Bharanidharan Shanmugam
Orcid: 0000-0002-2591-1949
According to our database1,
Bharanidharan Shanmugam
authored at least 36 papers
between 2006 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Int. J. Inf. Sec., June, 2024
Risk Evaluation and Attack Detection in Heterogeneous IoMT Devices Using Hybrid Fuzzy Logic Analytical Approach.
Sensors, May, 2024
Enhancing smart grid load forecasting: An attention-based deep learning model integrated with federated learning and XAI for security and interpretability.
Intell. Syst. Appl., 2024
Leak detection and localization in underground water supply system using thermal imaging and geophone signals through machine learning.
Intell. Syst. Appl., 2024
Self-healing hybrid intrusion detection system: an ensemble machine learning approach.
Discov. Artif. Intell., 2024
2023
PbDinEHR: A Novel Privacy by Design Developed Framework Using Distributed Data Storage and Sharing for Secure and Scalable Electronic Health Records Management.
J. Sens. Actuator Networks, April, 2023
Designing a Private and Secure Personal Health Records Access Management System: A Solution Based on IOTA Distributed Ledger Technology.
Sensors, 2023
Simulation of IoT-based Smart City of Darwin: Leading Cyber Attacks and Prevention Techniques.
Proceedings of the 14th International Conference on Computing Communication and Networking Technologies, 2023
2022
Sensors, 2022
J. Sens. Actuator Networks, 2022
A Review on Current Technologies and Future Direction of Water Leakage Detection in Water Distribution Network.
IEEE Access, 2022
2021
IEEE Access, 2021
IEEE Access, 2021
An Unsupervised Approach for Content-Based Clustering of Emails Into Spam and Ham Through Multiangular Feature Formulation.
IEEE Access, 2021
IEEE Access, 2021
2020
Efficient Clustering of Emails Into Spam and Ham: The Foundational Study of a Comprehensive Unsupervised Framework.
IEEE Access, 2020
2019
A Systematic Literature Review of Authentication in Internet of Things for Heterogeneous Devices.
J. Comput. Networks Commun., 2019
A privacy-preserving model to control social interaction behaviors in social network sites.
J. Inf. Secur. Appl., 2019
Proceedings of the Emerging Trends in Intelligent Computing and Informatics, 2019
Vulnerabilities Analysis and Security Assessment Framework for the Internet of Things.
Proceedings of the Cybersecurity and Cyberforensics Conference, 2019
Improving Accessibility for Mobility Impaired People in Smart City using Crowdsourcing.
Proceedings of the Cybersecurity and Cyberforensics Conference, 2019
2017
Classification of Third-Party Applications on Facebook to Mitigate Users' Information Leakage.
Proceedings of the Recent Advances in Information Systems and Technologies, 2017
An Efficient Method for Detecting Fraudulent Transactions Using Classification Algorithms on an Anonymized Credit Card Data Set.
Proceedings of the Intelligent Systems Design and Applications, 2017
Proceedings of the Intelligent Systems Design and Applications, 2017
2014
Secur. Commun. Networks, 2014
Proceedings of the 2014 International Symposium on Biometrics and Security Technologies, 2014
2013
Data Anonymization According to the Combination of Attributes on Social Network Sites.
Proceedings of the Security in Computing and Communications - International Symposium, 2013
2012
Analysis of Applying Enterprise Service Bus Architecture as a Cloud Interoperability and Resource Sharing Platform.
Proceedings of the 7th International Conference on Knowledge Management in Organizations: Service and Cloud Computing, 2012
2011
Enabling Data Hiding for Resource Sharing in Cloud Computing Environments Based on DNA Sequences.
Proceedings of the World Congress on Services, 2011
Proceedings of the Digital Information and Communication Technology and Its Applications, 2011
2009
Improved Intrusion Detection System Using Fuzzy Logic for Detecting Anamoly and Misuse Type of Attacks.
Proceedings of the First International Conference of Soft Computing and Pattern Recognition, 2009
2006
Novel Attack Detection Using Fuzzy Logic and Data Mining.
Proceedings of the 2006 International Conference on Security & Management, 2006