R R,Comparison Between Pixel Based And Block Based Watermarking,Proc. International Conference Networks, Intelligence and Computing Technologies, vol. 1, 99-103, December 2011.

Smitha K.K. and Subu Surendran, ROBUST SKIN TONE BASED IMAGE STEGANOGRAPHY USING INTEGER WAVELETS, International Conference On Network Intelligence And Computing Technologies (ICNICT)2011Volume : I, 177-180

Marfa M. and Subu Surendran, LOCATION DEPENDENT QUERIES ON MOBILE ENVIRONMENT-SURVEY, Proc. International Conference on Networks, Intelligence and Computing Technologies (ICNICT 2011), 2011, 395-398

B. Soniya and M. Wilscy, “Naive Bayesian Classifier for Port Scan Detection” 1 st International Conference on Technological Trends, Nov. 25-27, 2010.

Rejimol Robinson R R, Vessel Segmentation Using 3D region Growing,ICOICT,2009,pp 211-214

B. Soniya and M. Wilscy, "Detection of TCP SYN Scanning Using Packet Counts and Neural Network," Signal Image Technology and Internet Based Systems 2008. SITIS '08. IEEE International Conference, pp.646-649, Nov. 30 2008-Dec. 3 2008