Unknown affiliation
Verified email at
Cited by
Cited by
Applicability of machine learning in spam and phishing email filtering: review and approaches
T Gangavarapu, CD Jaidhar, B Chanduka
Artificial Intelligence Review 53 (7), 5019-5081, 2020
Cardamom plant disease detection approach using EfficientNetV2
CK Sunil, CD Jaidhar, N Patil
Ieee Access 10, 789-804, 2021
Robust smart card authentication scheme for multi-server architecture
RS Pippal, CD Jaidhar, S Tapaswi
Wireless Personal Communications 72, 729-745, 2013
Location prediction algorithm for a nonlinear vehicular movement in VANET using extended Kalman filter
RK Jaiswal, CD Jaidhar
Wireless Networks 23, 2021-2036, 2017
Windows malware detector using convolutional neural network based on visualization images
SD SL, CD Jaidhar
IEEE Transactions on Emerging Topics in Computing 9 (2), 1057-1069, 2019
Leveraging virtual machine introspection with memory forensics to detect and characterize unknown malware using machine learning techniques at hypervisor
MAA Kumara, CD Jaidhar
Digital Investigation 23, 99-123, 2017
Enhanced mutual authentication scheme for cloud architecture
CD Jaidhar
2013 3rd IEEE International Advance Computing Conference (IACC), 70-75, 2013
Automated multi-level malware detection system based on reconstructed semantic view of executables using machine learning techniques at VMM
A Kumara, CD Jaidhar
Future Generation Computer Systems 79, 431-446, 2018
Experimental analysis of Android malware detection based on combinations of permissions and API-calls
AK Singh, CD Jaidhar, MAA Kumara
Journal of Computer Virology and Hacking Techniques 15, 209-218, 2019
Performance evaluation of filter-based feature selection techniques in classifying portable executable files
SLS Darshan, CD Jaidhar
Procedia Computer Science 125, 346-356, 2018
Enhanced mobility aware routing protocol for low power and lossy networks
S Sanshi, CD Jaidhar
Wireless Networks 25, 1641-1655, 2019
Comparative study of principal component analysis based intrusion detection approach using machine learning algorithms
KJ Chabathula, CD Jaidhar, MAA Kumara
2015 3rd International Conference on Signal Processing, Communication and …, 2015
Windows malware detection based on cuckoo sandbox generated report using machine learning algorithm
SLS Darshan, MAA Kumara, CD Jaidhar
2016 11th International Conference on Industrial and Information Systems …, 2016
Hypervisor and virtual machine dependent Intrusion Detection and Prevention System for virtualized cloud environment
A Kumara, CD Jaidhar
2015 1st international conference on telematics and future generation …, 2015
Cryptanalysis of SIP secure and efficient authentication scheme
MK Gokhroo, CD Jaidhar, AS Tomar
2011 IEEE 3rd International Conference on Communication Software and …, 2011
Clothing invariant human gait recognition using modified local optimal oriented pattern binary descriptor
R Anusha, CD Jaidhar
Multimedia Tools and Applications 79, 2873-2896, 2020
Comments on symmetric key encryption based smart card authentication scheme
RS Pippal, CD Jaidhar, S Tapaswi
2010 2nd International Conference on Computer Technology and Development …, 2010
Human gait recognition based on histogram of oriented gradients and Haralick texture descriptor
R Anusha, CD Jaidhar
Multimedia Tools and Applications 79 (11), 8213-8234, 2020
Android malware detection using function call graph with graph convolutional networks
KV Vinayaka, CD Jaidhar
2021 2nd International Conference on Secure Cyber Computing and …, 2021
An applicability of aodv and olsr protocols on ieee 802.11 p for city road in vanet
RK Jaiswal, CD Jaidhar
Internet of Things, Smart Spaces, and Next Generation Networks and Systems …, 2015
The system can't perform the operation now. Try again later.
Articles 1–20