Ezhil Kalaimannan
Titel
Citeras av
Citeras av
År
Comparison of machine-learning algorithms for classification of VPN network traffic flow using time-related features
S Bagui, X Fang, E Kalaimannan, SC Bagui, J Sheehan
Journal of Cyber Security Technology 1 (2), 108-126, 2017
322017
A framework of cybersecurity approaches in precision agriculture
H Chi, S Welch, E Vasserman, E Kalaimannan
Proceedings of the ICMLG2017 5th International Conference on Management …, 2017
162017
Influences on ransomware’s evolution and predictions for the future challenges
E Kalaimannan, SK John, T DuBose, A Pinto
Journal of Cyber Security Technology 1 (1), 23-31, 2017
142017
A heuristic for maximizing investigation effectiveness of digital forensic cases involving multiple investigators
JND Gupta, E Kalaimannan, SM Yoo
Computers & Operations Research 69, 1-9, 2016
122016
Using machine learning techniques to identify rare cyber‐attacks on the UNSW‐NB15 dataset
S Bagui, E Kalaimannan, S Bagui, D Nandi, A Pinto
Security and Privacy 2 (6), e91, 2019
92019
Towards establishing a security engineered SCADA framework
S Hopkins, E Kalaimannan
Journal of Cyber Security Technology 3 (1), 47-59, 2019
92019
A case study on the trade-offs between security, scalability, and efficiency in smart home sensor networks
T Reichherzer, A Mishra, E Kalaimannan, N Wilde
2016 International Conference on Computational Science and Computational …, 2016
62016
Minimum cost security measurements for attack tree based threat models in smart grid
N Chakraborty, E Kalaimannan
2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile …, 2017
52017
Smart device forensics-Acquisition, analysis and interpretation of digital evidences
E Kalaimannan
2015 International Conference on Computational Science and Computational …, 2015
52015
eBot: Approach towards modeling an advanced P2P botnet
SK Tetarave, S Tripathy, E Kalaimannan, C John
2018 17th IEEE International Conference On Trust, Security And Privacy In …, 2018
42018
The security development lifecycle in the context of accreditation policies and standards
E Kalaimannan, JND Gupta
IEEE Security & Privacy 15 (1), 52-57, 2017
42017
Trade-offs involved in the choice of cloud service configurations when building secure, scalable, and efficient Internet-of-Things networks
A Mishra, T Reichherzer, E Kalaimannan, N Wilde, R Ramirez
International Journal of Distributed Sensor Networks 16 (2), 1550147720908199, 2020
32020
IDS Alarms investigation with limited resources
JND Gupta, E Kalaimannan, R Patnayakuni
Proceedings of the Pre-ICIS Workshop on Information Security and Privacy …, 2012
32012
Design of cybersecurity hands-on laboratory exercises using secDLC framework
H Chi, T Aderibigbe, E Kalaimannan
Proceedings of the ACMSE 2018 Conference, 1-1, 2018
22018
Selective scheduling: Controlling non-preemptive devices in smart grid environment
N Chakraborty, E Kalaimannan
2017 IEEE Power & Energy Society Innovative Smart Grid Technologies …, 2017
22017
Cyber Resilience using State Estimation Updates Based on Cyber Attack Matrix Classification
S Hopkins, E Kalaimannan, CS John
2020 IEEE Kansas Power and Energy Conference (KPEC), 1-6, 2020
12020
Foundations for Research in Cyber-Physical System Cyber Resilience using State Estimation
S Hopkins, E Kalaimannan, CS John
2020 SoutheastCon, 1-2, 2020
12020
A Routing Table Poisoning Model for Peer-to-Peer (P2P) Botnets
SK Tetarave, S Tripathy, E Kalaimannan, C John, A Srivastava
IEEE Access 7, 67983-67995, 2019
12019
Source anonymization of digital images: a counter–forensic attack on PRNU based source identification techniques
P Sengupta, VU Sameer, R Naskar, E Kalaimannan
12017
Maximizing Investigation Effectiveness in Digital Forensic Cases
E Kalaimannan, JND Gupta, SM Yoo
2013 International Conference on Social Computing, 618-623, 2013
12013
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–20