关注
Santhi Thilagam
Santhi Thilagam
Professor
在 nitk.edu.in 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Handbook of social network technologies and applications
B Furht
Springer Science & Business Media, 2010
2562010
DDoS attacks at the application layer: Challenges and research perspectives for safeguarding web applications
A Praseed, PS Thilagam
IEEE Communications Surveys & Tutorials 21 (1), 661-685, 2018
1832018
Securing web applications from injection and logic vulnerabilities: Approaches and challenges
G Deepa, PS Thilagam
Information and Software Technology 74, 160-180, 2016
1482016
A qos broker based architecture for dynamic web service selection
DA D'Mello, VS Ananthanarayana, S Thilagam
2008 Second Asia International Conference on Modelling & Simulation (AMS …, 2008
892008
Mining social networks for anomalies: Methods and challenges
PV Bindu, PS Thilagam
Journal of Network and Computer Applications 68, 213-229, 2016
872016
Discovering suspicious behavior in multilayer social networks
PV Bindu, PS Thilagam, D Ahuja
Computers in Human Behavior 73, 568-582, 2017
772017
Heuristics based server consolidation with residual resource defragmentation in cloud data centers
KS Rao, PS Thilagam
Future Generation Computer Systems 50, 87-98, 2015
692015
Discovering spammer communities in twitter
PV Bindu, R Mishra, PS Thilagam
Journal of Intelligent Information Systems 51, 503-527, 2018
652018
Crime base: Towards building a knowledge base for crime entities and their relationships from online news papers
K Srinivasa, PS Thilagam
Information Processing & Management 56 (6), 102059, 2019
472019
Load balancing in cloud based on live migration of virtual machines
R Achar, PS Thilagam, N Soans, PV Vikyath, S Rao, AM Vijeth
2013 Annual IEEE India Conference (INDICON), 1-5, 2013
452013
DetLogic: A black-box approach for detecting logic vulnerabilities in web applications
G Deepa, PS Thilagam, A Praseed, AR Pais
Journal of Network and Computer Applications 109, 89-109, 2018
402018
Optimal scheduling of computational task in cloud using virtual machine tree
R Achar, PS Thilagam, D Shwetha, H Pooja
2012 Third International Conference on Emerging Applications of Information …, 2012
402012
SQL injection attack mechanisms and prevention techniques
R Chandrashekhar, M Mardithaya, S Thilagam, D Saha
Advanced Computing, Networking and Security: International Conference …, 2012
352012
Modelling behavioural dynamics for asymmetric application layer DDoS detection
A Praseed, PS Thilagam
IEEE Transactions on Information Forensics and Security 16, 617-626, 2020
342020
Alleviating data sparsity and cold start in recommender systems using social behaviour
R Reshma, G Ambikesh, PS Thilagam
2016 international conference on recent trends in information technology …, 2016
342016
Application of non-linear gaussian regression-based adaptive clock synchronization technique for wireless sensor network in agriculture
D Upadhyay, AK Dubey, PS Thilagam
IEEE Sensors Journal 18 (10), 4328-4335, 2018
312018
Securing native XML database-driven web applications from XQuery injection vulnerabilities
N Palsetia, G Deepa, FA Khan, PS Thilagam, AR Pais
Journal of Systems and Software 122, 93-109, 2016
312016
An empirical study of license violations in open source projects
A Mathur, H Choudhary, P Vashist, W Thies, S Thilagam
2012 35th Annual IEEE Software Engineering Workshop, 168-176, 2012
302012
Multiplexed asymmetric attacks: Next-generation DDoS on HTTP/2 servers
A Praseed, PS Thilagam
IEEE Transactions on Information Forensics and Security 15, 1790-1800, 2019
282019
Black-box detection of XQuery injection and parameter tampering vulnerabilities in web applications
G Deepa, PS Thilagam, FA Khan, A Praseed, AR Pais, N Palsetia
International Journal of Information Security 17, 105-120, 2018
282018
系统目前无法执行此操作,请稍后再试。
文章 1–20