Identification of malware families using stacking of textural features and machine learning S Kumar, B Janet, S Neelakantan Expert Systems with Applications 208, 118073, 2022 | 28 | 2022 |
A Threat-Aware Anomaly-Based Intrusion-Detection Approach for Obtaining Network-Specific Useful Alarms S Neelakantan, S Rao International Conference on Distributed Computing and Networking, 175-180, 2009 | 26* | 2009 |
Behavior model for Detecting data Exfiltration in Network Environment R Ramachandran, N Subramanian, AS Bidyarthy Fifth International Conference on Internet Multimedia Services Architecture …, 2011 | 24 | 2011 |
Development of a Comprehensive Intrusion Detection System–Challenges and Approaches N Subramanian, P Pawar, M Bhatnagar, N Khedekar, S Guntupalli, ... Information Systems Security, 332-335, 2005 | 15 | 2005 |
Visualization of flow data based on clustering technique for identifying network anomalies MP Singh, Rajamenakshi, N Subramanian Industrial Electronics & Applications, 2009. ISIEA 2009. IEEE Symposium on 2 …, 2009 | 9 | 2009 |
An architecture for self-configuration of network for QoS and security N Subramanian, P Ampatt, N Muraleedharan, SCB Korimilli, A Parmar, ... Communication Systems and Networks and Workshops, 2009. COMSNETS 2009. First …, 2009 | 9* | 2009 |
Using digital tokens to improve amortized performance of eSign P Bakshi, N Subramanian, S Nandi 2018 IEEE 16th Intl Conf on Dependable, Autonomic and Secure Computing, 16th …, 2018 | 6 | 2018 |
A dynamic firewall architecture based on multi-source analysis M Navarikuth, N Subramanian, K Sachan, UP Singh, R Kumar, A Mallick CSI Transactions on ICT, 1-13, 2013 | 6 | 2013 |
A Threat-Aware Hybrid Intrusion – Detection Architecture for Dynamic Network Environments N Subramanian, S Rao CSI Journal of Computing 1 (3), 17, 2012 | 4 | 2012 |
Experimentation on usage of PQC Algorithms for eSign P Kurariya, A Bhargava, S Sailada, N Subramanian, J Bodhankar, ... 2022 IEEE International Conference on Public Key Infrastructure and its …, 2022 | 3 | 2022 |
Crystal dilithium algorithm for post quantum cryptography: experimentation and Usecase for eSign S Sailada, N Vohra, N Subramanian 2022 First International Conference on Electrical, Electronics, Information …, 2022 | 3 | 2022 |
Content-split based effective string-matching for multi-core based intrusion detection systems S Neelakantan, S Rao 2009 First International Conference on Computational Intelligence …, 2009 | 3 | 2009 |
Model for Establishing Knowledge Platforms: A Case Study N Subramanian, B R, P M International Conference on Digital Libraries, 2006 | 2 | 2006 |
IMCNN: Intelligent Malware Classification using Deep Convolution Neural Networks as Transfer learning and ensemble learning in honeypot enabled organizational network S Kumar, B Janet, S Neelakantan Computer Communications 216, 16-33, 2024 | 1 | 2024 |
SAS: A system for security assessment in grid environment UR Edara, N Subramanian, M Dwivedi, A Sinha IEEE 4th International Conference on Internet Multimedia Services …, 2010 | 1 | 2010 |
Design and Development of Community Aware Distributed Content Networking Framework using JXTA N Satyanarayana, N Subramanian, V NeelaNarayanan, E UshaRani AICT-ICIW'06. International Conference on Internet and Web Applications and …, 2006 | 1 | 2006 |
A prototype for functionality based network management system V Neelanarayanan, N Satyanarayana, N Subramanian, E Rani EurAsia-ICT 2002: Information and Communication Technology, 110--116, 2002 | 1 | 2002 |
High-Speed Network Traffic Analysis: Challenges and Approaches N Subramanian, N Muraleedharan National Workshop on Network Security, 2010 | | 2010 |
RUDRAA - An Intrusion Detection and Prevention Signature Formulation process N Subramanian, N Sachin, M Mohammed, G Bishwa, Ranjan International Conference on Advances in Computing, Communication and Control …, 2009 | | 2009 |
Grid Security Challenges: Experiences and proposed framework for mitigation N Subramanian, A Praveen, D, S Shahid, L Badiuzzaman Forum for Incident Response and Security Teams, 2008 International Conference, 2008 | | 2008 |