Publications


2026

R. Krithika, V.K. Kutty Malu, Prafullkumar Tale,”Revisiting path contraction and cycle contraction”, Journal of Computer and System Sciences, Volume 156, 2026, 103724, ISSN 0022-0000, https://doi.org/10.1016/j.jcss.2025.103724.

2025

Syam, Rohith & Arun, Govind & Surendran, Subu. (2025). Graph Neural Network and Natural Language Processing Integrated Methodology for Unmasking Scam Propagation in Social Network. 1-6. 10.1109/ICITIIT64777.2025.11041467.

Soja Salim; J.S. Jayasudha; B. Soniya, “Optimisation enabled deep learning model for traffic sign recognition” , International Journal of Heavy Vehicle Systems, 2025 Vol.32 No.1, pp.80 - 100.

Varghese, Remin & Salim, Soja. (2025). Comparative Analysis of Deep Learning Models on GTSRB Dataset for Classifying Under-Represented Data. 1-6. 10.1109/ETIS64005.2025.10960985.

A. I. Britto, A. S, D. S, S. Salim and S. B, "Advanced Decision-Making for Autonomous Vehicles Utilizing Deep Q Networks," 2025 Emerging Technologies for Intelligent Systems (ETIS), Trivandrum, India, 2025, pp. 1-5, doi: 10.1109/ETIS64005.2025.10961346.

Koruthu, Linta. “ Identifying High-Risk Patients in Hospitals to Prevent Complications Using Graph Neural Networks (GNNs) and the COVID-19 Open Research Dataset (CORD-19)”, INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT. 09. 1-9. 10.55041/IJSREM43016.

R, Rejimoan. “ DETECTION OF MACHINE-GENERATED TEXT BY INTEGRATING ROBERTA EMBEDDINGS WITH TOPOLOGICAL FEATURES. International Journal of Applied Mathematics., 38. 17-30, 2025. 10.12732/ijam.v38i6s.383.

Kavitha K V, L R Sudha, J S Jayasudha, “Optimizing EEG - based Emotion Recognition with a multi-modal ensemble approach”, Results in Engineering, Volume 26,2025, 104886, ISSN 2590-1230,https://doi.org/10.1016/j.rineng.2025.104886.

2024

Rejimol Robinson, R.R., Prasad, R.R., Thomas, C. et al. Validating network attack concepts: A TCAV-driven approach. J Comput Virol Hack Tech 20, 841–855 (2024). https://doi.org/10.1007/s11416-024-00535-z.

S. Salim, J. J. S. and S. B., "Ensuring Ethical AI: Unpacking the Significance of Risk Analysis Under the European Union's Artificial Intelligence Act," 2024 IEEE Region 10 Symposium (TENSYMP), New Delhi, India, 2024, pp. 1-6, doi: 10.1109/TENSYMP61132.2024.10752133.

S. Salim, J. J. S. and S. B., "Safe and Trustworthy AI Framework (STAIF): Addressing Uncertainty in AI-Based Models for Real-World Deployment," TENCON 2024 - 2024 IEEE Region 10 Conference (TENCON), Singapore, Singapore, 2024, pp. 727-730, doi: 10.1109/TENCON61640.2024.10902880.

2023

Hariharan, S., Rejimol Robinson, R.R., Prasad, R.R. et al. XAI for intrusion detection system: comparing explanations based on global and local scope. J Comput Virol Hack Tech 19, 217–239 (2023). https://doi.org/10.1007/s11416-022-00441-2.

Rejimol, R.R., Madhav, K.P., Thomas, C., Robinson, R.R., & Rejimol, A.R. (2024). Improved minority attack detection in Intrusion Detection System using efficient feature selection algorithms. Expert Systems, 41.

J.S. Jayasudha R. Rejimoan, B. Gnana priya, “Enhancing Question Answering with a Multidirectional Transformer: Insights from Squad 2.0”, SSRG Int. J. Electron. Commun. Eng, 2024.

S. Salim and J. JS, "A Literature Survey on Estimating Uncertainty in Deep Learning Models: Ensuring safety in Intelligent Systems," 2023 2nd International Conference on Computational Systems and Communication (ICCSC), Thiruvananthapuram, India, 2023, pp. 1-5, doi: 10.1109/ICCSC56913.2023.10143025.

