Ezhil Kalaimannan

Orcid: 0000-0003-2080-7007

According to our database1, Ezhil Kalaimannan authored at least 19 papers between 2013 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
FogAutho: Leveraging a novel authentication scheme for securing fog-cloud systems in smart home applications.
Proceedings of the 14th IEEE Annual Ubiquitous Computing, 2023

Passive Operating System Fingerprinting Analysis Using Artificial Intelligence Techniques.
Proceedings of the 2023 International Conference on Advances in Computing Research, 2023

2022
Simulating deferrable loads for the development of next generation energy systems: poster abstract.
Proceedings of the 9th ACM International Conference on Systems for Energy-Efficient Buildings, 2022

Scheduling Energy Flexible Devices Under Constrained Peak Load Consumption in Smart Grid.
Proceedings of the 13th ACM/IEEE International Conference on Cyber-Physical Systems, 2022

2021
NCHR: A Nonthreshold-Based Cluster-Head Rotation Scheme for IEEE 802.15.4 Cluster-Tree Networks.
IEEE Internet Things J., 2021

2020
Trade-offs involved in the choice of cloud service configurations when building secure, scalable, and efficient Internet-of-Things networks.
Int. J. Distributed Sens. Networks, 2020

Sub-Erroneous Outlier Detection of Cyber Attacks in a Smart Grid State Estimation System.
Proceedings of the 11th IEEE Annual Ubiquitous Computing, 2020

Optimal Sizing of Hybrid Renewable Energy Sources via Efficient Demand Response in Microgrid.
Proceedings of the e-Energy '20: The Eleventh ACM International Conference on Future Energy Systems, 2020

2019
Using machine learning techniques to identify rare cyber-attacks on the UNSW-NB15 dataset.
Secur. Priv., 2019

A Routing Table Poisoning Model for Peer-to-Peer (P2P) Botnets.
IEEE Access, 2019

Impact of Targeted Cyber Attacks on Electrical Power Systems.
Proceedings of the National Cyber Summit, 2019

A Sequential Investigation Model for Solving Time Critical Digital Forensic Cases Involving a Single Investigator.
Proceedings of the National Cyber Summit, 2019

2018
eBot: Approach Towards Modeling an Advanced P2P Botnet.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Design of cybersecurity hands-on laboratory exercises using secDLC framework.
Proceedings of the ACMSE 2018 Conference, Richmond, KY, USA, March 29-31, 2018, 2018

2017
The Security Development Lifecycle in the Context of Accreditation Policies and Standards.
IEEE Secur. Priv., 2017

Minimum cost security measurements for attack tree based threat models in smart grid.
Proceedings of the 8th IEEE Annual Ubiquitous Computing, 2017

Selective scheduling: Controlling non-preemptive devices in smart grid environment.
Proceedings of the IEEE Power & Energy Society Innovative Smart Grid Technologies Conference, 2017

2016
A heuristic for maximizing investigation effectiveness of digital forensic cases involving multiple investigators.
Comput. Oper. Res., 2016

2013
Maximizing Investigation Effectiveness in Digital Forensic Cases.
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013


  Loading...