Deep learning approach for intelligent intrusion detection system R Vinayakumar, M Alazab, KP Soman, P Poornachandran, A Al-Nemrat, ... Ieee Access 7, 41525-41550, 2019 | 1014 | 2019 |
A framework for implementing TQM in higher education programs S Venkatraman Quality assurance in education, 2007 | 442 | 2007 |
Robust intelligent malware detection using deep learning R Vinayakumar, M Alazab, KP Soman, P Poornachandran, ... IEEE Access 7, 46717-46738, 2019 | 340 | 2019 |
Zero-day Malware Detection based on Supervised Learning Algorithms of API call Signatures. M Alazab, S Venkatraman, PA Watters, M Alazab AusDM 11, 171-182, 2011 | 251 | 2011 |
Towards understanding malware behaviour by the extraction of API calls M Alazab, S Venkataraman, P Watters 2010 second cybercrime and trustworthy computing workshop, 52-59, 2010 | 199 | 2010 |
A hybrid deep learning image-based analysis for effective malware detection S Venkatraman, M Alazab, R Vinayakumar Journal of Information Security and Applications 47, 377-389, 2019 | 165 | 2019 |
Use of data visualisation for zero-day malware detection S Venkatraman, M Alazab Security and Communication Networks 2018, 1-13, 2018 | 124 | 2018 |
Challenges and success factors of ERP systems in Australian SMEs S Venkatraman, K Fahd Systems 4 (2), 20, 2016 | 118 | 2016 |
Use of the analytic hierarchy process for selecting automated manufacturing systems RP Mohanty, S Venkataraman International Journal of Operations & Production Management 13 (8), 45-57, 1993 | 100 | 1993 |
Cybercrime: The Case of Obfuscated Malware M Alazab, S Venkatraman, P Watters, M Alazab, A Alazab Proceedings of International Conference in Global Security Safety and …, 2011 | 98 | 2011 |
Malware detection based on structural and behavioural features of api calls M Alazab, R Layton, S Venkataraman, P Watters School of Computer and Information Science, Security Research Centre, Edith …, 2010 | 95 | 2010 |
Performance Evaluation of E-Government Services Using Balanced Scorecard - An Empirical Study in Jordan S Al-Hyari, M Alazab, S Venkatraman, A Alazab International Journal of Benchmarking 20 (4), 512 - 536, 2013 | 86 | 2013 |
Biometrics in banking security: a case study S Venkatraman, I Delpachitra Information Management & Computer Security 16 (4), 415-430, 2008 | 83 | 2008 |
SQL versus NoSQL movement with big data analytics S Venkatraman, K Fahd, S Kaspi, R Venkatraman International Journal of Information Technology and Computer Science 8 (12 …, 2016 | 72 | 2016 |
A hybrid wrapper-filter approach for malware detection M Alazab, S Huda, J Abawajy, MDR Islam, J Yearwood, S Venkatraman, ... Journal of networks 9 (11), 2878-2891, 2014 | 64 | 2014 |
Relationships among triple bottom line elements: Focus on integrating sustainable business practices S Venkatraman, RR Nayak Journal of Global Responsibility, 2015 | 56 | 2015 |
Improving employment outcomes of career and technical education students S Venkatraman, T de Souza-Daw, S Kaspi Higher Education, Skills and Work-Based Learning, 2018 | 53 | 2018 |
An optimal transportation routing approach using GIS-based dynamic traffic flows A Alazab, S Venkatraman, J Abawajy, M Alazab ICMTA 2010: Proceedings of the International Conference on Management …, 2010 | 50 | 2010 |
Efficient two-dimensional pattern matching in the presence of errors K Krithivasan, R Sitalakshmi Information Sciences 43 (3), 169-184, 1987 | 49 | 1987 |
Effective digital forensic analysis of the NTFS disk image M Alazab, S Venkatraman, P Watters Ubiquitous Computing and Communication Journal 4 (1), 551-558, 2009 | 47 | 2009 |