Emmanuel S. Pilli
Orcid: 0000-0002-6056-1147Affiliations:
- Malaviya National Institute of Technology, Jaipur, Rajasthan, India
According to our database1,
Emmanuel S. Pilli
authored at least 71 papers
between 2010 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on scopus.com
-
on orcid.org
-
on mnit.ac.in
-
on dl.acm.org
On csauthors.net:
Bibliography
2025
A comprehensive survey on RPL routing-based attacks, defences and future directions in Internet of Things.
Comput. Electr. Eng., 2025
2024
Mmds: multimodal benchmark dataset for suspicious profile detection on twitter social network.
Soc. Netw. Anal. Min., December, 2024
DiEvD-SF: Disruptive Event Detection Using Continual Machine Learning With Selective Forgetting.
IEEE Trans. Comput. Soc. Syst., June, 2024
D$i$E$v$D: Disruptive Event Detection From Dynamic Datastreams Using Continual Machine Learning: A Case Study With Twitter.
IEEE Trans. Emerg. Top. Comput., 2024
Securing RPL-Based IoT Networks: A Hyperparameter Based Deep Learning Approach for Intrusion Detection.
Proceedings of the International Symposium on Networks, Computers and Communications, 2024
Proceedings of the Advances in Digital Forensics XX, 2024
2023
J. Ambient Intell. Humaniz. Comput., December, 2023
Forensic Sci. Int. Digit. Investig., September, 2023
Comput. Electr. Eng., July, 2023
An effective NIDS framework based on a comprehensive survey of feature optimization and classification techniques.
Neural Comput. Appl., March, 2023
A Defense Solution to Secure Low-Power and Lossy Networks Against DAO Insider Attacks.
Proceedings of the IEEE Region 10 Conference, 2023
Proceedings of the Pattern Recognition and Machine Intelligence, 2023
Proceedings of the Information Systems Security - 19th International Conference, 2023
2022
SN Comput. Sci., 2022
Digit. Investig., 2022
Clust. Comput., 2022
vServiceInspector: Introspection-assisted evolutionary bag-of-ngram approach to detect malware in cloud servers.
Ad Hoc Networks, 2022
2021
Sustain. Comput. Informatics Syst., 2021
A smart anomaly-based intrusion detection system for the Internet of Things (IoT) network using GWO-PSO-RF model.
J. Reliab. Intell. Environ., 2021
BSS: a brokering model for service selection using integrated weighting approach in cloud environment.
J. Cloud Comput., 2021
J. Big Data, 2021
An Optimal NIDS for VCN Using Feature Selection and Deep Learning Technique: IDS for VCN.
Int. J. Digit. Crime Forensics, 2021
Appl. Soft Comput., 2021
Proceedings of the 7th IEEE World Forum on Internet of Things, 2021
An Automated MDD Detection System based on Machine Learning Methods in Smart Connected Healthcare.
Proceedings of the IEEE International Symposium on Smart Electronic Systems, 2021
Proceedings of the IC3 2021: Thirteenth International Conference on Contemporary Computing, Noida, India, August 5, 2021
2020
VMGuard: A VMI-Based Security Architecture for Intrusion Detection in Cloud Environment.
IEEE Trans. Cloud Comput., 2020
Comput. Sci. Rev., 2020
Towards trustworthy Internet of Things: A survey on Trust Management applications and schemes.
Comput. Commun., 2020
Proceedings of the Machine Learning, Image Processing, Network Security and Data Sciences, 2020
Proceedings of the Advances in Digital Forensics XVI, 2020
2019
J. Parallel Distributed Comput., 2019
Int. J. Grid Util. Comput., 2019
SOD-CED: salient object detection for noisy images using convolution encoder-decoder.
IET Comput. Vis., 2019
A Detailed Investigation and Analysis of Using Machine Learning Techniques for Intrusion Detection.
IEEE Commun. Surv. Tutorials, 2019
Proceedings of the 5th IEEE World Forum on Internet of Things, 2019
Proceedings of the Advances in Digital Forensics XV, 2019
VMProtector: Malign Process Detection for Protecting Virtual Machines in Cloud Environment.
Proceedings of the Advances in Computing and Data Sciences, 2019
Proceedings of the ACM India Joint International Conference on Data Science and Management of Data, 2019
2018
Netw. Protoc. Algorithms, 2018
Int. J. Inf. Technol. Web Eng., 2018
IEEE Access, 2018
Proceedings of the Advances in Digital Forensics XIV, 2018
JOTR: Join-Optimistic Triple Reordering Approach for SPARQL Query Optimization on Big RDF Data.
Proceedings of the 9th International Conference on Computing, 2018
Proceedings of the 2018 International Conference on Advances in Computing, 2018
Proceedings of the 20th IEEE International Conference on High Performance Computing and Communications; 16th IEEE International Conference on Smart City; 4th IEEE International Conference on Data Science and Systems, 2018
UPB: User Preference based Brokering for Service Ranking and Selection in Federated Cloud.
Proceedings of the IEEE International Conference on Advanced Networks and Telecommunications Systems, 2018
2017
J. Netw. Comput. Appl., 2017
PSI-NetVisor: Program semantic aware intrusion detection at network and hypervisor layer in cloud.
J. Intell. Fuzzy Syst., 2017
J. Cloud Comput., 2017
Concurr. Comput. Pract. Exp., 2017
Proceedings of the 2017 International Conference on Advances in Computing, 2017
Proceedings of the 2017 International Conference on Advances in Computing, 2017
Proceedings of the 2017 International Conference on Advances in Computing, 2017
2016
Computer Communications and Networks, Springer, ISBN: 978-1-4471-7299-4, 2016
NvCloudIDS: A security architecture to detect intrusions at network and virtualization layer in cloud environment.
Proceedings of the 2016 International Conference on Advances in Computing, 2016
Securing Virtual Machines from Anomalies Using Program-Behavior Analysis in Cloud Environment.
Proceedings of the 18th IEEE International Conference on High Performance Computing and Communications; 14th IEEE International Conference on Smart City; 2nd IEEE International Conference on Data Science and Systems, 2016
Proceedings of the Advances in Artificial Intelligence, 2016
2015
Proceedings of the 2nd IEEE World Forum on Internet of Things, 2015
Proceedings of the 8th Annual ACM India Conference, Ghaziabad, India, October 29-31, 2015, 2015
2014
LevelSync: A hierarchical time synchronization mechanism for wireless sensor networks.
Proceedings of the Seventh International Conference on Contemporary Computing, 2014
2013
Comparative Analysis and Research Issues in Classification Techniques for Intrusion Detection.
Proceedings of the Intelligent Computing, 2013
2011
Proceedings of the Advances in Digital Forensics VII - 7th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA, January 31, 2011
Data reduction by identification and correlation of TCP/IP attack attributes for network forensics.
Proceedings of the ICWET '11 International Conference & Workshop on Emerging Trends in Technology, Mumbai, Maharashtra, India, February 25, 2011
2010
Proceedings of the Information and Communication Technologies - International Conference, 2010
Proceedings of the Information and Communication Technologies - International Conference, 2010
Proceedings of the Digital Forensics and Cyber Crime, 2010