


default search action
Srinivas Mukkamala
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [j10]Geetika Kovelamudi, Bryan Watson, Jun Zheng
, Srinivas Mukkamala:
On the adoption of scramble keypad for unlocking PIN-protected smartphones. Int. J. Inf. Comput. Secur. 15(1): 1-17 (2021)
2010 – 2019
- 2018
- [c65]Supriya Das, Purnendu Banerjee, Bhagesh Seraogi
, Himadri Majumder, Srinivas Mukkamala, Rahul Roy, Bidyut Baran Chaudhuri:
Hand-Written and Machine-Printed Text Classification in Architecture, Engineering & Construction Documents. ICFHR 2018: 546-551 - [c64]Bhagesh Seraogi
, Supriya Das, Purnendu Banerjee, Himadri Majumder, Srinivas Mukkamala, Rahul Roy, Bidyut B. Chaudhuri:
Employing CNN to Identify Noisy Documents Thereafter Accomplishing Text Line Segmentation. TENCON 2018: 1284-1289 - [c63]Purnendu Banerjee, Saquib Mansoor, Supriya Das, Bhagesh Seraogi
, Avinash Patel, Himadri Majumder, Rahul Roy, Srinivas Mukkamala, B. B. Chaudhuri:
Automatic Creation of Hyperlinks in AEC Documents by Extracting the Sheet Numbers Using LSTM Model. TENCON 2018: 1667-1672 - [c62]Purnendu Banerjee, Avinash Patel, Supriya Das, Bhagesh Seraogi
, Rahul Roy, Himadri Majumder, Srinivas Mukkamala, B. B. Chaudhuri:
A Robust System for Visual Pattern Recognition in Engineering Drawing Documents. TENCON 2018: 2050-2055 - 2017
- [c61]Sandip Kumar Maity, Bhagesh Seraogi
, Supriya Das, Purnendu Banerjee, Himadri Majumder, Srinivas Mukkamala, Rahul Roy, Bidyut B. Chaudhuri:
An Approach for Detecting Circular Callouts in Architectural, Engineering and Constructional Drawing Documents. GREC 2017: 17-29 - [c60]Purnendu Banerjee, Supriya Das, Bhagesh Seraogi
, Himadri Majumder, Srinivas Mukkamala, Rahul Roy, Bidyut B. Chaudhuri:
A System for Automatic Elevation Datum Detection and Hyperlinking of AEC Drawing Documents. GREC 2017: 30-42 - [c59]Bhagesh Seraogi
, Supriya Das, Purnendu Banerjee, Himadri Majumdar, Srinivas Mukkamala, Rahul Roy, Bidyut B. Chaudhuri:
Automatic Orientation Correction of AEC Drawing Documents. GREC@ICDAR 2017: 9-10 - [c58]Purnendu Banerjee, Supriya Das, Bhagesh Seraogi
, Himadri Majumdar, Srinivas Mukkamala, Rahul Roy, Bidyut B. Chaudhuri:
Automatic Elevation Datum Detection and Hyperlinking of Architecture, Engineering & Construction Documents. GREC@ICDAR 2017: 37-38 - [c57]Sandip Kumar Maity, Bhagesh Seraogi
, Purnendu Banerjee, Supriya Das, Himadri Majumdar, Srinivas Mukkamala, Rahul Roy, Bidyut B. Chaudhuri:
A Novel Approach for Detecting Circular Callouts in AEC Drawing Documents. GREC@ICDAR 2017: 51-52 - [c56]Purnendu Banerjee, Sumit Choudhary, Supriya Das, Himadri Majumdar, Srinivas Mukkamala, Rahul Roy, B. B. Chaudhuri:
A System for Creating Automatic Navigation among Architectural and Construction Documents. ICDAR 2017: 677-682 - 2016
- [j9]Kesav Kancherla
, John Donahue, Srinivas Mukkamala:
Packer identification using Byte plot and Markov plot. J. Comput. Virol. Hacking Tech. 12(2): 101-111 (2016) - [c55]Geetika Kovelamudi, Jun Zheng
, Srinivas Mukkamala:
Scramble or not, that is the question a study of the security and usability of scramble keypad for PIN unlock on smartphones. ICCC 2016: 1-6 - 2015
- [c54]Yang Wang, Bryan Watson, Jun Zheng
, Srinivas Mukkamala:
ARP-Miner: Mining Risk Patterns of Android Malware. MIWAI 2015: 363-375 - 2014
- [j8]Manoj Cherukuri, Srinivas Mukkamala, Dongwan Shin
:
