Prabaharan Poornachandran

Orcid: 0000-0002-8812-0474

According to our database1, Prabaharan Poornachandran authored at least 55 papers between 2012 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
A Data-Driven Hybrid Methodology Using Randomized Low-Rank DMD Approximation and Flat-Top FIR Filter for Voltage Fluctuations Monitoring in Grid-Connected Distributed Generation Systems.
IEEE Access, 2023

Alzheimer's Detection and Prediction on MRI Scans: A Comparative Study.
Proceedings of the Multi-disciplinary Trends in Artificial Intelligence, 2023

2022
Social media text analytics of Malayalam-English code-mixed using deep learning.
J. Big Data, 2022

2021
Transformer Based Language Identification for Malayalam-English Code-Mixed Text.
IEEE Access, 2021

2020
DeepDGA-MINet: Cost-Sensitive Deep Learning Based Framework for Handling Multiclass Imbalanced DGA Detection.
Proceedings of the Handbook of Computer Networks and Cyber Security, 2020

2019
Modern Methods for Signal Analysis and Its Applications.
Proceedings of the Recent Advances in Computational Intelligence, 2019

ScaleNet: Scalable and Hybrid Frameworkfor Cyber Threat Situational AwarenessBased on DNS, URL, and Email Data Analysis.
J. Cyber Secur. Mobil., 2019

A Comparative Analysis of Deep Learning Approaches for Network Intrusion Detection Systems (N-IDSs): Deep Learning for N-IDSs.
Int. J. Digit. Crime Forensics, 2019

A Compendium on Network and Host based Intrusion Detection Systems.
CoRR, 2019

Robust Intelligent Malware Detection Using Deep Learning.
IEEE Access, 2019

Deep Learning Approach for Intelligent Intrusion Detection System.
IEEE Access, 2019

Amrita_CEN@FACT: Factuality Identification in Spanish Text.
Proceedings of the Iberian Languages Evaluation Forum co-located with 35th Conference of the Spanish Society for Natural Language Processing, 2019

Ransomware Triage Using Deep Learning: Twitter as a Case Study.
Proceedings of the Cybersecurity and Cyberforensics Conference, 2019

2018
Detecting Android malware using Long Short-term Memory (LSTM).
J. Intell. Fuzzy Syst., 2018

Evaluating deep learning approaches to characterize and classify the DGAs at scale.
J. Intell. Fuzzy Syst., 2018

Detecting malicious domain names using deep learning approaches at scale.
J. Intell. Fuzzy Syst., 2018

Evaluating deep learning approaches to characterize and classify malicious URL's.
J. Intell. Fuzzy Syst., 2018

Deep-Net: Deep Neural Network for Cyber Security Use Cases.
CoRR, 2018

Survey on Prevention, Mitigation and Containment of Ransomware Attacks.
Proceedings of the Security in Computing and Communications - 6th International Symposium, 2018

S.P.O.O.F Net: Syntactic Patterns for identification of Ominous Online Factors.
Proceedings of the 2018 IEEE Security and Privacy Workshops, 2018

Evaluating Shallow and Deep Neural Networks for Network Intrusion Detection Systems in Cyber Security.
Proceedings of the 9th International Conference on Computing, 2018

Code-Mixing: A Brief Survey.
Proceedings of the 2018 International Conference on Advances in Computing, 2018

A deep learning based Part-of-Speech (POS) tagger for Sanskrit language by embedding character level features.
Proceedings of the 10th annual meeting of the Forum for Information Retrieval Evaluation, 2018

2017
Why so abnormal? Detecting domains receiving anomalous surge traffic in a monitored network.
J. Intell. Fuzzy Syst., 2017

Evaluation of Recurrent Neural Network and its Variants for Intrusion Detection System (IDS).
Int. J. Inf. Syst. Model. Des., 2017

deepCybErNet at EmoInt-2017: Deep Emotion Intensities in Tweets.
Proceedings of the 8th Workshop on Computational Approaches to Subjectivity, 2017