R. R, G. B and J. J S, "A Comprehensive Review on Deep Learning Approaches for Question Answering and Machine Reading Comprehension in NLP," 2023 2nd Edition of IEEE Delhi Section Flagship Conference (DELCON), Rajpura, India, 2023, pp. 1-6, doi: 10.1109/DELCON57910.2023.10127327.

Preeja. V, T. S. Subashini and J. J S, "Exploring Deep Learning Approaches for Text Summarization and Text Generation," 2023 Third International Conference on Ubiquitous Computing and Intelligent Information Systems (ICUIS), Gobichettipalayam, India, 2023, pp. 154-160, doi: 10.1109/ICUIS60567.2023.00034.

Kavitha. K. V, Sudha. L. R and Jayasudha. J. S, "A Study on Human Emotion Recognition Techniques," 2023 International Conference on Innovations in Engineering and Technology (ICIET), Muvattupuzha, India, 2023, pp. 1-6, doi: 10.1109/ICIET57285.2023.10220883.

Syama, R. & Mala, C, “ Hybrid Interaction-Aware model for Surrounding vehicle Behaviour Prediction using Bi-LSTM for Autonomous Driving”, The 7th International Conference on Mobile Internet Security (MobiSec'23), Dec. 19-21, 2023, Okinawa, Japan, Article No. 21.

M R, Binu Rajan et al. “A Comprehensive Study on Computer Aided Approaches for Multiclass Neurological Disorder Classification.” 2023 Third International Conference on Ubiquitous Computing and Intelligent Information Systems (ICUIS) (2023): 135-139.

2022

Manoj, B.C., Auxillia, D.J. RDAD: An Efficient Distributed Multi-Layered Resource Handler in Jungle Computing. Wireless Pers Commun 122, 845–860 (2022). https://doi.org/10.1007/s11277-021-08928-9.

Swapna. H and Soniya. B, "A Review on News-Content Based Fake News Detection Approaches," 2022 International Conference on Computing, Communication, Security and Intelligent Systems (IC3SIS), Kochi, India, 2022, pp. 1-6, doi: 10.1109/IC3SIS54991.2022.9885447.

R Syama ,C Mala,Context-aware behaviour prediction for autonomous driving: a deep learning approach,International Journal of Pervasive Computing and Communications (2022),ISSN: 1742-7371.

R. Syama and C. Mala, "An Ensemble Model for Lane Change Intention Inference for Autonomous Driving," 2022 International Conference on Computing, Communication, Security and Intelligent Systems (IC3SIS), Kochi, India, 2022, pp. 1-6, doi: 10.1109/IC3SIS54991.2022.9885621.

Syama, R. & Mala, C.. “A Multi-objective Optimal Trajectory Planning for Autonomous Vehicles Using Dragonfly Algorithm.”, 3rd EAI InternationalConference on BigData Innovationfor SustainableCognitive Computing, 2022.

2021

Amal Saji ,Alex Roy,Gokul M S ,Dr Subu Surendran A Virtual Assistant For the Visually Impaired,. Springer June 27, 2021.

Robinson, Reji & Thomas, Ciza. (2021). Low Rate Multi-vector DDoS Attack Detection Using Information Gain Based Feature Selection. 10.1007/978-981-16-0965-7_53.

R Syama ,C Mala(2021)Hidden Markov Model Approach for Behavior Prediction of Surrounding Vehicles for Autonomous Driving,Autonomous Driving and Advanced Driver-Assistance Systems (ADAS).

Ciza Thomas, R.R. Rejimol Robinson(2021),Data Analytics for Detecting DDoS Attacks in Network Traffic,Data Science and Data Analytics.

Chitharanjan Karat, Radha Senthilkumar,Optimal resource allocation with deep reinforcement learning and greedy adaptive firefly algorithm in cloud computing, Concurrency and Computation: Practice and Experience,29 September 2021 https://doi.org/10.1002/cpe.6657.

