Follow
Vinod P
Title
Cited by
Cited by
Year
Survey on malware detection methods
P Vinod, R Jaipur, V Laxmi, M Gaur
Proceedings of the 3rd Hackers’ Workshop on computer and internet security …, 2009
2502009
Medusa: Metamorphic malware dynamic analysis usingsignature from api
VP Nair, H Jain, YK Golecha, MS Gaur, V Laxmi
Proceedings of the 3rd International Conference on Security of Information …, 2010
1222010
A machine learning based approach to detect malicious android apps using discriminant system calls
P Vinod, A Zemmari, M Conti
Future Generation Computer Systems 94, 333-350, 2019
862019
Malware detection employed by visualization and deep neural network
A Pinhero, ML Anupama, P Vinod, CA Visaggio, N Aneesh, S Abhijith, ...
Computers & Security 105, 102247, 2021
732021
Mining control flow graph as API call-grams to detect portable executable malware
P Faruki, V Laxmi, MS Gaur, P Vinod
Proceedings of the Fifth International Conference on Security of Information …, 2012
732012
Identification of malicious android app using manifest and opcode features
MV Varsha, P Vinod, KA Dhanya
Journal of Computer Virology and Hacking Techniques 13, 125-138, 2017
602017
Droid permission miner: Mining prominent permissions for Android malware analysis
AM Aswini, P Vinod
The Fifth International Conference on the Applications of Digital …, 2014
592014
SysDroid: a dynamic ML-based android malware analyzer using system call traces
A Ananya, A Aswathy, TR Amal, PG Swathy, P Vinod, S Mohammad
Cluster Computing 23 (4), 2789-2808, 2020
582020
Scheduling distributed energy resource operation and daily power consumption for a smart building to optimize economic and environmental parameters
Z Pooranian, JH Abawajy, V P, M Conti
Energies 11 (6), 1348, 2018
562018
Deep Learning Techniques for Android Botnet Detection
SY Yerima, MK Alzaylaee, A Shajan, V P
Electronics 10 10 (4), 519, 2021
502021
Sentiment analysis using deep learning
PC Shilpa, R Shereen, S Jacob, P Vinod
2021 Third International conference on intelligent communication …, 2021
492021
MOMENTUM: MetamOrphic malware exploration techniques using MSA signatures
P Vinod, V Laxmi, MS Gaur, G Chauhan
2012 International Conference on Innovations in Information Technology (IIT …, 2012
492012
A machine learning approach for linux malware detection
KA Asmitha, P Vinod
2014 international conference on issues and challenges in intelligent …, 2014
452014
Can machine learning model with static features be fooled: an adversarial machine learning approach
R Taheri, R Javidan, M Shojafar, P Vinod, M Conti
Cluster computing 23, 3233-3253, 2020
382020
Detection of Tor traffic using deep learning
D Sarkar, P Vinod, SY Yerima
17th ACS/IEEE International Conference on Computer Systems and Applications …, 2020
372020
Secure brain-to-brain communication with edge computing for assisting post-stroke paralyzed patients
S Rajesh, V Paul, VG Menon, S Jacob, P Vinod
IEEE Internet of Things Journal 7 (4), 2531-2538, 2019
322019
A few-shot malware classification approach for unknown family recognition using malware feature visualization
M Conti, S Khandhar, P Vinod
Computers & Security 122, 102887, 2022
302022
Static CFG analyzer for metamorphic Malware code
P Vinod, V Laxmi, MS Gaur, G Kumar, YS Chundawat
Proceedings of the 2nd International Conference on Security of Information …, 2009
302009
Malware visualization and detection using DenseNets
V Anandhi, P Vinod, VG Menon
Personal and Ubiquitous Computing, 2021
272021
Behavioural detection with API call-grams to identify malicious PE files.
P Faruki, V Laxmi, MS Gaur, P Vinod
SECURIT, 85-91, 2012
262012
The system can't perform the operation now. Try again later.
Articles 1–20