
Manesh ThankappanUniversitat Oberta de Catalunya | UOC
Manesh Thankappan
Cyber Security-Digital Forensic Science
Smart Home Cybersecurity
About
39
Publications
34,244
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
105
Citations
Citations since 2017
Introduction
Additional affiliations
October 2012 - September 2018
February 2006 - September 2012
Adi Shankara Institute of engineering and Technology
Position
- Professor (Assistant)
Description
- https://sites.google.com/site/maneshpadmayil/
Education
June 2009 - May 2011
June 2001 - June 2005
Mar Baselios Christian College of Engineering and Technology,Peermade
Field of study
- Computer Engineering
Publications
Publications (39)
Multi-Channel Man-in-the-Middle (MC-MitM) attack is an advanced form of MitM attack that can manipulate protected wireless communication between the Access Point (AP) and connected clients in a wireless network. Frontline MC-MitM attacks in recent years include Key Reinstallation Attacks (KRACK) reported in 2017 and the FragAttacks reported in 2021...
p>Multi-Channel Man-in-the-Middle (MitM) attacks are special MitM attacks capable of manipulating encrypted wireless frames between two legitimate endpoints. Since its inception in 2014, attackers have been targeting Wi-Fi networks to perform different attacks, such as cipher downgrades, denial of service, key reinstallation attacks (KRACK) in 2017...
Multi-Channel Man-in-the-Middle (MitM) attacks are special MitM attacks capable of manipulating encrypted wireless frames between two legitimate endpoints. Since its inception in 2014, attackers have been targeting Wi-Fi networks to perform different attacks, such as cipher downgrades, denial of service, key reinstallation attacks (KRACK) in 2017,...
p>One of the advanced Man-in-the-Middle (MitM) attacks is the Multi-Channel MitM (MC-MitM) attack, which is capable of manipulating encrypted wireless frames between clients and the Access Point (AP) in a Wireless LAN (WLAN). MC-MitM attacks are possible on any client no matter how the client authenticates with the AP. Key reinstallation attacks (K...
p>One of the advanced Man-in-the-Middle (MitM) attacks is the Multi-Channel MitM (MC-MitM) attack, which is capable of manipulating encrypted wireless frames between clients and the Access Point (AP) in a Wireless LAN (WLAN). MC-MitM attacks are possible on any client no matter how the client authenticates with the AP. Key reinstallation attacks (K...
Multi-Channel Man-in-the-Middle (MitM) attacks are special MitM attacks capable of manipulating encrypted Wi-Fi wireless frames between two legitimate endpoints. Since its inception in 2014, attackers have been targeting WPA Wi-Fi networks to perform different attacks, such as cipher downgrades, denial of service, key reinstallation Man-in-the-Midd...
In this era of information technology, email applications are the foremost and extensively used electronic communication technology. Emails are profusely used to exchange data and information using several frontend applications from various service providers by its users. Currently most of the email clients and service providers now moved to secure...
Email and instant messaging applications are foremost and extensively used electronic communication methods in this era of information explosion. These applications are generally used for exchange of information using several frontend applications from various service providers by its users. Almost all such communications are now secured using SSL...
In this era of information technology, email applications are the foremost and extensively used electronic communication technology. Emails are profusely used to exchange data and information using several frontend applications from various service providers by its users. Currently most of the email clients and service providers now moved to secure...
Wireless Sensor Networks (WSNs) are more inclined to attackers by outer sources. The total information must be secured to guarantee the uprightness and privacy. In sensor networks, the data collection and data accumulation are mainly based on the energy levels of the sensor hops. Due to the drain of the energy, at one particular point of time the s...
Fog computing is a model in which data, processing and applications are concentrated in devices at the network edge rather than existing almost entirely in the cloud. Fog Computing is a paradigm that extends Cloud Computing and services to the edge of the network, similar to Cloud, Fog provides data, compute, storage, and application services to en...
People have been utilizing Voice over Internet
Protocol (VoIP) in most of the conventional communication
facilities which has been of assistance in the enormous
attenuation of operating costs, as well as the promotion of nextgeneration
communication services-based IP. As an intimidating
upshot, cyber criminals have correspondingly started interject...
The deployment of Voice over Internet Protocol (VoIP) in place of traditional communication facilities has helped in huge reduction in operating costs, as well as enabled adoption of next generation communication services-based IP. At the same time, cyber criminals have also started intercepting environment and creating challenges for law enforceme...
Abstract—In this corporate world, the technology of Web
services has grown rapidly and its significance for the development
of web based applications gradually rises over time. The success of
Business to Business integration rely on finding novel partners and
their services in a global business environment. However, the
selection of the most suitab...
Image hashing technique constructs a short sequence from the image to represent its contents. This method proposes an image hash which is generated from Haralick and MOD-LBP features along with luminance and chrominance, which are computed from Zernike moments. Sender generates the hash from image features and attaches it with the image to be sent....
Denoising plays key role in the field of medical images. Reliable estimation and noise removal is very important for accurate diagnosis of the disease. This should be done in such a way that original resolution is retained while maintaining the valuable features. Multi-coil Magnetic Resonance Image(MRI) trails nonstationary noise following Rician a...
—In this corporate world, the technology of Web
services has grown rapidly and its significance for the development
of web based applications gradually rises over time. The success of
Business to Business integration rely on finding novel partners and
their services in a global business environment. However, the
selection of the most suitable Web s...
A book on C programming and Data structures conveys a disciplined approach for effective problem solving
techniques and proper understanding of concepts in C programming and data structures. This book assumes
a general purpose knowledge of C programming and data structures and is intended for use in either a first
or second programming course. It i...
Skype is a secure internet telephonic application which establishes
connection between its clients through a peer-to-peer architecture. The connection
between Skype client to its server and other clients uses an encrypted channel that
uses Transport layer Security (TLS) protocol. At the same time, connection
between Skype client and Public Switch t...
The medical imaging technology plays a crucial role in visualization and analysis of the human body with unprecedented accuracy and resolution. Analyzing the multimodal for disease-specific information across patients can reveal important similarities between patients, hence their underlying diseases and potential treatments. Classification of MR b...
Forensic investigation in computer networks is the process of capturing information that moves over a network and trying to gather some forensic information from it and also called network forensics. It is an art of discovery and retrieval of information about network events. Present networks carry large volume of data as network packets, so managi...
Web applications are becoming an important part of our daily life. So attacks against them also increases rapidly. Of these attacks, a major role is held by SQL Injection Attacks (SQLIA). This attack is launched through specially crafted user inputs and target web applications that used backend databases. Characteristics feature of this attack is t...
Nowadays a large amount of personal and business transactions are done electronically through secured internet communication with HTTPS Protocol. The internet offers computer users access to a wealth of information and reaches in to the heart of many organizations. In this context, there are many possibilities for having different malicious activit...
Web applications are becoming an important part of our daily life. So attacks against them also increasesrapidly. Of these attacks, a major role is held by SQL injection attacks (SQLIA). This paper proposes anew method for preventing SQL injection attacks in JSP web applications. The basic idea is to checkbefore execution, the intended structure of...
Web applications are becoming an important part of our daily life. So attacks against them also increases rapidly. Of these attacks, a major role is held by SQL injection attacks (SQLIA). This paper proposes a new method for preventing SQL injection attacks in JSP web applications. The basic idea is to check before execution, the intended structure...
Network packet analysis and reconstruction of network sessions are more sophisticated processes in any network forensic and analysis system. Here we introduce an integrated technique which can be used for inspecting, reordering and reconstructing the contents of packets in a network session as part of forensic investigation. Network analysts should...
Questions
Questions (3)