Follow
Dr. Ajit Kumar
Title
Cited by
Cited by
Year
A learning model to detect maliciousness of portable executable using integrated feature set
A Kumar, KS Kuppusamy, G Aghila
Journal of King Saud University-Computer and Information Sciences 31 (2 …, 2019
1312019
Temporal sentiment analysis and causal rules extraction from tweets for event prediction
PG Preethi, V Uma
Procedia Computer Science 48, 84-89, 2015
692015
FAMOUS: Forensic Analysis of MObile devices Using Scoring of application permissions
A Kumar, KS Kuppusamy, G Aghila
Future Generation Computer Systems 83, 158-172, 2018
432018
Machine learning based malware classification for Android applications using multimodal image representations
A Kumar, KP Sagar, KS Kuppusamy, G Aghila
2016 10th International Conference on Intelligent Systems and Control (ISCO …, 2016
432016
Connect the dots: accessibility, readability and site ranking–An investigation with reference to top ranked websites of Government of India
A Ismail, KS Kuppusamy, A Kumar, PK Ojha
Journal of King Saud University-Computer and Information Sciences 31 (4 …, 2019
352019
AI-assisted Computer Network Operations testbed for Nature-Inspired Cyber Security based adaptive defense simulation and analysis
SK Shandilya, S Upadhyay, A Kumar, AK Nagar
Future Generation Computer Systems 127, 297-308, 2022
282022
Machine Learning Algorithm for Detection of False Data Injection Attack in Power System
A Kumar, N Saxena, BJ Choi
2021 International Conference on Information Networking (ICOIN), 385-390, 2021
192021
Applications of cognitive internet of medical things in modern healthcare
MA Jabbar, SK Shandilya, A Kumar, S Shandilya
Computers and Electrical Engineering 102, 108276, 2022
142022
Internet of Things applications placement to minimize latency in multi-tier fog computing framework
P Maiti, B Sahoo, AK Turuk, A Kumar, BJ Choi
ICT Express 8 (2), 166-173, 2022
142022
Improving detection of false data injection attacks using machine learning with feature selection and oversampling
A Kumar, N Saxena, S Jung, BJ Choi
Energies 15 (1), 212, 2021
132021
A source location privacy preservation scheme in WSN-assisted IoT network by randomized ring and confounding transmission
AK Anurag Shukla, Deepak Singh, Mohit Sajwan,Abhishek Verma
Wireless Networks, https://doi.org/10.1007/s11276-021-02876, 2022
9*2022
SLP-RRFPR: a source location privacy protection scheme based on random ring and limited hop fake packet routing for wireless sensor networks
MP Anurag Shukla, Deepak Singh , Mohit Sajwan ,Malay Kumar ,Divya Kumari ...
Multimedia Tools and Applications, 2022
82022
PACER: Platform for Android Malware Classification, Performance Evaluation and Threat Reporting
A Kumar, V Agarwal, SK Shandilya, A Shalaginov, S Upadhyay, B Yadav
Future Internet 12 (4), 66, 2020
82020
Usability evaluation of active anti-phishing browser extensions for persons with visual impairments
G Sonowal, KS Kuppusamy, A Kumar
2017 4th International Conference on Advanced Computing and Communication …, 2017
82017
Malware Attacks: Dimensions, Impact, and Defenses
A Kumar, BJ Choi, KS Kuppusamy, G Aghila
Advances in Nature-Inspired Cyber Security and Resilience, 157-179, 2021
72021
A Malicious Attacks and Defense Techniques on Android-Based Smartphone Platform
AK MA Rahim Khan, RC Tripathi
International Journal of Innovative Technology and Exploring Engineering …, 2019
7*2019
Introduction to Federated Learning
M Pandey, S Pandey, A Kumar
Federated Learning for IoT Applications, 1-17, 2022
62022
A Framework for Malware Detection with Static Features using Machine Learning Algorithms
A Kumar
Department of Computer Science, Pondicherry University, 2017
62017
Modified Firefly Optimization Algorithm-Based IDS for Nature-Inspired Cybersecurity
SK Shandilya, BJ Choi, A Kumar, S Upadhyay
Processes 11 (3), 715, 2023
42023
Benchmarking Machine Learning based Detection of Cyber Attacks for Critical Infrastructure
A Kumar, BJ Choi
2022 International Conference on Information Networking (ICOIN), 24-29, 2022
42022
The system can't perform the operation now. Try again later.
Articles 1–20