Srinivas Mukkamala
According to our database1,
Srinivas Mukkamala
authored at least 77 papers
between 2001 and 2021.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on cs.nmt.edu
On csauthors.net:
Bibliography
2021
Int. J. Inf. Comput. Secur., 2021
2018
Employing CNN to Identify Noisy Documents Thereafter Accomplishing Text Line Segmentation.
Proceedings of the TENCON 2018, 2018
Proceedings of the TENCON 2018, 2018
Automatic Creation of Hyperlinks in AEC Documents by Extracting the Sheet Numbers Using LSTM Model.
Proceedings of the TENCON 2018, 2018
Hand-Written and Machine-Printed Text Classification in Architecture, Engineering & Construction Documents.
Proceedings of the 16th International Conference on Frontiers in Handwriting Recognition, 2018
2017
Proceedings of the 12th International Workshop on Graphics Recognitio, 2017
Proceedings of the 12th International Workshop on Graphics Recognitio, 2017
Automatic Elevation Datum Detection and Hyperlinking of Architecture, Engineering & Construction Documents.
Proceedings of the 12th International Workshop on Graphics Recognitio, 2017
A System for Creating Automatic Navigation among Architectural and Construction Documents.
Proceedings of the 14th IAPR International Conference on Document Analysis and Recognition, 2017
An Approach for Detecting Circular Callouts in Architectural, Engineering and Constructional Drawing Documents.
Proceedings of the Graphics Recognition, Current Trends and Evolutions, 2017
A System for Automatic Elevation Datum Detection and Hyperlinking of AEC Drawing Documents.
Proceedings of the Graphics Recognition, Current Trends and Evolutions, 2017
2016
J. Comput. Virol. Hacking Tech., 2016
Scramble or not, that is the question a study of the security and usability of scramble keypad for PIN unlock on smartphones.
Proceedings of the 2016 IEEE/CIC International Conference on Communications in China, 2016
2015
Proceedings of the Multi-disciplinary Trends in Artificial Intelligence, 2015
2014
J. Comput. Virol. Hacking Tech., 2014
Proceedings of the 10th IEEE International Conference on Collaborative Computing: Networking, 2014
2013
Proceedings of the 2013 IEEE International Conference on Intelligence and Security Informatics, 2013
Proceedings of the Data and Applications Security and Privacy XXVII, 2013
Mobile malware visual analytics and similarities of Attack Toolkits (Malware gene analysis).
Proceedings of the 2013 International Conference on Collaboration Technologies and Systems, 2013
Proceedings of the 2013 IEEE Symposium on Computational Intelligence in Cyber Security, 2013
Proceedings of the 2013 IEEE Symposium on Computational Intelligence in Bioinformatics and Computational Biology (CIBCB), 2013
2012
Computational Intelligent Techniques and Similarity Measures for Malware Classification.
Proceedings of the Computational Intelligence for Privacy and Security, 2012
Proceedings of the 11th International Conference on Machine Learning and Applications, 2012
Feature Selection for Lung Cancer Detection Using SVM Based Recursive Feature Elimination Method.
Proceedings of the Evolutionary Computation, Machine Learning and Data Mining in Bioinformatics, 2012
Proceedings of the 8th International Conference on Collaborative Computing: Networking, 2012
Proceedings of the Intelligent Information and Database Systems - 4th Asian Conference, 2012
2011
Proceedings of the Modern Approaches in Applied Intelligence, 2011
2010
Proceedings of the International Joint Conference on Neural Networks, 2010
2009
Proceedings of the International Joint Conference on Neural Networks, 2009
Role of Computational Intelligence in Malware Detection and Malicious Code Analysis.
Proceedings of the 4th Indian International Conference on Artificial Intelligence, 2009
Labeling of Cancer Cells in Sputum for the Early Detection of Lung Cancer Using Tetrakis Carboxy Phenyl Porphine (TCPP).
Proceedings of the 4th Indian International Conference on Artificial Intelligence, 2009
Proceedings of the 2009 International Conference on High Performance Computing & Simulation, 2009
Event Detection and Localization Using Sensor Networks.
