Handbook of social network technologies and applications B Furht Springer Science & Business Media, 2010 | 256 | 2010 |
DDoS attacks at the application layer: Challenges and research perspectives for safeguarding web applications A Praseed, PS Thilagam IEEE Communications Surveys & Tutorials 21 (1), 661-685, 2018 | 183 | 2018 |
Securing web applications from injection and logic vulnerabilities: Approaches and challenges G Deepa, PS Thilagam Information and Software Technology 74, 160-180, 2016 | 148 | 2016 |
A qos broker based architecture for dynamic web service selection DA D'Mello, VS Ananthanarayana, S Thilagam 2008 Second Asia International Conference on Modelling & Simulation (AMS …, 2008 | 89 | 2008 |
Mining social networks for anomalies: Methods and challenges PV Bindu, PS Thilagam Journal of Network and Computer Applications 68, 213-229, 2016 | 87 | 2016 |
Discovering suspicious behavior in multilayer social networks PV Bindu, PS Thilagam, D Ahuja Computers in Human Behavior 73, 568-582, 2017 | 77 | 2017 |
Heuristics based server consolidation with residual resource defragmentation in cloud data centers KS Rao, PS Thilagam Future Generation Computer Systems 50, 87-98, 2015 | 69 | 2015 |
Discovering spammer communities in twitter PV Bindu, R Mishra, PS Thilagam Journal of Intelligent Information Systems 51, 503-527, 2018 | 65 | 2018 |
Crime base: Towards building a knowledge base for crime entities and their relationships from online news papers K Srinivasa, PS Thilagam Information Processing & Management 56 (6), 102059, 2019 | 47 | 2019 |
Load balancing in cloud based on live migration of virtual machines R Achar, PS Thilagam, N Soans, PV Vikyath, S Rao, AM Vijeth 2013 Annual IEEE India Conference (INDICON), 1-5, 2013 | 45 | 2013 |
DetLogic: A black-box approach for detecting logic vulnerabilities in web applications G Deepa, PS Thilagam, A Praseed, AR Pais Journal of Network and Computer Applications 109, 89-109, 2018 | 40 | 2018 |
Optimal scheduling of computational task in cloud using virtual machine tree R Achar, PS Thilagam, D Shwetha, H Pooja 2012 Third International Conference on Emerging Applications of Information …, 2012 | 40 | 2012 |
SQL injection attack mechanisms and prevention techniques R Chandrashekhar, M Mardithaya, S Thilagam, D Saha Advanced Computing, Networking and Security: International Conference …, 2012 | 35 | 2012 |
Modelling behavioural dynamics for asymmetric application layer DDoS detection A Praseed, PS Thilagam IEEE Transactions on Information Forensics and Security 16, 617-626, 2020 | 34 | 2020 |
Alleviating data sparsity and cold start in recommender systems using social behaviour R Reshma, G Ambikesh, PS Thilagam 2016 international conference on recent trends in information technology …, 2016 | 34 | 2016 |
Application of non-linear gaussian regression-based adaptive clock synchronization technique for wireless sensor network in agriculture D Upadhyay, AK Dubey, PS Thilagam IEEE Sensors Journal 18 (10), 4328-4335, 2018 | 31 | 2018 |
Securing native XML database-driven web applications from XQuery injection vulnerabilities N Palsetia, G Deepa, FA Khan, PS Thilagam, AR Pais Journal of Systems and Software 122, 93-109, 2016 | 31 | 2016 |
An empirical study of license violations in open source projects A Mathur, H Choudhary, P Vashist, W Thies, S Thilagam 2012 35th Annual IEEE Software Engineering Workshop, 168-176, 2012 | 30 | 2012 |
Multiplexed asymmetric attacks: Next-generation DDoS on HTTP/2 servers A Praseed, PS Thilagam IEEE Transactions on Information Forensics and Security 15, 1790-1800, 2019 | 28 | 2019 |
Black-box detection of XQuery injection and parameter tampering vulnerabilities in web applications G Deepa, PS Thilagam, FA Khan, A Praseed, AR Pais, N Palsetia International Journal of Information Security 17, 105-120, 2018 | 28 | 2018 |