Aravind Ashok
Orcid: 0000-0002-0984-7051
  According to our database1,
  Aravind Ashok
  authored at least 12 papers
  between 2012 and 2023.
  
  
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
  2023
    Proceedings of the Information Processing in Medical Imaging, 2023
    
  
  2022
A graph neural network framework for mapping histological topology in oral mucosal tissue.
    
  
    BMC Bioinform., 2022
    
  
  2020
    Proceedings of the ESEM '20: ACM / IEEE International Symposium on Empirical Software Engineering and Measurement, 2020
    
  
  2019
Leveraging mutants for automatic prediction of metamorphic relations using machine learning.
    
  
    Proceedings of the 3rd ACM SIGSOFT International Workshop on Machine Learning Techniques for Software Quality Evaluation, 2019
    
  
  2017
Why so abnormal? Detecting domains receiving anomalous surge traffic in a monitored network.
    
  
    J. Intell. Fuzzy Syst., 2017
    
  
  2016
MalJs: Lexical, Structural and Behavioral Analysis of Malicious JavaScripts Using Ensemble Classifier.
    
  
    Proceedings of the Security in Computing and Communications - 4th International Symposium, 2016
    
  
    Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications, 2016
    
  
Drive-by-Download Malware Detection in Hosts by Analyzing System Resource Utilization Using One Class Support Vector Machines.
    
  
    Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications, 2016
    
  
  2015
    Proceedings of the 2015 International Conference on High Performance Computing & Simulation, 2015
    
  
    Proceedings of the 2015 International Conference on Information Technology, 2015
    
  
  2014
    Proceedings of the Working Notes for CLEF 2014 Conference, 2014
    
  
  2012
Secure Authentication in Multimodal Biometric Systems Using Cryptographic Hash Functions.
    
  
    Proceedings of the Recent Trends in Computer Networks and Distributed Systems Security, 2012