An efficacious method for detecting phishing webpages through target domain identification G Ramesh, I Krishnamurthi, KSS Kumar Decision Support Systems 61, 12-22, 2014 | 156 | 2014 |
A comprehensive and efficacious architecture for detecting phishing webpages R Gowtham, I Krishnamurthi Computers & Security 40, 23-37, 2014 | 128 | 2014 |
Automated dynamic approach for detecting ransomware using finite-state machine G Ramesh, A Menen Decision Support Systems 138, 113400, 2020 | 59 | 2020 |
PhishTackle—a web services architecture for anti-phishing R Gowtham, I Krishnamurthi Cluster Computing 17, 1051-1068, 2014 | 29 | 2014 |
Identification of phishing webpages and its target domains by analyzing the feign relationship G Ramesh, J Gupta, PG Gamya Journal of Information Security and Applications 35, 75-84, 2017 | 28 | 2017 |
Knowledge extraction using semantic similarity of concepts from Web of Things knowledge bases V Muppavarapu, G Ramesh, A Gyrard, M Noura Data & Knowledge Engineering 135, 101923, 2021 | 21 | 2021 |
An automated vision-based method to detect elephants for mitigation of human-elephant conflicts G Ramesh, S Mathi, SR Pulari, V Krishnamoorthy 2017 International conference on advances in computing, communications and …, 2017 | 20 | 2017 |
Method for automatic key concepts extraction: Application to documents in the domain of nuclear reactors S Desul, MM N, T Venkatesh, V Gunta, M Sai Baba The Electronic Library 37 (1), 2-15, 2019 | 16 | 2019 |
Intelligent explanation generation system for phishing webpages by employing an inference system G Ramesh, K Selvakumar, A Venugopal Behaviour & Information Technology 36 (12), 1244-1260, 2017 | 13 | 2017 |
Summarization of research publications using automatic extraction N Alampalli Ramu, MS Bandarupalli, MSS Nekkanti, G Ramesh Intelligent Data Communication Technologies and Internet of Things: ICICI …, 2020 | 11 | 2020 |
A layered approach to detect elephants in live surveillance video streams using convolution neural networks S Ravikumar, D Vinod, G Ramesh, SR Pulari, S Mathi Journal of Intelligent & Fuzzy Systems 38 (5), 6291-6298, 2020 | 10 | 2020 |
A study on verbalization of OWL axioms using controlled natural language A Venugopal, G Ramesh International Journal of Applied Engineering Research 10 (7), 16953-16960, 2015 | 8 | 2015 |
Ensemble model ransomware classification: a static analysis-based approach S Johnson, R Gowtham, AR Nair Inventive Computation and Information Technologies: Proceedings of ICICIT …, 2022 | 7 | 2022 |
Personalized research paper recommender system T Sripadh, G Ramesh Computational Vision and Bio Inspired Computing, 437-446, 2018 | 6 | 2018 |
Experimental study on behaviour of paver block using crushed rubber powder P Kirubagharan, R Gowtham, A Duraisingh, AB Nair, SML Bharathi International Journal of Civil Engineering and Technology (IJCIET) 8 (3 …, 2017 | 6 | 2017 |
Automated dynamic detection of ransomware using augmented bootstrapping M Sukul, SA Lakshmanan, R Gowtham 2022 6th International Conference on Trends in Electronics and Informatics …, 2022 | 5 | 2022 |
Study of ERP Test-Suite Reduction Based on Modified Condition/Decision Coverage J Prabhu, N Malmurugan, G Gunasekaran, R Gowtham 2010 Second International Conference on Computer Research and Development …, 2010 | 5 | 2010 |
Study of fundus changes in pregnancy induced Hypertension in rural tertiary care hospital S Badageri, KM Umashankar, G Ramesh, MN Dharmavijaya, ... Int J Applied Med Sci 4 (1), 260-67, 2014 | 3 | 2014 |
MAGIC: Malware behaviour analysis and impact quantification through signature co-occurrence and regression S Rohini, G Ramesh, AR Nair Computers & Security 139, 103735, 2024 | 2 | 2024 |
Numerical investigation of flow and heat transfer from a block placed in a cavity subject to different inlet conditions S Rakesh, PR Kanna, J Taler, P Oclon, D Taler, P Sudhakaran, ... Progress in Computational Fluid Dynamics, an International Journal 17 (6 …, 2017 | 2 | 2017 |