Taxonomy and survey of collaborative intrusion detection E Vasilomanolakis, S Karuppayah, M Mühlhäuser, M Fischer ACM computing surveys (CSUR) 47 (4), 1-33, 2015 | 390 | 2015 |
Botnet-based distributed denial of service (DDoS) attacks on web servers: classification and art E Alomari, S Manickam, BB Gupta, S Karuppayah, R Alfaris arXiv preprint arXiv:1208.0403, 2012 | 289 | 2012 |
A review on the role of blockchain technology in the healthcare domain HD Zubaydi, YW Chong, K Ko, SM Hanshi, S Karuppayah Electronics 8 (6), 679, 2019 | 122 | 2019 |
A honeypot-driven cyber incident monitor: lessons learned and steps ahead E Vasilomanolakis, S Karuppayah, P Kikiras, M Mühlhäuser Proceedings of the 8th International Conference on Security of Information …, 2015 | 89 | 2015 |
MQTT vulnerabilities, attack vectors and solutions in the internet of things (IoT) AJ Hintaw, S Manickam, MF Aboalmaaly, S Karuppayah IETE Journal of Research 69 (6), 3368-3397, 2023 | 57 | 2023 |
Fake news on social media: Brief review on detection techniques ZI Mahid, S Manickam, S Karuppayah 2018 Fourth international conference on advances in computing, communication …, 2018 | 43 | 2018 |
Detection of real-time malicious intrusions and attacks in IoT empowered cybersecurity infrastructures IA Kandhro, SM Alanazi, F Ali, A Kehar, K Fatima, M Uddin, S Karuppayah IEEE Access 11, 9136-9148, 2023 | 41 | 2023 |
On advanced monitoring in resilient and unstructured P2P botnets S Karuppayah, M Fischer, C Rossow, M Mühlhäuser 2014 IEEE International Conference on Communications (ICC), 871-877, 2014 | 35 | 2014 |
Hostage: a mobile honeypot for collaborative defense E Vasilomanolakis, S Karuppayah, M Mühlhäuser, M Fischer Proceedings of the 7th International Conference on Security of Information …, 2014 | 29 | 2014 |
On the resilience of P2P-based botnet graphs S Haas, S Karuppayah, S Manickam, M Mühlhäuser, M Fischer 2016 IEEE Conference on Communications and Network Security (CNS), 225-233, 2016 | 26 | 2016 |
Theory-based model and prediction analysis of information security compliance behavior in the Saudi healthcare sector S T. Alanazi, M Anbar, S A. Ebad, S Karuppayah, HA Al-Ani Symmetry 12 (9), 1544, 2020 | 25 | 2020 |
This network is infected: Hostage-a low-interaction honeypot for mobile devices E Vasilomanolakis, S Karuppayah, M Fischer, M Mühlhäuser, ... Proceedings of the Third ACM workshop on Security and privacy in smartphones …, 2013 | 25 | 2013 |
Zeus milker: circumventing the p2p zeus neighbor list restriction mechanism S Karuppayah, S Roos, C Rossow, M Mühlhäuser, M Fischer 2015 IEEE 35th International Conference on Distributed Computing Systems …, 2015 | 24 | 2015 |
A review on SECS/GEM: A machine-to-machine (M2M) communication protocol for industry 4.0 SA Laghari, S Manickam, S Karuppayah International Journal of Electrical and Electronic Engineering …, 2021 | 22 | 2021 |
A Brief Review on MQTT's Security Issues within the Internet of Things (IoT). AJ Hintaw, S Manickam, S Karuppayah, MF Aboalmaaly J. Commun. 14 (6), 463-469, 2019 | 22 | 2019 |
Applicability of intrusion detection system on Ethereum attacks: a comprehensive review AHH Kabla, M Anbar, S Manickam, TA Al-Amiedy, PB Cruspe, AK Al-Ani, ... IEEE Access 10, 71632-71655, 2022 | 21 | 2022 |
Next generation p2p botnets: Monitoring under adverse conditions L Böck, E Vasilomanolakis, M Mühlhäuser, S Karuppayah Research in Attacks, Intrusions, and Defenses: 21st International Symposium …, 2018 | 21 | 2018 |
SECS/GEMsec: A mechanism for detection and prevention of cyber-attacks on SECS/GEM communications in industry 4.0 landscape SUA Laghari, S Manickam, AK Al-Ani, SU Rehman, S Karuppayah Ieee Access 9, 154380-154394, 2021 | 20 | 2021 |
BoobyTrap: On autonomously detecting and characterizing crawlers in P2P botnets S Karuppayah, E Vasilomanolakis, S Haas, M Mühlhäuser, M Fischer 2016 IEEE International Conference on Communications (ICC), 1-7, 2016 | 20 | 2016 |
Advanced Monitoring in P2P Botnets: A Dual Perspective S Karuppayah Springer, 2018 | 18 | 2018 |