Publications




[1]       A.Sankara Narayanan, M.Syed Khaja Mohideen, and M. Chithik Raja: IPv6 Tunneling Over IPv4,International Journal of Computer Science Issues (IJCSI), Vol. 9, Issue 2, No 2, March 2012, pp. 599-604, ISSN (Online): 1694-0814, Mauritius. (Impact Factor 0.242)

[2]       A.Sankara Narayanan, and M.Mohamed Ashik: Malware Incident Handling, UACEE International Journal of Advances in Computer Networks and Security (UACEE-IJCNS), Vol.2, Issue 1, 25 April 2012, pp. 7-12, ISSN (Online): 2250-3757, India.

[3]       A.Sankara Narayanan, M.Syed Khaja Mohideen, and M.Mohamed Ashik: Patch Management and Analysing Strategy for Microsoft Bulletin Security, International Journal of Computer Engineering &Technology (IJCET), Vol.3,Issue 1, Jan-Jun 2012, pp. 250-257, ISSN (Online): 0976-6375, India. (Impact Factor 1.0425)

[4]        A.Sankara Narayanan, and M.Mohamed Ashik, Remote File Inclusion and Countermeasures: International Journal of Computer Science and Information Security (IJCSIS), Vol. 10, No.4, April 2012, pp. 46-49, ISSN (Online): 1947-5500, U.S.

[5]        A.Sankara Narayanan, M.Mohamed Ashik., and N. Mohamed Yasin, Homograph Attack and Confusability: Research Journal of Computer System Engineering (RJCSE), Vol. 03, Issue 01, Jan-Apr 2012, pp. 333-336, ISSN (Online): 2230-8563, India.

[6]        A.Sankara Narayanan, and M.Mohamed Ashik, Open Source Tools for Security Assessment: International Journal of Advanced Research in Computer Science and Electronics Engineering (IJARCSEE), Vol. 01, No.3, May 2012, pp. 21-26, ISSN (Online): 2277-9043, India.

[7]        A.Sankara Narayanan, Bypassing Antivirus with Crypters: International Journal of Computational Intelligence and Information Security (IJCIIS), Vol. 03, No.5, May 2012, pp. 18-24, ISSN (Online): 1837-7823, Australia. http://www.scribd.com/doc/95379416/Paper-3-Bypassing-Antivirus-With-Crypters

[8]        A.Sankara Narayanan, A Study on Overview of Steganography with Specific Tools: International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), Vol.01, Issue 04, June 2012, pp. 16-21, ISSN (Online): 2278-1323, India. http://ijarcet.org/index.php/ijarcet/article/view/93

[9]        A.Sankara Narayanan, Chrome RLZ and Unknown Features: International Journal of Computer Applications (IJCA), Vol.48, No.16, June 2012, pp. 49-52, ISBN (Online): 973-93-80869-10-5, U.S. (Impact Factor 0.814) http://research.ijcaonline.org/volume48/number16/pxc3880510.pdf

[10]      A.Sankara Narayanan, QR Codes and Security Solutions: International Journal of Computer Science and Telecommunications (IJCST), Vol.03, Issue 07, July 2012, pp. 69-72, ISSN (Online): 2047-3338,U.K. http://www.ijcst.org/Volume3/Issue7/p13_3_7.pdf

 [11]     A.Sankara Narayanan, and M.Mohamed Ashik, Computer Forensic First Responder Tools: IEEE’s Xplore Digital Library .

[12]      A.Sankara Narayanan, Clickjacking Vulnerability and Countermeasures: International Journal of Applied Information Systems (IJAIS), Vol.04, No.07, Dec 2012, pp. 07-10, ISSN (Online): 2249-0868, U.S. http://www.ijais.org/archives/volume4/number7/368-0793



1 comment: