Back close

Dr. Prabaharan Poornachandran

Director, Centre for Internet Studies and Artificial Intelligence-CISAI, Amritapuri

praba@am.amrita.edu

Bio

Dr. Prabaharan Poornachandran (Praba) is the Director at Centre for Internet Studies and Artificial Intelligence-CISAI, School of Engineering, Amrita Vishwa Vidyapeetham, Kollam, Kerala.
Prabaharan and his R&D Team has created several bigdata Analytics platforms that provides deep insights and cutting edge digital tools and technologies. His areas of interest are web-scale systems, Internet Research, AI, ML, Graph theory, Pervasive computing, IoT, Digital Forensics, Critical Infrastructure. He is passionate about using the technological advances to solve societal problems. During the span more than two decades, he has worked with several reputed organizations both in India and abroad such as the World Bank and VeriSign Inc among others He is also a CISSP and CISA certified among other certifications. He has co-authored several research papers, book chapters and publications.

Publications

Journal Article

Year : 2021

Transformer Based Language Identification for Malayalam-English Code-Mixed Text

Cite this Research Publication : S. Thara and P. Poornachandran, "Transformer Based Language Identification for Malayalam-English Code-Mixed Text," in IEEE Access, vol. 9, pp. 118837-118850, 2021, doi: 10.1109/ACCESS.2021.3104106.

Publisher : IEEE Access

Year : 2019

Robust Intelligent Malware Detection Using Deep Learning

Cite this Research Publication : R. Vinayakumar, Alazab, M., Dr. Soman K. P., Poornachandran, P., and Venkatraman, S., “Robust Intelligent Malware Detection Using Deep Learning”, IEEE Access, vol. 7, pp. 46717-46738, 2019.

Publisher : IEEE Access

Year : 2017

Evaluation of Recurrent Neural Network and its Variants for Intrusion Detection System (IDS)

Cite this Research Publication : Dr. Soman K. P., Vinayakumar, R., and Poornachandran, P., “Evaluation of Recurrent Neural Network and its Variants for Intrusion Detection System (IDS)”, International Journal of Information System Modeling and Design (IJISMD) , vol. 8, no. 3, 2017.

Publisher : International Journal of Information System Modeling and Design (IJISMD)

Year : 2017

Why so abnormal? Detecting domains receiving anomalous surge traffic in a monitored network

Cite this Research Publication : A. Ashok, Poornachandran, P., Pal, S., Sankar, P., and Surendran, K., “Why so abnormal? Detecting domains receiving anomalous surge traffic in a monitored network”, Journal of Intelligent and Fuzzy Systems, vol. 32, pp. 2901-2907, 2017.

Publisher : Journal of Intelligent and Fuzzy Systems, IOS Press,

Year : 2017

B-secure: A dynamic reputation system for identifying anomalous BGP paths

Cite this Research Publication : A. U. Prem Sankar, Poornachandran, P., Ashok, A., Manu, R. K., and Hrudya, P., “B-secure: A dynamic reputation system for identifying anomalous BGP paths”, Advances in Intelligent Systems and Computing, vol. 515, pp. 767-775, 2017.

Publisher : Advances in Intelligent Systems and Computing

Year : 2016

A distributed approach for predicting malicious activities in a network from a streaming data with support vector machine and explicit random feature mapping

Cite this Research Publication : P. Poornachandran, B. Premjith, and Dr. Soman K. P., “A distributed approach for predicting malicious activities in a network from a streaming data with support vector machine and explicit random feature mapping”, IIOAB Journal, vol. 7, pp. 24-29, 2016.

Publisher : IIOAB Journal.

Year : 2016

Password reuse behavior: How massive online data breaches impacts personal data in web

Cite this Research Publication :

Publisher : Springer Singapore

Year : 2016

Effectiveness of Email Address Obfuscation on Internet Innovations in Computer Science and Engineering

Cite this Research Publication : Prabaharan Poornachandran, Raj, D., and Pal, S., “Effectiveness of Email Address Obfuscation on Internet”, Innovations in Computer Science and Engineering: Proceedings of the Third ICICSE, 2015. Springer Singapore, Singapore, pp. 181–191, 2016.

Publisher : Springer Singapore

Year : 2016

MalJs: Lexical, structural and behavioral analysis of malicious javascripts using ensemble classifier

Cite this Research Publication : K. Surendran, Poornachandran, P., Nair, A. A., Srinath, N., Kumar, Y., and Hrudya, P., “MalJs: Lexical, structural and behavioral analysis of malicious javascripts using ensemble classifier”, Communications in Computer and Information Science, vol. 625, pp. 439-449, 2016.

Publisher : Communications in Computer and Information Science.

Year : 2016

A distributed approach for predicting malicious activities in a network from a streaming data with support vector machine and explicit random feature mapping

Cite this Research Publication : P. Poornachandran, B. Premjith, and Dr. Soman K. P., “A distributed approach for predicting malicious activities in a network from a streaming data with support vector machine and explicit random feature mapping”, IIOAB Journal, vol. 7, pp. 24-29, 2016.

Publisher : IIOAB Journal

Year : 2015

Human vs. Machine: Analyzing the Robustness of Advertisement Based Captchas Advances in Signal Processing and Intelligent Recognition Systems

Cite this Research Publication : P. Poornachandran, Hrudya, P., and Reghunadh, J., “Human vs. machine: Analyzing the robustness of advertisement based CAPTCHAs”, Advances in Intelligent Systems and Computing, vol. 264, pp. 477-489, 2014.

Publisher : Springer Cham

Year : 2015

Audio data authentication with pmu data and ewt Procedia Technology

Cite this Research Publication :

Publisher : Elsevier

Year : 2014

Ensemble Learning Approach for Author Profiling

Cite this Research Publication :

Publisher : CLEF

Year : 2014

Demalvertising: A Probabilistic Approach for Detecting Malwares in Advertising Networks

Cite this Research Publication :

Publisher : International Conference on Advances in Computing, Communications and Informatics

Journal

Year : 2020

A Compendium on Network and Host based Intrusion Detection Systems

Cite this Research Publication : R. Vigneswaran, Poornachandran, P., and Dr. Soman K. P., “A Compendium on Network and Host based Intrusion Detection Systems”, in Lecture Notes in Electrical Engineering, 2020.

Publisher : Lecture Notes in Electrical Engineering

Year : 2020

Cost-sensitive deep learning based framework for handling multiclass imbalanced dga detection

Cite this Research Publication :

Publisher : Handbook of Computer Networks and Cyber Security

Year : 2019

Deep Temporal Analysis of Twitter Bots Symposium on Machine Learning and Metaheuristics Algorithms and Applications

Cite this Research Publication :

Publisher : Springer Singapore

Year : 2019

Deep learning architecture for big data analytics in detecting intrusions and malicious URL Big Data Recommender Systems

Cite this Research Publication :

Publisher : Institution of Engineering and Technology

Year : 2019

Ransomware triage using deep learning: twitter as a case study

Cite this Research Publication :

Publisher : IEEE

Year : 2019

Electric Vehicle Scenario in India: Roadmap Challenges and Opportunities

Cite this Research Publication :

Publisher : IEEE

Year : 2019

A Machine Learning Approach for Identifying Compound Words from a Sanskrit Text Proceedings of the 6th International Sanskrit Computational Linguistics Symposium

Cite this Research Publication :

Publisher : 6th International Sanskrit Computational Linguistics Symposium

Year : 2019

Deep learning DGA-based botnet detection Deep learning applications for cyber security

Cite this Research Publication :

Publisher : Springer Cham

Year : 2019

Application of deep learning architectures for cyber security Cybersecurity and Secure Information System

Cite this Research Publication :

