


default search action
Mounika Vanamala
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
[c12]Ryan Boston, Naeem Seliya, Mounika Vanamala:
Analyzing Tweets for Disaster Prediction. EIT 2024: 439-443
[c11]Benjamin Kirkwood, Mounika Vanamala, Naeem Seliya:
Click Fraud Detection of Online Advertising Using Machine Learning Algorithms. EIT 2024: 586-590
[c10]Thomas Scott, Naeem Seliya, Mounika Vanamala:
Heart Murmur Prediction with Machine Learning. EIT 2024: 615-620
[i17]Andrew Root, Liam Jakubowski, Mounika Vanamala:
Exploration and Evaluation of Bias in Cyberbullying Detection with Machine Learning. CoRR abs/2412.00609 (2024)- 2023
[j5]Braxton Fair, Cole Harp, Mahlet Asmare, Mohammed Khalil, Rushit Dave, Mounika Vanamala:
Enhancing Mouse Dynamics for Continuous Secure Authentication Using Machine Learning. J. Comput. Sci. Coll. 39(4): 16-25 (2023)
[j4]Ali Rashid, Cole Schoenbauer, James O'Reilly, Marcho Handoko, Rushit Dave, Mounika Vanamala:
Clicking Your Way to Security: A Review of Continuous Authentication with Mouse Dynamics. J. Comput. Sci. Coll. 39(4): 39-49 (2023)
[j3]Sara Kokal, Mounika Vanamala, Rushit Dave:
Deep Learning and Machine Learning, Better Together Than Apart: A Review on Biometrics Mobile Authentication. J. Cybersecur. Priv. 3(2): 227-258 (2023)
[c9]Jairen Gilmore
, Uriah Vendell Moore
, Xiaohong Yuan
, Taylor Headen
, Mounika Vanamala
:
Visualization Dashboard for Recommending Attack Patterns Using Topic Modeling. ICSIE 2023: 46-51
[c8]Jacob Mallet
, Laura Pryor
, Rushit Dave
, Mounika Vanamala
:
Deepfake Detection Analyzing Hybrid Dataset Utilizing CNN and SVM. ISMSI 2023: 7-11
[c7]Aniruddha Tiwari
, Rushit Dave
, Mounika Vanamala
:
Leveraging Deep Learning Approaches for Deepfake Detection: A Review. ISMSI 2023: 12-19
[i16]Nicholas Lasky, Benjamin Hallis, Mounika Vanamala, Rushit Dave, Jim Seliya:
Machine Learning Based Approach to Recommend MITRE ATT&CK Framework for Software Requirements and Design Specifications. CoRR abs/2302.05530 (2023)
[i15]Jacob Mallet, Laura Pryor, Rushit Dave, Mounika Vanamala:
Deepfake Detection Analyzing Hybrid Dataset Utilizing CNN and SVM. CoRR abs/2302.10280 (2023)
[i14]Aniruddha Tiwari, Rushit Dave, Mounika Vanamala:
Leveraging Deep Learning Approaches for Deepfake Detection: A Review. CoRR abs/2304.01908 (2023)
[i13]Jacob Mallet, Natalie Krueger, Mounika Vanamala, Rushit Dave:
Hybrid Deepfake Detection Utilizing MLP and LSTM. CoRR abs/2304.14504 (2023)
[i12]Brendan Pelto, Mounika Vanamala, Rushit Dave:
Your Identity is Your Behavior - Continuous User Authentication based on Machine Learning and Touch Dynamics. CoRR abs/2305.09482 (2023)
[i11]Mounika Vanamala, Sean Loesch, Alexander Caravella:
Using Machine Learning To Identify Software Weaknesses From Software Requirement Specifications. CoRR abs/2308.05558 (2023)
[i10]Natalie Krueger, Mounika Vanamala, Rushit Dave:
Recent Advancements In The Field Of Deepfake Detection. CoRR abs/2308.05563 (2023)
[i9]Mounika Vanamala, Keith Bryant, Alexander Caravella:
Software Repositories and Machine Learning Research in Cyber Security. CoRR abs/2311.00691 (2023)
