Leveraging virtual machine introspection with memory forensics to detect and characterize unknown malware using machine learning techniques at hypervisor MAA Kumara, CD Jaidhar Digital Investigation 23, 99-123, 2017 | 43 | 2017 |
Automated multi-level malware detection system based on reconstructed semantic view of executables using machine learning techniques at VMM A Kumara, CD Jaidhar Future Generation Computer Systems 79, 431-446, 2018 | 42 | 2018 |
Experimental analysis of Android malware detection based on combinations of permissions and API-calls AK Singh, CD Jaidhar, MAA Kumara Journal of Computer Virology and Hacking Techniques 15, 209-218, 2019 | 41 | 2019 |
Comparative study of principal component analysis based intrusion detection approach using machine learning algorithms KJ Chabathula, CD Jaidhar, MAA Kumara 2015 3rd International Conference on Signal Processing, Communication and …, 2015 | 35 | 2015 |
Windows malware detection based on cuckoo sandbox generated report using machine learning algorithm SLS Darshan, MAA Kumara, CD Jaidhar 2016 11th International Conference on Industrial and Information Systems …, 2016 | 31 | 2016 |
Hypervisor and virtual machine dependent Intrusion Detection and Prevention System for virtualized cloud environment A Kumara, CD Jaidhar 2015 1st international conference on telematics and future generation …, 2015 | 29 | 2015 |
API call based malware detection approach using recurrent neural network—LSTM J Mathew, MA Ajay Kumara Intelligent Systems Design and Applications: 18th International Conference …, 2020 | 21 | 2020 |
Resource management in cloud and cloud-influenced technologies for internet of things applications R Jeyaraj, A Balasubramaniam, AK MA, N Guizani, A Paul ACM Computing Surveys 55 (12), 1-37, 2023 | 18 | 2023 |
Execution time measurement of virtual machine volatile artifacts analyzers MAA Kumara, CD Jaidhar 2015 IEEE 21st International Conference on Parallel and Distributed Systems …, 2015 | 12 | 2015 |
Virtual machine introspection based spurious process detection in virtualized cloud computing environment MAA Kumara, CD Jaidhar 2015 international conference on futuristic trends on computational analysis …, 2015 | 8 | 2015 |
Machine learning based platform and recommendation system for food ordering services within premises GM Aditya, A Hoode, KA Rai, G Biradar, MAA Kumara, MVM Kumar, ... 2021 2nd global conference for advancement in technology (GCAT), 1-8, 2021 | 5 | 2021 |
VMI based automated real-time malware detector for virtualized cloud environment MA Ajay Kumara, CD Jaidhar International Conference on Security, Privacy, and Applied Cryptography …, 2016 | 3 | 2016 |
Deep Learning for COVID-19 BS Prashanth, MV Manoj Kumar, L Thomas, MA Ajay Kumar, D Wu, ... Understanding COVID-19: The Role of Computational Intelligence, 531-569, 2022 | 2 | 2022 |
An Analysis of Blockchain Technology: A Security and Privacy Perspective - https://doi.org/10.1201/9781003355052-5 KH Prashanth B, Ajay Kumara M A, Himanshu Upadhyay, Santosh Joshi Blockchain Technology and Applications 1, 498, 2022 | | 2022 |
Evaluating the Performance of Machine Learning Algorithms for Sentiment Prediction on Social Media Natural Language Text Data G Moulshree, MV Manoj Kumar, BS Prashanth, MA Ajay Kumara, ... Advances in Distributed Computing and Machine Learning: Proceedings of …, 2022 | | 2022 |
Classifying Malware Represented as Assembly and Control Flow Graphs Using Ensemble Learning S Somanna, N Vikhyath Shetty, M Mohammed Afthab, S Neupane, ... Advances in Distributed Computing and Machine Learning: Proceedings of …, 2022 | | 2022 |
Information gain score computation for N-grams using multiprocessing model SLS Darshan, MAA Kumara, CD Jaidhar 2017 ISEA Asia Security and Privacy (ISEASP), 1-7, 2017 | | 2017 |