Ezhil Kalaimannan
Cited by
Cited by
Comparison of machine-learning algorithms for classification of VPN network traffic flow using time-related features
S Bagui, X Fang, E Kalaimannan, SC Bagui, J Sheehan
Journal of Cyber Security Technology 1 (2), 108-126, 2017
Using machine learning techniques to identify rare cyber‐attacks on the UNSW‐NB15 dataset
S Bagui, E Kalaimannan, S Bagui, D Nandi, A Pinto
Security and Privacy 2 (6), e91, 2019
A framework of cybersecurity approaches in precision agriculture
H Chi, S Welch, E Vasserman, E Kalaimannan
proceedings of the ICMLG2017 5th International Conference on Management …, 2017
Influences on ransomware’s evolution and predictions for the future challenges
E Kalaimannan, SK John, T DuBose, A Pinto
Journal of Cyber Security Technology 1 (1), 23-31, 2017
A heuristic for maximizing investigation effectiveness of digital forensic cases involving multiple investigators
JND Gupta, E Kalaimannan, SM Yoo
Computers & Operations Research 69, 1-9, 2016
NCHR: A nonthreshold-based cluster-head rotation scheme for IEEE 802.15. 4 cluster-tree networks
N Choudhury, R Matam, M Mukherjee, J Lloret, E Kalaimannan
IEEE internet of things journal 8 (1), 168-178, 2020
Towards establishing a security engineered SCADA framework
S Hopkins, E Kalaimannan
Journal of Cyber Security Technology 3 (1), 47-59, 2019
Cyber resilience using state estimation updates based on cyber attack matrix classification
S Hopkins, E Kalaimannan, CS John
2020 IEEE Kansas Power and Energy Conference (KPEC), 1-6, 2020
A case study on the trade-offs between security, scalability, and efficiency in smart home sensor networks
T Reichherzer, A Mishra, E Kalaimannan, N Wilde
2016 International Conference on Computational Science and Computational …, 2016
Minimum cost security measurements for attack tree based threat models in smart grid
N Chakraborty, E Kalaimannan
2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile …, 2017
Foundations for research in cyber-physical system cyber resilience using state estimation
S Hopkins, E Kalaimannan, CS John
2020 SoutheastCon, 1-2, 2020
Trade-offs involved in the choice of cloud service configurations when building secure, scalable, and efficient Internet-of-Things networks
A Mishra, T Reichherzer, E Kalaimannan, N Wilde, R Ramirez
International Journal of Distributed Sensor Networks 16 (2), 1550147720908199, 2020
The security development lifecycle in the context of accreditation policies and standards
E Kalaimannan, JND Gupta
IEEE Security & Privacy 15 (1), 52-57, 2017
Smart Device Forensics-Acquisition, Analysis and Interpretation of Digital Evidences
E Kalaimannan
2015 International Conference on Computational Science and Computational …, 2015
A routing table poisoning model for peer-to-peer (P2P) botnets
SK Tetarave, S Tripathy, E Kalaimannan, C John, A Srivastava
IEEE access 7, 67983-67995, 2019
eBot: Approach towards modeling an advanced P2P botnet
SK Tetarave, S Tripathy, E Kalaimannan, C John
2018 17th IEEE International Conference On Trust, Security And Privacy In …, 2018
Source anonymization of digital images: a counter–forensic attack on PRNU based source identification techniques
P Sengupta, VU Sameer, R Naskar, E Kalaimannan
Sub-erroneous outlier detection of cyber attacks in a smart grid state estimation system
S Hopkins, E Kalaimannan, CS John
2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile …, 2020
Design of cybersecurity hands-on laboratory exercises using secDLC framework
H Chi, T Aderibigbe, E Kalaimannan
Proceedings of the ACMSE 2018 Conference, 1-1, 2018
Maximizing investigation effectiveness in digital forensic cases
E Kalaimannan, JND Gupta, SM Yoo
2013 International Conference on Social Computing, 618-623, 2013
The system can't perform the operation now. Try again later.
Articles 1–20