Back close
Publications
Malsign: Threat analysis of signed and implicitly trusted malicious code

Authors : Pal Soumajit, Krishnan Manu R, Sankar AU Prem, Sasikala Parvathy

Publisher :IEEE

Publications
Evaluating shallow and deep networks for secure shell (ssh) traffic analysis

Authors : Vinayakumar R, Soman KP

Publisher :IEEE

Publications
Spoofing technique to counterfeit the GPS receiver on a drone

Authors : Shijith N, Sujadevi VG, Dharmana Meher Madhu, P. Poornachandran

Publisher :2017 International Conference on Technological Advancements in Power and Energy ( TAP Energy)

Publications
Secure shell (ssh) traffic analysis with flow based features using shallow and deep networks

Authors : Vinayakumar R, Soman KP, Prof. Prabaharan Poornachandran

Publisher :2017 International Conference on Advances in Computing Communications and Informatics (ICACCI) .

Publications
Deep encrypted text categorisation

Authors : Vinayakumar R, Soman KP

Publisher :IEEE

Publications
Deep Stance and Gender Detection in Tweets on Catalan Independence

Authors : Vinayakumar R, Sachin Kumar S, soman KP

Publisher :Ibereval

Publications
Long short-term memory based operation log anomaly detection

Authors : Vinayakumar R, Soman KP

Publisher :IEEE

Publications
Suppressing Parkinson’s diseases induced involuntary movements using wearables

Authors : Vidya Vishnu, Sujadevi VG, Dharmana Meher Madhu, Poornachandran, P

Publisher :2017 International Conference on Technological Advancements in Power and Energy ( TAP Energy)

Publications
Applying convolutional neural network for network intrusion detection

Authors : Vinayakumar R, Soman KP

Publisher :IEEE

Publications
IMU sensor based self stabilizing cup for elderly and parkinsonism

Authors : Vidya Vishnu, Soman KP

Publisher :IEEE

Publications
Deep emotion intensities in tweets

Authors : Vinayakumar R, Premjith B, Kumar Sachin, Soman KP

Publisher :Deepcybernet at emoint

Admissions Apply Now