Identification of malicious android app using manifest and opcode features MV Varsha, P Vinod, KA Dhanya Journal of Computer Virology and Hacking Techniques 13, 125-138, 2017 | 59 | 2017 |
Static and dynamic analysis for android malware detection K Sugunan, T Gireesh Kumar, KA Dhanya Advances in Big Data and Cloud Computing, 147-155, 2018 | 46 | 2018 |
A review on latest internet of things based healthcare applications V Philip, VK Suman, VG Menon, KA Dhanya International Journal of Computer Science and Information Security 15 (1), 248, 2017 | 46 | 2017 |
Detection of network attacks using machine learning and deep learning models KA Dhanya, S Vajipayajula, K Srinivasan, A Tibrewal, TS Kumar, ... Procedia Computer Science 218, 57-66, 2023 | 45 | 2023 |
Multiclass emotion extraction from sentences B Thomas, P Vinod, KA Dhanya International Journal of Scientific & Engineering Research 5 (2), 12-15, 2014 | 23 | 2014 |
Genetic algorithm with different feature selection method for intrusion detection N Cleetus, KA Dhanya 2014 First International Conference on Computational Systems and …, 2014 | 15 | 2014 |
Multi-objective functions in particle swarm optimization for intrusion detection N Cleetus, KA Dhanya 2014 International Conference on Advances in Computing, Communications and …, 2014 | 15 | 2014 |
Efficient Feature Set for Spam Email Filtering R Varghese, KA Dhanya 2017 IEEE 7th International Advance Computing Conference (IACC), 2017 | 13 | 2017 |
Detection of obfuscated mobile malware with machine learning and deep learning models KA Dhanya, OK Dheesha, T Gireesh Kumar, P Vinod Symposium on Machine Learning and Metaheuristics Algorithms, and …, 2020 | 11 | 2020 |
Efficient Android Malware Scanner Using Hybrid Analysis TGK K.A. Dhanya International Journal of Recent Technology and Engineering(TM) 7 (Issue …, 2019 | 10* | 2019 |
Obfuscated Malware Detection in IoT Android Applications Using Markov Images and CNN KA Dhanya, P Vinod, SY Yerima, A Bashar, A David, T Abhiram, A Antony, ... IEEE Systems Journal 17 (2), 2756-2766, 2023 | 9 | 2023 |
Heterogeneous feature space for Android malware detection MV Varsha, P Vinod, KA Dhanya 2015 Eighth International Conference on Contemporary Computing (IC3), 383-388, 2015 | 8 | 2015 |
Multi-objective particle swarm optimization in intrusion detection N Cleetus, KA Dhanya Computational Intelligence in Data Mining-Volume 2: Proceedings of the …, 2015 | 5 | 2015 |
Hartley's test ranked opcodes for Android malware analysis MM John, P Vinod, KA Dhanya Proceedings of the 8th International Conference on Security of Information …, 2015 | 4 | 2015 |
Rule induction using ant-miner algorithm N Cleetus, KA Dhanya Int. J. Sci. Eng. Res 5, 6-11, 2014 | 4 | 2014 |
A Deep Learning-Based Model for an efficient Hate-speech Detection in Twitter PR Vishnu, B Agarwal, P Vinod, KA Dhanya, A Baroni Securing Social Networks in Cyberspace, 123-138, 2021 | 3 | 2021 |
Twitter Sentiments: A Machine Learning Approach B John, C Vishnu, R Joshua, KA Dhanya 2021 Third International Conference on Intelligent Communication …, 2021 | 3 | 2021 |
Applicability of clustering techniques on masquerade detection R Raveendran, KA Dhanya 2014 International Conference on Advances in Computing, Communications and …, 2014 | 1 | 2014 |
Covariance matrix method based technique for masquerade detection R Raveendran, KA Dhanya International Conference for Convergence for Technology-2014, 1-5, 2014 | 1 | 2014 |
6 A Deep Learning-Based PR Vishnu, B Agarwal, P Vinod, KA Dhanya, A Baroni Securing Social Networks in Cyberspace, 123, 2021 | | 2021 |