Detection of shellcodes in drive-by attacks using kernel machines. J. Comput. Virol. Hacking Tech. 10(3): 189-203 (2014) - [c53]Manoj Cherukuri, Srinivas Mukkamala, Dongwan Shin
:
Detection of plugin misuse drive-by download attacks using kernel machines. CollaborateCom 2014: 546-553 - 2013
- [c52]Kesav Kancherla, Srinivas Mukkamala:
Early lung cancer detection using nucleus segementation based features. CIBCB 2013: 91-95 - [c51]Kesav Kancherla, Srinivas Mukkamala:
Image visualization based malware detection. CICS 2013: 40-44 - [c50]Anand Paturi, Manoj Cherukuri, John Donahue, Srinivas Mukkamala:
Mobile malware visual analytics and similarities of Attack Toolkits (Malware gene analysis). CTS 2013: 149-154 - [c49]Yang Wang, Jun Zheng
, Chen Sun, Srinivas Mukkamala:
Quantitative Security Risk Assessment of Android Permissions and Applications. DBSec 2013: 226-241 - [c48]John Donahue, Anand Paturi, Srinivas Mukkamala:
Visualization techniques for efficient malware detection. ISI 2013: 289-291 - 2012
- [c47]Kesav Kancherla, Srinivas Mukkamala:
Novel Blind Video Forgery Detection Using Markov Models on Motion Residue. ACIIDS (3) 2012: 308-315 - [c46]Manoj Cherukuri, Srinivas Mukkamala, Dongwan Shin:
Similarity analysis of shellcodes in drive-by download attack kits. CollaborateCom 2012: 687-694 - [c45]Kesav Kancherla, Srinivas Mukkamala:
Feature Selection for Lung Cancer Detection Using SVM Based Recursive Feature Elimination Method. EvoBIO 2012: 168-176 - [c44]Kesav Kancherla, Srinivas Mukkamala:
Block Level Video Steganalysis Scheme. ICMLA (1) 2012: 651-654 - [p2]Madhu K. Shankarpani, Kesav Kancherla, Ram S. Movva, Srinivas Mukkamala:
Computational Intelligent Techniques and Similarity Measures for Malware Classification. Computational Intelligence for Privacy and Security 2012: 215-236 - 2011
- [j7]Madhu K. Shankarapani, Subbu Ramamoorthy, Ram S. Movva, Srinivas Mukkamala:
Malware detection using assembly and API call sequences. J. Comput. Virol. 7(2): 107-119 (2011) - [c43]Kesav Kancherla, Srinivas Mukkamala:
Lung Cancer Detection Using Labeled Sputum Sample: Multi Spectrum Approach. IEA/AIE (2) 2011: 446-458 - 2010
- [c42]Madhu K. Shankarapani, Kesav Kancherla, Subbu Ramamoorthy, Ram S. Movva, Srinivas Mukkamala:
Kernel machines for malware classification and similarity analysis. IJCNN 2010: 1-6
2000 – 2009
- 2009
- [j6]Madhu K. Shankarapani, Anthonius Sulaiman, Srinivas Mukkamala:
Fragmented malware through RFID and its defenses. J. Comput. Virol. 5(3): 187-198 (2009) - [c41]Kesav Kancherla, Raveesh Chilakapati, Divya Suryakumar, John Cousins, Constance Dorian, Srinivas Mukkamala:
Lung Cancer Detection and Classification Using Microarray Data. BIOCOMP 2009: 477-488 - [c40]Satish T. S. Bukkapatnam
, Srinivas Mukkamala, Jakkrit Kunthong, Venkatesh Sarangan, Ranga Komanduri:
Real-time monitoring of container stability loss using wireless vibration sensor tags. CASE 2009: 221-226 - [c39]Ram B. Basnet, Srinivas Mukkamala:
Event Detection and Localization Using Sensor Networks. ICWN 2009: 103-108 - [c38]Kesav Kancherla, Srinivas Mukkamala:
Video steganalysis using spatial and temporal redundancies. HPCS 2009: 200-207 - [c37]Srinivas Mukkamala:
Role of Computational Intelligence in Malware Detection and Malicious Code Analysis. IICAI 2009: 3 - [c36]Kesav Kancherla, Srinivas Mukkamala, aveeshaveeshti, John Cousins:
