Publications

Export 9 results:
Sort by: Author Title [ Type  (Asc)] Year
Book Chapter
Anu Mary Chacko, Alfredo Cuzzocrea, MKSD.  2018.  Automatic Big Data Provenance Capture at Middleware Level in Advanced Big Data Frameworks . Connected Environments for the Internet of Things Challenges and Solutions . : Computer Communications and Network (CCN) series
Conference Paper
Ghanwat, P, Chacko AM.  2017.   Improved Personalized Recommendation System with better user experience, 15 Friday. 6th International Conference on Advances in Computing Communications and Informatics. , Manipal
K, A, Zachariah R, Yousef MS, Chacko AM.  2018.  Android Malware Detection a Survey, 21 Dec. IEEE International Conference on Circuits and Systems (ICCS 2017). , Trivandrum
Chacko, A.M., BKAMSD.  2015.  Capturing provenance for big data analytics done using SQL interface, 4-6 Dec. 2015 IEEE UP Section Conference on Electrical Computer and Electronics, UPCON 2015 . , IIIT Allahabad
Chacko, AM, Kumar S, Pathari V.  2013.  Generalized architecture to capture end to end provenance in a system , 18 Dec. International Conference on IT Convergence and Security (ICITCS) . , Macau
Conference Proceedings
P., B, A.M. C, S.D. M.  2014.  Making an Application Provenance-Aware through UML – A General Scheme. Recent Trends in Computer Networks and Distributed Systems Security. SNDS 2014. . :451-460.: Communications in Computer and Information Science, vol 420. Springer, Berlin, Heidelberg
Chacko A.M., Fairooz M., MKSD.  2016.  Provenance-aware NoSQL databases . Security in Computing and Communications. SSCC 2016. Communications in Computer and Information Science. 625, India: Springer Singapore
Journal Article
R, AD, Chacko AM, Pathari V.  2015.  Implementing Message Integrity in Mobile Phones (Android platform) Using Identity Based Encryption. International Journal of Applied Engineering Research (IJAER). 10(55):.2623-2627.
Anu Mary Chacko, Anish Gupta, MMKSSD.  2017.  Improving execution speed of incremental runs of MapReduce using provenance. International Journal of Big Data Intelligence. 4(3):186-194.