Back close
Publications
Deep learning approach for intelligent intrusion detection system

Authors : Vinayakumar Ravi, Alazab Mamoun, Soman KP, Al-Nemrat Ameer, Venkatraman Sitalakshmi

Publisher : IEEE

Publications
A comparative analysis of deep learning approaches for network intrusion detection systems (N-IDSs)

Authors : Soman KP, Vinayakumar R

Publisher : Journal of Digital Crime and Forensics (IJDCF)

Publications
Application of deep learning architectures for cyber security Cybersecurity and Secure Information System

Authors : Vinayakumar R, Soman KP, Akarsh S

Publisher : Springer Cham

Publications
Modern methods for signal analysis and its applications Recent advances in computational intelligence

Authors : Soman KP, Sachin Kumar S, Neethu Mohan

Publisher : Springer Cham

Publications
A Compendium on Network and Host based Intrusion Detection Systems

Authors : KP Soman, Vigneswaran, Rahul, Poornachandran, Prabaharan

Publisher : Lecture Notes in Electrical Engineering

Publications
A compendium on network and host based intrusion detection systems

Authors : Dr. Soman K. P., Vigneswaran, Rahul, Poornachandran, Prabaharan;

Publisher : Lecture Notes in Electrical Engineering

Publications
A deep-dive on machine learning for cyber security use cases Machine Learning for Computer and Cyber Security

Authors : Vinayakumar R, Soman KP, Menon Vijay Krishna

Publisher : CRC Press

Publications
Facile pH-sensitive optical detection of pathogenic bacteria and cell imaging using multi-emissive nitrogen-doped carbon dots

Authors : Abhishek Pathak, Parvathy Venugopal, Punathil Vasu Suneesh, Dr. Satheesh Babu T. G.

Publisher : Microchemical Journal

Publications
Dhot-repository and classification of offensive tweets in the hindi language Procedia Computer Science 171

Authors : Jha Vikas Kumar, Hrudya P, Vinu PN, Vijayan Vishnu

Publisher : Elsevier

Publications
Cost-sensitive deep learning based framework for handling multiclass imbalanced dga detection

Authors : Vinayakumar R, Soman KP, Deepdga-minet

Publisher : Handbook of Computer Networks and Cyber Security

Admissions Apply Now