Back close
Publications
An efficient classification model for detecting advanced persistent threat

Authors : Chandran Saranya, Hrudya P

Publisher : IEEE

Publications
Internet of Vulnerable Things (IoVT): Detecting Vulnerable SOHO Routers

Authors : Sreeram R, Krishnan Manu R, Pal Soumajit, Sankar AU Prem, Ashok Aravind

Publisher : 14th International Conference on Information Technology, ICIT

Publications
A lexical approach for classifying malicious URLs

Authors : Darling Michael, Heileman Greg, Gressel Gilad, Ashok Aravind

Publisher : International Conference on High Performance Computing & Simulation (HPCS)

Publications
Detecting the network attack vectors on SCADA systems

Authors : R. S. Ramachandruni , Poornachandran, P

Publisher : International Conference on Advances in Computing, Communications and Informatics, ICACCI

Publications
Effectiveness of Email Address Obfuscation on Internet Innovations in Computer Science and Engineering

Authors : Raj Deepak, Pal Soumajit, Ashok Aravind

Publisher : Springer Singapore

Publications
Secure shell (ssh) traffic analysis with flow based features using shallow and deep networks

Authors : Vinayakumar R, Soman KP, Prof. Prabaharan Poornachandran

Publisher : 2017 International Conference on Advances in Computing Communications and Informatics (ICACCI) .

Publications
Long short-term memory based operation log anomaly detection

Authors : Vinayakumar R, Soman KP

Publisher : IEEE

Publications
Applying convolutional neural network for network intrusion detection

Authors : Vinayakumar R, Soman KP

Publisher : IEEE

Publications
Deep emotion intensities in tweets

Authors : Vinayakumar R, Premjith B, Kumar Sachin, Soman KP

Publisher : Deepcybernet at emoint

Admissions Apply Now