Labeling of Cancer Cells in Sputum for the Early Detection of Lung Cancer Using Tetrakis Carboxy Phenyl Porphine (TCPP). IICAI 2009: 1503-1518 - [c35]Kesav Kancherla, Srinivas Mukkamala:
Video steganalysis using motion estimation. IJCNN 2009: 1510-1515 - 2008
- [j5]Anthonius Sulaiman, Srinivas Mukkamala, Andrew H. Sung:
SQL infections through RFID. J. Comput. Virol. 4(4): 347-356 (2008) - [c34]Anthonius Sulaiman, Madhu K. Shankarapani, Srinivas Mukkamala, Andrew H. Sung:
RFID malware fragmentation attacks. CTS 2008: 533-539 - [c33]Jean-Louis Lassez, Ryan A. Rossi
, Stephen J. Sheel, Srinivas Mukkamala:
Signature based intrusion detection using latent semantic analysis. IJCNN 2008: 1068-1074 - [c32]Ashwin Tamilarasan, Madhu K. Shankarapani, Xiao Qin, Srinivas Mukkamala, Andrew H. Sung:
Integrating energy efficiency and security for storage systems. SMC 2008: 2396-2400 - [p1]Ram B. Basnet, Srinivas Mukkamala, Andrew H. Sung:
Detection of Phishing Attacks: A Machine Learning Approach. Soft Computing Applications in Industry 2008: 373-383 - 2007
- [j4]Jianyun Xu, Andrew H. Sung, Srinivas Mukkamala, Qingzhong Liu:
Obfuscated Malicious Executable Scanner. J. Res. Pract. Inf. Technol. 39(3): 181-198 (2007) - [j3]Srinivas Mukkamala, Andrew H. Sung, Ajith Abraham:
Hybrid multi-agent framework for detection of stealthy probes. Appl. Soft Comput. 7(3): 631-641 (2007) - [c31]Srinivas Mukkamala, Krishna Yendrapalli, Ram B. Basnet, Andrew H. Sung:
Detecting Coordinated Distributed Multiple Attacks. AINA Workshops (1) 2007: 557-562 - [c30]Rajani Goteti, Ashwin Tamilarasan, R. S. Balch, Srinivas Mukkamala, Andrew H. Sung:
Estimating Monthly Production of Oil Wells. IFSA (2) 2007: 393-403 - [c29]Ram B. Basnet, Krishna Yendrapalli, Tenzin Doleck, Srinivas Mukkamala, Andrew H. Sung:
Knowledge Based Discovery of Phishing Attacks. IICAI 2007: 731-742 - [c28]Krishna Yendrapalli, Ram B. Basnet, Srinivas Mukkamala, Andrew H. Sung:
Gene Selection for Tumor Classification Using Microarray Gene Expression Data. World Congress on Engineering 2007: 290-295 - [c27]Krishna Yendrapalli, Srinivas Mukkamala, Andrew H. Sung, Bernardete Ribeiro:
Biased Support Vector Machines and Kernel Methods for Intrusion Detection. World Congress on Engineering 2007: 321-325 - 2006
- [c26]Patrick Defibaugh-Chavez, Srinivas Mukkamala, Andrew H. Sung:
Efficacy of Coordinated Distributed Multiple Attacks (A Proactive Approach to Cyber Defense). AINA (2) 2006: 10-14 - [c25]Srinivas Mukkamala, Qingzhong Liu
, Rajeev Veeraghattam, Andrew H. Sung:
Feature Selection and Ranking of Key Genes for Tumor Classification: Using Microarray Gene Expression Data. ICAISC 2006: 951-961 - [c24]Jean-Louis Lassez, Tayfun Karadeniz, Srinivas Mukkamala:
Zoomed Clusters. ICONIP (2) 2006: 824-830 - [c23]Srinivas Mukkamala, Dennis Xu, Andrew H. Sung:
Intrusion Detection Based on Behavior Mining and Machine Learning Techniques. IEA/AIE 2006: 619-628 - [c22]Ashwin Tamilarasan, Srinivas Mukkamala, Andrew H. Sung, Krishna Yendrapalli:
Feature Ranking and Selection for Intrusion Detection Using Artificial Neural Networks and Statistical Methods. IJCNN 2006: 4754-4761 - 2005
- [j2]Srinivas Mukkamala, Andrew H. Sung, Ajith Abraham:
Intrusion detection using an ensemble of intelligent paradigms. J. Netw. Comput. Appl. 28(2): 167-182 (2005) - [c21]Jianyun Xu, Andrew H. Sung, Qingzhong Liu, Srinivas Mukkamala:
Fraud Detection System Based on Behavior Mining and Anomaly Detection. IICAI 2005: 3487-3501 - [c20]Anthonius Sulaiman, K. Ramamoorthy, Srinivas Mukkamala, Andrew H. Sung:
