A learning model to detect maliciousness of portable executable using integrated feature set A Kumar, KS Kuppusamy, G Aghila Journal of King Saud University-Computer and Information Sciences 31 (2 …, 2019 | 139 | 2019 |
Temporal sentiment analysis and causal rules extraction from tweets for event prediction PG Preethi, V Uma Procedia Computer Science 48, 84-89, 2015 | 77 | 2015 |
FAMOUS: Forensic Analysis of MObile devices Using Scoring of application permissions A Kumar, KS Kuppusamy, G Aghila Future Generation Computer Systems 83, 158-172, 2018 | 46 | 2018 |
Machine learning based malware classification for Android applications using multimodal image representations A Kumar, KP Sagar, KS Kuppusamy, G Aghila 2016 10th International Conference on Intelligent Systems and Control (ISCO …, 2016 | 41 | 2016 |
AI-assisted Computer Network Operations testbed for Nature-Inspired Cyber Security based adaptive defense simulation and analysis SK Shandilya, S Upadhyay, A Kumar, AK Nagar Future Generation Computer Systems 127, 297-308, 2022 | 38 | 2022 |
Connect the dots: accessibility, readability and site ranking–An investigation with reference to top ranked websites of Government of India A Ismail, KS Kuppusamy, A Kumar, PK Ojha Journal of King Saud University-Computer and Information Sciences 31 (4 …, 2019 | 37 | 2019 |
Machine Learning Algorithm for Detection of False Data Injection Attack in Power System A Kumar, N Saxena, BJ Choi 2021 International Conference on Information Networking (ICOIN), 385-390, 2021 | 22 | 2021 |
Applications of cognitive internet of medical things in modern healthcare MA Jabbar, SK Shandilya, A Kumar, S Shandilya Computers and Electrical Engineering 102, 108276, 2022 | 20 | 2022 |
Internet of Things applications placement to minimize latency in multi-tier fog computing framework P Maiti, B Sahoo, AK Turuk, A Kumar, BJ Choi ICT Express 8 (2), 166-173, 2022 | 19 | 2022 |
Improving detection of false data injection attacks using machine learning with feature selection and oversampling A Kumar, N Saxena, S Jung, BJ Choi Energies 15 (1), 212, 2021 | 15 | 2021 |
SLP-RRFPR: a source location privacy protection scheme based on random ring and limited hop fake packet routing for wireless sensor networks MP Anurag Shukla, Deepak Singh , Mohit Sajwan ,Malay Kumar ,Divya Kumari ... Multimedia Tools and Applications, 2022 | 10 | 2022 |
A source location privacy preservation scheme in WSN-assisted IoT network by randomized ring and confounding transmission AK Anurag Shukla, Deepak Singh, Mohit Sajwan,Abhishek Verma Wireless Networks, https://doi.org/10.1007/s11276-021-02876, 2022 | 10* | 2022 |
Usability evaluation of active anti-phishing browser extensions for persons with visual impairments G Sonowal, KS Kuppusamy, A Kumar 2017 4th International Conference on Advanced Computing and Communication …, 2017 | 10 | 2017 |
PACER: Platform for Android Malware Classification, Performance Evaluation and Threat Reporting A Kumar, V Agarwal, SK Shandilya, A Shalaginov, S Upadhyay, B Yadav Future Internet 12 (4), 66, 2020 | 8 | 2020 |
Modified Firefly Optimization Algorithm-Based IDS for Nature-Inspired Cybersecurity SK Shandilya, BJ Choi, A Kumar, S Upadhyay Processes 11 (3), 715, 2023 | 7 | 2023 |
Towards Multimodal Prediction of Time-continuous Emotion using Pose Feature Engineering and a Transformer Encoder H Park, I Yun, A Kumar, AK Singh, BJ Choi, D Singh, W De Neve Proceedings of the 3rd International on Multimodal Sentiment Analysis …, 2022 | 7 | 2022 |
Malware Attacks: Dimensions, Impact, and Defenses A Kumar, BJ Choi, KS Kuppusamy, G Aghila Advances in Nature-Inspired Cyber Security and Resilience, 157-179, 2021 | 7 | 2021 |
A Malicious Attacks and Defense Techniques on Android-Based Smartphone Platform AK MA Rahim Khan, RC Tripathi International Journal of Innovative Technology and Exploring Engineering …, 2019 | 7* | 2019 |
Benchmarking Machine Learning based Detection of Cyber Attacks for Critical Infrastructure A Kumar, BJ Choi 2022 International Conference on Information Networking (ICOIN), 24-29, 2022 | 6 | 2022 |
A Framework for Malware Detection with Static Features using Machine Learning Algorithms A Kumar Department of Computer Science, Pondicherry University, 2017 | 6 | 2017 |