Karthikeyan, J.C., Sreehari, S., Koshy, J.R., Kavitha, K.V. (2021). Live Acoustic Monitoring of Forests to Detect Illegal Logging and Animal Activity. In: Thampi, S.M., Gelenbe, E., Atiquzzaman, M., Chaudhary, V., Li, KC. (eds) Advances in Computing and Network Communications. Lecture Notes in Electrical Engineering, vol 736. Springer, Singapore. https://doi.org/10.1007/978-981-33-6987-0_8.

Anju, S.S., Kavitha, K.V. (2021). Separable Convolution Neural Network for Abnormal Activity Detection in Surveillance Videos. In: Raj, J.S., Iliyasu, A.M., Bestak, R., Baig, Z.A. (eds) Innovative Data Communication Technologies and Application. Lecture Notes on Data Engineering and Communications Technologies, vol 59. Springer, Singapore.

R. Syama and C. Mala, “StackelbergHidden Markov Model Approach forBehavior Prediction of SurroundingVehicles for Autonomous Driving”, Autonomous Driving and Advanced Driver-Assistance Systems (ADAS) CRC Press, 2021.

R. R. Prasad, R. R. Rejimol Robinson, C. Thomas, and N. Balakrishnan, “Evaluation of Strategic Decision taken by Autonomous Agent using Explainable AI,” in 2021 4th International Conference on Security and Privacy (ISEA-ISAP), 2021, pp. 1–8. doi: 10.1109/ISEA-ISAP54304.2021.9689715.

Roy, A., Saji, A., Gokul, M. S., & Surendran, S. (2022). A Virtual Assistant for the Visually Impaired. In Advances in Electrical and Computer Technologies: Select Proceedings of ICAECT 2021 (pp. 49-57). Springer, Singapore. DOI: 10.1007/978-981-19-1111-8_5.

Soja Salim, "Early Warning System for Dengue Surveillance in Thiruvananthapuram", National Conference on Deep Learning & Applications (Deep.Learn 2021), CSI Trivandrum Chapter.

2020

Anupama M Nair, Anusha Aji Justus, Arjun Ramesh and Binu Rajan M R.. Event Extraction from Emails. International Journal of Computer Applications 176(41):1-8, July 2020.

Athira Sekhar A. S, Dr. Subu Surendran,Deep Learning Based Malayalam Handwritten Character Recognition System,International Journal for Research in Engineering Application & Management (IJREAM),ISSN : 2454-9150 Vol-06, Issue-04, July 2020.

2019

Anju S.S., Kavitha K.V., “Performance Evaluation of Various Machine Learning Techniques for Human Activity Recognition using Smartphone,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.8, pp.316-319, 2019.

Kavitha K V, Athira S Pillai, Disha Dinesh Majithia, “Virtual Assistance Using Chatbots,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.10, pp.77-80, 2019.

N.S., Ameena and Surendran, Subu, Identification of Malicious Bots in Twitter using Wavelets (August 3, 2019). Proceedings of International Conference on Recent Trends in Computing, Communication & Networking Technologies (ICRTCCNT) 2019.

Soja Salim ,Early Warning System for Dengue Surveillance in Thiruvananthapuram, International Research Journal of Engineering and Technology (IRJET,2019).

Geethu Mohan M J ,Soja Salim ,IoT And Big Data Analytics Approach Using Smart Home Energy Management System,International Research Journal of Engineering and Technology (IRJET),Vol 6 :Issue 5.

2018

Arun, K., Rejimoan, R. (2018). SDA Algorithm for Network Path Identification. In: Saini, H., Singh, R., Reddy, K. (eds) Innovations in Electronics and Communication Engineering . Lecture Notes in Networks and Systems, vol 7. Springer, Singapore. https://doi.org/10.1007/978-981-10-3812-9_36.

2017

Radhika S M, Syama R,(2017)Local and global learning method for question answering approach,International Journal of Application or Innovation in Engineering.

2016

A. H. Shahana and V. Preeja, "Survey on feature subset selection for high dimensional data," 2016 International Conference on Circuit, Power and Computing Technologies (ICCPCT), Nagercoil, India, 2016, pp. 1-4, doi: 10.1109/ICCPCT.2016.7530147.