Publisher : Springer Cham

Year : 2019

A comparative analysis of deep learning approaches for network intrusion detection systems (N-IDSs)

Cite this Research Publication :

Publisher : Journal of Digital Crime and Forensics (IJDCF)

Year : 2019

Deep learning approach for intelligent intrusion detection system

Cite this Research Publication :

Publisher : IEEE

Year : 2019

Modern methods for signal analysis and its applications Recent advances in computational intelligence

Cite this Research Publication :

Publisher : Springer Cham

Year : 2018

Dynamic Mode based Feature with Random Mapping for Sentiment Analysis

Cite this Research Publication :

Year : 2018

Deep-Net: Deep neural network for cyber security use cases arXiv

Cite this Research Publication :

Publisher : arXiv:1812.03519

Year : 2018

ScaleNet: scalable and hybrid framework for cyber threat situational awareness based on DNS URL and email data analysis

Cite this Research Publication :

Publisher : Journal of Cyber Security and Mobility

Year : 2018

DeepAnti-PhishNet: Applying deep neural networks for phishing email detection Proc.

Cite this Research Publication :

Publisher : Tempe AZ USA

Year : 2018

Stance-in-depth deep neural approach to stance classification Procedia computer science

Cite this Research Publication :

Publisher : Elsevier

Year : 2018

LSTM based Self-Defending AI ChatBot Providing Anti-Phishing

Cite this Research Publication :

Publisher : ACM

Year : 2018

Evaluating deep learning approaches to characterize and classify malicious URL’s

Cite this Research Publication :

Publisher : Journal of Intelligent & Fuzzy Systems

Year : 2018

Detecting malicious domain names using deep learning approaches at scale

Cite this Research Publication :

Publisher : Journal of Intelligent & Fuzzy Systems

Year : 2018

Detecting Android malware using long short-term memory (LSTM)

Cite this Research Publication :

Publisher : Journal of Intelligent & Fuzzy Systems

Year : 2018

Evaluating deep learning approaches to characterize and classify the DGAs at scale Journal of Intelligent & Fuzzy Systems

Cite this Research Publication :

Publisher : Intelligent & Fuzzy Systems, IOS Press

Year : 2017

Deep Stance and Gender Detection in Tweets on Catalan Independence

Cite this Research Publication :

Publisher : Ibereval

Year : 2017

Stylometry detection using deep learning Computational Intelligence in Data Mining

Cite this Research Publication :

Publisher : Springer Singapore

Year : 2017

Aware Public Safety in Pervasive Environment Wireless Public Safety Networks

Cite this Research Publication :

Publisher : Elsevier

Year : 2017

Drive-by-download malware detection in hosts by analyzing system resource utilization using one class support vector machines

Cite this Research Publication : P. Poornachandran, Praveen, S., Ashok, A., Krishnan, M. R., and Dr. Soman K. P., “Drive-by-download malware detection in hosts by analyzing system resource utilization using one class support vector machines”, Advances in Intelligent Systems and Computing, vol. 516, pp. 129-137, 2017.

Publisher : Advances in Intelligent Systems and Computing, Springer Verlag,

Year : 2016

Automatic modulation classification using convolutional neural network

Cite this Research Publication : A. S and Dr. Soman K. P., “Automatic Modulation Classification using Convolutional Neural Network”, in International Conference on Artificial Intelligence and Evolutionary Computations in Engineering Systems (ICAIECES-2016), 2016.

Publisher : International Conference on Artificial Intelligence and Evolutionary Computations in Engineering Systems

Year : 2016

Text/Image Region Separation for Document Layout Detection of Old Document Images using Non-linear Diffusion and Level Set Procedia Computer Science

Cite this Research Publication : S. S. Kumar, Rajendran, P., Prabaharan, P., Dr. Soman K. P., J., M., and J., J., “Text/Image Region Separation for Document Layout Detection of Old Document Images Using Non-linear Diffusion and Level Set”, in Procedia Computer Science, 2016, vol. 93, pp. 469-477.

Publisher : Procedia Computer Science, Elsevier.

Year : 2016

Total Variation Denoising Based Approach for R-peak Detection in ECG Signals Procedia Computer Science

Cite this Research Publication : S. Sa Kumar, Dr. Neethu Mohan, Prabaharan, Pb, Dr. Soman K. P., J., M., and J., J., “Total Variation Denoising Based Approach for R-peak Detection in ECG Signals”, in Procedia Computer Science, 2016, vol. 93, pp. 697-705.

Publisher : Procedia Computer Science, Elsevier.

Year : 2016

Modified variational mode decomposition for power line interference removal in ECG signals

Cite this Research Publication : Dr. Neethu Mohan, S. Kumar, S., Poornachandran, P., and Dr. Soman K. P., “Modified variational mode decomposition for power line interference removal in ECG signals”, International Journal of Electrical and Computer Engineering, vol. 6, pp. 151-159, 2016.

Publisher : IJECE

Year : 2016

MalJs: Lexical Structural and Behavioral Analysis of Malicious JavaScripts Using Ensemble Classifier

Cite this Research Publication :

Publisher : Springer Singapore

Conference Paper

Year : 2019

Amrita_CEN@FACT: Factuality Identification in Spanish Text

Cite this Research Publication : Premjith, B., Soman, K.P., Poornachandran, P., "Amrita Cen@fact: Factuality identification in Spanish text," (2019) CEUR Workshop Proceedings, 2421, pp. 111-118.

Publisher : IberLEF@ SEPLN

Year : 2019

A Machine Learning Approach for Identifying Compound Words from a Sanskrit Text

Cite this Research Publication : B. Premjith, Chandni Chandran V., Shriganesh Bhat, Dr. Soman K. P., and Prabaharan P., “A Machine Learning Approach for Identifying Compound Words from a Sanskrit Text”, in Proceedings of the 6th International Sanskrit Computational Linguistics Symposium, IIT Kharagpur, India, 2019.

Publisher : Association for Computational Linguistics, IIT Kharagpur,

Year : 2019

Deep Learning Framework for Domain Generation Algorithms Prediction Using Long Short-term Memory

Cite this Research Publication : S. Akarsh, Sriram, S., Poornachandran, P., Menon, V. K., and Dr. Soman K. P., “Deep Learning Framework for Domain Generation Algorithms Prediction Using Long Short-term Memory”, in 2019 5th International Conference on Advanced Computing and Communication Systems, ICACCS 2019, 2019, pp. 666-671.

Publisher : Institute of Electrical and Electronics Engineers Inc.,

Year : 2019

Deep Learning Framework and Visualization for Malware Classification

Cite this Research Publication : S. Akarsh, Simran, K., Poornachandran, P., Menon, V. K., and Dr. Soman K. P., “Deep Learning Framework and Visualization for Malware Classification”, in 2019 5th International Conference on Advanced Computing and Communication Systems, ICACCS 2019, 2019, pp. 1059-1063.

Publisher : Institute of Electrical and Electronics Engineers Inc

Year : 2018

SPOOF Net: Syntactic Patterns for Identification of Ominous Online Factors

Cite this Research Publication : V. S. Mohan, Vinayakumar, R., Dr. Soman K. P., and Poornachandran, P., “SPOOF Net: Syntactic Patterns for Identification of Ominous Online Factors”, in 2018 IEEE Security and Privacy Workshops (SPW), 2018.

Publisher : 2018 IEEE Security and Privacy Workshops (SPW)

Year : 2018

A deep learning based Part-of-Speech (POS) tagger for Sanskrit language by embedding character level features

Cite this Research Publication : Premjith, B., Soman, K.P., Poornachandran, P., A deep learning based Part-of-Speech (POS) tagger for Sanskrit language by embedding character level features, (2018) ACM International Conference Proceeding Series, pp. 56-60., DOI: 10.1145/3293339.3293352

Publisher : FIRE'18 .

Year : 2017

Suppressing Parkinson’s diseases induced involuntary movements using wearables

Cite this Research Publication : V. Vidya, Poornachandran, P., Sujadevi, V. G., and Meher Madhu Dharmana, “Suppressing Parkinson's diseases induced involuntary movements using wearables”, in 2017 International Conference on Technological Advancements in Power and Energy ( TAP Energy), Kollam, India, 2017.

Publisher : 2017 International Conference on Technological Advancements in Power and Energy ( TAP Energy)

Year : 2017

Spoofing technique to counterfeit the GPS receiver on a drone

Cite this Research Publication : N. Shijith, Poornachandran, P., Sujadevi, V. G., and Meher Madhu Dharmana, “Spoofing technique to counterfeit the GPS receiver on a drone”, in 2017 International Conference on Technological Advancements in Power and Energy ( TAP Energy), Kollam, India, 2017.

Publisher : 2017 International Conference on Technological Advancements in Power and Energy ( TAP Energy)

Year : 2017

Deep learning LSTM based ransomware detection

Cite this Research Publication :

Publisher : IEEE

Year : 2017

Malsign: Threat analysis of signed and implicitly trusted malicious code

Cite this Research Publication :

Publisher : IEEE

Year : 2017

Deep learning model on stance classification

Cite this Research Publication : G. Rajendran, Prabaharan Poornachandran, and Dr. Bhadrachalam Chitturi, “Deep learning model on stance classification”, in International Conference on Advances in Computing, Communications and Informatics (ICACCI), Udupi, India, 2017.

Publisher : International Conference on Advances in Computing, Communications and Informatics

Year : 2017

Deep encrypted text categorisation

Cite this Research Publication :

Publisher : IEEE

Year : 2017

IMU sensor based self stabilizing cup for elderly and parkinsonism

Cite this Research Publication :

Publisher : IEEE

Year : 2017

Secure shell (ssh) traffic analysis with flow based features using shallow and deep networks

Cite this Research Publication : Prof. Prabaharan Poornachandran ,Vinayakumar R ,; Soman KP ."Secure shell (ssh) traffic analysis with flow based features using shallow and deep networks" 2017 International Conference on Advances in Computing Communications and Informatics (ICACCI) 2026-2032 2017 IEEE .

Publisher : 2017 International Conference on Advances in Computing Communications and Informatics (ICACCI) .

Year : 2017

Evaluating shallow and deep networks for secure shell (ssh) traffic analysis

Cite this Research Publication :

Publisher : IEEE

Year : 2017

Applying deep learning approaches for network traffic prediction

Cite this Research Publication :

Publisher : IEEE

Year : 2017

Long short-term memory based operation log anomaly detection

Cite this Research Publication :

Publisher : IEEE

Year : 2017

Deep android malware detection and classification

Cite this Research Publication :

Publisher : IEEE

Year : 2017

Applying convolutional neural network for network intrusion detection

Cite this Research Publication :

Publisher : IEEE

Year : 2017

Evaluating effectiveness of shallow and deep networks to intrusion detection system

Cite this Research Publication :

Publisher : IEEE

Year : 2017

Deep Analysis of Opinion and Figurative language on Tweets

Cite this Research Publication :

Publisher : TALN

Year : 2017

Deep Stance and Gender Detection in Tweets on Catalan Independence@IBEREVAL

Cite this Research Publication : Vinayakumar R, Sachin Kumar S, Premjith B, KP Soman, Deep Stance and Gender Detection in Tweets on Catalan Independence@IBEREVAL, IBEREVAL, pp 222-229, 2017, (Scopus)

Publisher : IBEREVAL

Year : 2017

deepCybErNet at EmoInt-2017: Deep Emotion Intensities in Tweets

Cite this Research Publication : Vinayakumar, R., Premjith, B., Sachin Kumar, S., Soman, K.P., Poornachandran, P., deepCybErNet at EmoInt-2017: Deep emotion intensities in tweets, (2017) EMNLP 2017 - 8th Workshop on Computational Approaches to Subjectivity, Sentiment and Social Media Analysis, WASSA 2017 - Proceedings of the Workshop, pp. 259-263.

Publisher : EMNLP-WASSA

Year : 2016

Effortless exchange of personal health records using near field communication

Cite this Research Publication :

Publisher : IEEE

Year : 2016

MobAware’-Employing Context Awareness, Sensors and Cloud for Automatic Emergency Help Requests

Cite this Research Publication : P. Poornachandran, A. Ashok, AU, P. Shankar, VG, S., Krishnamoorthy, S., Bharataraju, M., Panchagnula, S. K., and Khyati, D., “MobAware’-Employing Context Awareness, Sensors and Cloud for Automatic Emergency Help Requests”, in International Conference on Ambient Assisted Living Technologies based on Internet of Things, 2016.

Publisher : International Conference on Ambient Assisted Living Technologies based on Internet of Things

Year : 2015

An optimization algorithm for voltage flicker analysis

Cite this Research Publication :

Publisher : Elsevier

Year : 2015

Apache spark a big data analytics platform for smart grid Procedia Technology

Cite this Research Publication :

Publisher : Elsevier

Year : 2015

Internet of Vulnerable Things (IoVT): Detecting Vulnerable SOHO Routers

Cite this Research Publication : P. Poornachandran, Sreeram, R., Krishnan, M. R., Pal, S., Sankar, A. U. Prem, and Ashok, A., “Internet of Vulnerable Things (IoVT): Detecting Vulnerable SOHO Routers”, in Proceedings - 2015 14th International Conference on Information Technology, ICIT 2015, 2015, pp. 119-123.

Publisher : 14th International Conference on Information Technology, ICIT

Year : 2015

Development of SCADA automated 33kV substation model as testing platform

Cite this Research Publication : S. M. Ramesh, Smrithi, S., AkhilRajkoti, P., Dr. P. Kanakasabapathy, A.N. Ravishankar, Pal, S., and Poornachandran, P., “Development of SCADA automated 33kV substation model as testing platform”, in IEEE International Conference on Industrial Instrumentation and Control (ICIC 2015), Pune, 2015.

Publisher : IEEE International Conference on Industrial Instrumentation and Control (ICIC 2015)

Year : 2015

An efficient classification model for detecting advanced persistent threat

Cite this Research Publication :

Publisher : IEEE

Year : 2015

Detecting the network attack vectors on SCADA systems

Cite this Research Publication : R. S. Ramachandruni and Poornachandran, P., “Detecting the network attack vectors on SCADA systems”, in 2015 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2015, 2015, pp. 707-712.

Publisher : International Conference on Advances in Computing, Communications and Informatics, ICACCI

Year : 2015

A lexical approach for classifying malicious URLs

Cite this Research Publication :

Publisher : International Conference on High Performance Computing & Simulation (HPCS)

Year : 2014

Personal Health Data Exchange Using NFC

Cite this Research Publication :

Publisher : International Symposium on Women in Computing and Informatics (WCI-2014)

Year : 2014

High Performance Packet Processing on Commodity Hardware Bypassing the Kernel

Cite this Research Publication :

Publisher : IEEE CAMAD 2014

Year : 2013

Digital image forgery detection on artificially blurred images

Cite this Research Publication : H. P, Lekha S. Nair, S.M, A., Unni, R., H, V. Priya, and Prabaharan Poornachandran, “Digital Image Forgery Detection on Artificially Blurred Images”, in International Conference on Emerging Trends in Communication, Control, Signal Processing & Computing Applications (C2SPCA), 2013 , Bangalore, India, 2013.

