Selvakumar Manickam
Orcid: 0000-0003-4378-1954
According to our database1,
Selvakumar Manickam
authored at least 89 papers
between 2001 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
2005
2010
2015
2020
2025
0
5
10
15
2
11
13
14
5
4
4
2
2
2
2
2
2
1
2
4
3
3
2
1
1
2
2
1
2
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
Deep Learning-Based Intrusion Detection System for Detecting IoT Botnet Attacks: A Review.
IEEE Access, 2025
IEEE Access, 2025
2024
Peer-to-peer botnets: exploring behavioural characteristics and machine/deep learning-based detection.
EURASIP J. Inf. Secur., December, 2024
Malware cyberattacks detection using a novel feature selection method based on a modified whale optimization algorithm.
Wirel. Networks, November, 2024
Exploring aspect-based sentiment analysis: an in-depth review of current methods and prospects for advancement.
Knowl. Inf. Syst., July, 2024
Neighbor discovery protocol anomaly-based detection system using neural network algorithm.
Int. J. Inf. Sec., June, 2024
A systematic literature review of recent lightweight detection approaches leveraging machine and deep learning mechanisms in Internet of Things networks.
J. King Saud Univ. Comput. Inf. Sci., January, 2024
Exploring the convergence of Metaverse, Blockchain, and AI: A comprehensive survey of enabling technologies, applications, challenges, and future directions.
WIREs Data. Mining. Knowl. Discov., 2024
Illuminating Healthcare Management: A Comprehensive Review of IoT-Enabled Chronic Disease Monitoring.
IEEE Access, 2024
Majority Voting Ensemble Classifier for Detecting Keylogging Attack on Internet of Things.
IEEE Access, 2024
IEEE Access, 2024
Securing MQTT Ecosystem: Exploring Vulnerabilities, Mitigations, and Future Trajectories.
IEEE Access, 2024
2023
Privacy calculus model for online social networks: a study of Facebook users in a Malaysian university.
Educ. Inf. Technol., June, 2023
Efficient Authentication Scheme for 5G-Enabled Vehicular Networks Using Fog Computing.
Sensors, April, 2023
Secured-KDS: Secret key distribution and authentication scheme for resource-constrained devices.
IET Networks, January, 2023
A Systematic Literature Review on Machine Learning and Deep Learning Approaches for Detecting DDoS Attacks in Software-Defined Networking.
Sensors, 2023
Informatica (Slovenia), 2023
Feature Selection for Detecting ICMPv6-Based DDoS Attacks Using Binary Flower Pollination Algorithm.
Comput. Syst. Sci. Eng., 2023
Exploring the Potential of Metaverse Technology in Healthcare: Applications, Challenges, and Future Directions.
IEEE Access, 2023
Unveiling the Metaverse: Exploring Emerging Trends, Multifaceted Perspectives, and Future Challenges.
IEEE Access, 2023
FC-PA: Fog Computing-Based Pseudonym Authentication Scheme in 5G-Enabled Vehicular Networks.
IEEE Access, 2023
Uncovering the Cloak: A Systematic Review of Techniques Used to Conceal Phishing Websites.
IEEE Access, 2023
IEEE Access, 2023
A Robust Security Scheme Based on Enhanced Symmetric Algorithm for MQTT in the Internet of Things.
IEEE Access, 2023
A Systematic Literature Review on Security of Vehicular Ad-Hoc Network (VANET) Based on VEINS Framework.
IEEE Access, 2023
Proceedings of the NOMS 2023, 2023
Modified Flower Pollination Algorithm for ICMPv6-Based DDoS Attacks Anomaly Detection.
Proceedings of the 14th International Conference on Ambient Systems, 2023
2022
Man-in-the-Middle Attacks in Mobile Ad Hoc Networks (MANETs): Analysis and Evaluation.
Symmetry, 2022
CM-CPPA: Chaotic Map-Based Conditional Privacy-Preserving Authentication Scheme in 5G-Enabled Vehicular Networks.
Sensors, 2022
A Secure Pseudonym-Based Conditional Privacy-Preservation Authentication Scheme in Vehicular Ad Hoc Networks.
Sensors, 2022
Informatica (Slovenia), 2022
An enhanced mechanism for detection of Domain Name System-based distributed reflection denial of service attacks depending on modified metaheuristic algorithms and adaptive thresholding techniques.
IET Networks, 2022
Intrusion Detection Systems Using Blockchain Technology: A Review, Issues and Challenges.
Comput. Syst. Sci. Eng., 2022
IEEE Access, 2022
Applicability of Intrusion Detection System on Ethereum Attacks: A Comprehensive Review.
IEEE Access, 2022
MSR-DoS: Modular Square Root-Based Scheme to Resist Denial of Service (DoS) Attacks in 5G-Enabled Vehicular Networks.
IEEE Access, 2022
2021
SE-CPPA: A Secure and Efficient Conditional Privacy-Preserving Authentication Scheme in Vehicular Ad-Hoc Networks.
Sensors, 2021
Security and Privacy Schemes in Vehicular Ad-Hoc Network With Identity-Based Cryptography Approach: A Survey.
IEEE Access, 2021
Towards Identity-Based Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks.
