Follow
Vinod P
Title
Cited by
Cited by
Year
Survey on malware detection methods
P Vinod, R Jaipur, V Laxmi, M Gaur
Proceedings of the 3rd Hackers’ Workshop on computer and internet security …, 2009
2132009
Medusa: Metamorphic malware dynamic analysis usingsignature from api
VP Nair, H Jain, YK Golecha, MS Gaur, V Laxmi
Proceedings of the 3rd International Conference on Security of Information …, 2010
1122010
Mining control flow graph as API call-grams to detect portable executable malware
P Faruki, V Laxmi, MS Gaur, P Vinod
Proceedings of the Fifth International Conference on Security of Information …, 2012
562012
A machine learning based approach to detect malicious android apps using discriminant system calls
P Vinod, A Zemmari, M Conti
Future Generation Computer Systems 94, 333-350, 2019
542019
Droid permission miner: Mining prominent permissions for Android malware analysis
AM Aswini, P Vinod
The Fifth International Conference on the Applications of Digital …, 2014
482014
Scheduling distributed energy resource operation and daily power consumption for a smart building to optimize economic and environmental parameters
Z Pooranian, JH Abawajy, M Conti
Energies 11 (6), 1348, 2018
472018
MOMENTUM: metamorphic malware exploration techniques using MSA signatures
P Vinod, V Laxmi, MS Gaur, G Chauhan
2012 International Conference on Innovations in Information Technology (IIT …, 2012
422012
Identification of malicious android app using manifest and opcode features
MV Varsha, P Vinod, KA Dhanya
Journal of Computer Virology and Hacking Techniques 13 (2), 125-138, 2017
402017
A machine learning approach for linux malware detection
KA Asmitha, P Vinod
2014 international conference on issues and challenges in intelligent …, 2014
332014
SysDroid: a dynamic ML-based android malware analyzer using system call traces
A Ananya, A Aswathy, TR Amal, PG Swathy, P Vinod, S Mohammad
Cluster Computing 23 (4), 2789-2808, 2020
262020
Static CFG analyzer for metamorphic Malware code
P Vinod, V Laxmi, MS Gaur, G Kumar, YS Chundawat
Proceedings of the 2nd International Conference on Security of Information …, 2009
262009
Unknown metamorphic malware detection: Modelling with fewer relevant features and robust feature selection techniques
J Kuriakose, P Vinod
IAENG International Journal of Computer Science 42 (2), 139-151, 2015
252015
Secure brain-to-brain communication with edge computing for assisting post-stroke paralyzed patients
S Rajesh, V Paul, VG Menon, S Jacob, P Vinod
IEEE Internet of Things Journal 7 (4), 2531-2538, 2019
232019
Malware detection employed by visualization and deep neural network
A Pinhero, ML Anupama, P Vinod, CA Visaggio, N Aneesh, S Abhijith, ...
Computers & Security 105, 102247, 2021
202021
Can machine learning model with static features be fooled: an adversarial machine learning approach
R Taheri, R Javidan, M Shojafar, P Vinod, M Conti
Cluster computing 23 (4), 3233-3253, 2020
202020
Ranked linear discriminant analysis features for metamorphic malware detection
J Kuriakose, P Vinod
2014 IEEE International Advance Computing Conference (IACC), 112-117, 2014
202014
Behavioural detection with API call-grams to identify malicious PE files.
P Faruki, V Laxmi, MS Gaur, P Vinod
SECURIT, 85-91, 2012
202012
Reform: Relevant features for malware analysis
P Vinod, V Laxmi, MS Gaur
2012 26th international conference on advanced information networking and …, 2012
202012
Multiclass emotion extraction from sentences
B Thomas, P Vinod, KA Dhanya
International Journal of Scientific & Engineering Research 5 (2), 12-15, 2014
192014
Deep Learning Techniques for Android Botnet Detection
SY Yerima, MK Alzaylaee, A Shajan, V P
Electronics 10 10 (4), 519, 2021
172021
The system can't perform the operation now. Try again later.
Articles 1–20