Publications

(2022). Evaluating the Performance of Machine Learning Algorithms for Sentiment Prediction on social media Natural Language Text Data. The 3rd International Conference on Advances in Distributed Computing and Machine Learning (ICADCML-2022), January 2022.

Cite PDF

(2022). An Analysis of Blockchain Technology: A Security and Privacy Perspective. Blockchain Technology and Applications:Advances in Industry 4.0 and Machine Learning, published by CRC Press - Taylor & Francis Group, USA,2022.

Cite PDF

(2022). Unraveling the Blockchain: A Study on Blockchain and its Potential Applications.. Blockchain Technology and Applications:Advances in Industry 4.0 and Machine Learning, published by CRC Press - Taylor & Francis Group, USA,2022.

Cite PDF

(2021). Machine Learning-Based Platform and Recommendation System for Food Ordering Services within Premises. 2nd IEEE Global Conference for Advancement in Technology (GCAT-2021), October 2021.

Cite PDF

(2020). Deep Learning for COVID-19. OVID-19 The Role of Computational Intelligence, Springer Book Publisher, October 2020.

Cite PDF

(2018). API Call Based Malware Detection Approach Using Recurrent Neural Network-LSTM. The 18th International Conference on Intelligent Systems Design and Applications (ISDA 2018), LNCS, Springer Publishers, 2018.

Cite PDF

(2017). Information Gain Score Computation for N-Grams Using Multiprocessing Model. 1st International Conference on Asia Security and Privacy Conference (Asia 2017).

Cite PDF

(2016). Windows Malware Detection Based on Cuckoo Sandbox Generated Report Using Machine Learning Algorithm. 11th International Conference on Industrial and Information Systems (ICIIS-2016).

Cite PDF

(2016). VMI-based Automated Real-time Malware Detector for Virtualized Cloud Environment. In Proceedings of the 6th International Conference on Security, Privacy, and Applied Cryptography Engineering (SPACE-2016), December 14-18, 2016, pages 281-300.

Cite PDF

, (2015). Comparative Study of Principal Component Analysis Based Intrusion Detection Approach Using Machine Learning Algorithms. The 3rd International Conference on Signal Processing, Communication, and Networking (ICSCN-2015).

Cite PDF

(2015). Virtual machine introspection based spurious process detection in a virtualized cloud computing environment. In 2015 international conference on futuristic trends on computational analysis and knowledge management (ABLAZE), pp. 309-315. IEEE, 2015.

Cite PDF

(2015). Hypervisor and Virtual Machine Dependent Intrusion Detection and Prevention System for Virtualized Cloud Computing Environment. In Proceedings of the 1st IEEE International Conference on Telematics and Future Generation Networks (TAFGEN-2015), University Technology Malaysia. Pages: 28-33, Kuala Lumpur, Malaysia. Best Student Research Paper Award.

Cite PDF

(2015). Execution Time Measurement of Virtual Machine Volatile Artifacts Analyzers.. Proceedings of the 21st IEEE International Conference on Parallel and Distributed Systems (ICPADS 2015), at RMIT University and University of Melbourne. December 14-17, 2015, Melbourne, Australia, Pages 314- 319, ACM India travels grant award .

Cite PDF