Deep learning approach for intelligent intrusion detection system R Vinayakumar, M Alazab, KP Soman, P Poornachandran, A Al-Nemrat, ... Ieee Access 7, 41525-41550, 2019 | 685 | 2019 |
A framework for implementing TQM in higher education programs S Venkatraman Quality assurance in education, 2007 | 388 | 2007 |
Zero-day malware detection based on supervised learning algorithms of API call signatures M Alazab, S Venkatraman, P Watters, M Alazab Sydney, New South Wales: Australian Computer Society, 2010 | 233 | 2010 |
Robust intelligent malware detection using deep learning R Vinayakumar, M Alazab, KP Soman, P Poornachandran, ... IEEE Access 7, 46717-46738, 2019 | 220 | 2019 |
Towards understanding malware behaviour by the extraction of API calls M Alazab, S Venkataraman, P Watters 2010 second cybercrime and trustworthy computing workshop, 52-59, 2010 | 174 | 2010 |
A hybrid deep learning image-based analysis for effective malware detection S Venkatraman, M Alazab, R Vinayakumar Journal of Information Security and Applications 47, 377-389, 2019 | 112 | 2019 |
Use of the analytic hierarchy process for selecting automated manufacturing systems RP Mohanty, S Venkataraman International Journal of Operations & Production Management, 1993 | 99 | 1993 |
Challenges and success factors of ERP systems in Australian SMEs S Venkatraman, K Fahd Systems 4 (2), 20, 2016 | 98 | 2016 |
Use of data visualisation for zero-day malware detection S Venkatraman, M Alazab Security and Communication Networks 2018, 2018 | 97 | 2018 |
Malware detection based on structural and behavioural features of api calls M Alazab, R Layton, S Venkataraman, P Watters School of Computer and Information Science, Security Research Centre, Edith …, 2010 | 85 | 2010 |
Cybercrime: The Case of Obfuscated Malware M Alazab, S Venkatraman, P Watters, M Alazab, A Alazab Proceedings of International Conference in Global Security Safety and …, 2011 | 81 | 2011 |
Biometrics in banking security: a case study S Venkatraman, I Delpachitra Information Management & Computer Security, 2008 | 78 | 2008 |
Performance Evaluation of E-Government Services Using Balanced Scorecard - An Empirical Study in Jordan S Al-Hyari, M Alazab, S Venkatraman, A Alazab International Journal of Benchmarking 20 (4), 512 - 536, 2013 | 73 | 2013 |
SQL versus NoSQL movement with big data analytics S Venkatraman, K Fahd, S Kaspi, R Venkatraman International Journal of Information Technology and Computer Science 8 (12 …, 2016 | 61 | 2016 |
A hybrid wrapper-filter approach for malware detection M Alazab, S Huda, J Abawajy, R Islam, J Yearwood, S Venkatraman, ... Academy Publisher, 2014 | 58 | 2014 |
Efficient two-dimensional pattern matching in the presence of errors K Krithivasan, R Sitalakshmi Information Sciences 43 (3), 169-184, 1987 | 49 | 1987 |
Effective digital forensic analysis of the NTFS disk image M Alazab, S Venkatraman, P Watters Ubiquitous Computing and Communication Journal 4 (1), 551-558, 2009 | 47 | 2009 |
Relationships among triple bottom line elements: Focus on integrating sustainable business practices S Venkatraman, RR Nayak Journal of Global Responsibility, 2015 | 45 | 2015 |
An optimal transportation routing approach using GIS-based dynamic traffic flows A Alazab, S Venkatraman, J Abawajy, M Alazab ICMTA 2010: Proceedings of the International Conference on Management …, 2010 | 44 | 2010 |
Transforming grid to cloud services for multimodal biometrics S Venkatraman International Journal of Computational Science and Engineering 10, 2014 | 40* | 2014 |