Arun K. and Rejimoan R., "A survey on network path identification using bio inspired algorithms," 2016 2nd International Conference on Advances in Electrical, Electronics, Information, Communication and Bio-Informatics (AEEICB), Chennai, India, 2016, pp. 387-389, doi: 10.1109/AEEICB.2016.7538314.

Arun K ,Preeja V , Android Malware Detection Techniques- A Survey International Journal of Engineering and Advanced Technology (IJEAT) ISSN: 2249-8958 (Online), Volume-5 Issue-4, April 2016.

B. Soniya, M. Wilscy,Detection of randomized bot command and control traffic on an end-point host,Alexandria Engineering Journal,Volume 55, Issue 3,2016.

B Soniya B Feature Selection For Effective BOTNET Detection Based On Periodicity Of Traffic,Lecture Notes in Computer Science (2016).

G. L. Gopu, K. V. Kavitha and J. Joy, "Service Oriented Architecture based connectivity of automotive ECUs," 2016 International Conference on Circuit, Power and Computing Technologies (ICCPCT), Nagercoil, India, 2016, pp. 1-4, doi: 10.1109/ICCPCT.2016.7530358.

H. S. Raju and S. Salim, "An efficient trust model for detecting trusted nodes in peer to peer systems," 2016 International Conference on Emerging Technological Trends (ICETT), Kollam, India, 2016, pp. 1-5, doi: 10.1109/ICETT.2016.7873680.

H. S. Raju and S. Salim, "Reputation and trust management models in peer-to-peer," 2016 International Conference on Research Advances in Integrated Navigation Systems (RAINS), Bangalore, India, 2016, pp. 1-3, doi: 10.1109/RAINS.2016.7764398.

K. V. Kavitha and V. V. Suthan, "Dynamic load balancing in cloud based multimedia system with genetic algorithm," 2016 International Conference on Inventive Computation Technologies (ICICT), Coimbatore, India, 2016, pp. 1-4, doi: 10.1109/INVENTIVE.2016.7824842.

M. Indu and K. V. Kavitha, "Review on text summarization evaluation methods," 2016 International Conference on Research Advances in Integrated Navigation Systems (RAINS), Bangalore, India, 2016, pp. 1-4, doi: 10.1109/RAINS.2016.7764406.

M. Indu and K. V. Kavitha ,A Varied Efficient Approach on Sketch Based Image Retrieval System,International Journal of Engineering and Advanced Technology (IJEAT)ISSN: 2249-8958 (Online), Volume-6 Issue-1, October 2016.

M. Indu and K. V. Kavitha, "Survey on sketch based image retrieval methods," 2016 International Conference on Circuit, Power and Computing Technologies (ICCPCT), Nagercoil, India, 2016, pp. 1-4, doi: 10.1109/ICCPCT.2016.7530359.

P. S. Raji and S. Surendran, "RDF approach on social network analysis," 2016 International Conference on Research Advances in Integrated Navigation Systems (RAINS), Bangalore, India, 2020, pp. 1-4, doi: 10.1109/RAINS.2016.7764416.

S. Asha, T. Harsha and B. Soniya, "Analysis on botnet detection techniques," 2016 International Conference on Research Advances in Integrated Navigation Systems (RAINS), Bangalore, India, 2016, pp. 1-4, doi: 10.1109/RAINS.2016.7764411.

Soja Salim,Survey on Software Vulnerability Prediction National conference on recent advances in computer engineering and information technology.

Surendran, S., Chithraprasad, D. & Kaimal, M.R. A scalable geometric algorithm for community detection from social networks with incremental update. Soc. Netw. Anal. Min. 6, 90 (2016). https://doi.org/10.1007/s13278-016-0399-9.

T. A. Xavier and R. Rejimoan, "Survey on various resource allocation strategies in cloud," 2016 International Conference on Circuit, Power and Computing Technologies (ICCPCT), Nagercoil, India, 2016, pp. 1-4, doi: 10.1109/ICCPCT.2016.7530351.

