default search action
Balachandra Muniyal
Person information
- affiliation: Manipal Academy of Higher Education, Manipal Institute of Technology, Department of Information and Communication Technology, India
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j13]S. Divya, K. V. Prema, Balachandra Muniyal:
Data Privacy Technique for the Data Transmitted in Wireless Body Area Network. IEEE Access 12: 75208-75219 (2024) - [j12]Nisha P. Shetty, Balachandra Muniyal, Aman Priyanshu, Dhruthi Kumar, Leander Melroy Maben, Yash Agrawal, Ruchita Natarajan, Shravya Gunda, Nitish Gupta:
Protecting Your Online Persona: A Preferential Selective Encryption Approach for Enhanced Privacy in Tweets, Images, Memes, and Metadata. IEEE Access 12: 86403-86424 (2024) - 2023
- [j11]Chetana Pujari, Balachandra Muniyal, C. B. Chandrakala, Anirudha Rao, Vasudeva Sadiname, Muttukrishnan Rajarajan:
Identity resilience in the digital health ecosystem: A key recovery-enabled framework. Comput. Biol. Medicine 167: 107702 (2023) - [j10]S. Divya, K. V. Prema, Balachandra Muniyal:
Efficient Key Generation Techniques for Wireless Body Area Network. Int. J. Wirel. Inf. Networks 30(3): 270-281 (2023) - [j9]Nisha P. Shetty, Balachandra Muniyal, Aman Priyanshu, Vedant Rishi Das:
FedBully: A Cross-Device Federated Approach for Privacy Enabled Cyber Bullying Detection using Sentence Encoders. J. Cyber Secur. Mobil. 12(4): 465-496 (2023) - [j8]Nisha P. Shetty, Balachandra Muniyal, Daita Ravi Teja, Leander Melroy Maben, Tummala Srinag Vinil:
Identity - Attribute Inference in Online Social Network(s) Using Bio-Inspired Algorithms and Machine Learning Approaches. J. Mobile Multimedia 19(3): 645-678 (2023) - 2022
- [j7]Josy Elsa Varghese, Balachandra Muniyal, Aman Priyanshu:
Finding an elite feature for (D)DoS fast detection - Mixed methods research. Comput. Electr. Eng. 98: 107705 (2022) - [j6]Nisha P. Shetty, Balachandra Muniyal, Niraj Yagnik, Tulika Banerjee, Angad Singh:
A Privacy Preserving Framework to Protect Sensitive Data in Online Social Networks. J. Cyber Secur. Mobil. 11(4): 575-600 (2022) - [c14]S. Divya, K. V. Prema, Balachandra Muniyal:
Modified Blowfish Encryption Algorithm for Wireless Body Area Network. ATIS 2022: 98-108 - [c13]G. K. Sudhina Kumar, K. Krishna Prakasha, Balachandra Muniyal:
Intrusion Detection Using Federated Learning. ATIS 2022: 143-151 - 2021
- [j5]Josy Elsa Varghese, Balachandra Muniyal:
An Efficient IDS Framework for DDoS Attacks in SDN Environment. IEEE Access 9: 69680-69699 (2021) - [j4]Manjula C. Belavagi, Balachandra Muniyal:
Improved Intrusion Detection System using Quantal Response Equilibrium-based Game Model and Rule-based Classification. Int. J. Commun. Networks Inf. Secur. 13(1) (2021) - [c12]Balachandra Muniyal, Sumith N., Sriraksha Nayak, Namratha Prabhu:
Risk Prediction in Real Estate Investment to Protect Against Asset Bubbles. ATIS 2021: 37-52 - 2020
- [j3]S. N. Muralikrishna, Balachandra Muniyal, U. Dinesh Acharya, K. Raghurama Holla:
Enhanced Human Action Recognition Using Fusion of Skeletal Joint Dynamics and Structural Features. J. Robotics 2020: 3096858:1-3096858:16 (2020)
2010 – 2019
- 2019
- [j2]Krishna Prakasha, Balachandra Muniyal, Vasundhara Acharya:
Automated User Authentication in Wireless Public Key Infrastructure for Mobile Devices Using Aadhar Card. IEEE Access 7: 17981-18007 (2019) - 2018
- [j1]Krishna Prakasha, Balachandra Muniyal, Vasundhara Acharya, Suyash Krishna, Smriti Prakash:
Efficient digital certificate verification in wireless public key infrastructure using enhanced certificate revocation list. Inf. Secur. J. A Glob. Perspect. 27(4): 214-229 (2018) - [c11]Krishna Prakasha, Pratheeksha Gowda, Vasundhara Acharya, Balachandra Muniyal, Mayank Khandelwal:
Enhanced Authentication and Key Agreement Mechanism Using PKI. ATIS 2018: 40-51 - [c10]Abhilash M. Joshi, Balachandra Muniyal:
Authentication Using Text and Graphical Password. ICACCI 2018: 381-386 - [c9]B. P. Swathi, Balachandra Muniyal:
Query Quality Prediction on Source Code Base Dataset: A Comparative Study. ICACCI 2018: 1115-1119 - [c8]Akshay K. C., Balachandra Muniyal:
Analysis of Data Hiding Methods in Image Steganography. ICACCI 2018: 2023-2027 - [c7]Josy Elsa Varghese, Balachandra Muniyal:
A Comparative Analysis of Different Soft Computing Techniques for Intrusion Detection System. SSCC 2018: 563-577 - [c6]Krishna Prakasha, Rachana Kalkur, Vasundhara Acharya, Balachandra Muniyal, Mayank Khandelwal:
A Novel Secret Key Exchange Mechanism for Secure Communication and Data Transfer in Symmetric Cryptosystems. SSCC 2018: 578-590 - [c5]Akshay K. C., Balachandra Muniyal:
Analysis of Execution Time for Encryption During Data Integrity Check in Cloud Environment. SSCC 2018: 617-627 - 2017
- [c4]Josy Elsa Varghese, Balachandra Muniyal:
An investigation of classification algorithms for intrusion detection system - A quantitative approach. ICACCI 2017: 2045-2051 - [c3]Manjula C. Belavagi, Balachandra Muniyal:
Multi Class Machine Learning Algorithms for Intrusion Detection - A Performance Study. SSCC 2017: 170-178 - 2014
- [c2]Akshay K. C., Ashalatha Nayak, Balachandra Muniyal:
Modeling data races using UML/MARTE profile. ICACCI 2014: 238-244 - 2012
- [i2]Balachandra Muniyal, K. V. Prema, Mamatha Balachandra:
Comparison of Certificate Policies for Merging Public Key Infrastructures during Merger and Acquisition of Companies. CoRR abs/1210.2934 (2012) - [i1]Balachandra Muniyal, Krishna Prakash, Shashank Sharma:
Wireless Public key Infrastructure for Mobile Phones. CoRR abs/1212.2563 (2012) - 2010
- [c1]Balachandra Muniyal, K. V. Prema:
Design and Implementation of an Efficient Method for Certificate Path Verification in Hierarchical Public Key Infrastructures. BAIP 2010: 320-324
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:22 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint