P. Santhi Thilagam
Orcid: 0000-0002-8359-1330
According to our database1,
P. Santhi Thilagam
authored at least 58 papers
between 2007 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
2023
J. Univers. Comput. Sci., March, 2023
Eng. Appl. Artif. Intell., March, 2023
Appl. Intell., March, 2023
User Interest Drift Identification Using Contextual Factors in Implicit Feedback-Based Recommender Systems.
Proceedings of the Pattern Recognition and Machine Intelligence, 2023
Proceedings of the 6th Joint International Conference on Data Science & Management of Data (10th ACM IKDD CODS and 28th COMAD), 2023
2022
HTTP request pattern based signatures for early application layer DDoS detection: A firewall agnostic approach.
J. Inf. Secur. Appl., 2022
2021
IEEE Trans. Inf. Forensics Secur., 2021
Fuzzy Request Set Modelling for Detecting Multiplexed Asymmetric DDoS Attacks on HTTP/2 servers.
Expert Syst. Appl., 2021
Comput. Informatics, 2021
Proceedings of the Data and Applications Security and Privacy XXXV, 2021
2020
IEEE Trans. Inf. Forensics Secur., 2020
Int. J. Inf. Retr. Res., 2020
Int. J. Commun. Networks Inf. Secur., 2020
2019
A Probabilistic Model of Clock Offset Estimator (PMCOE) for Clock Synchronization in Wireless Sensor Network.
Wirel. Pers. Commun., 2019
Inf. Syst., 2019
Crime base: Towards building a knowledge base for crime entities and their relationships from online news papers.
Inf. Process. Manag., 2019
DDoS Attacks at the Application Layer: Challenges and Research Perspectives for Safeguarding Web Applications.
IEEE Commun. Surv. Tutorials, 2019
2018
Time synchronization problem of wireless sensor network using maximum probability theory.
Int. J. Syst. Assur. Eng. Manag., 2018
DetLogic: A black-box approach for detecting logic vulnerabilities in web applications.
J. Netw. Comput. Appl., 2018
Black-box detection of XQuery injection and parameter tampering vulnerabilities in web applications.
Int. J. Inf. Sec., 2018
Int. J. Ad Hoc Ubiquitous Comput., 2018
Privacy-Preserving Searchable Encryption Scheme over Encrypted Data Supporting Dynamic Update.
Proceedings of the Security in Computing and Communications - 6th International Symposium, 2018
An Efficient Multi-User Searchable Encryption Scheme without Query Transformation over Outsourced Encrypted Data.
Proceedings of the 9th IFIP International Conference on New Technologies, 2018
2017
Live migration of virtual machines with their local persistent storage in a data intensive cloud.
Int. J. High Perform. Comput. Netw., 2017
Comput. Hum. Behav., 2017
Proceedings of the 2017 International Conference on Advances in Computing, 2017
Target specific influence maximization: An approach to maximize adoption in labeled social networks.
Proceedings of the 9th International Conference on Communication Systems and Networks, 2017
2016
Securing native XML database-driven web applications from XQuery injection vulnerabilities.
J. Syst. Softw., 2016
J. Netw. Comput. Appl., 2016
Securing web applications from injection and logic vulnerabilities: Approaches and challenges.
Inf. Softw. Technol., 2016
Proceedings of the Distributed Computing and Internet Technology, 2016
Proceedings of the 2016 International Conference on Advances in Computing, 2016
2015
Heuristics based server consolidation with residual resource defragmentation in cloud data centers.
Future Gener. Comput. Syst., 2015
Proceedings of Fifth International Conference on Soft Computing for Problem Solving, 2015
Proceedings of the 2015 IEEE International Conference on Data Science and Advanced Analytics, 2015
Proceedings of the Second ACM IKDD Conference on Data Sciences, 2015
2014
Reputation-based cross-layer intrusion detection system for wormhole attacks in wireless mesh networks.
Secur. Commun. Networks, 2014
Proceedings of the 2014 International Conference on Advances in Computing, 2014
Optimization of countour based template matching using GPGPU based hexagonal framework.
Proceedings of the 14th International Conference on Hybrid Intelligent Systems, 2014
Hierarchical Homomorphic Encryption Based Privacy Preserving Distributed Association Rule Mining.
Proceedings of the 2014 International Conference on Information Technology, 2014
2012
Proceedings of the 35th Annual IEEE Software Engineering Workshop, 2012
Proceedings of the 12th IEEE International Conference on Data Mining Workshops, 2012
Proceedings of the Second International Conference on Computational Science, 2012
2011
Intrusion Detection Technique for Wormhole and Following Jellyfish and Byzantine Attacks in Wireless Mesh Network.
Proceedings of the Advanced Computing, Networking and Security - International Conference, 2011
Proceedings of the Advanced Computing, Networking and Security - International Conference, 2011
2010
Proceedings of the Handbook of Social Network Technologies and Applications, 2010
2009
Proceedings of the Information Systems, Technology and Management, 2009
Proceedings of the ARTCom 2009, 2009
2008
Extraction and optimization of fuzzy association rules using multi-objective genetic algorithm.
Pattern Anal. Appl., 2008
Proceedings of the Distributed Computing and Networking, 9th International Conference, 2008
Proceedings of the 14th International Conference on Management of Data, 2008
Proceedings of the Second Asia International Conference on Modelling and Simulation, 2008
2007
Semantic Partition Based Association Rule Mining across Multiple Databases Using Abstraction.
Proceedings of the Sixth International Conference on Machine Learning and Applications, 2007