Dr. Sitalakshmi Venkatraman
Dr. Sitalakshmi Venkatraman
Melbourne Polytechnic
Verified email at
Cited by
Cited by
Deep learning approach for intelligent intrusion detection system
R Vinayakumar, M Alazab, KP Soman, P Poornachandran, A Al-Nemrat, ...
Ieee Access 7, 41525-41550, 2019
A framework for implementing TQM in higher education programs
S Venkatraman
Quality assurance in education, 2007
Robust intelligent malware detection using deep learning
R Vinayakumar, M Alazab, KP Soman, P Poornachandran, ...
IEEE Access 7, 46717-46738, 2019
Zero-day Malware Detection based on Supervised Learning Algorithms of API call Signatures.
M Alazab, S Venkatraman, PA Watters, M Alazab
AusDM 11, 171-182, 2011
Towards understanding malware behaviour by the extraction of API calls
M Alazab, S Venkataraman, P Watters
2010 second cybercrime and trustworthy computing workshop, 52-59, 2010
A hybrid deep learning image-based analysis for effective malware detection
S Venkatraman, M Alazab, R Vinayakumar
Journal of Information Security and Applications 47, 377-389, 2019
Use of data visualisation for zero-day malware detection
S Venkatraman, M Alazab
Security and Communication Networks 2018, 1-13, 2018
Challenges and success factors of ERP systems in Australian SMEs
S Venkatraman, K Fahd
Systems 4 (2), 20, 2016
Use of the analytic hierarchy process for selecting automated manufacturing systems
RP Mohanty, S Venkataraman
International Journal of Operations & Production Management 13 (8), 45-57, 1993
Cybercrime: The Case of Obfuscated Malware
M Alazab, S Venkatraman, P Watters, M Alazab, A Alazab
Proceedings of International Conference in Global Security Safety and …, 2011
Malware detection based on structural and behavioural features of api calls
M Alazab, R Layton, S Venkataraman, P Watters
School of Computer and Information Science, Security Research Centre, Edith …, 2010
Performance Evaluation of E-Government Services Using Balanced Scorecard - An Empirical Study in Jordan
S Al-Hyari, M Alazab, S Venkatraman, A Alazab
International Journal of Benchmarking 20 (4), 512 - 536, 2013
Biometrics in banking security: a case study
S Venkatraman, I Delpachitra
Information Management & Computer Security 16 (4), 415-430, 2008
SQL versus NoSQL movement with big data analytics
S Venkatraman, K Fahd, S Kaspi, R Venkatraman
International Journal of Information Technology and Computer Science 8 (12 …, 2016
A hybrid wrapper-filter approach for malware detection
M Alazab, S Huda, J Abawajy, MDR Islam, J Yearwood, S Venkatraman, ...
Journal of networks 9 (11), 2878-2891, 2014
Relationships among triple bottom line elements: Focus on integrating sustainable business practices
S Venkatraman, RR Nayak
Journal of Global Responsibility, 2015
Improving employment outcomes of career and technical education students
S Venkatraman, T de Souza-Daw, S Kaspi
Higher Education, Skills and Work-Based Learning, 2018
An optimal transportation routing approach using GIS-based dynamic traffic flows
A Alazab, S Venkatraman, J Abawajy, M Alazab
ICMTA 2010: Proceedings of the International Conference on Management …, 2010
Efficient two-dimensional pattern matching in the presence of errors
K Krithivasan, R Sitalakshmi
Information Sciences 43 (3), 169-184, 1987
Effective digital forensic analysis of the NTFS disk image
M Alazab, S Venkatraman, P Watters
Ubiquitous Computing and Communication Journal 4 (1), 551-558, 2009
The system can't perform the operation now. Try again later.
Articles 1–20