Proceedings of the 2009 International Conference on Wireless Networks, 2009
Real-time monitoring of container stability loss using wireless vibration sensor tags.
Proceedings of the IEEE Conference on Automation Science and Engineering, 2009
Lung Cancer Detection and Classification Using Microarray Data.
Proceedings of the International Conference on Bioinformatics & Computational Biology, 2009
2008
Proceedings of the Soft Computing Applications in Industry, 2008
Proceedings of the IEEE International Conference on Systems, 2008
Proceedings of the International Joint Conference on Neural Networks, 2008
Proceedings of the 2008 International Symposium on Collaborative Technologies and Systems, 2008
2007
Appl. Soft Comput., 2007
Biased Support Vector Machines and Kernel Methods for Intrusion Detection.
Proceedings of the World Congress on Engineering, 2007
Gene Selection for Tumor Classification Using Microarray Gene Expression Data.
Proceedings of the World Congress on Engineering, 2007
Knowledge Based Discovery of Phishing Attacks.
Proceedings of the 3rd Indian International Conference on Artificial Intelligence, 2007
Proceedings of the Theoretical Advances and Applications of Fuzzy Logic and Soft Computing, 2007
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007
2006
Feature Ranking and Selection for Intrusion Detection Using Artificial Neural Networks and Statistical Methods.
Proceedings of the International Joint Conference on Neural Networks, 2006
Proceedings of the Advances in Applied Artificial Intelligence, 2006
Proceedings of the Neural Information Processing, 13th International Conference, 2006
Feature Selection and Ranking of Key Genes for Tumor Classification: Using Microarray Gene Expression Data.
Proceedings of the Artificial Intelligence and Soft Computing, 2006
Efficacy of Coordinated Distributed Multiple Attacks (A Proactive Approach to Cyber Defense).
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006
2005
J. Netw. Comput. Appl., 2005
Proceedings of the 2005 IEEE International Conference on Information Reuse and Integration, 2005
Fraud Detection System Based on Behavior Mining and Anomaly Detection.
Proceedings of the 2nd Indian International Conference on Artificial Intelligence, 2005
2004
Proceedings of the IEEE International Conference on Systems, 2004
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004
Proceedings of the Innovations in Applied Artificial Intelligence, 2004
Proceedings of the Innovations in Applied Artificial Intelligence, 2004
Proceedings of the Innovations in Applied Artificial Intelligence, 2004
Proceedings of the Enterprise Information Systems VI, 2004
Intrusion Detection Systems Using Adaptive Regression Splines.
Proceedings of the ICEIS 2004, 2004
Proceedings of the 4th International Conference on Hybrid Intelligent Systems (HIS 2004), 2004
Proceedings of the 4th International Conference on Hybrid Intelligent Systems (HIS 2004), 2004
Proceedings of the Advances in Computer Science, 2004
Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC 2004), 2004
2003
Identifying Significant Features for Network Forensic Analysis Using Artificial Intelligence Techniques.
Int. J. Digit. EVid., 2003
Proceedings of the IEEE International Conference on Systems, 2003
Identifying Important Features for Intrusion Detection Using Support Vector Machines and Neural Networks.
Proceedings of the 2003 Symposium on Applications and the Internet (SAINT 2003), 27-31 January 2003, 2003
A Distributed Agent Based IDS for Stealthy Probe Detection.
Proceedings of the 1st Indian International Conference on Artificial Intelligence, 2003
Proceedings of the 15th IEEE International Conference on Tools with Artificial Intelligence (ICTAI 2003), 2003
Distributed Multi-Intelligent Agent Framework for Detection of Stealthy Probes.
Proceedings of the Design and Application of Hybrid Intelligent Systems, 2003
Proceedings of the 12th IEEE International Conference on Fuzzy Systems, 2003
2002
Performance Based Feature Identification for Intrusion Detection Using Support Vector Machines.
Proceedings of the Soft Computing Systems - Design, Management and Applications, 2002
2001
Monitoring System Security Using Neural Networks and Support Vector Machines.
Proceedings of the Hybrid Information Systems, 2001