Detection and filtering of collaborative malicious users in reputation system using quality repository approach HK Jnanamurthy, S Singh 2013 International Conference on Advances in Computing, Communications and …, 2013 | 20 | 2013 |
Discovery of maximal frequent item sets using subset creation HK Jnanamurthy, HV Vishesh, V Jain, P Kumar, RM Pai International Journal of Data Mining & Knowledge Management Process 3 (1), 27, 2013 | 16 | 2013 |
Modelling and verification of extensible authentication protocol using spin model checker MS Hegde, HK Jnanamurthy, S Singh International Journal of Network Security & Its Applications 4 (6), 81, 2012 | 11 | 2012 |
Threat analysis and malicious user detection in reputation systems using mean bisector analysis and cosine similarity (MBACS) HK Jnanamurthy, C Warty, S Singh 2013 Annual IEEE India Conference (INDICON), 1-6, 2013 | 10 | 2013 |
Analysis of Industrial Control System Software to Detect Semantic Clones HK Jnanamurthy, R Jetley, F Henskens, D Paul, M Wallis, SD Sudarsan | 7* | |
Clone detection in model-based development using formal methods to enhance performance in software development H Jnanamurthy, F Henskens, D Paul, M Wallis 2018 3rd International Conference for Convergence in Technology (I2CT), 1-8, 2018 | 5 | 2018 |
Verification of interactive automated air traffic control system in a model driven approach HK Jnanamurthy, F Henskens, D Paul 2016 2nd International Conference on Contemporary Computing and Informatics …, 2016 | 4 | 2016 |
Formal verification of the Extensible Authentication Protocol using SPIN MS Hegde, HK Jnanamurthy, S Singh Proceedings of the Second International Conference on Computational Science …, 2012 | 4 | 2012 |
Top Down Approach to find Maximal Frequent Item Sets using Subset Creation H Jnanamurthy, HV Vishesh, PK Vishruth Jain, RM Pai Comput. Sci. Inf. Technol.(CS IT), 445-452, 2012 | 2 | 2012 |
Formal specification at model-level of model-driven engineering using modelling techniques HK Jnanamurthy, F Henskens, D Paul, M Wallis International Journal of Computer Applications in Technology 67 (4), 340-350, 2021 | 1 | 2021 |
Multi-level analysis of IEC 61131-3 languages to detect clones HK Jnanamurthy, R Jetley, F Henskens, D Paul, M Wallis, SD Sudarsan International Journal of Computer Applications in Technology 63 (4), 286-299, 2020 | 1 | 2020 |
Formal Modelling and Verification of Software Defined Network V Varadharajan arXiv preprint arXiv:2004.04425, 2020 | | 2020 |
Formal Modelling and Verification of Software Defined Network. HK Jnanamurthy, V Varadharajan CoRR, 2020 | | 2020 |
Formal Modelling and Analysis of Software Defined Networks HK Jnanamurthy, V Varadharajan | | 2019 |
Model-driven engineering to enhance the reliability of software development by verifying system properties and detecting clones J Hogavanaghatta Kumaraswamy University of Newcastle, 2019 | | 2019 |
Analysis of industrial control system software to detect semantic clones J HK, R Jetley, F Henskens, D Paul, M Wallis, S SD Institute of Electrical and Electronics Engineers (IEEE), 2019 | | 2019 |
Clone detection in model-based development using formal methods to enhance performance in software development J Hogavanaghatta Kumaraswamy, F Henskens, D Paul, M Wallis Institute of Electrical and Electronics Engineers (IEEE), 2018 | | 2018 |
Top Down Approach to find Maximal Frequent Item Sets using Subset Creation V Jain, P Kumar, RM Pai arXiv preprint arXiv:1210.8229, 2012 | | 2012 |