[i8]Sean Loesch, Ryan Hrastich, Jordan Herbert, Ben Drangstveit, Jacob Weber, Mounika Vanamala:
Secure Arcade: A Gamified Defense Against Cyber Attacks. CoRR abs/2311.16131 (2023)- 2022
[j2]Nyle Siddiqui, Rushit Dave, Mounika Vanamala, Naeem Seliya:
Machine and Deep Learning Applications to Mouse Dynamics for Continuous User Authentication. Mach. Learn. Knowl. Extr. 4(2): 502-518 (2022)
[c6]Jacob Mallet, Laura Pryor, Rushit Dave, Naeem Seliya, Mounika Vanamala, Evelyn R. Sowells Boone
:
Hold On and Swipe: A Touch-Movement Based Continuous Authentication Schema based on Machine Learning. CACML 2022: 442-447
[c5]Wei Zhong Tee, Rushit Dave, Naeem Seliya, Mounika Vanamala:
Human Activity Recognition models using Limited Consumer Device Sensors and Machine Learning. CACML 2022: 456-461
[c4]Wei Zhong Tee, Rushit Dave, Jim Seliya, Mounika Vanamala:
A Close Look into Human Activity Recognition Models using Deep Learning. CNIOT 2022: 201-206
[c3]Jacob Mallet, Rushit Dave, Naeem Seliya, Mounika Vanamala:
Using Deep Learning to Detecting Deepfakes. ISCMI 2022: 1-5
[c2]Zachary Deridder, Nyle Siddiqui, Thomas Reither, Rushit Dave, Brendan Pelto, Mounika Vanamala, Naeem Seliya:
Continuous User Authentication Using Machine Learning and Multi-finger Mobile Touch Dynamics with a Novel Dataset. ISCMI 2022: 42-46
[i7]Rushit Dave, Naeem Seliya, Laura Pryor, Mounika Vanamala, Evelyn R. Sowells Boone, Jacob Mallet:
Hold On and Swipe: A Touch-Movement Based Continuous Authentication Schema based on Machine Learning. CoRR abs/2201.08564 (2022)
[i6]Rushit Dave, Naeem Seliya, Mounika Vanamala, Wei Tee:
Human Activity Recognition models using Limited Consumer Device Sensors and Machine Learning. CoRR abs/2201.08565 (2022)
[i5]Wei Zhong Tee, Rushit Dave, Naeem Seliya, Mounika Vanamala:
A Close Look into Human Activity Recognition Models using Deep Learning. CoRR abs/2204.13589 (2022)
[i4]Laura Pryor, Jacob Mallet, Rushit Dave, Naeem Seliya, Mounika Vanamala, Evelyn R. Sowells Boone
:
Evaluation of a User Authentication Schema Using Behavioral Biometrics and Machine Learning. CoRR abs/2205.08371 (2022)
[i3]Nyle Siddiqui, Rushit Dave, Naeem Seliya, Mounika Vanamala:
Machine and Deep Learning Applications to Mouse Dynamics for Continuous User Authentication. CoRR abs/2205.13646 (2022)
[i2]Jacob Mallet, Rushit Dave, Naeem Seliya, Mounika Vanamala:
Using Deep Learning to Detecting Deepfakes. CoRR abs/2207.13644 (2022)
[i1]Zachary Deridder, Nyle Siddiqui, Thomas Reither, Rushit Dave, Brendan Pelto, Naeem Seliya, Mounika Vanamala:
Continuous User Authentication Using Machine Learning and Multi-Finger Mobile Touch Dynamics with a Novel Dataset. CoRR abs/2207.13648 (2022)- 2020
[c1]Jinghua Zhang, Xiaohong Yuan, Jaris Johnson, Jinsheng Xu
, Mounika Vanamala:
Developing and Assessing a Web-Based Interactive Visualization Tool to Teach Buffer Overflow Concepts. FIE 2020: 1-7
2010 – 2019
- 2019
[j1]Mounika Vanamala, Xiaohong Yuan, Macey Morgan:
A course module on HTML5 new features and security concerns. J. Comput. Sci. Coll. 34(5): 23-30 (2019)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-09-09 03:10 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







