default search action
Prabaharan Poornachandran
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j13]Neethu Mohan, S. Sachin Kumar, K. P. Soman, V. G. Sujadevi, Prabaharan Poornachandran, U. Rajendra Acharya:
A Data-Driven Hybrid Methodology Using Randomized Low-Rank DMD Approximation and Flat-Top FIR Filter for Voltage Fluctuations Monitoring in Grid-Connected Distributed Generation Systems. IEEE Access 11: 39228-39242 (2023) - [c38]Namrata Nair, Prabaharan Poornachandran, V. G. Sujadevi, M. Aravind:
Alzheimer's Detection and Prediction on MRI Scans: A Comparative Study. MIWAI 2023: 245-254 - 2022
- [j12]S. Thara, Prabaharan Poornachandran:
Social media text analytics of Malayalam-English code-mixed using deep learning. J. Big Data 9(1): 45 (2022) - 2021
- [j11]S. Thara, Prabaharan Poornachandran:
Transformer Based Language Identification for Malayalam-English Code-Mixed Text. IEEE Access 9: 118837-118850 (2021) - 2020
- [p2]R. Vinayakumar, K. P. Soman, Prabaharan Poornachandran:
DeepDGA-MINet: Cost-Sensitive Deep Learning Based Framework for Handling Multiclass Imbalanced DGA Detection. Handbook of Computer Networks and Cyber Security 2020: 905-928
2010 – 2019
- 2019
- [j10]R. Vinayakumar, Mamoun Alazab, K. P. Soman, Prabaharan Poornachandran, Ameer Al-Nemrat, Sitalakshmi Venkatraman:
Deep Learning Approach for Intelligent Intrusion Detection System. IEEE Access 7: 41525-41550 (2019) - [j9]R. Vinayakumar, Mamoun Alazab, K. P. Soman, Prabaharan Poornachandran, Sitalakshmi Venkatraman:
Robust Intelligent Malware Detection Using Deep Learning. IEEE Access 7: 46717-46738 (2019) - [j8]R. Vinayakumar, K. P. Soman, Prabaharan Poornachandran:
A Comparative Analysis of Deep Learning Approaches for Network Intrusion Detection Systems (N-IDSs): Deep Learning for N-IDSs. Int. J. Digit. Crime Forensics 11(3): 65-89 (2019) - [j7]R. Vinayakumar, K. P. Soman, Prabaharan Poornachandran, Vysakh S. Mohan, Amara Dinesh Kumar:
ScaleNet: Scalable and Hybrid Frameworkfor Cyber Threat Situational AwarenessBased on DNS, URL, and Email Data Analysis. J. Cyber Secur. Mobil. 8(2): 189-240 (2019) - [c37]Vinayakumar R., Mamoun Alazab, Alireza Jolfaei, Soman K. P., Prabaharan Poornachandran:
Ransomware Triage Using Deep Learning: Twitter as a Case Study. CCC 2019: 67-73 - [c36]Bhavukam Premjith, Kutti Padanayl Soman, Prabaharan Poornachandran:
Amrita_CEN@FACT: Factuality Identification in Spanish Text. IberLEF@SEPLN 2019: 111-118 - [p1]K. P. Soman, S. Sachin Kumar, Neethu Mohan, Prabaharan Poornachandran:
Modern Methods for Signal Analysis and Its Applications. Recent Advances in Computational Intelligence 2019: 263-290 - [i2]Rahul-Vigneswaran K, Prabaharan Poornachandran, Soman K. P:
A Compendium on Network and Host based Intrusion Detection Systems. CoRR abs/1904.03491 (2019) - 2018
- [j6]R. Vinayakumar, K. P. Soman, Prabaharan Poornachandran, S. Sachin Kumar:
Evaluating deep learning approaches to characterize and classify the DGAs at scale. J. Intell. Fuzzy Syst. 34(3): 1265-1276 (2018) - [j5]R. Vinayakumar, K. P. Soman, Prabaharan Poornachandran, S. Sachin Kumar:
Detecting Android malware using Long Short-term Memory (LSTM). J. Intell. Fuzzy Syst. 34(3): 1277-1288 (2018) - [j4]R. Vinayakumar, K. P. Soman, Prabaharan Poornachandran:
Evaluating deep learning approaches to characterize and classify malicious URL's. J. Intell. Fuzzy Syst. 34(3): 1333-1343 (2018) - [j3]R. Vinayakumar, K. P. Soman, Prabaharan Poornachandran:
