Shankar Karuppayah
Orcid: 0000-0003-4801-6370
According to our database1,
Shankar Karuppayah
authored at least 43 papers
between 2011 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Peer-to-peer botnets: exploring behavioural characteristics and machine/deep learning-based detection.
EURASIP J. Inf. Secur., December, 2024
Malware cyberattacks detection using a novel feature selection method based on a modified whale optimization algorithm.
Wirel. Networks, November, 2024
Artif. Intell. Rev., September, 2024
Securing MQTT Ecosystem: Exploring Vulnerabilities, Mitigations, and Future Trajectories.
IEEE Access, 2024
Detecting Version Number Attacks in Low Power and Lossy Networks for Internet of Things Routing: Review and Taxonomy.
IEEE Access, 2024
2023
Federated Learning Attacks Revisited: A Critical Discussion of Gaps, Assumptions, and Evaluation Setups.
Sensors, 2023
CoRR, 2023
IEEE Access, 2023
Detection of Real-Time Malicious Intrusions and Attacks in IoT Empowered Cybersecurity Infrastructures.
IEEE Access, 2023
A Robust Security Scheme Based on Enhanced Symmetric Algorithm for MQTT in the Internet of Things.
IEEE Access, 2023
Proceedings of the Annual Computer Security Applications Conference, 2023
2022
IEEE Access, 2022
Applicability of Intrusion Detection System on Ethereum Attacks: A Comprehensive Review.
IEEE Access, 2022
2021
Malware Sight-Seeing: Accelerating Reverse-Engineering via Point-of-Interest-Beacons.
CoRR, 2021
SECS/GEMsec: A Mechanism for Detection and Prevention of Cyber-Attacks on SECS/GEM Communications in Industry 4.0 Landscape.
IEEE Access, 2021
Mathematical Approach as Qualitative Metrics of Distributed Denial of Service Attack Detection Mechanisms.
IEEE Access, 2021
A Review of Scalability Issues in Software-Defined Exchange Point (SDX) Approaches: State-of-the-Art.
IEEE Access, 2021
An Improved Secure Router Discovery Mechanism to Prevent Fake RA Attack in Link Local IPv6 Network.
Proceedings of the Advances in Cyber Security - Third International Conference, 2021
Proceedings of the Advances in Cyber Security - Third International Conference, 2021
Proceedings of the Advances in Cyber Security - Third International Conference, 2021
2020
Theory-Based Model and Prediction Analysis of Information Security Compliance Behavior in the Saudi Healthcare Sector.
Symmetry, 2020
2019
J. Commun., 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
2018
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2018
Springer, ISBN: 978-981-10-9049-3, 2018
2017
Int. J. Commun. Networks Inf. Secur., 2017
A temporal-aware signature extraction method using sliding-window mechanism for scalable, cost-effective and accurate traffic classification.
Proceedings of the 7th IEEE International Conference on Control System, 2017
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017
2016
Proceedings of the 2016 IEEE International Conference on Communications, 2016
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016
2015
Proceedings of the 8th International Conference on Security of Information and Networks, 2015
Proceedings of the 35th IEEE International Conference on Distributed Computing Systems, 2015
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015
2014
Proceedings of the 7th International Conference on Security of Information and Networks, 2014
Proceedings of the IEEE International Conference on Communications, 2014
2013
Proceedings of the SPSM'13, 2013
2012
Botnet-based Distributed Denial of Service (DDoS) Attacks on Web Servers: Classification and Art
CoRR, 2012
2011
CAD+ : Detecting Colluding Nodes in Gray Hole Attacks.
Proceedings of the Informatiktage 2011, 2011