Back close
Publications
Condition monitoring in roller bearings using cyclostationary

Publisher :International Symposium on Women in Computing and Informatics

Publications
Internet of Vulnerable Things (IoVT): Detecting Vulnerable SOHO Routers

Citation : P. Poornachandran, Sreeram, R., Krishnan, M. R., Pal, S., Sankar, A. U. Prem, and Ashok, A., “Inte ...

Publisher :14th International Conference on Information Technology, ICIT

Publications
Development of SCADA automated 33kV substation model as testing platform

Citation : S. M. Ramesh, Smrithi, S., AkhilRajkoti, P., Dr. P. Kanakasabapathy, A.N. Ravishankar, Pal, S., and ...

Publisher :IEEE International Conference on Industrial Instrumentation and Control (ICIC 2015)

Publications
Detecting the network attack vectors on SCADA systems

Citation : R. S. Ramachandruni and Poornachandran, P., “Detecting the network attack vectors on SCADA systems ...

Publisher :International Conference on Advances in Computing, Communications and Informatics, ICACCI

Publications
A lexical approach for classifying malicious URLs

Publisher :International Conference on High Performance Computing & Simulation (HPCS)

Publications
Automatic modulation classification using convolutional neural network

Citation : A. S and Dr. Soman K. P., “Automatic Modulation Classification using Convolutional Neural Network ...

Publisher :International Conference on Artificial Intelligence and Evolutionary Computations in Engineering Systems

Publications
Text/Image Region Separation for Document Layout Detection of Old Document Images using Non-linear Diffusion and Level Set Procedia Computer Science

Citation : S. S. Kumar, Rajendran, P., Prabaharan, P., Dr. Soman K. P., J., M., and J., J., “Text/Image Regio ...

Publisher :Procedia Computer Science, Elsevier.

Publications
A distributed approach for predicting malicious activities in a network from a streaming data with support vector machine and explicit random feature mapping

Citation : P. Poornachandran, B. Premjith, and Dr. Soman K. P., “A distributed approach for predicting malici ...

Publisher :IIOAB Journal.

Admissions Apply Now