Srinivas Mukkamala

According to our database1, Srinivas Mukkamala authored at least 77 papers between 2001 and 2021.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2021
On the adoption of scramble keypad for unlocking PIN-protected smartphones.
Int. J. Inf. Comput. Secur., 2021

2018
Employing CNN to Identify Noisy Documents Thereafter Accomplishing Text Line Segmentation.
Proceedings of the TENCON 2018, 2018

A Robust System for Visual Pattern Recognition in Engineering Drawing Documents.
Proceedings of the TENCON 2018, 2018

Automatic Creation of Hyperlinks in AEC Documents by Extracting the Sheet Numbers Using LSTM Model.
Proceedings of the TENCON 2018, 2018

Hand-Written and Machine-Printed Text Classification in Architecture, Engineering & Construction Documents.
Proceedings of the 16th International Conference on Frontiers in Handwriting Recognition, 2018

2017
Automatic Orientation Correction of AEC Drawing Documents.
Proceedings of the 12th International Workshop on Graphics Recognitio, 2017

A Novel Approach for Detecting Circular Callouts in AEC Drawing Documents.
Proceedings of the 12th International Workshop on Graphics Recognitio, 2017

Automatic Elevation Datum Detection and Hyperlinking of Architecture, Engineering & Construction Documents.
Proceedings of the 12th International Workshop on Graphics Recognitio, 2017

A System for Creating Automatic Navigation among Architectural and Construction Documents.
Proceedings of the 14th IAPR International Conference on Document Analysis and Recognition, 2017

An Approach for Detecting Circular Callouts in Architectural, Engineering and Constructional Drawing Documents.
Proceedings of the Graphics Recognition, Current Trends and Evolutions, 2017

A System for Automatic Elevation Datum Detection and Hyperlinking of AEC Drawing Documents.
Proceedings of the Graphics Recognition, Current Trends and Evolutions, 2017

2016
Packer identification using Byte plot and Markov plot.
J. Comput. Virol. Hacking Tech., 2016

Scramble or not, that is the question a study of the security and usability of scramble keypad for PIN unlock on smartphones.
Proceedings of the 2016 IEEE/CIC International Conference on Communications in China, 2016

2015
ARP-Miner: Mining Risk Patterns of Android Malware.
Proceedings of the Multi-disciplinary Trends in Artificial Intelligence, 2015

2014
Detection of shellcodes in drive-by attacks using kernel machines.
J. Comput. Virol. Hacking Tech., 2014

Detection of plugin misuse drive-by download attacks using kernel machines.
Proceedings of the 10th IEEE International Conference on Collaborative Computing: Networking, 2014

2013
Visualization techniques for efficient malware detection.
Proceedings of the 2013 IEEE International Conference on Intelligence and Security Informatics, 2013

Quantitative Security Risk Assessment of Android Permissions and Applications.
Proceedings of the Data and Applications Security and Privacy XXVII, 2013

Mobile malware visual analytics and similarities of Attack Toolkits (Malware gene analysis).
Proceedings of the 2013 International Conference on Collaboration Technologies and Systems, 2013

Image visualization based malware detection.
Proceedings of the 2013 IEEE Symposium on Computational Intelligence in Cyber Security, 2013

Early lung cancer detection using nucleus segementation based features.
Proceedings of the 2013 IEEE Symposium on Computational Intelligence in Bioinformatics and Computational Biology (CIBCB), 2013

2012
Computational Intelligent Techniques and Similarity Measures for Malware Classification.
Proceedings of the Computational Intelligence for Privacy and Security, 2012

Block Level Video Steganalysis Scheme.
Proceedings of the 11th International Conference on Machine Learning and Applications, 2012

Feature Selection for Lung Cancer Detection Using SVM Based Recursive Feature Elimination Method.
Proceedings of the Evolutionary Computation, Machine Learning and Data Mining in Bioinformatics, 2012

Similarity analysis of shellcodes in drive-by download attack kits.
Proceedings of the 8th International Conference on Collaborative Computing: Networking, 2012

Novel Blind Video Forgery Detection Using Markov Models on Motion Residue.
Proceedings of the Intelligent Information and Database Systems - 4th Asian Conference, 2012

2011
Malware detection using assembly and API call sequences.
J. Comput. Virol., 2011

Lung Cancer Detection Using Labeled Sputum Sample: Multi Spectrum Approach.
Proceedings of the Modern Approaches in Applied Intelligence, 2011

2010
Kernel machines for malware classification and similarity analysis.
Proceedings of the International Joint Conference on Neural Networks, 2010

2009
Fragmented malware through RFID and its defenses.
J. Comput. Virol., 2009

Video steganalysis using motion estimation.
Proceedings of the International Joint Conference on Neural Networks, 2009

Role of Computational Intelligence in Malware Detection and Malicious Code Analysis.
Proceedings of the 4th Indian International Conference on Artificial Intelligence, 2009

Labeling of Cancer Cells in Sputum for the Early Detection of Lung Cancer Using Tetrakis Carboxy Phenyl Porphine (TCPP).
Proceedings of the 4th Indian International Conference on Artificial Intelligence, 2009

Video steganalysis using spatial and temporal redundancies.
Proceedings of the 2009 International Conference on High Performance Computing & Simulation, 2009

Event Detection and Localization Using Sensor Networks.
Proceedings of the 2009 International Conference on Wireless Networks, 2009

