Prabaharan Poornachandran

Learn More
With the evolution of internet, author profiling has become a topic of great interest in the field of forensics, security, marketing, plagiarism detection etc. However the task of identifying the characteristics of the author just based on a text document has its own limitations and challenges. This paper reports on the design, techniques and learning(More)
Given the continuous growth of malicious activities on the internet, there is a need for intelligent systems to identify malicious web pages. It has been shown that URL analysis is an effective tool for detecting phishing, malware, and other attacks. Previous studies have performed URL classification using a combination of lexical features, network traffic,(More)
Among most of the cyber attacks that occured, the most drastic are advanced persistent threats. APTs are differ from other attacks as they have multiple phases, often silent for long period of time and launched by adamant, well-funded opponents. These targeted attacks mainly concentrated on government agencies and organizations in industries, as are those(More)
In this digital era, lot of information are expressed through images. Various social networking websites, such as Facebook, Twitter, MySpace etc. provides a platform for the users to post up almost any type of picture or photo. However, with the advancement in image editing technologies, many users have become victims of digital forgery as their uploaded(More)
This paper discusses deepyCybErNet submission methodology to the task on Stance and Gender Detection in Tweets on Catalan Independence@Ibereval 2017. The goal of the task is to detect the stance and gender of the user in tweets on the subject ”independence of Catalonia”. Tweets are available in two languages: Spanish and Catalan. In task 1 and 2, the system(More)
Personal health records (PHR) either resides in the hospital or resides with the patient in the form of paper-based records. When PHR is in the printed form it is bulky and inconvenient to carry by the user. Since smart phones has become ubiquitous and a necessity in day to day life, and most of them are equipped with contactless near field communication(More)
Anomaly detection has been considered as a critical problem in any application area. In computer networks, anomaly detection is important as any kind of abnormal behavior in the network data is considered harmful to the end user. Snort is an open source NIDS tool that uses misuse detection method for intrusion detection. There are many pre-processor and(More)