Detecting malicious domain names using deep learning approaches at scale. J. Intell. Fuzzy Syst. 34(3): 1355-1367 (2018) - [c35]B. Premjith, Soman K. P, Prabaharan Poornachandran:
A deep learning based Part-of-Speech (POS) tagger for Sanskrit language by embedding character level features. FIRE 2018: 56-60 - [c34]S. Thara, Prabaharan Poornachandran:
Code-Mixing: A Brief Survey. ICACCI 2018: 2382-2388 - [c33]Rahul-Vigneswaran K, R. Vinayakumar, K. P. Soman, Prabaharan Poornachandran:
Evaluating Shallow and Deep Neural Networks for Network Intrusion Detection Systems in Cyber Security. ICCCNT 2018: 1-6 - [c32]Vysakh S. Mohan, R. Vinayakumar, Soman K. P, Prabaharan Poornachandran:
S.P.O.O.F Net: Syntactic Patterns for identification of Ominous Online Factors. IEEE Symposium on Security and Privacy Workshops 2018: 258-263 - [c31]Sumith Maniath, Prabaharan Poornachandran, V. G. Sujadevi:
Survey on Prevention, Mitigation and Containment of Ransomware Attacks. SSCC 2018: 39-52 - [i1]R. Vinayakumar, Barathi Ganesh HB, Prabaharan Poornachandran, Anand Kumar M, Soman K. P:
Deep-Net: Deep Neural Network for Cyber Security Use Cases. CoRR abs/1812.03519 (2018) - 2017
- [j2]R. Vinayakumar, K. P. Soman, Prabaharan Poornachandran:
Evaluation of Recurrent Neural Network and its Variants for Intrusion Detection System (IDS). Int. J. Inf. Syst. Model. Des. 8(3): 43-63 (2017) - [j1]Aravind Ashok, Prabaharan Poornachandran, Soumajit Pal, A. U. Prem Sankar, Surendran K:
Why so abnormal? Detecting domains receiving anomalous surge traffic in a monitored network. J. Intell. Fuzzy Syst. 32(4): 2901-2907 (2017) - [c30]R. Vinayakumar, K. P. Soman, Prabaharan Poornachandran:
Long short-term memory based operation log anomaly detection. ICACCI 2017: 236-242 - [c29]R. Vinayakumar, K. P. Soman, Prabaharan Poornachandran:
Evaluating shallow and deep networks for secure shell (ssh)traffic analysis. ICACCI 2017: 266-274 - [c28]R. Vinayakumar, K. P. Soman, Prabaharan Poornachandran:
Deep encrypted text categorization. ICACCI 2017: 364-370 - [c27]R. Vinayakumar, K. P. Soman, Prabaharan Poornachandran:
Applying convolutional neural network for network intrusion detection. ICACCI 2017: 1222-1228 - [c26]R. Vinayakumar, K. P. Soman, Prabaharan Poornachandran:
Evaluating effectiveness of shallow and deep networks to intrusion detection system. ICACCI 2017: 1282-1289 - [c25]R. Vinayakumar, K. P. Soman, Prabaharan Poornachandran:
Deep android malware detection and classification. ICACCI 2017: 1677-1683 - [c24]R. Vinayakumar, K. P. Soman, Prabaharan Poornachandran:
Secure shell (ssh) traffic analysis with flow based features using shallow and deep networks. ICACCI 2017: 2026-2032 - [c23]Vishnu Vidya, Prabaharan Poornachandran, V. G. Sujadevi, Meher Madhu Dharmana:
Imu sensor based self stabilizing cup for elderly and parkinsonism. ICACCI 2017: 2264-2269 - [c22]R. Vinayakumar, K. P. Soman, Prabaharan Poornachandran:
Applying deep learning approaches for network traffic prediction. ICACCI 2017: 2353-2358 - [c21]Gayathri Rajendran, Prabaharan Poornachandran, Bhadrachalam Chitturi:
Deep learning model on stance classification. ICACCI 2017: 2407-2409 - [c20]Soumajit Pal, Prabaharan Poornachandran, Manu R. Krishnan, A. U. Prem Sankar, Parvathy Sasikala:
Malsign: Threat analysis of signed and implicitly trusted malicious code. PKIA 2017: 23-27 - [c19]R. Vinayakumar, S. Sachin Kumar, B. Premjith, Prabaharan Poornachandran, Soman Kotti Padannayil:
