Остановите войну!
for scientists:
default search action
Vinaykumar R.
- > Home > Persons > Vinaykumar R.
Publications
- 2024
- [j83]Hanane Azzaoui, Akram Zine Eddine Boukhamla, Pericle Perazzo, Mamoun Alazab, Vinayakumar Ravi:
A Lightweight Cooperative Intrusion Detection System for RPL-based IoT. Wirel. Pers. Commun. 134(4): 2235-2258 (2024) - 2023
- [j81]Vinayakumar Ravi, Mamoun Alazab:
Attention-based convolutional neural network deep learning approach for robust malware classification. Comput. Intell. 39(1): 145-168 (2023) - [j80]Vinayakumar Ravi, Vasundhara Acharya, Mamoun Alazab:
A multichannel EfficientNet deep learning-based stacking ensemble approach for lung disease detection using chest X-ray images. Clust. Comput. 26(2): 1181-1203 (2023) - [j68]Vinayakumar Ravi, Tuan D. Pham, Mamoun Alazab:
Deep Learning-Based Network Intrusion Detection System for Internet of Medical Things. IEEE Internet Things Mag. 6(2): 50-54 (2023) - [j56]Vinayakumar Ravi, Tuan D. Pham, Mamoun Alazab:
Attention-Based Multidimensional Deep Learning Approach for Cross-Architecture IoMT Malware Detection and Classification in Healthcare Cyber-Physical Systems. IEEE Trans. Comput. Soc. Syst. 10(4): 1597-1606 (2023) - [j55]Vinayakumar Ravi, Mamoun Alazab, Sriram Srinivasan, Ajay Arunachalam, K. P. Soman:
Adversarial Defense: DGA-Based Botnets and DNS Homographs Detection Through Integrated Deep Learning. IEEE Trans. Engineering Management 70(1): 249-266 (2023) - 2022
- [j46]Vinayakumar Ravi, Rajasekhar Chaganti, Mamoun Alazab:
Recurrent deep learning-based feature fusion ensemble meta-classifier approach for intelligent network intrusion detection system. Comput. Electr. Eng. 102: 108156 (2022) - [j42]Vinayakumar Ravi, Mamoun Alazab, Shymalagowri Selvaganapathy, Rajasekhar Chaganti:
A Multi-View attention-based deep learning framework for malware detection in smart healthcare systems. Comput. Commun. 195: 73-81 (2022) - [j29]Vinayakumar Ravi, Rajasekhar Chaganti, Mamoun Alazab:
Deep Learning Feature Fusion Approach for an Intrusion Detection System in SDN-Based IoT Networks. IEEE Internet Things Mag. 5(2): 24-29 (2022) - 2021
- [i14]Rajasekhar Chaganti, Vinayakumar Ravi, Mamoun Alazab, Tuan D. Pham:
Stegomalware: A Systematic Survey of MalwareHiding and Detection in Images, Machine LearningModels and Research Challenges. CoRR abs/2110.02504 (2021) - 2020
- [c34]Sriram S, Vinayakumar R., Mamoun Alazab, K. P. Soman:
Network Flow based IoT Botnet Attack Detection using Deep Learning. INFOCOM Workshops 2020: 189-194 - [c33]Sriram S, Vinayakumar R., V. Sowmya, Mamoun Alazab, K. P. Soman:
Multi-scale Learning based Malware Variant Detection using Spatial Pyramid Pooling Network. INFOCOM Workshops 2020: 740-745 - 2019
- [j13]R. Vinayakumar, Mamoun Alazab, K. P. Soman, Prabaharan Poornachandran, Ameer Al-Nemrat, Sitalakshmi Venkatraman:
Deep Learning Approach for Intelligent Intrusion Detection System. IEEE Access 7: 41525-41550 (2019) - [j12]R. Vinayakumar, Mamoun Alazab, K. P. Soman, Prabaharan Poornachandran, Sitalakshmi Venkatraman:
Robust Intelligent Malware Detection Using Deep Learning. IEEE Access 7: 46717-46738 (2019) - [j10]Sitalakshmi Venkatraman, Mamoun Alazab, R. Vinayakumar:
A hybrid deep learning image-based analysis for effective malware detection. J. Inf. Secur. Appl. 47: 377-389 (2019) - [c32]Vinayakumar R., Mamoun Alazab, Alireza Jolfaei, Soman K. P., Prabaharan Poornachandran:
Ransomware Triage Using Deep Learning: Twitter as a Case Study. CCC 2019: 67-73
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-08 23:42 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint