Follow
Aghila Gnanasekaran; Gnanasekaran Aghila; G Aghila; Aghila G
Aghila Gnanasekaran; Gnanasekaran Aghila; G Aghila; Aghila G
Professor of Computer Science and Engineering, National Institute of Technology Puducherry, Karaikal
Verified email at nitpy.ac.in
Title
Cited by
Cited by
Year
A learning model to detect maliciousness of portable executable using integrated feature set
A Kumar, KS Kuppusamy, G Aghila
Journal of King Saud University-Computer and Information Sciences 31 (2 …, 2019
1322019
A comber approach to protect cloud computing against XML DDoS and HTTP DDoS attack
T Karnwal, T Sivakumar, G Aghila
2012 IEEE Students' Conference on Electrical, Electronics and Computer …, 2012
1122012
A wide scale survey on botnet
AK Tyagi, G Aghila
International Journal of Computer Applications 34 (9), 9-22, 2011
912011
Text mining process, techniques and tools: an overview
KA Vidhya, G Aghila
International Journal of Information Technology and Knowledge Management 2 …, 2010
722010
Combinatorial approach for preventing SQL injection attacks
R Ezumalai, G Aghila
2009 IEEE International Advance Computing Conference, 1212-1217, 2009
712009
Ontology-based web crawler
S Ganesh, M Jayaraj, V Kalyan, G Aghila
International Conference on Information Technology: Coding and Computing …, 2004
692004
A survey of na\" ive bayes machine learning approach in text document classification
G Aghila
arXiv preprint arXiv:1003.1795, 2010
622010
Pattern based 3d image steganography
P Thiyagarajan, V Natarajan, G Aghila, V Prasanna Venkatesan, R Anitha
3D Research 4 (1), 1-8, 2013
612013
AARIN: Affordable, accurate, reliable and innovative mechanism to protect a medical cyber-physical system using blockchain technology
AK Tyagi, SU Aswathy, G Aghila, N Sreenath
International Journal of Intelligent Networks 2, 175-183, 2021
572021
A survey of semantic similarity methods for ontology based information retrieval
K Saruladha, G Aghila, S Raj
2010 Second International Conference on Machine Learning and Computing, 297-301, 2010
572010
FAMOUS: Forensic Analysis of MObile devices Using Scoring of application permissions
A Kumar, KS Kuppusamy, G Aghila
Future Generation Computer Systems 83, 158-172, 2018
432018
Machine learning based malware classification for Android applications using multimodal image representations
A Kumar, KP Sagar, KS Kuppusamy, G Aghila
2016 10th international conference on intelligent systems and control (ISCO …, 2016
402016
A filter tree approach to protect cloud computing against XML DDoS and HTTP DDoS attack
T Karnwal, S Thandapanii, A Gnanasekaran
Intelligent Informatics: Proceedings of the International Symposium on …, 2013
382013
Design and development of chemical ontologies for reaction representation
P Sankar, G Aghila
Journal of chemical information and modeling 46 (6), 2355-2368, 2006
382006
Reversible dynamic secure steganography for medical image using graph coloring
P Thiyagarajan, G Aghila
Health Policy and Technology 2 (3), 151-161, 2013
352013
A model for remote access and protection of smartphones using short message service
KS Kuppusamy, G Aghila
arXiv preprint arXiv:1203.3431, 2012
352012
LDA based integrated document recommendation model for e-learning systems
R Nagori, G Aghila
2011 international conference on emerging trends in networks and computer …, 2011
302011
A survey on black hole attacks on aodv protocol in manet
KS Madhusudhananagakumar, G Aghila
International Journal of Computer Applications 34 (7), 0975-8887, 2011
282011
Anti-phishing technique using automated challenge response method
P Thiyagarajan, VP Venkatesan, G Aghila
2010 International Conference on Communication and Computational …, 2010
282010
A DCT–SVD-based speech steganography in voiced frames
A Kanhe, G Aghila
Circuits, systems, and signal processing 37 (11), 5049-5068, 2018
272018
The system can't perform the operation now. Try again later.
Articles 1–20