A learning model to detect maliciousness of portable executable using integrated feature set A Kumar, KS Kuppusamy, G Aghila Journal of King Saud University-Computer and Information Sciences 31 (2 …, 2019 | 146 | 2019 |
A comber approach to protect cloud computing against XML DDoS and HTTP DDoS attack T Karnwal, T Sivakumar, G Aghila 2012 IEEE Students' Conference on Electrical, Electronics and Computer …, 2012 | 116 | 2012 |
A wide scale survey on botnet AK Tyagi, G Aghila International Journal of Computer Applications 34 (9), 9-22, 2011 | 94 | 2011 |
Text mining process, techniques and tools: an overview KA Vidhya, G Aghila International Journal of Information Technology and Knowledge Management 2 …, 2010 | 76 | 2010 |
Combinatorial approach for preventing SQL injection attacks R Ezumalai, G Aghila 2009 IEEE International Advance Computing Conference, 1212-1217, 2009 | 73 | 2009 |
Ontology-based web crawler S Ganesh, M Jayaraj, V Kalyan, G Aghila International Conference on Information Technology: Coding and Computing …, 2004 | 70 | 2004 |
Pattern based 3d image steganography P Thiyagarajan, V Natarajan, G Aghila, V Prasanna Venkatesan, R Anitha 3D Research 4 (1), 1-8, 2013 | 64 | 2013 |
AARIN: Affordable, accurate, reliable and innovative mechanism to protect a medical cyber-physical system using blockchain technology AK Tyagi, SU Aswathy, G Aghila, N Sreenath International Journal of Intelligent Networks 2, 175-183, 2021 | 63 | 2021 |
A survey of na\" ive bayes machine learning approach in text document classification G Aghila arXiv preprint arXiv:1003.1795, 2010 | 62 | 2010 |
A survey of semantic similarity methods for ontology based information retrieval K Saruladha, G Aghila, S Raj 2010 Second International Conference on Machine Learning and Computing, 297-301, 2010 | 57 | 2010 |
FAMOUS: Forensic Analysis of MObile devices Using Scoring of application permissions A Kumar, KS Kuppusamy, G Aghila Future Generation Computer Systems 83, 158-172, 2018 | 47 | 2018 |
Machine learning based malware classification for Android applications using multimodal image representations A Kumar, KP Sagar, KS Kuppusamy, G Aghila 2016 10th international conference on intelligent systems and control (ISCO …, 2016 | 45 | 2016 |
A filter tree approach to protect cloud computing against XML DDoS and HTTP DDoS attack T Karnwal, S Thandapanii, A Gnanasekaran Intelligent Informatics: Proceedings of the International Symposium on …, 2013 | 39 | 2013 |
Reversible dynamic secure steganography for medical image using graph coloring P Thiyagarajan, G Aghila Health Policy and Technology 2 (3), 151-161, 2013 | 38 | 2013 |
Design and development of chemical ontologies for reaction representation P Sankar, G Aghila Journal of chemical information and modeling 46 (6), 2355-2368, 2006 | 37 | 2006 |
A model for remote access and protection of smartphones using short message service KS Kuppusamy, G Aghila arXiv preprint arXiv:1203.3431, 2012 | 35 | 2012 |
LDA based integrated document recommendation model for e-learning systems R Nagori, G Aghila 2011 international conference on emerging trends in networks and computer …, 2011 | 31 | 2011 |
A DCT–SVD-based speech steganography in voiced frames A Kanhe, G Aghila Circuits, systems, and signal processing 37 (11), 5049-5068, 2018 | 28 | 2018 |
A survey on black hole attacks on aodv protocol in manet KS Madhusudhananagakumar, G Aghila International Journal of Computer Applications 34 (7), 0975-8887, 2011 | 28 | 2011 |
Anti-phishing technique using automated challenge response method P Thiyagarajan, VP Venkatesan, G Aghila 2010 International Conference on Communication and Computational …, 2010 | 27 | 2010 |