Android based malware detection using a multifeature collaborative decision fusion approach S Sheen, R Anitha, V Natarajan Neurocomputing 151, 905-912, 2015 | 120 | 2015 |
Network intrusion detection using feature selection and Decision tree classifier S Sheen, R Rajesh TENCON 2008-2008 IEEE Region 10 Conference, 1-4, 2008 | 57 | 2008 |
Malware detection by pruning of parallel ensembles using harmony search S Sheen, R Anitha, P Sirisha Pattern Recognition Letters 34 (14), 1679-1686, 2013 | 40 | 2013 |
Ransomware detection by mining API call usage S Sheen, A Yadav 2018 International Conference on Advances in Computing, Communications and …, 2018 | 29 | 2018 |
Detection of stegobot: A covert social network botnet V Natarajan, S Sheen, R Anitha Proceedings of the First International Conference on Security of Internet of …, 2012 | 23 | 2012 |
Darknet traffic analysis and classification using numerical AGM and mean shift clustering algorithm R Niranjana, VA Kumar, S Sheen SN Computer Science 1, 1-10, 2020 | 16 | 2020 |
Multilevel analysis to detect covert social botnet in multimedia social networks V Natarajan, S Sheen, R Anitha The Computer Journal 58 (4), 679-687, 2015 | 16 | 2015 |
Malware detection in Android files based on multiple levels of learning and diverse data sources S Sheen, A Ramalingam Proceedings of the Third International Symposium on Women in Computing and …, 2015 | 9 | 2015 |
R-Sentry: Deception based ransomware detection using file access patterns S Sheen, KA Asmitha, S Venkatesan Computers and Electrical Engineering 103, 108346, 2022 | 7 | 2022 |
Ensemble pruning using harmony search S Sheen, SV Aishwarya, R Anitha, SV Raghavan, SM Bhaskar Hybrid Artificial Intelligent Systems: 7th International Conference, HAIS …, 2012 | 7 | 2012 |
Hybrid Artificial Intelligent Systems: 7th International Conference, HAIS 2012, Salamanca, Spain, March 28-30th, 2012 S Sheen, SV Aishwarya, R Anitha, SV Raghavan, SM Bhaskar Proceedings, Part II, 13-24, 2012 | 4 | 2012 |
Digital Connectivity–Social Impact: 51st Annual Convention of the Computer Society of India, CSI 2016, Coimbatore, India, December 8-9, 2016, Proceedings S Subramanian, R Nadarajan, S Rao, S Sheen Springer, 2016 | 2 | 2016 |
Computational Intelligence, Cyber Security and Computational Models LBM SenthilKumar, V Ramasamy, S Sheen, C Veeramani, A Bonato, ... | 2 | 2016 |
Comparative Study of Two-and Multi-Class-Classification-Based Detection of Malicious Executables Using Soft Computing Techniques on Exhaustive Feature Set S Sheen, R Karthik, R Anitha Computational Intelligence, Cyber Security and Computational Models …, 2014 | 2 | 2014 |
Early Detection of Android Locker Ransomware Through Foreground Activity Analysis S Sheen, S Gayathri Proceedings of Third International Conference on Communication, Computing …, 2022 | 1 | 2022 |
A novel node splitting criteria for decision trees based on theil index S Sheen, R Anitha Neural Information Processing: 19th International Conference, ICONIP 2012 …, 2012 | 1 | 2012 |
Evaluation and Recommendation of Fertility Hospitals Through Multi Criteria Decision Making and Rank Correlation K Parisa Begum, S Sheen International Conference on Computational Intelligence, Cyber Security, and …, 2021 | | 2021 |
Computational Intelligence, Cyber Security and Computational Models: Proceedings of ICC3 2015 M Senthilkumar, V Ramasamy, S Sheen, C Veeramani, A Bonato, ... Springer, 2015 | | 2015 |
Analysis and detection of windows and android malware using structural feature based mining S Sheen, R Anitha Anna University, 2015 | | 2015 |