Bharanidharan Shanmugam

Orcid: 0000-0002-2591-1949

According to our database1, Bharanidharan Shanmugam authored at least 36 papers between 2006 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Generative AI for pentesting: the good, the bad, the ugly.
Int. J. Inf. Sec., June, 2024

Risk Evaluation and Attack Detection in Heterogeneous IoMT Devices Using Hybrid Fuzzy Logic Analytical Approach.
Sensors, May, 2024

Enhancing smart grid load forecasting: An attention-based deep learning model integrated with federated learning and XAI for security and interpretability.
Intell. Syst. Appl., 2024

Leak detection and localization in underground water supply system using thermal imaging and geophone signals through machine learning.
Intell. Syst. Appl., 2024

Self-healing hybrid intrusion detection system: an ensemble machine learning approach.
Discov. Artif. Intell., 2024

2023
PbDinEHR: A Novel Privacy by Design Developed Framework Using Distributed Data Storage and Sharing for Secure and Scalable Electronic Health Records Management.
J. Sens. Actuator Networks, April, 2023

Designing a Private and Secure Personal Health Records Access Management System: A Solution Based on IOTA Distributed Ledger Technology.
Sensors, 2023

Bibliometric Analysis of IoT Lightweight Cryptography.
Inf., 2023

An Intelligent IoT and ML-Based Water Leakage Detection System.
IEEE Access, 2023

Simulation of IoT-based Smart City of Darwin: Leading Cyber Attacks and Prevention Techniques.
Proceedings of the 14th International Conference on Computing Communication and Networking Technologies, 2023

2022
Addressing the Challenges of Electronic Health Records Using Blockchain and IPFS.
Sensors, 2022

A Systematic Review of Radio Frequency Threats in IoMT.
J. Sens. Actuator Networks, 2022

A Review on Current Technologies and Future Direction of Water Leakage Detection in Water Distribution Network.
IEEE Access, 2022

2021
A Conceptual Framework to Ensure Privacy in Patient Record Management System.
IEEE Access, 2021

Machine Learning Based PV Power Generation Forecasting in Alice Springs.
IEEE Access, 2021

An Unsupervised Approach for Content-Based Clustering of Emails Into Spam and Ham Through Multiangular Feature Formulation.
IEEE Access, 2021

Preprocessing of Breast Cancer Images to Create Datasets for Deep-CNN.
IEEE Access, 2021

2020
Efficient Clustering of Emails Into Spam and Ham: The Foundational Study of a Comprehensive Unsupervised Framework.
IEEE Access, 2020

2019
A Systematic Literature Review of Authentication in Internet of Things for Heterogeneous Devices.
J. Comput. Networks Commun., 2019

A privacy-preserving model to control social interaction behaviors in social network sites.
J. Inf. Secur. Appl., 2019

An Intelligent Spam Detection Model Based on Artificial Immune System.
Inf., 2019

A Comprehensive Survey for Intelligent Spam Email Detection.
IEEE Access, 2019

Detecting False Messages in the Smartphone Fault Reporting System.
Proceedings of the Emerging Trends in Intelligent Computing and Informatics, 2019

Vulnerabilities Analysis and Security Assessment Framework for the Internet of Things.
Proceedings of the Cybersecurity and Cyberforensics Conference, 2019

Improving Accessibility for Mobility Impaired People in Smart City using Crowdsourcing.
Proceedings of the Cybersecurity and Cyberforensics Conference, 2019

2017
Classification of Third-Party Applications on Facebook to Mitigate Users' Information Leakage.
Proceedings of the Recent Advances in Information Systems and Technologies, 2017

An Efficient Method for Detecting Fraudulent Transactions Using Classification Algorithms on an Anonymized Credit Card Data Set.
Proceedings of the Intelligent Systems Design and Applications, 2017

A Novel Approach for Steganography App in Android OS.
Proceedings of the Intelligent Systems Design and Applications, 2017

2014
Security risk assessment framework for cloud computing environments.
Secur. Commun. Networks, 2014

Botnet evolution: Network traffic indicators.
Proceedings of the 2014 International Symposium on Biometrics and Security Technologies, 2014

2013
Data Anonymization According to the Combination of Attributes on Social Network Sites.
Proceedings of the Security in Computing and Communications - International Symposium, 2013

2012
Analysis of Applying Enterprise Service Bus Architecture as a Cloud Interoperability and Resource Sharing Platform.
Proceedings of the 7th International Conference on Knowledge Management in Organizations: Service and Cloud Computing, 2012

2011
Enabling Data Hiding for Resource Sharing in Cloud Computing Environments Based on DNA Sequences.
Proceedings of the World Congress on Services, 2011

A Novel Proof of Work Model Based on Pattern Matching to Prevent DoS Attack.
Proceedings of the Digital Information and Communication Technology and Its Applications, 2011

2009
Improved Intrusion Detection System Using Fuzzy Logic for Detecting Anamoly and Misuse Type of Attacks.
Proceedings of the First International Conference of Soft Computing and Pattern Recognition, 2009

2006
Novel Attack Detection Using Fuzzy Logic and Data Mining.
Proceedings of the 2006 International Conference on Security & Management, 2006


  Loading...