Back close
Publications
Password reuse behavior: How massive online data breaches impacts personal data in web

Authors : Nithun M, Pal Soumajit, Ashok Aravind, Ajayan Aravind

Publisher : Springer Singapore

Publications
MalJs: Lexical Structural and Behavioral Analysis of Malicious JavaScripts Using Ensemble Classifier

Authors : Surendran K, Aravind Ashok, Srinath N, Kumar Ysudhir, Hrudya P

Publisher : Springer Singapore

Publications
Malsign: Threat analysis of signed and implicitly trusted malicious code

Authors : Pal Soumajit, Krishnan Manu R, Sankar AU Prem, Sasikala Parvathy

Publisher : IEEE

Publications
Evaluating shallow and deep networks for secure shell (ssh) traffic analysis

Authors : Vinayakumar R, Soman KP

Publisher : IEEE

Publications
Modified variational mode decomposition for power line interference removal in ECG signals

Authors : Mohan Neethu, Kumar Sachin, Soman KP, ; Poornachandran, P

Publisher : IJECE

Publications
Breach detection and mitigation of UAVs using deep neural network

Authors : Shijith N, Sujadevi VG, Dharmana Meher Madhu, P. Poornachandran

Publisher : 2017 Recent Developments in Control, Automation Power Engineering (RDCAPE),

Publications
Spoofing technique to counterfeit the GPS receiver on a drone

Authors : Shijith N, Sujadevi VG, Dharmana Meher Madhu, P. Poornachandran

Publisher : 2017 International Conference on Technological Advancements in Power and Energy ( TAP Energy)

Publications
Secure shell (ssh) traffic analysis with flow based features using shallow and deep networks

Authors : Vinayakumar R, Soman KP, Prof. Prabaharan Poornachandran

Publisher : 2017 International Conference on Advances in Computing Communications and Informatics (ICACCI) .

Publications
Deep encrypted text categorisation

Authors : Vinayakumar R, Soman KP

Publisher : IEEE

Publications
Deep Stance and Gender Detection in Tweets on Catalan Independence

Authors : Vinayakumar R, Sachin Kumar S, soman KP

Publisher : Ibereval

Admissions Apply Now