Deep Stance and Gender Detection in Tweets on Catalan Independence@Ibereval 2017. IberEval@SEPLN 2017: 222-229 - [c18]R. Vinayakumar, B. Premjith, S. Sachin Kumar, K. P. Soman, Prabaharan Poornachandran:
deepCybErNet at EmoInt-2017: Deep Emotion Intensities in Tweets. WASSA@EMNLP 2017: 259-263 - 2016
- [c17]Prabaharan Poornachandran, S. Praveen, Aravind Ashok, Manu R. Krishnan, K. P. Soman:
Drive-by-Download Malware Detection in Hosts by Analyzing System Resource Utilization Using One Class Support Vector Machines. FICTA (2) 2016: 129-137 - [c16]A. U. Prem Sankar, Prabaharan Poornachandran, Aravind Ashok, Manu R. Krishnan, P. Hrudya:
B-Secure: A Dynamic Reputation System for Identifying Anomalous BGP Paths. FICTA (1) 2016: 767-775 - [c15]Aravind C. Ajayan, Prabaharan Poornachandran, Manu R. Krishnan, Soumajit Pal:
Hiper-ping: Data plane based high performance packet generation bypassing kernel on ×86 based commodity systems. ICACCI 2016: 478-483 - [c14]V. G. Sujadevi, Twintu H. Kumar, A. S. Arunjith, P. Hrudya, Prabaharan Poornachandran:
Effortless exchange of personal health records using near field communication. ICACCI 2016: 1764-1769 - [c13]Surendran K, Prabaharan Poornachandran, Aravind Ashok Nair, Srinath N, Ysudhir Kumar, P. Hrudya:
MalJs: Lexical, Structural and Behavioral Analysis of Malicious JavaScripts Using Ensemble Classifier. SSCC 2016: 439-449 - 2015
- [c12]Prabaharan Poornachandran, R. Sreeram, Manu R. Krishnan, Soumajit Pal, A. U. Prem Sankar, Aravind Ashok:
Internet of Vulnerable Things (IoVT): Detecting Vulnerable SOHO Routers. ICIT 2015: 119-123 - [c11]Ram Sandesh Ramachandruni, Prabaharan Poornachandran:
Detecting the network attack vectors on SCADA systems. ICACCI 2015: 707-712 - [c10]Saranya Chandran, P. Hrudya, Prabaharan Poornachandran:
An efficient classification model for detecting advanced persistent threat. ICACCI 2015: 2001-2009 - [c9]Michael C. Darling, Greg Heileman, Gilad Gressel, Aravind Ashok, Prabaharan Poornachandran:
A lexical approach for classifying malicious URLs. HPCS 2015: 195-202 - [c8]S. Sachin Kumar, Neethu Mohan, Prabaharan Poornachandran, K. P. Soman:
Condition Monitoring in Roller Bearings using Cyclostationary Features. WCI 2015: 690-697 - 2014
- [c7]Surendran K, Gilad Gressel, Thara S, P. Hrudya, Aravind Ashok, Prabaharan Poornachandran:
Ensemble Learning Approach for Author Profiling. CLEF (Working Notes) 2014: 1148-1156 - [c6]Prabaharan Poornachandran, P. Hrudya, Jothis Reghunadh:
Human vs. Machine: Analyzing the Robustness of Advertisement Based Captchas. SIRS 2014: 477-489 - 2012
- [c5]K. Praveen, Prabaharan Poornachandran, A. S. Remya Ajai:
Implementation of DES using pipelining concept with skew core key scheduling in secure transmission of images. CCSEIT 2012: 637-641 - [c4]Annie George, Prabaharan Poornachandran, M. Ramachandra Kaimal:
adsvm: pre-processor plug-in using support vector machine algorithm for Snort. SECURIT 2012: 179-184 - [c3]Jinu Elizabeth John, A. S. Remya Ajai, Prabaharan Poornachandran:
Effective Implementation of DES Algorithm for Voice Scrambling. SNDS 2012: 75-84 - [c2]Aravind Ashok, Prabaharan Poornachandran, Krishnashree Achuthan:
Secure Authentication in Multimodal Biometric Systems Using Cryptographic Hash Functions. SNDS 2012: 168-177 - [c1]P. V. Sruthi, Prabaharan Poornachandran, A. S. Remya Ajai:
Performance Analysis and Improvement Using LFSR in the Pipelined Key Scheduling Section of DES. SNDS 2012: 215-224
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:52 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint