A survey of distributed denial of service attack KN Mallikarjunan, K Muthupriya, SM Shalinie 2016 10th International Conference on Intelligent Systems and Control (ISCO …, 2016 | 91 | 2016 |
DDAM: detecting DDoS attacks using machine learning approach K Narasimha Mallikarjunan, A Bhuvaneshwaran, K Sundarakantham, ... Computational Intelligence: Theories, Applications and Future Directions …, 2018 | 20 | 2018 |
Detection of spyware in software using virtual environment KMEN Mallikarajunan, SR Preethi, S Selvalakshmi, N Nithish 2019 3rd International Conference on Trends in Electronics and Informatics …, 2019 | 18 | 2019 |
Real Time Attacker Behavior Pattern Discovery and Profiling Using Fuzzy Rules KN Mallikarjunan, SM Shalinie, G Preetha Journal of Internet Technology 19 (5), 1567-1575, 2018 | 11 | 2018 |
Evaluation of security metrics for system security analysis K Narasimha Mallikarjunan, S Mercy Shalinie, K Sundarakantham, ... Computational Intelligence: Theories, Applications and Future Directions …, 2018 | 8 | 2018 |
Model for cyber attacker behavioral analysis KN Mallikarjunan, S Prabavathy, K Sundarakantham, SM Shalinie 2015 IEEE Workshop on Computational Intelligence: Theories, Applications and …, 2015 | 7 | 2015 |
Fog computing-based autonomic security approach to Internet of Things applications S Prabavathy, K Sundarakantham, SM Shalinie, KN Mallikarjunan Computational Intelligence: Theories, Applications and Future Directions …, 2018 | 5 | 2018 |
CoDe—An collaborative detection algorithm for DDoS attacks SM Shalinie, MPM Kumar, M Karthikeyan, JD Sajani, VA Nachammai, ... 2011 International Conference on Recent Trends in Information Technology …, 2011 | 5 | 2011 |
BAIT: behaviour aided intruder testimony technique for attacker intention prediction in business data handling KN Mallikarjunan, SM Shalinie, A Bhuvaneshwaran International Journal of Business Intelligence and Data Mining 14 (1-2), 177-198, 2019 | 3 | 2019 |
Binding registration based on home agent priority queue scheduling in MIPv6 network AA Diana, V Ragavinodhini, K Sundarakantham, SM Shalinie, ... 2014 International Conference on Recent Trends in Information Technology, 1-7, 2014 | 2 | 2014 |
RISE: Privacy preserved data analytics using Regularized Inference Specific autoEncoder NK Mallikarjunan, H Rajashree R, K Sundarakantham Engineering Applications of Artificial Intelligence 133, 108384, 2024 | | 2024 |
System Application Behavioural Profiling using Log Analysis DKNM E.V.Soundariya, S.Kalaiselvi International Research Journal of Engineering and Technology (IRJET) 7 (09 …, 2020 | | 2020 |
Prediction of Ongoing Attacks using System Behavioural Traces SA Lakshmi, V Pavithra, KN Mallikarjunan | | 2020 |
Anomaly Based Intrusion Detection System using Classifiers K NarasimaMallikarjunan, M Aarthi ADVANCED COMPUTING (ICoAC 2017), 500, 2017 | | 2017 |