Network intrusion detection system based on machine learning algorithms V Das, V Pathak, S Sharma, R Sreevathsan, M Srikanth, G Kumar International Journal of Computer Science and Information Technology 2 (6 …, 2010 | 67 | 2010 |
Relating the embedding efficiency of LSB steganography techniques in spatial and transform domains P Malathi, T Gireeshkumar Procedia Computer Science 93, 878-885, 2016 | 51 | 2016 |
Static and dynamic analysis for android malware detection K Sugunan, T Gireesh Kumar, KA Dhanya Advances in Big Data and Cloud Computing, 147-155, 2018 | 44 | 2018 |
Facial expression classification using machine learning approach: a review A Baskar, T Gireesh Kumar Data Engineering and Intelligent Computing: Proceedings of IC3T 2016, 337-345, 2018 | 34 | 2018 |
An intelligent question answering conversational agent using Naïve Bayesian classifier M Niranjan, MS Saipreethy, TG Kumar 2012 IEEE international conference on technology enhanced education (ICTEE), 1-5, 2012 | 34 | 2012 |
Detection of network attacks using machine learning and deep learning models KA Dhanya, S Vajipayajula, K Srinivasan, A Tibrewal, TS Kumar, ... Procedia Computer Science 218, 57-66, 2023 | 30 | 2023 |
Graph similarity-based hierarchical clustering of trajectory data BA Sabarish, R Karthi, TG Kumar Procedia Computer Science 171, 32-41, 2020 | 30 | 2020 |
Feature based steganalysis using wavelet decomposition and magnitude statistics G Kumar, R Jithin, DD Shankar 2010 International Conference on Advances in Computer Engineering, 298-300, 2010 | 27 | 2010 |
Malware capturing and detection in dionaea honeypot PD Ali, TG Kumar 2017 Innovations in Power and Advanced Computing Technologies (i-PACT), 1-5, 2017 | 26 | 2017 |
Advance persistent threat detection using long short term memory (LSTM) neural networks PV Sai Charan, T Gireesh Kumar, P Mohan Anand Emerging Technologies in Computer Engineering: Microservices in Big Data …, 2019 | 24 | 2019 |
Agent based ground flight control using type-2 fuzzy logic and hybrid ant colony optimization to a dynamic environment KJ Poornaselvan, TG Kumar, VP Vijayan 2008 First International Conference on Emerging Trends in Engineering and …, 2008 | 24 | 2008 |
A novel authentication framework for Hadoop PK Rahul, T GireeshKumar Artificial Intelligence and Evolutionary Algorithms in Engineering Systems …, 2015 | 20 | 2015 |
A computational approach to determine shielding effectiveness of carbon nanotube-based nanocomposites for EMC application SS Prabhu, R Bhavani, GK Thonnuthodi, R Thiruvengadathan Computational Materials Science 126, 400-406, 2017 | 19 | 2017 |
A multi class classification for detection of IoT botnet malware H Chunduri, T Gireesh Kumar, PVS Charan International conference on computing science, communication and security, 17-29, 2021 | 18 | 2021 |
An ensemble approach for algorithmically generated domain name detection using statistical and lexical analysis PM Anand, TG Kumar, PVS Charan Procedia Computer Science 171, 1129-1136, 2020 | 18 | 2020 |
A survey on DNA and image steganography RE Vinodhini, P Malathi, TG Kumar 2017 4th International Conference on Advanced Computing and Communication …, 2017 | 18 | 2017 |
A survey of location prediction using trajectory mining BA Sabarish, R Karthi, T Gireeshkumar Artificial Intelligence and Evolutionary Algorithms in Engineering Systems …, 2015 | 16 | 2015 |
Neighbor attack detection in internet of things A Thomas, T Gireesh Kumar, AK Mohan Advanced Computational and Communication Paradigms: Proceedings of …, 2018 | 15 | 2018 |
Clustering of trajectory data using hierarchical approaches BA Sabarish, R Karthi, T Gireeshkumar Computational Vision and Bio Inspired Computing, 215-226, 2018 | 15 | 2018 |
A multi-agent optimal path planning approach to robotics environment G Kumar, VP Vijayan International Conference on Computational Intelligence and Multimedia …, 2007 | 14 | 2007 |