T. S. Greeshma and S. Surendren, "Mining communities in directed graph using wavelets," 2016 International Conference on Inventive Computation Technologies (ICICT), Coimbatore, India, 2016, pp. 1-4, doi: 10.1109/INVENTIVE.2016.7824807.

V. Preeja and A. H. Shahana, "A binary Krill Herd approach based feature selection for high dimensional data," 2016 International Conference on Inventive Computation Technologies (ICICT), Coimbatore, India, 2016, pp. 1-6, doi: 10.1109/INVENTIVE.2016.7824803.

W. Preethi and M. R. B. Rajan, "Survey on different strategies for software reliability prediction," 2016 International Conference on Circuit, Power and Computing Technologies (ICCPCT), Nagercoil, India, 2016, pp. 1-3, doi: 10.1109/ICCPCT.2016.7530124.

W. Preethi and M. R. Binu Rajan, "Web service QoS prediction strategies," 2016 International Conference on Research Advances in Integrated Navigation Systems (RAINS), Bangalore, India, 2016, pp. 1-4, doi: 10.1109/RAINS.2016.7764407.

2015

Deepak K L and S. Surendran, "Layering technique for visualizing social networks under force directed placement," 2015 International Conference on Computing and Network Communications (CoCoNet), Trivandrum, India, 2015, pp. 951-959, doi: 10.1109/CoCoNet.2015.7411306.

Sumithra V.S and S. Surendran, "A computational geometric approach for overlapping community (cover) detection in social network," 2015 International Conference on Computing and Network Communications (CoCoNet), Trivandrum, India, 2015, pp. 98- 105, doi: 10.1109/CoCoNet.2015.7411173.

Deepak K L, Subu Surendran, “A Comparative Study on Network Visualization Techniques”, International Journal of Computer and Advanced Engineering Research (IJCAER), Volume 02– Issue 02, APRIL 2015.

"Integillence Based Electric Vehicle Route Planning System", International Journal of Engineering and Advanced Technology(IJEAT),ISSN:2249-8958,Vol2,August2015.

"Survey on Intelligence based Electric Vehicle Route Planning System",International Journal of Computer and Advanced Engineering Research(IJCAER),Vol2,April 2015.

Adarsh S S and Kavitha K V, Computational approaches in Human Activity Recognition, International Journal of Computer and Advanced Engineering Research(IJCAER) ,Vol 2- Issue 2, April 2015.

Adarsh S S and Kavitha K V, Review on Aircraft security Monitoring Systems, International Journal of Technology Enhancements and Emerging research v0l3-Issue 7,pp 106-108, July 2015.

Adarsh S S and Kavitha K V, Online Human Detection using HOG and RSCBFD, International Journal of Engineering and Advanced Technology(IJEAT), Vol 4-Issue 6,pp 210-203,Aug 2015.

Ansila Henderson and Kavitha K V, Mechanisms for Scalable Image Searching: A Survey , International Journal of Computer and Advanced Engineering Research(IJCAER) ,Vol 2-Issue 2, April 2015.

Ansila Henderson and Kavitha K V,Scalable Image Search System, International Journal of Engineering and Advanced Technology(IJEAT), Vol 4-Issue 6,pp 197-200,Aug 2015.

Parvathi R , Syama R, Search as You Type in Database, International journal of Engineering and Advanced Technology(IJEAT) Volume 4 Issue 6 August 2015.

Parvathi R , Syama R, A Survey on Search as You Type in Database, International journal of Computer and Advanced Engineering Research( IJCAER), Volume 02 Issue 03 June 2015.

Soja Salim ,Achieving Efficient Ranked Multikeyword Search over Outsourced Cloud Data' 'International Journal of Engineering and Advanced Technology (IJEAT)', Volume-4 , August 2015.

Soja Salim,Review of Video Synopsis Approaches,International Journal of Technology Enhancements and Emerging Engineering Research, VOL 3, ISSUE 5 ISSN 2347-4289.

Soja Salim,Improved Approach to Customer Transaction Mining and PredictionInternational Journal of Scientific and Engineering Research (IJSER) - (ISSN 2229-5518).published in IJSER Volume 5, Issue 7 Edition.

