Back close
Publications
Distributed representation using target classes: Bag of tricks for security and privacy analytics Amrita-NLP@IWSPA-2018

Authors : Barathi Ganesh, H.B., Vinayakumar, R., Anand Kumar, M., Soman, K.P.

Publisher :CEUR Workshop Proceedings, CEUR-WS

Publications
Distributed human interaction proof for public Blockchain platform

Authors : M. Kumar, Sindhu, M., Sethumadhavan, M., Lakshmy, K.V.

Publisher :International Journal of Engineering and Technology(UAE)

Publications
Effective Implementation of Automated Fertilization Unit Using Analog pH Sensor and Arduino

Authors : Oberoi, A., Basavaraju, S., Lekshmi, S.

Publisher :2017 IEEE International Conference on Computational Intelligence and Computing Research, ICCIC 2017

Publications
Disk memory forensics: Analysis of memory forensics frameworks flow

Authors : Prem, T., Selwin, V.P., Ashok Kumar Mohan

Publisher :2017 Innovations in Power and Advanced Computing Technologies, i-PACT 2017

Publications
Effect of Variation in Zinc Content and Ageing Treatment on Tribological Properties of Cast Aluminium-Zinc Alloys

Authors : Ilyas Hussain, Dr. Ilangovan S.

Publisher :International Journal of Pure and Applied Mathematics

Publications
Power And Delay Efficient Exact Adder For Approximate Multiplier

Authors : V. V. Kavipranesh, J. Janarthanan, T. N. Amruth, T. M. Harisuriya, Prabhu E.

Publisher :2018 International Conference on Advances in Computing, Communications and Informatics (ICACCI).

Publications
Detection and isolation of Black Hole in VANET

Authors : Gautham, P.S., Shanmughasundaram, R.

Publisher :2017 International Conference on Intelligent Computing, Instrumentation and Control Technologies, ICICICT 2017

Publications
Detecting Ransomware using GURLS

Authors : Harikrishnan, N., Soman, K.

Publisher :Proceedings of 2018 2nd International Conference on Advances in Electronics, Computers and Communications, ICAECC 2018

Publications
Detecting phishing E-mail using machine learning techniques CEN-SecureNLP

Authors : Unnithan, N.A., Harikrishnan, N.B., Vinayakumar, R., Soman, K.P., Sundarakrishna, S.

Publisher :CEUR Workshop Proceedings

Publications
Control for transformation of a four wheeled to two wheeled mobile robot

Authors : J.S.Lekshmi, Nandagopal J. L.

Publisher :Materials Today: Proceedings .

Publications
Detecting malicious domain names using deep learning approaches at scale

Authors : Vinayakumar, R., Dr. Soman K. P., Poornachandran, P.

Publisher :Journal of Intelligent and Fuzzy Systems, IOS Press

Publications
Detecting Android malware using Long Short-term Memory (LSTM)

Authors : Vinayakumar, R., Soman, K.P., Poornachandran, P., Sachin Kumar, S.

Publisher :Journal of Intelligent and Fuzzy Systems

Admissions Apply Now