P. Vinod
Orcid: 0000-0001-6078-2014Affiliations:
- Cochin University of Science and Technology, India
- SCMS School of Engineering, Ernakulam / Karukutty, Kerala, India (former)
- University of Padua, Italy (former)
- Malaviya National Institute of Technology, Jaipur, India (PhD)
According to our database1,
P. Vinod
authored at least 83 papers
between 2011 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on scopus.com
-
on orcid.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2025
Clust. Comput., April, 2025
Int. J. Inf. Sec., February, 2025
J. Netw. Comput. Appl., 2025
Future Gener. Comput. Syst., 2025
2024
XAITrafficIntell: Interpretable Cyber Threat Intelligence for Darknet Traffic Analysis.
J. Netw. Syst. Manag., October, 2024
SFC-NIDS: a sustainable and explainable flow filtering based concept drift-driven security approach for network introspection.
Clust. Comput., October, 2024
Clust. Comput., October, 2024
Multim. Tools Appl., August, 2024
Effectiveness of machine learning based android malware detectors against adversarial attacks.
Clust. Comput., June, 2024
A defensive attention mechanism to detect deepfake content across multiple modalities.
Multim. Syst., February, 2024
Microprocess. Microsystems, 2024
CoRR, 2024
MoRSE: Bridging the Gap in Cybersecurity Expertise with Retrieval Augmented Generation.
CoRR, 2024
CoRR, 2024
Comput. Secur., 2024
Comput. Commun., 2024
LFGurad: A Defense against Label Flipping Attack in Federated Learning for Vehicular Network.
Comput. Networks, 2024
vDefender: An explainable and introspection-based approach for identifying emerging malware behaviour at hypervisor-layer in virtualization environment.
Comput. Electr. Eng., 2024
DLShield: A Defense Approach Against Dirty Label Attacks in Heterogeneous Federated Learning.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2024
Proceedings of the Natural Language Processing and Information Systems, 2024
Proceedings of the Computer Security - ESORICS 2024, 2024
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024
2023
A Privacy Preservation Framework Using Integration of Blockchain and Federated Learning.
SN Comput. Sci., November, 2023
Multim. Syst., October, 2023
A defensive framework for deepfake detection under adversarial settings using temporal and spatial features.
Int. J. Inf. Sec., October, 2023
IEEE Syst. J., June, 2023
Obfuscated Malware Detection in IoT Android Applications Using Markov Images and CNN.
IEEE Syst. J., June, 2023
Concurr. Comput. Pract. Exp., January, 2023
CoRR, 2023
Proceedings of the 16th International Conference on Security of Information and Networks, 2023
Proceedings of the 2023 Fifteenth International Conference on Contemporary Computing, 2023
2022
J. Comput. Virol. Hacking Tech., 2022
A Deep Learning Approach for Classifying Vulnerability Descriptions Using Self Attention Based Neural Network.
J. Netw. Syst. Manag., 2022
J. Inf. Secur. Appl., 2022
Expert Syst. J. Knowl. Eng., 2022
A few-shot malware classification approach for unknown family recognition using malware feature visualization.
Comput. Secur., 2022
Clust. Comput., 2022
Performance evaluation of deep neural network on malware detection: visual feature approach.
Clust. Comput., 2022
Proceedings of the 8th International Conference on Information Systems Security and Privacy, 2022
Multi-Domain Network Traffic Analysis using Machine Learning and Deep Learning Techniques.
Proceedings of the 2022 Fourteenth International Conference on Contemporary Computing, 2022
2021
Comput. Secur., 2021
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 25th International Conference KES-2021, 2021
A Study on Misclassification of Software Vulnerabilities when using Deep Learning and Machine Learning Algorithms.
Proceedings of the Italian Conference on Cybersecurity, 2021
Automatic Classification of Vulnerabilities using Deep Learning and Machine Learning Algorithms.
Proceedings of the International Joint Conference on Neural Networks, 2021
Hide and Seek Game: A Machine Learning Approach for Detecting Malicious Samples in Analysis Environment.
Proceedings of the IC3 2021: Thirteenth International Conference on Contemporary Computing, Noida, India, August 5, 2021
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2021
Proceedings of the 18th IEEE/ACS International Conference on Computer Systems and Applications, 2021
2020
Secure Brain-to-Brain Communication With Edge Computing for Assisting Post-Stroke Paralyzed Patients.
IEEE Internet Things J., 2020
Detection of algorithmically-generated domains: An adversarial machine learning approach.
Comput. Commun., 2020
Can machine learning model with static features be fooled: an adversarial machine learning approach.
Clust. Comput., 2020
Clust. Comput., 2020
Proceedings of the 17th IEEE/ACS International Conference on Computer Systems and Applications, 2020
2019
A machine learning based approach to detect malicious android apps using discriminant system calls.
Future Gener. Comput. Syst., 2019
Concurr. Comput. Pract. Exp., 2019
2018
FeatureAnalytics: An approach to derive relevant attributes for analyzing Android Malware.
CoRR, 2018
Proceedings of the Security and Privacy - Second ISEA International Conference, 2018
2017
J. Comput. Virol. Hacking Tech., 2017
2015
Proceedings of the 8th International Conference on Security of Information and Networks, 2015
Proceedings of the 8th International Conference on Security of Information and Networks, 2015
Proceedings of the 8th International Conference on Security of Information and Networks, 2015
Proceedings of the Eighth International Conference on Contemporary Computing, 2015
Proceedings of the Eighth International Conference on Contemporary Computing, 2015
2014
Int. J. Inf. Comput. Secur., 2014
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2014
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2014
Proceedings of the 7th International Conference on Security of Information and Networks, 2014
Proceedings of the Fifth International Conference on the Applications of Digital Information and Web Technologies, 2014
Proceedings of the 2014 International Conference on Advances in Computing, 2014
Proceedings of the 2014 International Conference on Advances in Computing, 2014
Proceedings of the 2014 International Conference on Advances in Computing, 2014
Proceedings of the 2014 International Conference on Advances in Computing, 2014
Proceedings of the Seventh International Conference on Contemporary Computing, 2014
2013
Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops, 2013
2012
Proceedings of the 5th International Conference of Security of Information and Networks, 2012
Mining control flow graph as <i>API call-grams</i> to detect portable executable malware.
Proceedings of the 5th International Conference of Security of Information and Networks, 2012
Proceedings of the First International Conference on Security of Internet of Things, 2012
Proceedings of the First International Conference on Security of Internet of Things, 2012
2011
Proceedings of the Advances in Computing and Communications, 2011
Proceedings of the Cyber Security, Cyber Crime and Cyber Forensics, 2011