Safeera N, Chitharanjan K ,Intelligence Based Electric Vehicle Route Planning System,International Journal of Engineering and Advanced Technology (IJEAT) ISSN: 2249-8958 (Online), Volume-4 Issue-6, August 2015.

2014

"Clustering using SimHash and Locality Sensitive Hashing in Hadoop-HDFS : An Infrastructure Extension",ISTE-ACEEE International Journal in Computer Science,Vol1,March2014.

"Survey on Different Types of Cloud Operating Systems", published in International Journal of Engineering Research and Technology(IJERT),Vol3,e-ISSN:2278-0181,April 2014.

"SIFT and DWT based Video Sequence Matching Method for Copy Detection", International Journal for Computer Applications(0975-8887)Vol99,No.13,Aug14.

"Rule Based Labeling and Max Entropy based Learning for Mining Wishes from User Reviews", International Journal of Applied Engineering Research(IJAER)ISSN 0973- 4562,Vol9,No.20(2014)pp.7699-7704.

Balram, Soniya, and M. Wilscy. "User Traffic Profile for Traffic Reduction and Effective Bot C&C Detection.", International Journal of Network Security, Vol.16, No.1, PP.37-43,Jan. 2014.

Subu Surendran, Anju S R, "A Study on Different Hand Gesture Recognition Techniques", International Journal of Engineering Research & Technology (IJERT), Vol. 3 Issue 4, April – 2014.

Anju S.R., Subu Surendran., "A Study on different Hand Gesture Recognition techniques", International Journal of Engineering Research and Technology, Volume No. 3, Issue 04, April 2014.

Surendran, Subu, D. Chitraprasad, and M. R. Kaimal. "Voronoi Diagram-Based Geometric Approach for Social Network Analysis." Computational Intelligence, Cyber Security and Computational Models. Springer India, 2014. 359-369.

Subu Surendran, Chitraprasad D and Kaimal M.R.. "A Novel Approach for Automatic Detection of Communities from Multi-Dimensional Social Network Data.", Advances in Computing, Communication and Information Science, Elsevier-2014.

Anju S.R., Subu Surendran, "Simple, Efficient and Cost Effective Technology for Fall Detection", Accepted in 5th International Conference on Advances in Computer Sciences, Software Solutions, E-Learning, and Information & Communication Technology-2014.

Jini Jacob, Subu Surendran, "Community detection in social network data based on geometric clustering", Communicated in 5th International Conference on Advances in Computer Sciences, Software Solutions, E-Learning, Information & Communication Technology (ACSEICT - 2014).

Prathibha R.C and Smt. Rejimol Robinson R.R, Classification of Flooding attacks using severity labelling based Machine Learning Techniques, International Journal of Applied Engineering Research (IJAER), pp. 7667-7678, Volume 9, Number 20 (2014).

Prathibha R C and Rejimol Robinson R R. Article: A Comparative Study of Defense Mechanisms against SYN Flooding Attack.International Journal of Computer Applications 98(18):16-21, July 2014.

Liya Thomas, Syama R, Survey on Mareduce Scheduling Algorithms, International journal of Computer Applications (0975-8887), Volume 93-No 23 June 2014.

Liya Thomas , Syama R, Ontology Based Video Annotation and Retrieval System, International journal of Emeging Technology and Advanced Engineering, Volume 4 Issue 7 July 2014.

Karthia Srendran, Syama R, A comparative study on various approaches to Anti Random Testing, International journal of Engineering, Research and Technology(IJERT), Volume 3 Issue 4 April 2014.

Fingerprint Privacy Protection Techniques: A Comparative Study', JCSE International Journal of Computer Sciences and Engineering Open Access, 30-07-2014.

Fingerprint Combinations for Privacy Protection: A Performance Analysis ' International Journal of Computer Applications ,Volume 103 – No.6, October 2014.

A Survey on Network Traffic Classification Techniques International Journal of Engineering Research & Technology (IJERT) Vol. 3 Issue 3, March – 2014.

Lekshmi R ,Binu Rajan M R ,Survey on Different Machine Learning Techniques for Software Effort Estimation,International Journal For Computer Applications.

