Control flow obfuscation for Android applications V Balachandran, Sufatrio, DJJ Tan, VLL Thing Computers & Security 61, 72-93, 2016 | 80 | 2016 |
Distributed ledger technology: Its evolutionary path and the road ahead A Perdana, A Robb, V Balachandran, F Rohde Information & Management 58 (3), 103316, 2021 | 72 | 2021 |
Potent and stealthy control flow obfuscation by stack based self-modifying code V Balachandran, S Emmanuel IEEE Transactions on Information Forensics and Security 8 (4), 669-681, 2013 | 43 | 2013 |
Effectiveness of android obfuscation on evading anti-malware M Chua, V Balachandran Proceedings of the eighth ACM conference on data and application security …, 2018 | 34 | 2018 |
Software code obfuscation by hiding control flow information in stack V Balachandran, S Emmanuel 2011 IEEE International Workshop on Information Forensics and Security, 1-6, 2011 | 34 | 2011 |
Function level control flow obfuscation for software security V Balachandran, NW Keong, S Emmanuel 2014 Eighth International Conference on Complex, Intelligent and Software …, 2014 | 31 | 2014 |
Fix-it: An extensible code auto-fix component in review bot V Balachandran 2013 IEEE 13th International Working Conference on Source Code Analysis and …, 2013 | 24 | 2013 |
Software protection with obfuscation and encryption V Balachandran, S Emmanuel International Conference on Information Security Practice and Experience …, 2013 | 23 | 2013 |
Gramac: A graph based android malware classification mechanism D Vij, V Balachandran, T Thomas, R Surendran Proceedings of the tenth ACM conference on data and application security and …, 2020 | 15 | 2020 |
DRAT: A drone attack tool for vulnerability assessment MS bin Mohammad Fadilah, V Balachandran, P Loh, M Chua Proceedings of the tenth ACM conference on data and application security and …, 2020 | 14 | 2020 |
AEON: android encryption based obfuscation D Geethanjali, TL Ying, CWJ Melissa, V Balachandran Proceedings of the Eighth ACM Conference on Data and Application Security …, 2018 | 12 | 2018 |
Obfuscation by code fragmentation to evade reverse engineering V Balachandran, S Emmanuel, NW Keong 2014 IEEE International Conference on Systems, Man, and Cybernetics (SMC …, 2014 | 10 | 2014 |
ABC-Verify: AI-Blockchain integrated framework for tweet misinformation detection THY Zen, CB Hong, PM Mohan, V Balachandran 2021 IEEE International Conference on Service Operations and Logistics, and …, 2021 | 9 | 2021 |
Blockchain-based proof of existence (POE) framework using Ethereum Smart Contracts LWM Shawn, P Murali Mohan, P Loh Kok Keong, V Balachandran Proceedings of the Eleventh ACM Conference on Data and Application Security …, 2021 | 8 | 2021 |
Incorporating Industry into the Curriculum: Applied Learning in Computer Science R Kirwan, V Balachandran Applied Learning in Higher Education:: Perspective, Pedagogy, and Practice …, 2020 | 8 | 2020 |
Enhancing decision making with machine learning: The case of aurora crowdlending platform P Jutasompakorn, A Perdana, V Balachandran Journal of Information Technology Teaching Cases 13 (1), 58-66, 2023 | 7 | 2023 |
Drat: A penetration testing framework for drones CS Veerappan, PLK Keong, V Balachandran, MSBM Fadilah 2021 IEEE 16th Conference on Industrial Electronics and Applications (ICIEA …, 2021 | 7 | 2021 |
Towards a Hybrid Security Framework for Phishing Awareness Education and Defense PKK Loh, AZY Lee, V Balachandran Future Internet 16 (3), 86, 2024 | 5 | 2024 |
Nft-merit: An nft-based module credit management system on ethereum blockchain PM Mohan, V Balachandran, OZ Quan, JPZ Xin, DM Divakaran 2022 IEEE International Conference on Teaching, Assessment and Learning for …, 2022 | 4 | 2022 |
Towards Robust Detection of PDF-based Malware KY Tay, S Chua, M Chua, V Balachandran Proceedings of the Twelfth ACM Conference on Data and Application Security …, 2022 | 3 | 2022 |