Real-time monitoring of container stability loss using wireless vibration sensor tags.
Proceedings of the IEEE Conference on Automation Science and Engineering, 2009

Lung Cancer Detection and Classification Using Microarray Data.
Proceedings of the International Conference on Bioinformatics & Computational Biology, 2009

2008
Detection of Phishing Attacks: A Machine Learning Approach.
Proceedings of the Soft Computing Applications in Industry, 2008

SQL infections through RFID.
J. Comput. Virol., 2008

Integrating energy efficiency and security for storage systems.
Proceedings of the IEEE International Conference on Systems, 2008

Signature based intrusion detection using latent semantic analysis.
Proceedings of the International Joint Conference on Neural Networks, 2008

RFID malware fragmentation attacks.
Proceedings of the 2008 International Symposium on Collaborative Technologies and Systems, 2008

2007
Hybrid multi-agent framework for detection of stealthy probes.
Appl. Soft Comput., 2007

Obfuscated Malicious Executable Scanner.
J. Res. Pract. Inf. Technol., 2007

Biased Support Vector Machines and Kernel Methods for Intrusion Detection.
Proceedings of the World Congress on Engineering, 2007

Gene Selection for Tumor Classification Using Microarray Gene Expression Data.
Proceedings of the World Congress on Engineering, 2007

Knowledge Based Discovery of Phishing Attacks.
Proceedings of the 3rd Indian International Conference on Artificial Intelligence, 2007

Estimating Monthly Production of Oil Wells.
Proceedings of the Theoretical Advances and Applications of Fuzzy Logic and Soft Computing, 2007

Detecting Coordinated Distributed Multiple Attacks.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

2006
Feature Ranking and Selection for Intrusion Detection Using Artificial Neural Networks and Statistical Methods.
Proceedings of the International Joint Conference on Neural Networks, 2006

Intrusion Detection Based on Behavior Mining and Machine Learning Techniques.
Proceedings of the Advances in Applied Artificial Intelligence, 2006

Zoomed Clusters.
Proceedings of the Neural Information Processing, 13th International Conference, 2006

Feature Selection and Ranking of Key Genes for Tumor Classification: Using Microarray Gene Expression Data.
Proceedings of the Artificial Intelligence and Soft Computing, 2006

Efficacy of Coordinated Distributed Multiple Attacks (A Proactive Approach to Cyber Defense).
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006

2005
Intrusion detection using an ensemble of intelligent paradigms.
J. Netw. Comput. Appl., 2005

Disassembled code analyzer for malware (DCAM).
Proceedings of the 2005 IEEE International Conference on Information Reuse and Integration, 2005

Fraud Detection System Based on Behavior Mining and Anomaly Detection.
Proceedings of the 2nd Indian International Conference on Artificial Intelligence, 2005

2004
A framework for countering denial of service attacks.
Proceedings of the IEEE International Conference on Systems, 2004

Defeating the Current Steganalysis Techniques (Robust Steganography).
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004

Data Mining Approach for Analyzing Call Center Performance.
Proceedings of the Innovations in Applied Artificial Intelligence, 2004

Modeling Intrusion Detection Systems Using Linear Genetic Programming Approach.
Proceedings of the Innovations in Applied Artificial Intelligence, 2004

Computational Intelligent Techniques for Detecting Denial of Service Attacks.
Proceedings of the Innovations in Applied Artificial Intelligence, 2004

Intrusion Detection Systems Using Adaptive Regression Spines.
Proceedings of the Enterprise Information Systems VI, 2004

Intrusion Detection Systems Using Adaptive Regression Splines.
Proceedings of the ICEIS 2004, 2004

Polymorphic Malicious Executable Scanner by API Sequence Analysis.
Proceedings of the 4th International Conference on Hybrid Intelligent Systems (HIS 2004), 2004

Website Visitor Classification Using Machine Learning.
Proceedings of the 4th International Conference on Hybrid Intelligent Systems (HIS 2004), 2004

The Feature Selection and Intrusion Detection Problems.
Proceedings of the Advances in Computer Science, 2004

Static Analyzer of Vicious Executables (SAVE).
Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC 2004), 2004

2003
Identifying Significant Features for Network Forensic Analysis Using Artificial Intelligence Techniques.
Int. J. Digit. EVid., 2003

Artificial intelligent techniques for intrusion detection.
Proceedings of the IEEE International Conference on Systems, 2003

Identifying Important Features for Intrusion Detection Using Support Vector Machines and Neural Networks.
Proceedings of the 2003 Symposium on Applications and the Internet (SAINT 2003), 27-31 January 2003, 2003

A Distributed Agent Based IDS for Stealthy Probe Detection.
Proceedings of the 1st Indian International Conference on Artificial Intelligence, 2003

A Comparative Study of Techniques for Intrusion Detection.
Proceedings of the 15th IEEE International Conference on Tools with Artificial Intelligence (ICTAI 2003), 2003

Distributed Multi-Intelligent Agent Framework for Detection of Stealthy Probes.
Proceedings of the Design and Application of Hybrid Intelligent Systems, 2003

Detecting denial of service attacks using support vector machines.
Proceedings of the 12th IEEE International Conference on Fuzzy Systems, 2003

2002
Performance Based Feature Identification for Intrusion Detection Using Support Vector Machines.
Proceedings of the Soft Computing Systems - Design, Management and Applications, 2002

2001
Monitoring System Security Using Neural Networks and Support Vector Machines.
Proceedings of the Hybrid Information Systems, 2001


  Loading...