关注
Narasimha Mallikarjunan,K  (0000-0002-9517-100X)
Narasimha Mallikarjunan,K (0000-0002-9517-100X)
在 tce.edu 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
A survey of distributed denial of service attack
KN Mallikarjunan, K Muthupriya, SM Shalinie
2016 10th International Conference on Intelligent Systems and Control (ISCO …, 2016
912016
DDAM: detecting DDoS attacks using machine learning approach
K Narasimha Mallikarjunan, A Bhuvaneshwaran, K Sundarakantham, ...
Computational Intelligence: Theories, Applications and Future Directions …, 2018
202018
Detection of spyware in software using virtual environment
KMEN Mallikarajunan, SR Preethi, S Selvalakshmi, N Nithish
2019 3rd International Conference on Trends in Electronics and Informatics …, 2019
182019
Real Time Attacker Behavior Pattern Discovery and Profiling Using Fuzzy Rules
KN Mallikarjunan, SM Shalinie, G Preetha
Journal of Internet Technology 19 (5), 1567-1575, 2018
112018
Evaluation of security metrics for system security analysis
K Narasimha Mallikarjunan, S Mercy Shalinie, K Sundarakantham, ...
Computational Intelligence: Theories, Applications and Future Directions …, 2018
82018
Model for cyber attacker behavioral analysis
KN Mallikarjunan, S Prabavathy, K Sundarakantham, SM Shalinie
2015 IEEE Workshop on Computational Intelligence: Theories, Applications and …, 2015
72015
Fog computing-based autonomic security approach to Internet of Things applications
S Prabavathy, K Sundarakantham, SM Shalinie, KN Mallikarjunan
Computational Intelligence: Theories, Applications and Future Directions …, 2018
52018
CoDe—An collaborative detection algorithm for DDoS attacks
SM Shalinie, MPM Kumar, M Karthikeyan, JD Sajani, VA Nachammai, ...
2011 International Conference on Recent Trends in Information Technology …, 2011
52011
BAIT: behaviour aided intruder testimony technique for attacker intention prediction in business data handling
KN Mallikarjunan, SM Shalinie, A Bhuvaneshwaran
International Journal of Business Intelligence and Data Mining 14 (1-2), 177-198, 2019
32019
Binding registration based on home agent priority queue scheduling in MIPv6 network
AA Diana, V Ragavinodhini, K Sundarakantham, SM Shalinie, ...
2014 International Conference on Recent Trends in Information Technology, 1-7, 2014
22014
RISE: Privacy preserved data analytics using Regularized Inference Specific autoEncoder
NK Mallikarjunan, H Rajashree R, K Sundarakantham
Engineering Applications of Artificial Intelligence 133, 108384, 2024
2024
System Application Behavioural Profiling using Log Analysis
DKNM E.V.Soundariya, S.Kalaiselvi
International Research Journal of Engineering and Technology (IRJET) 7 (09 …, 2020
2020
Prediction of Ongoing Attacks using System Behavioural Traces
SA Lakshmi, V Pavithra, KN Mallikarjunan
2020
Anomaly Based Intrusion Detection System using Classifiers
K NarasimaMallikarjunan, M Aarthi
ADVANCED COMPUTING (ICoAC 2017), 500, 2017
2017
系统目前无法执行此操作,请稍后再试。
文章 1–14