Deep Stance and Gender Detection in Tweets on Catalan Independence@Ibereval 2017.
Proceedings of the Second Workshop on Evaluation of Human Language Technologies for Iberian Languages (IberEval 2017) co-located with 33th Conference of the Spanish Society for Natural Language Processing (SEPLN 2017), 2017

Malsign: Threat analysis of signed and implicitly trusted malicious code.
Proceedings of the 2017 International Conference on Public Key Infrastructure and its Applications, 2017

Applying deep learning approaches for network traffic prediction.
Proceedings of the 2017 International Conference on Advances in Computing, 2017

Secure shell (ssh) traffic analysis with flow based features using shallow and deep networks.
Proceedings of the 2017 International Conference on Advances in Computing, 2017

Deep android malware detection and classification.
Proceedings of the 2017 International Conference on Advances in Computing, 2017

Evaluating effectiveness of shallow and deep networks to intrusion detection system.
Proceedings of the 2017 International Conference on Advances in Computing, 2017

Applying convolutional neural network for network intrusion detection.
Proceedings of the 2017 International Conference on Advances in Computing, 2017

Deep encrypted text categorization.
Proceedings of the 2017 International Conference on Advances in Computing, 2017

Evaluating shallow and deep networks for secure shell (ssh)traffic analysis.
Proceedings of the 2017 International Conference on Advances in Computing, 2017

Long short-term memory based operation log anomaly detection.
Proceedings of the 2017 International Conference on Advances in Computing, 2017

Imu sensor based self stabilizing cup for elderly and parkinsonism.
Proceedings of the 2017 International Conference on Advances in Computing, 2017

Deep learning model on stance classification.
Proceedings of the 2017 International Conference on Advances in Computing, 2017

2016
MalJs: Lexical, Structural and Behavioral Analysis of Malicious JavaScripts Using Ensemble Classifier.
Proceedings of the Security in Computing and Communications - 4th International Symposium, 2016

Effortless exchange of personal health records using near field communication.
Proceedings of the 2016 International Conference on Advances in Computing, 2016

Hiper-ping: Data plane based high performance packet generation bypassing kernel on ×86 based commodity systems.
Proceedings of the 2016 International Conference on Advances in Computing, 2016

B-Secure: A Dynamic Reputation System for Identifying Anomalous BGP Paths.
Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications, 2016

Drive-by-Download Malware Detection in Hosts by Analyzing System Resource Utilization Using One Class Support Vector Machines.
Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications, 2016

2015
Condition Monitoring in Roller Bearings using Cyclostationary Features.
Proceedings of the Third International Symposium on Women in Computing and Informatics, 2015

A lexical approach for classifying malicious URLs.
Proceedings of the 2015 International Conference on High Performance Computing & Simulation, 2015

Detecting the network attack vectors on SCADA systems.
Proceedings of the 2015 International Conference on Advances in Computing, 2015

An efficient classification model for detecting advanced persistent threat.
Proceedings of the 2015 International Conference on Advances in Computing, 2015

Internet of Vulnerable Things (IoVT): Detecting Vulnerable SOHO Routers.
Proceedings of the 2015 International Conference on Information Technology, 2015

2014
Human vs. Machine: Analyzing the Robustness of Advertisement Based Captchas.
Proceedings of the Advances in Signal Processing and Intelligent Recognition Systems, 2014

Ensemble Learning Approach for Author Profiling.
Proceedings of the Working Notes for CLEF 2014 Conference, 2014

2012
Performance Analysis and Improvement Using LFSR in the Pipelined Key Scheduling Section of DES.
Proceedings of the Recent Trends in Computer Networks and Distributed Systems Security, 2012

Effective Implementation of DES Algorithm for Voice Scrambling.
Proceedings of the Recent Trends in Computer Networks and Distributed Systems Security, 2012

Secure Authentication in Multimodal Biometric Systems Using Cryptographic Hash Functions.
Proceedings of the Recent Trends in Computer Networks and Distributed Systems Security, 2012

adsvm: pre-processor plug-in using support vector machine algorithm for Snort.
Proceedings of the First International Conference on Security of Internet of Things, 2012

Implementation of DES using pipelining concept with skew core key scheduling in secure transmission of images.
Proceedings of the Second International Conference on Computational Science, 2012


  Loading...