IEEE Access, 2021
SECS/GEMsec: A Mechanism for Detection and Prevention of Cyber-Attacks on SECS/GEM Communications in Industry 4.0 Landscape.
IEEE Access, 2021
A Review of Scalability Issues in Software-Defined Exchange Point (SDX) Approaches: State-of-the-Art.
IEEE Access, 2021
Proceedings of the 11th International Conference on Robotics, Vision, Signal Processing and Power Applications, 2021
Proceedings of the Advances in Cyber Security - Third International Conference, 2021
Propose a Flow-Based Approach for Detecting Abnormal Behavior in Neighbor Discovery Protocol (NDP).
Proceedings of the Advances in Cyber Security - Third International Conference, 2021
An Improved Secure Router Discovery Mechanism to Prevent Fake RA Attack in Link Local IPv6 Network.
Proceedings of the Advances in Cyber Security - Third International Conference, 2021
2020
An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Secure Communication in a Vehicular Ad Hoc Network.
Symmetry, 2020
Efficient Conditional Privacy Preservation With Mutual Authentication in Vehicular Ad Hoc Networks.
IEEE Access, 2020
LSWBVM: A Lightweight Security Without Using Batch Verification Method Scheme for a Vehicle Ad Hoc Network.
IEEE Access, 2020
Proposed Efficient Conditional Privacy-Preserving Authentication Scheme for V2V and V2I Communications Based on Elliptic Curve Cryptography in Vehicular Ad Hoc Networks.
Proceedings of the Advances in Cyber Security - Second International Conference, 2020
Proceedings of the Advances in Cyber Security - Second International Conference, 2020
Proceedings of the Advances in Cyber Security - Second International Conference, 2020
2019
J. Cyber Secur. Mobil., 2019
J. Commun., 2019
DDoS attack aware environment with secure clustering and routing based on RPL protocol operation.
IET Circuits Devices Syst., 2019
Comparative Analysis of State-of-the-Art EDoS Mitigation Techniques in Cloud Computing Environment.
CoRR, 2019
Performance Analysis of EMM an EDoS Mitigation Technique in Cloud Computing Environment.
Proceedings of the Advances in Cyber Security - First International Conference, 2019
Iraqi's Organizations Awareness to Prompt Open Source Cloud Computing (OSCC) in Their Service: A Study.
Proceedings of the Advances in Cyber Security - First International Conference, 2019
Proceedings of the Advances in Cyber Security - First International Conference, 2019
2018
Neural Comput. Appl., 2018
DAD-Match: Technique to Prevent DoS Attack on Duplicate Address Detection Process in IPv6 Link-local Network.
J. Commun., 2018
2017
An Adaptive Assessment and Prediction Mechanism in Network Security Situation Awareness.
J. Comput. Sci., 2017
Int. J. Commun. Networks Inf. Secur., 2017
A temporal-aware signature extraction method using sliding-window mechanism for scalable, cost-effective and accurate traffic classification.
Proceedings of the 7th IEEE International Conference on Control System, 2017
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017
2016
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016
2015
J. Comput. Sci., 2015
A Proposed Framework for Outsourcing and Secure Encrypted Data on OpenStack Object Storage (Swift).
J. Comput. Sci., 2015
2014
2013
Research Proposal: an Intrusion Detection System Alert Reduction and Assessment Framework based on Data Mining.
J. Comput. Sci., 2013
Phishing Dynamic Evolving Neural Fuzzy Framework for Online Detection Zero-day Phishing Email
CoRR, 2013
2012
Statistical cross-relation approach for detecting TCP and UDP random and sequential network scanning (SCANS).
Int. J. Comput. Math., 2012
Botnet-based Distributed Denial of Service (DDoS) Attacks on Web Servers: Classification and Art
CoRR, 2012
2009
Proceedings of the EMS 2009, 2009
2005
Using ensemble and learning techniques towards extending the knowledge discovery pipeline.
Proceedings of the ICEIS 2005, 2005
A knowledge discovery pipeline for medical decision support using clustering ensemble and neural network ensemble.
Proceedings of the AC 2005, 2005
2003
An Approach to Analyze Visual Field and Diagnose Glaucoma Progression Using Artificial Neural Network Techniques.
Proceedings of the IADIS International Conference WWW/Internet 2003, 2003
Internet Mediated, Multi Layer Medical Terminologies Retriever: Towards We-based UMLS Thesauri and Semantic Search Engine.
Proceedings of the 3th International Conference on IT in Asia, 2003
2002
Leveraging XML-based electronic medical records to extract experiential clinical knowledge: An automated approach to generate cases for medical case-based reasoning systems.
Int. J. Medical Informatics, 2002
Distributed Data Mining From Heterogeneous Healthcare Data Repositories: Towards an Intelligent Agent-Based Framework.
Proceedings of the 15th IEEE Symposium on Computer-Based Medical Systems (CBMS 2002), 2002
2001
Extracting Clinical Cases from XML-Based Electronic Patient Records for Use in Web-based Medical Case Based Reasoning Systems.
Proceedings of the MEDINFO 2001, 2001
Augmenting Medical Case Base Reasoning Systems with Clinical Knowledge Derived from Heterogeneous Electronic Patient Records.
Proceedings of the 14th IEEE Symposium on Computer-Based Medical Systems (CBMS 2001), 2001