Prabaharan Poornachandran
Orcid: 0000-0002-8812-0474
According to our database1,
Prabaharan Poornachandran
authored at least 55 papers
between 2012 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
2012
2014
2016
2018
2020
2022
0
5
10
15
1
1
1
1
1
5
5
2
1
2
5
13
5
5
2
5
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2023
A Data-Driven Hybrid Methodology Using Randomized Low-Rank DMD Approximation and Flat-Top FIR Filter for Voltage Fluctuations Monitoring in Grid-Connected Distributed Generation Systems.
IEEE Access, 2023
Proceedings of the Multi-disciplinary Trends in Artificial Intelligence, 2023
2022
J. Big Data, 2022
2021
IEEE Access, 2021
2020
DeepDGA-MINet: Cost-Sensitive Deep Learning Based Framework for Handling Multiclass Imbalanced DGA Detection.
Proceedings of the Handbook of Computer Networks and Cyber Security, 2020
2019
Proceedings of the Recent Advances in Computational Intelligence, 2019
ScaleNet: Scalable and Hybrid Frameworkfor Cyber Threat Situational AwarenessBased on DNS, URL, and Email Data Analysis.
J. Cyber Secur. Mobil., 2019
A Comparative Analysis of Deep Learning Approaches for Network Intrusion Detection Systems (N-IDSs): Deep Learning for N-IDSs.
Int. J. Digit. Crime Forensics, 2019
Proceedings of the Iberian Languages Evaluation Forum co-located with 35th Conference of the Spanish Society for Natural Language Processing, 2019
Proceedings of the Cybersecurity and Cyberforensics Conference, 2019
2018
J. Intell. Fuzzy Syst., 2018
J. Intell. Fuzzy Syst., 2018
J. Intell. Fuzzy Syst., 2018
J. Intell. Fuzzy Syst., 2018
Proceedings of the Security in Computing and Communications - 6th International Symposium, 2018
Proceedings of the 2018 IEEE Security and Privacy Workshops, 2018
Evaluating Shallow and Deep Neural Networks for Network Intrusion Detection Systems in Cyber Security.
Proceedings of the 9th International Conference on Computing, 2018
Proceedings of the 2018 International Conference on Advances in Computing, 2018
A deep learning based Part-of-Speech (POS) tagger for Sanskrit language by embedding character level features.
Proceedings of the 10th annual meeting of the Forum for Information Retrieval Evaluation, 2018
2017
Why so abnormal? Detecting domains receiving anomalous surge traffic in a monitored network.
J. Intell. Fuzzy Syst., 2017
Evaluation of Recurrent Neural Network and its Variants for Intrusion Detection System (IDS).
Int. J. Inf. Syst. Model. Des., 2017
Proceedings of the 8th Workshop on Computational Approaches to Subjectivity, 2017
Proceedings of the Second Workshop on Evaluation of Human Language Technologies for Iberian Languages (IberEval 2017) co-located with 33th Conference of the Spanish Society for Natural Language Processing (SEPLN 2017), 2017
Proceedings of the 2017 International Conference on Public Key Infrastructure and its Applications, 2017
Proceedings of the 2017 International Conference on Advances in Computing, 2017
Secure shell (ssh) traffic analysis with flow based features using shallow and deep networks.
Proceedings of the 2017 International Conference on Advances in Computing, 2017
Proceedings of the 2017 International Conference on Advances in Computing, 2017
Proceedings of the 2017 International Conference on Advances in Computing, 2017
Proceedings of the 2017 International Conference on Advances in Computing, 2017
Proceedings of the 2017 International Conference on Advances in Computing, 2017
Proceedings of the 2017 International Conference on Advances in Computing, 2017
Proceedings of the 2017 International Conference on Advances in Computing, 2017
Proceedings of the 2017 International Conference on Advances in Computing, 2017
Proceedings of the 2017 International Conference on Advances in Computing, 2017
2016
MalJs: Lexical, Structural and Behavioral Analysis of Malicious JavaScripts Using Ensemble Classifier.
Proceedings of the Security in Computing and Communications - 4th International Symposium, 2016
Proceedings of the 2016 International Conference on Advances in Computing, 2016
Hiper-ping: Data plane based high performance packet generation bypassing kernel on ×86 based commodity systems.
Proceedings of the 2016 International Conference on Advances in Computing, 2016
Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications, 2016
Drive-by-Download Malware Detection in Hosts by Analyzing System Resource Utilization Using One Class Support Vector Machines.
Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications, 2016
2015
Proceedings of the Third International Symposium on Women in Computing and Informatics, 2015
Proceedings of the 2015 International Conference on High Performance Computing & Simulation, 2015
Proceedings of the 2015 International Conference on Advances in Computing, 2015
Proceedings of the 2015 International Conference on Advances in Computing, 2015
Proceedings of the 2015 International Conference on Information Technology, 2015
2014
Proceedings of the Advances in Signal Processing and Intelligent Recognition Systems, 2014
Proceedings of the Working Notes for CLEF 2014 Conference, 2014
2012
Performance Analysis and Improvement Using LFSR in the Pipelined Key Scheduling Section of DES.
Proceedings of the Recent Trends in Computer Networks and Distributed Systems Security, 2012
Proceedings of the Recent Trends in Computer Networks and Distributed Systems Security, 2012
Secure Authentication in Multimodal Biometric Systems Using Cryptographic Hash Functions.
Proceedings of the Recent Trends in Computer Networks and Distributed Systems Security, 2012
Proceedings of the First International Conference on Security of Internet of Things, 2012
Implementation of DES using pipelining concept with skew core key scheduling in secure transmission of images.
Proceedings of the Second International Conference on Computational Science, 2012