Sl.No | Title | Name of Journal/Publication | Author Name | Volume Number | Issue Number | Pages | Year | DOI | View Upload |
1
|
GPU based integrated security systems for minimizing data loss in big data transmission
|
2nd International Conference on Data Management, Analytics & Innovation
|
|
|
|
|
2018
|
2018-01-21
|
View
|
2
|
A SURVEY ON VARIOUS MOBILE MALWARE ATTACKS AND SECURITY CHARACTERISTICS
|
International Journal of Latest Trends in Engineering and Technology
|
|
|
|
|
2017
|
2017-02-14
|
View
|
3
|
Malicious Traffic Detection and Containment based on Connection Attempt Failures using Kernelized ELM with Automated Worm Containment Algorithm
|
Indian Journal of Science and Technology
|
|
|
|
|
2016
|
2016-11-18
|
View
|
4
|
Computer Network Worms Propagation and its Defense Mechanisms: A Survey
|
Fifth International Conference on Advances in Communication, Network and computing, CNC 2014, organized by ACEEE
|
|
|
|
|
2014
|
2015-01-07
|
View
|
5
|
A Novel method for Detection of Internet Worm Malcodes using Principal Component Analysis and Multiclass Support Vector Machine
|
International Journal of Security and Its Applications
|
|
|
|
|
2014
|
2015-01-07
|
View
|
6
|
Packet Payload Monitoring for Internet Worm Content Detection using Deterministic Finite Automata with Delayed Dictionary Compression
|
Journal of Computer Networks and Communications
|
|
|
|
|
2014
|
2015-01-07
|
View
|
7
|
Internet Worm Detection based on Traffic Behavior Monitoring with Improved C4.5
|
International Conference on Cryptography and Security 2014, organized by Association of Scientists, Developers and Faculties
|
|
|
|
|
2014
|
2015-01-07
|
View
|
8
|
Computer Network Worms Propagation and its Defense Mechanisms: A Survey
|
Fifth International Conference on Advances in Communication, Network and computing, CNC 2014, organized by ACEEE
|
|
|
|
|
2014
|
2015-01-07
|
View
|
9
|
A Novel method for Detection of Internet Worm Malcodes using Principal Component Analysis and Multiclass Support Vector Machine
|
International Journal of Security and Its Applications
|
|
|
|
|
2014
|
2015-01-07
|
View
|
10
|
Packet Payload Monitoring for Internet Worm Content Detection using Deterministic Finite Automata with Delayed Dictionary Compression
|
Journal of Computer Networks and Communications
|
|
|
|
|
2014
|
2015-01-07
|
View
|
11
|
Internet Worm Detection based on Traffic Behavior Monitoring with Improved C4.5
|
International Conference on Cryptography and Security 2014, organized by Association of Scientists, Developers and Faculties
|
|
|
|
|
2014
|
2015-01-07
|
View
|
12
|
A survey on various security threats and classification of Malware attacks, vulnerabilities and detection techniques
|
The International Journal of Computer Science and Applications (TIJCSA)
|
|
|
|
|
2013
|
2015-01-07
|
View
|
13
|
An appraisal of Artificial Immune System
|
Int. J. Advanced Networking and Applications, Special Issue on “Computational Intelligence- A Research Perspective”
|
|
|
|
|
2013
|
2015-01-07
|
View
|
14
|
A survey on various security threats and classification of Malware attacks, vulnerabilities and detection techniques
|
The International Journal of Computer Science and Applications (TIJCSA)
|
|
|
|
|
2013
|
2015-01-07
|
View
|
15
|
An appraisal of Artificial Immune System
|
Int. J. Advanced Networking and Applications, Special Issue on “Computational Intelligence- A Research Perspective”
|
|
|
|
|
2013
|
2015-01-07
|
View
|