Vinod P
Cited by
Cited by
Survey on malware detection methods
P Vinod, R Jaipur, V Laxmi, M Gaur
Proceedings of the 3rd Hackers’ Workshop on computer and internet security …, 2009
Medusa: Metamorphic malware dynamic analysis usingsignature from api
VP Nair, H Jain, YK Golecha, MS Gaur, V Laxmi
Proceedings of the 3rd International Conference on Security of Information …, 2010
A machine learning based approach to detect malicious android apps using discriminant system calls
P Vinod, A Zemmari, M Conti
Future Generation Computer Systems 94, 333-350, 2019
Mining control flow graph as API call-grams to detect portable executable malware
P Faruki, V Laxmi, MS Gaur, P Vinod
Proceedings of the Fifth International Conference on Security of Information …, 2012
Malware detection employed by visualization and deep neural network
A Pinhero, ML Anupama, P Vinod, CA Visaggio, N Aneesh, S Abhijith, ...
Computers & Security 105, 102247, 2021
Droid permission miner: Mining prominent permissions for Android malware analysis
AM Aswini, P Vinod
The Fifth International Conference on the Applications of Digital …, 2014
Identification of malicious android app using manifest and opcode features
MV Varsha, P Vinod, KA Dhanya
Journal of Computer Virology and Hacking Techniques 13, 125-138, 2017
Scheduling distributed energy resource operation and daily power consumption for a smart building to optimize economic and environmental parameters
Z Pooranian, JH Abawajy, V P, M Conti
Energies 11 (6), 1348, 2018
SysDroid: a dynamic ML-based android malware analyzer using system call traces
A Ananya, A Aswathy, TR Amal, PG Swathy, P Vinod, S Mohammad
Cluster Computing 23 (4), 2789-2808, 2020
MOMENTUM: MetamOrphic malware exploration techniques using MSA signatures
P Vinod, V Laxmi, MS Gaur, G Chauhan
2012 International Conference on Innovations in Information Technology (IIT …, 2012
Deep Learning Techniques for Android Botnet Detection
SY Yerima, MK Alzaylaee, A Shajan, V P
Electronics 10 10 (4), 519, 2021
A machine learning approach for linux malware detection
KA Asmitha, P Vinod
2014 international conference on issues and challenges in intelligent …, 2014
Sentiment analysis using deep learning
PC Shilpa, R Shereen, S Jacob, P Vinod
2021 Third International conference on intelligent communication …, 2021
Detection of Tor traffic using deep learning
D Sarkar, P Vinod, SY Yerima
17th ACS/IEEE International Conference on Computer Systems and Applications …, 2020
Can machine learning model with static features be fooled: an adversarial machine learning approach
R Taheri, R Javidan, M Shojafar, P Vinod, M Conti
Cluster computing 23, 3233-3253, 2020
Secure brain-to-brain communication with edge computing for assisting post-stroke paralyzed patients
S Rajesh, V Paul, VG Menon, S Jacob, P Vinod
IEEE Internet of Things Journal 7 (4), 2531-2538, 2019
Static CFG analyzer for metamorphic Malware code
P Vinod, V Laxmi, MS Gaur, G Kumar, YS Chundawat
Proceedings of the 2nd International Conference on Security of Information …, 2009
Behavioural detection with API call-grams to identify malicious PE files.
P Faruki, V Laxmi, MS Gaur, P Vinod
SECURIT, 85-91, 2012
Unknown metamorphic malware detection: Modelling with fewer relevant features and robust feature selection techniques
J Kuriakose, P Vinod
IAENG International Journal of Computer Science 42 (2), 139-151, 2015
Reform: Relevant features for malware analysis
P Vinod, V Laxmi, MS Gaur
2012 26th international conference on advanced information networking and …, 2012
The system can't perform the operation now. Try again later.
Articles 1–20