Disassembled code analyzer for malware (DCAM). IRI 2005: 398-403 - 2004
- [c19]Andrew H. Sung, Jianyun Xu, Patrick Chavez, Srinivas Mukkamala:
Static Analyzer of Vicious Executables (SAVE). ACSAC 2004: 326-334 - [c18]Andrew H. Sung, Srinivas Mukkamala:
The Feature Selection and Intrusion Detection Problems. ASIAN 2004: 468-482 - [c17]Jianyun Xu, Andrew H. Sung, Patrick Chavez, Srinivas Mukkamala:
Polymorphic Malicious Executable Scanner by API Sequence Analysis. HIS 2004: 378-383 - [c16]Patrick Defibaugh-Chavez, Srinivas Mukkamala, Andrew H. Sung:
Website Visitor Classification Using Machine Learning. HIS 2004: 384-389 - [c15]Srinivas Mukkamala, Andrew H. Sung, Ajith Abraham, Vitorino Ramos:
Intrusion Detection Systems Using Adaptive Regression Splines. ICEIS (3) 2004: 26-33 - [c14]Srinivas Mukkamala, Andrew H. Sung, Ajith Abraham, Vitorino Ramos:
Intrusion Detection Systems Using Adaptive Regression Spines. ICEIS (Selected Papers) 2004: 211-218 - [c13]Srinivas Mukkamala, Andrew H. Sung:
Computational Intelligent Techniques for Detecting Denial of Service Attacks. IEA/AIE 2004: 616-624 - [c12]Srinivas Mukkamala, Andrew H. Sung, Ajith Abraham:
Modeling Intrusion Detection Systems Using Linear Genetic Programming Approach. IEA/AIE 2004: 633-642 - [c11]Marcin Paprzycki
, Ajith Abraham, Ruiyuan Guo, Srinivas Mukkamala:
Data Mining Approach for Analyzing Call Center Performance. IEA/AIE 2004: 1092-1101 - [c10]Andrew H. Sung, Gopalakrishna Reddy Tadiparthi, Srinivas Mukkamala:
Defeating the Current Steganalysis Techniques (Robust Steganography). ITCC (1) 2004: 440-444 - [c9]Srinivas Mukkamala, Andrew H. Sung:
A framework for countering denial of service attacks. SMC (4) 2004: 3273-3278 - [i1]Srinivas Mukkamala, Andrew H. Sung, Ajith Abraham, Vitorino Ramos:
Intrusion Detection Systems Using Adaptive Regression Splines. CoRR cs.AI/0405016 (2004) - 2003
- [j1]Srinivas Mukkamala, Andrew H. Sung:
Identifying Significant Features for Network Forensic Analysis Using Artificial Intelligence Techniques. Int. J. Digit. EVid. 1(4) (2003) - [c8]Srinivas Mukkamala, Andrew H. Sung:
Detecting denial of service attacks using support vector machines. FUZZ-IEEE 2003: 1231-1236 - [c7]Srinivas Mukkamala, Andrew H. Sung, Ajith Abraham:
Distributed Multi-Intelligent Agent Framework for Detection of Stealthy Probes. HIS 2003: 779-788 - [c6]Srinivas Mukkamala, Andrew H. Sung:
A Comparative Study of Techniques for Intrusion Detection. ICTAI 2003: 570- - [c5]Srinivas Mukkamala, Andrew H. Sung:
A Distributed Agent Based IDS for Stealthy Probe Detection. IICAI 2003: 413-422 - [c4]Andrew H. Sung, Srinivas Mukkamala:
Identifying Important Features for Intrusion Detection Using Support Vector Machines and Neural Networks. SAINT 2003: 209-217 - [c3]Srinivas Mukkamala, Andrew H. Sung:
Artificial intelligent techniques for intrusion detection. SMC 2003: 1266-1271 - 2002
- [c2]Srinivas Mukkamala, Andrew H. Sung:
Performance Based Feature Identification for Intrusion Detection Using Support Vector Machines. HIS 2002: 351-364 - 2001
- [c1]Srinivas Mukkamala, Guadalupe I. Janoski, Andrew H. Sung:
Monitoring System Security Using Neural Networks and Support Vector Machines. HIS 2001: 121-137
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:59 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint