Vivek Balachandran

According to our database1, Vivek Balachandran authored at least 27 papers between 2011 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Towards a Hybrid Security Framework for Phishing Awareness Education and Defense.
Future Internet, March, 2024

Mitigating Bias in Machine Learning Models for Phishing Webpage Detection.
Proceedings of the 16th International Conference on COMmunication Systems & NETworkS, 2024

2023
Authentic Assessment of Programme Learning Outcomes in Infocomm Technology.
Proceedings of the IEEE International Conference on Teaching, 2023

Bridging the Gap in Phishing Detection: A Comprehensive Phishing Dataset Collector.
Proceedings of the IEEE International Conference on Service Operations and Logistics, 2023

ASAP: Application Security Assessment Protocol.
Proceedings of the IEEE International Conference on Service Operations and Logistics, 2023

2022
NFT-Merit: An NFT-based Module Credit Management System on Ethereum Blockchain.
Proceedings of the IEEE International Conference on Teaching, 2022

Towards Robust Detection of PDF-based Malware.
Proceedings of the CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24, 2022

Using Adversarial Defences Against Image Classification CAPTCHA.
Proceedings of the CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24, 2022

2021
Distributed ledger technology: Its evolutionary path and the road ahead.
Inf. Manag., 2021

Data Analysis for Curriculum Alteration in Information Communication Technology.
Proceedings of the 2021 IEEE International Conference on Engineering, 2021

ABC-Verify: AI-Blockchain Integrated Framework for Tweet Misinformation Detection.
Proceedings of the 2021 IEEE International Conference on Service Operations and Logistics, 2021

Blockchain-based Proof of Existence (PoE) Framework using Ethereum Smart Contracts.
Proceedings of the CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy, 2021

Neutralizing Hostile Drones with Surveillance Drones.
Proceedings of the CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy, 2021

Quantum Obfuscation: Quantum Predicates with Entangled qubits.
Proceedings of the CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy, 2021

2020
GRAMAC: A Graph Based Android Malware Classification Mechanism.
Proceedings of the CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy, 2020

DRAT: A Drone Attack Tool for Vulnerability Assessment.
Proceedings of the CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy, 2020

2019
Incorporating Industry into the Curriculum: Applied Learning in Computer Science.
Proceedings of the IEEE International Conference on Engineering, Technology and Education, 2019

Anomaly Detection on DNS Traffic using Big Data and Machine Learning.
Proceedings of the 2nd International Conference on Big Data and Cyber-Security Intelligence, 2019

2018
AEON: Android Encryption based Obfuscation.
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, 2018

Effectiveness of Android Obfuscation on Evading Anti-malware.
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, 2018

2016
Control flow obfuscation for Android applications.
Comput. Secur., 2016

2014
Software protection through obfuscation
PhD thesis, 2014

Obfuscation by code fragmentation to evade reverse engineering.
Proceedings of the 2014 IEEE International Conference on Systems, Man, and Cybernetics, 2014

Function Level Control Flow Obfuscation for Software Security.
Proceedings of the Eighth International Conference on Complex, 2014

2013
Potent and Stealthy Control Flow Obfuscation by Stack Based Self-Modifying Code.
IEEE Trans. Inf. Forensics Secur., 2013

Software Protection with Obfuscation and Encryption.
Proceedings of the Information Security Practice and Experience, 2013

2011
Software code obfuscation by hiding control flow information in stack.
Proceedings of the 2011 IEEE International Workshop on Information Forensics and Security, 2011


  Loading...