Prabaharan Poornachandran
Orcid: 0000-0002-8812-0474
  According to our database1,
  Prabaharan Poornachandran
  authored at least 55 papers
  between 2012 and 2023.
  
  
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
- 
    on orcid.org
 
On csauthors.net:
Bibliography
  2023
A Data-Driven Hybrid Methodology Using Randomized Low-Rank DMD Approximation and Flat-Top FIR Filter for Voltage Fluctuations Monitoring in Grid-Connected Distributed Generation Systems.
    
  
    IEEE Access, 2023
    
  
    Proceedings of the Multi-disciplinary Trends in Artificial Intelligence, 2023
    
  
  2022
    J. Big Data, 2022
    
  
  2021
    IEEE Access, 2021
    
  
  2020
DeepDGA-MINet: Cost-Sensitive Deep Learning Based Framework for Handling Multiclass Imbalanced DGA Detection.
    
  
    Proceedings of the Handbook of Computer Networks and Cyber Security, 2020
    
  
  2019
    Proceedings of the Recent Advances in Computational Intelligence, 2019
    
  
ScaleNet: Scalable and Hybrid Frameworkfor Cyber Threat Situational AwarenessBased on DNS, URL, and Email Data Analysis.
    
  
    J. Cyber Secur. Mobil., 2019
    
  
A Comparative Analysis of Deep Learning Approaches for Network Intrusion Detection Systems (N-IDSs): Deep Learning for N-IDSs.
    
  
    Int. J. Digit. Crime Forensics, 2019
    
  
    Proceedings of the Iberian Languages Evaluation Forum co-located with 35th Conference of the Spanish Society for Natural Language Processing, 2019
    
  
    Proceedings of the Cybersecurity and Cyberforensics Conference, 2019
    
  
  2018
    J. Intell. Fuzzy Syst., 2018
    
  
    J. Intell. Fuzzy Syst., 2018
    
  
    J. Intell. Fuzzy Syst., 2018
    
  
    J. Intell. Fuzzy Syst., 2018
    
  
    Proceedings of the Security in Computing and Communications - 6th International Symposium, 2018
    
  
    Proceedings of the 2018 IEEE Security and Privacy Workshops, 2018
    
  
Evaluating Shallow and Deep Neural Networks for Network Intrusion Detection Systems in Cyber Security.
    
  
    Proceedings of the 9th International Conference on Computing, 2018
    
  
    Proceedings of the 2018 International Conference on Advances in Computing, 2018
    
  
A deep learning based Part-of-Speech (POS) tagger for Sanskrit language by embedding character level features.
    
  
    Proceedings of the 10th annual meeting of the Forum for Information Retrieval Evaluation, 2018
    
  
  2017
Why so abnormal? Detecting domains receiving anomalous surge traffic in a monitored network.
    
  
    J. Intell. Fuzzy Syst., 2017
    
  
Evaluation of Recurrent Neural Network and its Variants for Intrusion Detection System (IDS).
    
  
    Int. J. Inf. Syst. Model. Des., 2017
    
  
    Proceedings of the 8th Workshop on Computational Approaches to Subjectivity, 2017
    
  
    Proceedings of the Second Workshop on Evaluation of Human Language Technologies for Iberian Languages (IberEval 2017) co-located with 33th Conference of the Spanish Society for Natural Language Processing (SEPLN 2017), 2017
    
  
    Proceedings of the 2017 International Conference on Public Key Infrastructure and its Applications, 2017
    
  
    Proceedings of the 2017 International Conference on Advances in Computing, 2017
    
  
Secure shell (ssh) traffic analysis with flow based features using shallow and deep networks.
    
  
    Proceedings of the 2017 International Conference on Advances in Computing, 2017
    
  
    Proceedings of the 2017 International Conference on Advances in Computing, 2017
    
  
    Proceedings of the 2017 International Conference on Advances in Computing, 2017
    
  
    Proceedings of the 2017 International Conference on Advances in Computing, 2017
    
  
    Proceedings of the 2017 International Conference on Advances in Computing, 2017
    
  
    Proceedings of the 2017 International Conference on Advances in Computing, 2017
    
  
    Proceedings of the 2017 International Conference on Advances in Computing, 2017
    
  
    Proceedings of the 2017 International Conference on Advances in Computing, 2017
    
  
    Proceedings of the 2017 International Conference on Advances in Computing, 2017
    
  
  2016
MalJs: Lexical, Structural and Behavioral Analysis of Malicious JavaScripts Using Ensemble Classifier.
    
  
    Proceedings of the Security in Computing and Communications - 4th International Symposium, 2016
    
  
    Proceedings of the 2016 International Conference on Advances in Computing, 2016
    
  
Hiper-ping: Data plane based high performance packet generation bypassing kernel on ×86 based commodity systems.
    
  
    Proceedings of the 2016 International Conference on Advances in Computing, 2016
    
  
    Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications, 2016
    
  
Drive-by-Download Malware Detection in Hosts by Analyzing System Resource Utilization Using One Class Support Vector Machines.
    
  
    Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications, 2016
    
  
  2015
    Proceedings of the Third International Symposium on Women in Computing and Informatics, 2015
    
  
    Proceedings of the 2015 International Conference on High Performance Computing & Simulation, 2015
    
  
    Proceedings of the 2015 International Conference on Advances in Computing, 2015
    
  
    Proceedings of the 2015 International Conference on Advances in Computing, 2015
    
  
    Proceedings of the 2015 International Conference on Information Technology, 2015
    
  
  2014
    Proceedings of the Advances in Signal Processing and Intelligent Recognition Systems, 2014
    
  
    Proceedings of the Working Notes for CLEF 2014 Conference, 2014
    
  
  2012
Performance Analysis and Improvement Using LFSR in the Pipelined Key Scheduling Section of DES.
    
  
    Proceedings of the Recent Trends in Computer Networks and Distributed Systems Security, 2012
    
  
    Proceedings of the Recent Trends in Computer Networks and Distributed Systems Security, 2012
    
  
Secure Authentication in Multimodal Biometric Systems Using Cryptographic Hash Functions.
    
  
    Proceedings of the Recent Trends in Computer Networks and Distributed Systems Security, 2012
    
  
    Proceedings of the First International Conference on Security of Internet of Things, 2012
    
  
Implementation of DES using pipelining concept with skew core key scheduling in secure transmission of images.
    
  
    Proceedings of the Second International Conference on Computational Science, 2012