Daniel, Akhila.Preeja V "A Novel Technique for Automatic Road Distress Detection and Analysis." (2014).

Reena P ,Binu Rajan M R ,A Novel Feature Subset Selection Algorithm for Software Defect Prediction,International Journal of Computer Applications (0975 – 8887) Volume 100 – No.17, August 2014.

Reena P ,Binu Rajan M R ,Software Defect Prediction System –Decision Tree Algorithm With Two Level Data Preprocessing,International Journal of Engineering Research & Technology (IJERT).

Thomas, Liya and R. Syama. "Ontology Based Video Annotation and Retrieval System." (2014).

Thomas, Liya and R. Syama,Survey on Mareduce Scheduling Algorithms,International Journal of Computer Applications (0975 – 8887) Volume 95– No.23, June 2014.

Chandra, V.S. ,Rejimoan R (2014). Maximum Entropy based Natural Language Interface for Relational Database.

Soniya, B., and M. Wilscy. "Fuzzy inference system based on entropy of traffic for bot detection on an endpoint host." Data Science & Engineering (ICDSE), 2014 International Conference on. IEEE, 2014.

2013

"Locality Sensitive Hashing based Clustering in Hadoop-HDFS: An Infrastructure Extension", Proceeding of IEEE International Conference on Circuit, Power and Computing Technologies(ICCPCT'13),pp.1243-1249,March2013.

"A Review on Hadoop-HDFS Infrastructure Extensions", Proceeding of IEEE Conference on Information and Communication Technology(ICT'13)pp.132-137,April 2013.

Devika K, Subu Surendran, "An Overview of Web Data Extraction Techniques", International Journal of Scientific Engineering and Technology, Volume 2, Issue 4, pp : 278 – 287, 2013.

Dhanyamol Antony, Subu Surendran, "Satellite Image Registration and Image Stitching" International Journal of Computer Science & Engineering Technology (IJCSET), Vol. 4 No. 02, 2013, pp: 62-66.

Neethu C V, Subu Surendran, Review of Spatial Clustering Methods, International Journal of Information Technology Infrastructure (IJITI), Volume 2, No. 2, March- April 2013, ISSN 2320 2629.

Neethu C V, Subu Surendran, A New Approach For Spatial Pattern Analysis, International Journal of Computational Engineering Research (IJCER),Volume 4, August 2013, ISSN 2250 3005.

Nishana S S and Subu Surendran, "Structure Preserving Embedding Based Face Recognition", International Journal of Engineering and Innovative Technology (IJEIT), Volume 3, Issue 1 (July 2013).

Nishana. S. S and Subu Surendran, " A Survey on Visual Search Reranking "International Journal of Computer Science and Engineering Technology, vol 4, No 5 , May 2013.

Nishana S S and Subu Surendran, "Graph Embedding and Dimensionality Reduction – A Survey", International Journal of Computer Science & Engineering Technology (IJCSET), Vol. 4 No. 01 Jan 2013, ISSN: 2229-3345.

Deepthi S, Subu Surendran, "Map Overlay and Zooming of Satellite Images", International Journal of Computer Science & Engineering Technology (IJCSET), Vol. 4, pp. 57-61, 2013.

Kavitha K V, Saritha R , VinodChandra S S, Computational Prediction of Continuous B- Cell Epitopes using Random Forest Classifier; Fourth International IEEE Conference on Computing, Communication and Networking Technologies (ICCCNT), pp 1-5,July 2013.

Kavitha K V, Saritha R . Support Vector Machine based Prognostication of Linear B-Cell Epitopes; 14th National Conference on Technological Trends, College of Engineering,Pp 43-46, Aug 2013.

Devika K Syama R, An overview of AUTOSAR multicore operating system Implementation, International journal of innovative research in Science Engineering And Technology, Volume 2 Issue 7 July 2013.

2012

B. Soniya and M. Wilscy, "Host-Based Bot Detection Using Destination White- Lists for User's Profile", Advances in Computing and Information Technology, Proceedings of the Fifth International Conference on Network Security & Applications (CNSA-2012), July 13-15, Springer, 2012.

