Demalvertising: A Kernel Approach for Detecting Malwares in Advertising Networks P Poornachandran, N Balagopal, S Pal, A Ashok, P Sankar, MR Krishnan Proceedings of the First International Conference on Intelligent Computing …, 2017 | 18 | 2017 |
Password reuse behavior: How massive online data breaches impacts personal data in web P Poornachandran, M Nithun, S Pal, A Ashok, A Ajayan Innovations in Computer Science and Engineering, 199-210, 2016 | 17 | 2016 |
Internet of Vulnerable Things (IoVT): Detecting Vulnerable SOHO Routers P Poornachandran, R Sreeram, MR Krishnan, S Pal, AUP Sankar, ... Information Technology (ICIT), 2015 International Conference on, 119-123, 2015 | 7 | 2015 |
Enhancing Knowledge Graph Completion By Embedding Correlations S Pal, J Urbani Proceedings of the 2017 {ACM} on Conference on Information and Knowledge …, 2017 | 3 | 2017 |
Why so abnormal? Detecting domains receiving anomalous surge traffic in a monitored network A Ashok, P Poornachandran, S Pal, P Sankar, K Surendran Journal of Intelligent & Fuzzy Systems 32 (4), 2901-2907, 2017 | 3 | 2017 |
Malsign: Threat analysis of signed and implicitly trusted malicious code S Pal, P Poornachandran, MR Krishnan, PS Au, P Sasikala 2017 International Conference on Public Key Infrastructure and its …, 2017 | 2 | 2017 |
Hiper-ping: Data plane based high performance packet generation bypassing kernel on× 86 based commodity systems AC Ajayan, P Prabaharan, MR Krishnan, S Pal Advances in Computing, Communications and Informatics (ICACCI), 2016 …, 2016 | 2 | 2016 |
Effectiveness of Email Address Obfuscation on Internet P Poornachandran, D Raj, S Pal, A Ashok Innovations in Computer Science and Engineering, 181-191, 2016 | 1 | 2016 |
Development of SCADA automated 33kV substation model as testing platform S Smrithi, P AkhilRajkoti, P Kanakasabapathy, AN Ravishankar, S Pal, ... Industrial Instrumentation and Control (ICIC), 2015 International Conference …, 2015 | 1 | 2015 |