Survey on malware detection methods P Vinod, R Jaipur, V Laxmi, M Gaur Proceedings of the 3rd Hackers’ Workshop on computer and internet security …, 2009 | 236 | 2009 |
Medusa: Metamorphic malware dynamic analysis usingsignature from api VP Nair, H Jain, YK Golecha, MS Gaur, V Laxmi Proceedings of the 3rd International Conference on Security of Information …, 2010 | 119 | 2010 |
A machine learning based approach to detect malicious android apps using discriminant system calls P Vinod, A Zemmari, M Conti Future Generation Computer Systems 94, 333-350, 2019 | 68 | 2019 |
Mining control flow graph as API call-grams to detect portable executable malware P Faruki, V Laxmi, MS Gaur, P Vinod Proceedings of the Fifth International Conference on Security of Information …, 2012 | 63 | 2012 |
Droid permission miner: Mining prominent permissions for Android malware analysis AM Aswini, P Vinod The Fifth International Conference on the Applications of Digital …, 2014 | 52 | 2014 |
Scheduling distributed energy resource operation and daily power consumption for a smart building to optimize economic and environmental parameters Z Pooranian, JH Abawajy, V P, M Conti Energies 11 (6), 1348, 2018 | 51 | 2018 |
Identification of malicious android app using manifest and opcode features MV Varsha, P Vinod, KA Dhanya Journal of Computer Virology and Hacking Techniques 13, 125-138, 2017 | 47 | 2017 |
MOMENTUM: metamorphic malware exploration techniques using MSA signatures P Vinod, V Laxmi, MS Gaur, G Chauhan 2012 International Conference on Innovations in Information Technology (IIT …, 2012 | 47 | 2012 |
Malware detection employed by visualization and deep neural network A Pinhero, ML Anupama, P Vinod, CA Visaggio, N Aneesh, S Abhijith, ... Computers & Security 105, 102247, 2021 | 42 | 2021 |
A machine learning approach for linux malware detection KA Asmitha, P Vinod 2014 international conference on issues and challenges in intelligent …, 2014 | 42 | 2014 |
SysDroid: a dynamic ML-based android malware analyzer using system call traces A Ananya, A Aswathy, TR Amal, PG Swathy, P Vinod, S Mohammad Cluster Computing 23 (4), 2789-2808, 2020 | 39 | 2020 |
Deep Learning Techniques for Android Botnet Detection SY Yerima, MK Alzaylaee, A Shajan, V P Electronics 10 10 (4), 519, 2021 | 32 | 2021 |
Static CFG analyzer for metamorphic Malware code P Vinod, V Laxmi, MS Gaur, G Kumar, YS Chundawat Proceedings of the 2nd International Conference on Security of Information …, 2009 | 29 | 2009 |
Can machine learning model with static features be fooled: an adversarial machine learning approach R Taheri, R Javidan, M Shojafar, P Vinod, M Conti Cluster computing 23, 3233-3253, 2020 | 26 | 2020 |
Secure brain-to-brain communication with edge computing for assisting post-stroke paralyzed patients S Rajesh, V Paul, VG Menon, S Jacob, P Vinod IEEE Internet of Things Journal 7 (4), 2531-2538, 2019 | 25 | 2019 |
Unknown metamorphic malware detection: Modelling with fewer relevant features and robust feature selection techniques J Kuriakose, P Vinod IAENG International Journal of Computer Science 42 (2), 139-151, 2015 | 24 | 2015 |
Behavioural detection with API call-grams to identify malicious PE files. P Faruki, V Laxmi, MS Gaur, P Vinod SECURIT, 85-91, 2012 | 23 | 2012 |
Ranked linear discriminant analysis features for metamorphic malware detection J Kuriakose, P Vinod 2014 IEEE International Advance Computing Conference (IACC), 112-117, 2014 | 22 | 2014 |
Detection of Tor traffic using deep learning D Sarkar, P Vinod, SY Yerima 17th ACS/IEEE International Conference on Computer Systems and Applications …, 2020 | 21 | 2020 |
Multiclass emotion extraction from sentences B Thomas, P Vinod, KA Dhanya International Journal of Scientific & Engineering Research 5 (2), 12-15, 2014 | 21 | 2014 |