Marfa M., Subu Surendran , Sabu M. Thampi and Radhakrishnan T, .CACHE BASED APPROACH FOR IMPROVING LOCATION BASED QUERY PROCESSING IN MOBILE ENVIRONMENT,Proc. International Conference on Security of Internet of Things (SECURIT'12), August 17-19, 2012, Kerala, India [ACM].

RR Rejimol Robinson, C Thomas,,Evaluation of mitigation methods for distributed denial of service attacks,Industrial Electronics and Applications (ICIEA), 2012 7th IEEE Conference on Industrial Electronics and Applications (ICIEA).

ViniVidyadharan and Subu Surendran, AUTOMATIC IMAGE REGISTRATION USING SIFT-NCC International conference on Advanced Computing & Communication Technologies for High Performance Applications 21st June 2012- 23rd June 2012 IC ACCTHPA 2012.

Merlin George, and Rejimol Robinson R.R, "A Novel Stereo Matching Technique for Radiometric Changes using Normalized Cross Correlation," Proc. IEEE International Conference on Data Science and Engineering, July 2012.

Merlin George and Rejimol Robinson R.R. Article: Real Time Stereo Matching for Radiometric Changes. IJCA Special Issue on Advanced Computing and Communication Technologies for HPC Applications ACCTHPCA (4):23-28, July 2012. Published by Foundation of Computer Science, New York, USA.

Rashmi S Nair,Rejimol Robinson R R,Evaluation of Image Compression algorithmsIJCA Special Issue on Advanced Computing and Communication Technologies for HPC Applications ACCTHPCA (4): July 2012. Published by Foundation of Computer Science, New York, USA.

Rashmi S Nair,Rejimol Robinson R R,Survey of Various Watermarking Techniques for Providing Authentication and Integrity, The First International Conference on Information Technology Convergence and Services (ITCS 2012).

Neethu C V, Rejimol Robinson R R, A Survey of Techniques for Answering Top- K Queries, Global Journal of Computer Science and Technology.

Jisha Krishnan, Rejimol Robinson R R,"Detection Of Rheumatoid Arthritis Affecting Lungs"Journal of current Engineering Research,Volume 3 ,issue 5,PP 39 -45.

"Cloud Based E-Governance System: A Survey", International Conference on Modeling, Optimization and Computing (ICMOC 2012), Procedia Engineering, Vol38,pp.3816-3823,2012.

"Secure Cloud Based Medical Data Exchange Using Attribute based Encryption" IJCA special issue on Advanced Computing and Communication Technologies for HPC applications (ACCTHPC (2):36-42, July 2012).Published by Foundation of Computer Science,Newyork,USA.

2011

Rashmi S Nair and Rejimol Robinson R R,Comparison Between Pixel Based And Block Based Watermarking,Proc. International Conference Networks, Intelligence and Computing Technologies, vol. 1, 99-103, December 2011.

Smitha K.K. and Subu Surendran, ROBUST SKIN TONE BASED IMAGE STEGANOGRAPHY USING INTEGER WAVELETS, International Conference On Network Intelligence And Computing Technologies (ICNICT)2011Volume : I, 177-180.

Marfa M. and Subu Surendran, LOCATION DEPENDENT QUERIES ON MOBILE ENVIRONMENT-SURVEY, Proc. International Conference on Networks, Intelligence and Computing Technologies (ICNICT 2011), 2011, 395-398.

2010

B. Soniya and M. Wilscy, "Naive Bayesian Classifier for Port Scan Detection" 1 st International Conference on Technological Trends, Nov. 25-27, 2010.

Soniya, B., and M. Wilscy. "Using entropy of traffic features to identify bot infected hosts." Intelligent Computational Systems (RAICS), 2013 IEEE Recent Advances in. IEEE, 2013.

2009

Rejimol Robinson R R, Vessel Segmentation Using 3D region Growing,ICOICT,2009,pp 211-214.

2008

B. Soniya and M. Wilscy, "Detection of TCP SYN Scanning Using Packet Counts and Neural Network," Signal Image Technology and Internet Based Systems 2008. SITIS '08. IEEE International Conference, pp.646-649, Nov. 30 2008-Dec. 3 2008.