Aravind Ashok Nair
Title
Cited by
Cited by
Year
A lexical approach for classifying malicious URLs
M Darling, G Heileman, G Gressel, A Ashok, P Poornachandran
High Performance Computing & Simulation (HPCS), 2015, 195-202, 2015
492015
Ensemble learning approach for author profiling
HP Gilad Gressel, K Surendran, S Thara, A Aravind
Proceedings of CLEF, 2014
20*2014
Deep learning LSTM based ransomware detection
S Maniath, A Ashok, P Poornachandran, VG Sujadevi, AUP Sankar, S Jan
2017 Recent Developments in Control, Automation & Power Engineering (RDCAPE …, 2017
192017
Demalvertising: A Kernel Approach for Detecting Malwares in Advertising Networks
P Poornachandran, N Balagopal, S Pal, A Ashok, P Sankar, MR Krishnan
Proceedings of the First International Conference on Intelligent Computing …, 2016
102016
Password Reuse Behavior: How Massive Online Data Breaches Impacts Personal Data in Web
P Poornachandran, M Nithun, S Pal, A Ashok, A Ajayan
Innovations in Computer Science and Engineering, 199-210, 2016
72016
Internet of Vulnerable Things (IoVT): Detecting Vulnerable SOHO Routers
P Poornachandran, R Sreeram, MR Krishnan, S Pal, AUP Sankar, ...
2015 International Conference on Information Technology (ICIT), 119-123, 2015
62015
B-Secure: A Dynamic Reputation System for Identifying Anomalous BGP Paths
AUP Sankar, P Poornachandran, A Ashok, RK Manu, P Hrudya
Proceedings of the 5th International Conference on Frontiers in Intelligent …, 2017
52017
Drive-by-Download Malware Detection in Hosts by Analyzing System Resource Utilization Using One Class Support Vector Machines
P Poornachandran, S Praveen, A Ashok, MR Krishnan, KP Soman
Proceedings of the 5th International Conference on Frontiers in Intelligent …, 2017
52017
Secure authentication in multimodal biometric systems using cryptographic hash functions
A Ashok, P Poornachandran, K Achuthan
International Conference on Security in Computer Networks and Distributed …, 2012
42012
Leveraging Mutants for Automatic Prediction of Metamorphic Relations using Machine Learning
A Ashok, K Meinke, S Eldh
Proceedings of the 3rd ACM SIGSOFT International Workshop on Machine …, 2019
3*2019
LSTM Based Self-Defending AI Chatbot Providing Anti-Phishing
S Kovalluri, A Ashok, H Singanamala, P Poornachandran
1st Radical and Experiential Security Workshop, 2018
22018
Why so abnormal? Detecting domains receiving anomalous surge traffic in a monitored network
A Ashok, P Poornachandran, S Pal, P Sankar, K Surendran
Journal of Intelligent & Fuzzy Systems 32 (4), 2901-2907, 2017
12017
Effectiveness of Email Address Obfuscation on Internet
P Poornachandran, D Raj, S Pal, A Ashok
Innovations in Computer Science and Engineering, 181-191, 2016
12016
funcGNN: A Graph Neural Network Approach to Program Similarity
A Nair, A Roy, K Meinke
ACM / IEEE International Symposium on Empirical Software Engineering and …, 2020
2020
‘MobAware’-Harnessing Context Awareness, Sensors and Cloud for Spontaneous Personal Safety Emergency Help Requests
VG Sujadevi, A Ashok, S Krishnamoorthy, P Prabaharan, P Shankar, ...
International Conference on Ubiquitous Communications and Network Computing …, 2017
2017
MalJs: Lexical, Structural and Behavioral Analysis of Malicious JavaScripts Using Ensemble Classifier
K Surendran, P Poornachandran, AA Nair, N Srinath, Y Kumar, P Hrudya
International Symposium on Security in Computing and Communication, 439-449, 2016
2016
Demalvertising: A Kernel Approach for Detecting Malwares in Advertising Networks
BN Prabaharan Poornachandran, S Pal, A Ashok, P Sankar, MR Krishnan, ...
The system can't perform the operation now. Try again later.
Articles 1–17