Dr. Ajit Kumar
Cited by
Cited by
A learning model to detect maliciousness of portable executable using integrated feature set
A Kumar, KS Kuppusamy, G Aghila
Journal of King Saud University-Computer and Information Sciences 31 (2 …, 2019
Temporal sentiment analysis and causal rules extraction from tweets for event prediction
PG Preethi, V Uma
Procedia Computer Science 48, 84-89, 2015
FAMOUS: Forensic Analysis of MObile devices Using Scoring of application permissions
A Kumar, KS Kuppusamy, G Aghila
Future Generation Computer Systems 83, 158-172, 2018
Machine learning based malware classification for Android applications using multimodal image representations
A Kumar, KP Sagar, KS Kuppusamy, G Aghila
2016 10th International Conference on Intelligent Systems and Control (ISCO …, 2016
Connect the dots: accessibility, readability and site ranking–An investigation with reference to top ranked websites of Government of India
A Ismail, KS Kuppusamy, A Kumar, PK Ojha
Journal of King Saud University-Computer and Information Sciences 31 (4 …, 2019
A Malicious Attacks and Defense Techniques on Android-Based Smartphone Platform
AK MA Rahim Khan, RC Tripathi
International Journal of Innovative Technology and Exploring Engineering …, 2019
PACER: Platform for Android Malware Classification, Performance Evaluation and Threat Reporting
A Kumar, V Agarwal, SK Shandilya, A Shalaginov, S Upadhyay, B Yadav
Future Internet 12 (4), 66, 2020
A Framework for Malware Detection with Static Features using Machine Learning Algorithms
A Kumar
Department of Computer Science, Pondicherry University, 2017
Portable executable scoring: What is your malicious score?
A Kumar, G Aghila
2014 International Conference on Science Engineering and Management Research …, 2014
Usability evaluation of active anti-phishing browser extensions for persons with visual impairments
G Sonowal, KS Kuppusamy, A Kumar
2017 4th International Conference on Advanced Computing and Communication …, 2017
Machine Learning Algorithm for Detection of False Data Injection Attack in Power System
A Kumar, N Saxena, BJ Choi
2021 International Conference on Information Networking (ICOIN), 385-390, 2021
PACE: Platform for Android Malware Classification and Performance Evaluation
A Kumar, V Agarwal, SK Shandilya, A Shalaginov, S Upadhyay, B Yadav
2019 IEEE International Conference on Big Data (Big Data), 4280-4288, 2019
Features for Detecting Malware on Computing Environments
A Kumar, KS Kuppusamy, G Aghila
International Journal of Engineering and Applied Computer Science, doi 10, 31-36, 0
AI-assisted Computer Network Operations testbed for Nature-Inspired Cyber Security based adaptive defense simulation and analysis
SK Shandilya, S Upadhyay, A Kumar, AK Nagar
Future Generation Computer Systems, 2021
Internet of Things applications placement to minimize latency in multi-tier fog computing framework
P Maiti, B Sahoo, AK Turuk, A Kumar, BJ Choi
ICT Express, 2021
A Malware classifier dataset built with header fields’ values of Portable Executable files
A kumar
https://github.com/urwithajit9/ClaMP, 2016
The system can't perform the operation now. Try again later.
Articles 1–16