Publisher : IEEE

Year : 2013

Forepart Based Captcha Segmentation And Recognition Using Dft

Cite this Research Publication : H. Poroli, Prabaharan Poornachandran, and G, G. N., “Forepart Based Captcha Segmentation And Recognition Using Dft”, in Fourth International Conference on Recent Trends in Information, Telecommunication and Computing – ITC 2013,, 2013.

Publisher : Fourth International Conference on Recent Trends in Information, Telecommunication and Computing – ITC 2013,

Year : 2012

DVM based scalable and adaptive multipath routing in MANET for emergency rescue application

Cite this Research Publication : Dr. Maneesha V. Ramesh, Prabaharan, P., Shameem, A. A., and Rekha, P., “DVM based Scalable and Adaptive Multipath Routing in MANET For Emergency Rescue Application”, in Wireless and Optical Communications Conference (WOCC), 2012 21st Annual, 2012, pp. 123-129

Publisher : WOCC

Year : 2012

DVM based multipath routing in MANET for different scalable and adaptive environment

Cite this Research Publication : A. S. Ansar, Prabaharan, P., Dr. Maneesha V. Ramesh, and Rekha, P., “DVM based multipath routing in MANET for different scalable and adaptive environment”, in Data Science & Engineering (ICDSE), 2012 International Conference on, 2012, pp. 187-193.

Publisher : IEEE

Year : 2012

Implementation of DES using pipelining concept with skew core key scheduling in secure transmission of images

Cite this Research Publication : Ka Praveen, Poornachandran, Pb, and Remya Ajai A. S., “Implementation of DES using pipelining concept with skew core key scheduling in secure transmission of images”, in ACM International Conference Proceeding Series, Coimbatore, 2012, pp. 637-641.

Year : 2012

Performance Analysis and Improvement Using LFSR in the Pipelined Key Scheduling Section

Cite this Research Publication :

Publisher : Springer Berlin Heidelberg

Year : 2012

Adsvm: Pre-processor plug-in using support vector machine algorithm

Cite this Research Publication :

Publisher : IEEE

Year : 2012

Secure authentication in multimodal biometric systems using cryptographic hash functions

Cite this Research Publication : A. Ashok, Poornachandran, P., and Dr. Krishnashree Achuthan, “Secure authentication in multimodal biometric systems using cryptographic hash functions”, Communications in Computer and Information Science, vol. 335 CCIS, pp. 168-177, 2012.

Publisher : Springer Berlin Heidelberg

Year : 2012

Effective implementation of des algorithm for voice scrambling

Cite this Research Publication : J. Ea John, Ajai, A. SaRemya, and Poornachandran, Pb, “Effective implementation of des algorithm for voice scrambling”, Communications in Computer and Information Science, vol. 335 CCIS, pp. 75-84, 2012.

Publisher : Springer

Book Chapter

Year : 2018

Scalable Framework for Cyber Threat Situational Awareness Based on Domain Name Systems Data Analysis

Cite this Research Publication : R. Vinayakumar, Poornachandran, P., and Dr. Soman K. P., “Scalable Framework for Cyber Threat Situational Awareness Based on Domain Name Systems Data Analysis”, in Big Data in Engineering Applications, S. Sekhar Roy, Samui, P., Deo, R., and Ntalampiras, S., Eds. Singapore: Springer Singapore, 2018, pp. 113–142.

Publisher : Big Data in Engineering Applications, Springer Singapore, Singapore, p.113–142 .

Conference Proceedings

Year : 2017

Deep emotion intensities in tweets

Cite this Research Publication :

Publisher : Deepcybernet at emoint

Year : 2015

Condition monitoring in roller bearings using cyclostationary

Cite this Research Publication :

Publisher : International Symposium on Women in Computing and Informatics

Case Study

Year : 2014

Ensemble learning approach for author profiling Notebook for PAN

Cite this Research Publication :

Publisher : CLEF

Admissions Apply Now