Elankayer Sithirasenan

According to our database1, Elankayer Sithirasenan authored at least 33 papers between 2004 and 2016.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2016
Functional Analysis of EAP-CRA.
J. Networks, 2016

Intelligent Sampling Using an Optimized Neural Network.
J. Networks, 2016

A survey on data leakage prevention systems.
J. Netw. Comput. Appl., 2016

A probabilistic sampling method for efficient flow-based analysis.
J. Commun. Networks, 2016

Formal Security Analysis of EAP-ERP Using Casper.
IEEE Access, 2016

Discovery of potential data leaks in email communications.
Proceedings of the 10th International Conference on Signal Processing and Communication Systems, 2016

2015
Performance of Flow-based Anomaly Detection in Sampled Traffic.
J. Networks, 2015

Detecting Data Semantic: A Data Leakage Prevention Approach.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Flow-based anomaly detection using semisupervised learning.
Proceedings of the 9th International Conference on Signal Processing and Communication Systems, 2015

2014
A Simple Lightweight Encryption Scheme for Wireless Sensor Networks.
Proceedings of the Distributed Computing and Networking - 15th International Conference, 2014

A Semantics-Aware Classification Approach for Data Leakage Prevention.
Proceedings of the Information Security and Privacy - 19th Australasian Conference, 2014

2013
Formal Verification of the Coordinated Robust Authentication Protocol for Wireless Networks.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Determining Similar Recommenders Using Improved Collaborative Filtering in MANETs.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Word N-Gram Based Classification for Data Leakage Prevention.
Proceedings of the 12th IEEE International Conference on Trust, 2013

An energy efficient clique based clustering and routing mechanism in wireless sensor networks.
Proceedings of the 2013 9th International Wireless Communications and Mobile Computing Conference, 2013

Maximal clique based clustering scheme for wireless sensor networks.
Proceedings of the 2013 IEEE Eighth International Conference on Intelligent Sensors, 2013

Adaptable N-gram classification model for data leakage prevention.
Proceedings of the 7th International Conference on Signal Processing and Communication Systems, 2013

Flow-Based Anomaly Detection Using Neural Network Optimized with GSA Algorithm.
Proceedings of the 33rd International Conference on Distributed Computing Systems Workshops (ICDCS 2013 Workshops), 2013

Coordinates Determination of Submerged Sensors Using Cayley-Menger Determinant.
Proceedings of the IEEE International Conference on Distributed Computing in Sensor Systems, 2013

The Analysis of Temperature, Depth, Salinity Effect on Acoustic Speed for a Vertical Water Column.
Proceedings of the IEEE International Conference on Distributed Computing in Sensor Systems, 2013

Metaheuristic algorithms based Flow Anomaly Detector.
Proceedings of the 19th Asia-Pacific Conference on Communications, 2013

Localization of Submerged Sensors Using Radio and Acoustic Signals with Single Beacon.
Proceedings of the Ad-hoc, Mobile, and Wireless Network - 12th International Conference, 2013

2012
Enhanced CRA protocol for seamless connectivity in wireless networks.
Proceedings of the International Symposium on Communications and Information Technologies, 2012

2011
Substantiating Anomalies In Wireless Networks Using Group Outlier Scores.
J. Softw., 2011

An EAP Framework for Unified Authentication in Wireless Networks.
Proceedings of the IEEE 10th International Conference on Trust, 2011

Trust-Based Cluster Head Selection Algorithm for Mobile Ad Hoc Networks.
Proceedings of the IEEE 10th International Conference on Trust, 2011

2010
Using WiMAX for effective business continuity during and after disaster.
Proceedings of the 6th International Wireless Communications and Mobile Computing Conference, 2010

2008
Substantiating Timing and Behavioral Anomalies in Wireless LANs Using GCL.
J. Networks, 2008

Substantiating Security Threats Using Group Outlier Detection Techniques.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

2007
Detecting Security Threats in Wireless LANs Using Timing and Behavioral Anomalies.
Proceedings of the 15th IEEE International Conference on Networks, 2007

Substantiating Unexpected Behavior of 802.11 Network Hosts.
Proceedings of the 4th IEEE Consumer Communications and Networking Conference, 2007

2006
Formal Verification of the IEEE 802.11i WLAN Security Protocol.
Proceedings of the 17th Australian Software Engineering Conference (ASWEC 2006), 2006

2004
A model for object-based distributed processing using behaviour trees.
Proceedings of the IASTED Conference on Software Engineering and Applications, 2004


  Loading...