G. Geethakumari

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Bibliography

2022
A holistic framework for prediction of routing attacks in IoT-LLNs.
J. Supercomput., 2022

Correction: Mitigating the worst parent attack in RPL based internet of things.
Clust. Comput., 2022

Mitigating the worst parent attack in RPL based internet of things.
Clust. Comput., 2022

Securing Fog Nodes against On-Off Attacks using Subjective Logic.
Proceedings of the IEEE International Conference on Advanced Networks and Telecommunications Systems, 2022

2021
A framework for the identification of suspicious packets to detect anti-forensic attacks in the cloud environment.
Peer-to-Peer Netw. Appl., 2021

A novel Network Partitioning Attack against Routing Protocol in Internet of Things.
Ad Hoc Networks, 2021

IB-RPL: Embedding Isolation and Blacklisting of Malicious Nodes in RPL for Securing IoT-LLNs.
Proceedings of the IEEE International Conference on Advanced Networks and Telecommunications Systems, 2021

2020
A novel blockchain based framework to secure IoT-LLNs against routing attacks.
Computing, 2020

Secure data transmission and detection of anti-forensic attacks in cloud environment using MECC and DLMNN.
Comput. Commun., 2020

A Feedforward Neural Network based Model to Predict Sub-optimal Path Attack in IoT-LLNs.
Proceedings of the 20th IEEE/ACM International Symposium on Cluster, 2020

2019
SNAPS: Towards building snapshot based provenance system for virtual machines in the cloud environment.
Comput. Secur., 2019

Temporal Dynamics and Spatial Content in IoT Malware detection.
Proceedings of the TENCON 2019, 2019

2018
Attack graph - Based vulnerability assessment of rank property in RPL-6LOWPAN in IoT.
Proceedings of the 4th IEEE World Forum on Internet of Things, 2018

Traffic Convergence Detection in IoT LLNs: A Multilayer Perceptron based Mechanism.
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2018

Efficient Framework for Detection of Version Number Attack in Internet of Things.
Proceedings of the Intelligent Systems Design and Applications, 2018

Exponential Smoothing based Approach for Detection of Blackhole Attacks in IoT.
Proceedings of the IEEE International Conference on Advanced Networks and Telecommunications Systems, 2018

2017
CLOSER: applying aggregation for effective event reconstruction of cloud service logs.
Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, 2017

2016
CEAT: a cloud evidence acquisition tool for aiding forensic investigations in cloud systems.
Int. J. Trust. Manag. Comput. Commun., 2016

A trigger-based introspection approach for cloud incident handling.
Int. J. Big Data Intell., 2016

Event correlation in cloud: a forensic perspective.
Computing, 2016

A psychometric analysis of information propagation in online social networks using latent trait theory.
Computing, 2016

FaaSeC: enabling forensics-as-a-service for cloud computing systems.
Proceedings of the 9th International Conference on Utility and Cloud Computing, 2016

2015
Privacy landscape in online social networks.
Int. J. Trust. Manag. Comput. Commun., 2015

Real-time digital forensic triaging for cloud data analysis using MapReduce on Hadoop framework.
Int. J. Electron. Secur. Digit. Forensics, 2015

Pre processing of evidences from cloud components for effective forensic analysis.
Proceedings of the 2015 International Conference on Advances in Computing, 2015

2014
Analysis and modelling of semantic attacks in online social networks.
Int. J. Trust. Manag. Comput. Commun., 2014

A taxonomy for modelling and analysis of diffusion of (mis)information in social networks.
Int. J. Commun. Networks Distributed Syst., 2014

Detecting misinformation in online social networks using cognitive psychology.
Hum. centric Comput. Inf. Sci., 2014

A Heuristic Model for Performing Digital Forensics in Cloud Computing Environment.
Proceedings of the Security in Computing and Communications, 2014

Analysis of Semantic Attacks in Online Social Networks.
Proceedings of the Recent Trends in Computer Networks and Distributed Systems Security, 2014

Identifying Sources of Misinformation in Online Social Networks.
Proceedings of the Advances in Signal Processing and Intelligent Recognition Systems, 2014

Quantifying Direct Trust for Private Information Sharing in an Online Social Network.
Proceedings of the Intelligent Distributed Computing, 2014

Design and Implementation of a forensic framework for Cloud in OpenStack cloud platform.
Proceedings of the 2014 International Conference on Advances in Computing, 2014

A novel approach for incident response in cloud using forensics.
Proceedings of the 7th ACM India Computing Conference, 2014

2013
Measuring privacy leaks in Online Social Networks.
Proceedings of the International Conference on Advances in Computing, 2013

Information diffusion model for spread of misinformation in online social networks.
Proceedings of the International Conference on Advances in Computing, 2013

2012
Digital evidence detection in virtual environment for cloud computing.
Proceedings of the First International Conference on Security of Internet of Things, 2012

2009
A Cross - Domain Role Mapping and Authorization Framework for RBAC in Grid Systems.
Int. J. Comput. Sci. Appl., 2009

2006
Indirect Authorization Topologies for Grid Access Control.
Proceedings of the 9th International Conference in Information Technology, 2006

2005
Dynamic Delegation Approach for Access Control in Grids.
Proceedings of the First International Conference on e-Science and Grid Technologies (e-Science 2005), 2005


  Loading...