Suku Nair
Affiliations:- Southern Methodist University, Dallas, Texas, USA
According to our database1,
Suku Nair
authored at least 85 papers
between 1988 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on engr.smu.edu
On csauthors.net:
Bibliography
2024
Proceedings of the 10th IEEE International Conference on Network Softwarization, 2024
2023
Proceedings of the NOMS 2023, 2023
EdgeGym: A Reinforcement Learning Environment for Constraint-Aware NFV Resource Allocation.
Proceedings of the IEEE 2nd International Conference on AI in Cybersecurity, 2023
2022
Proceedings of the IEEE Global Communications Conference, 2022
Optimal Resource Allocation in SDN/NFV-Enabled Networks via Deep Reinforcement Learning.
Proceedings of the Ninth International Conference on Communications and Networking, 2022
Proceedings of the IWSPA@CODASPY 2022: Proceedings of the 2022 ACM on International Workshop on Security and Privacy Analytics, 2022
On SDPN: Integrating the Software-Defined Perimeter (SDP) and the Software-Defined Network (SDN) Paradigms.
Proceedings of the 10th IEEE Conference on Communications and Network Security, 2022
2021
Objective Measures of Cognitive Load Using Deep Multi-Modal Learning: A Use-Case in Aviation.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2021
Proceedings of the International Conference on Software, 2021
Proceedings of the 2021 IEEE Conference on Network Function Virtualization and Software Defined Networks, 2021
Proceedings of the 2021 IEEE Conference on Computer Communications Workshops, 2021
Proceedings of the IEEE International Conference on Consumer Electronics, 2021
Proceedings of the 10th IEEE International Conference on Cloud Networking, CloudNet 2021, 2021
2020
IEEE Syst. J., 2020
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020
2017
A Feasibility Evaluation of Fair and Privacy-Enhanced Matchmaking with Identity Linked Wishes.
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017
2016
Proceedings of the IEEE International Carnahan Conference on Security Technology, 2016
2015
Predictive Cyber-security Analytics Framework: A non-homogenous Markov model for Security Quantification.
CoRR, 2015
A Novel Architecture for Predictive CyberSecurity Using Non-homogenous Markov Models.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
Proceedings of the 8th ACM International Conference on PErvasive Technologies Related to Assistive Environments, 2015
Work-in-Progress, PupilWare-M: Cognitive Load Estimation Using Unmodified Smartphone Cameras.
Proceedings of the 12th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2015
Proceedings of the 2nd IEEE International Conference on Cybernetics, 2015
2014
Proceedings of the 7th International Conference on PErvasive Technologies Related to Assistive Environments, 2014
Semi-Synthetic Data for Enhanced SMS Spam Detection: [Using Synthetic Minority Oversampling TEchnique SMOTE].
Proceedings of the 6th International Conference on Management of Emergent Digital EcoSystems, 2014
2013
IEEE Syst. J., 2013
Comput. Stand. Interfaces, 2013
Proceedings of the ACS International Conference on Computer Systems and Applications, 2013
Proceedings of the ACS International Conference on Computer Systems and Applications, 2013
2011
Proceedings of the 6th USENIX Workshop on Hot Topics in Security, 2011
Proceedings of the 7th International Wireless Communications and Mobile Computing Conference, 2011
Proceedings of the 7th International Wireless Communications and Mobile Computing Conference, 2011
Proceedings of the HOST 2011, 2011
Proceedings of the 2011 IEEE Symposium on Computational Intelligence in Cyber Security, 2011
Proceedings of the 2011 IEEE Consumer Communications and Networking Conference, 2011
2010
Wirel. Commun. Mob. Comput., 2010
Circumventing security toolbars and phishing filters <i>via</i> rogue wireless access points.
Wirel. Commun. Mob. Comput., 2010
Proceedings of the IEEE 7th International Conference on Mobile Adhoc and Sensor Systems, 2010
2009
Proceedings of the Seventh Annual IEEE International Conference on Pervasive Computing and Communications, 2009
Distributed Phishing Detection by Applying Variable Selection Using Bayesian Additive Regression Trees.
Proceedings of IEEE International Conference on Communications, 2009
2008
Comput. Networks, 2008
Developing a SSE-CMM-based security risk assessment process for patient-centered healthcare systems.
Proceedings of the 6th international workshop on Software quality, 2008
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008
A distributed architecture for phishing detection using Bayesian Additive Regression Trees.
Proceedings of the 2008 eCrime Researchers Summit, 2008
Proceedings of the The Third International Conference on Availability, 2008
Proceedings of the The Third International Conference on Availability, 2008
2007
Proceedings of the 21th International Parallel and Distributed Processing Symposium (IPDPS 2007), 2007
Proceedings of the Tenth IEEE International Symposium on High Assurance Systems Engineering (HASE 2007), 2007
Proceedings of the Anti-Phishing Working Groups 2nd Annual eCrime Researchers Summit 2007, 2007
2006
Proceedings of the Fifth International Conference on Networking and the International Conference on Systems (ICN / ICONS / MCL 2006), 2006
Proceedings of the 2006 IEEE/ACS International Conference on Computer Systems and Applications (AICCSA 2006), 2006
Proceedings of the 2006 IEEE/ACS International Conference on Computer Systems and Applications (AICCSA 2006), 2006
Proceedings of the 2006 IEEE/ACS International Conference on Computer Systems and Applications (AICCSA 2006), 2006
An Experimental and Industrial Experience: Avoiding Denial of Service via Memory Profiling.
Proceedings of the 2006 IEEE/ACS International Conference on Computer Systems and Applications (AICCSA 2006), 2006
2005
Proceedings of the Systems Communications 2005 (ICW / ICHSN / ICMCS / SENET 2005), 2005
2004
1999
Design and Evaluation of System-Level Checks for On-Line Control Flow Error Detection.
IEEE Trans. Parallel Distributed Syst., 1999
ACM Trans. Design Autom. Electr. Syst., 1999
Optimization Based Algorithms for Finding Minimal Cost Ring Covers in Survivable Networks.
Comput. Optim. Appl., 1999
1998
Proceedings of the ACM SIGCOMM 1998 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, August 31, 1998
Proceedings of the International Conference On Computer Communications and Networks (ICCCN 1998), 1998
1997
IEEE Trans. Software Eng., 1997
J. Syst. Softw., 1997
Proceedings of the 2nd High-Assurance Systems Engineering Workshop (HASE '97), 1997
1996
Efficient Techniques for the Analysis of Algorithm-Based Fault Tolerance (ABFT) Schemes.
IEEE Trans. Computers, 1996
1995
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 1995
Proceedings of the 19th International Computer Software and Applications Conference (COMPSAC'95), 1995
Proceedings of the 19th International Computer Software and Applications Conference (COMPSAC'95), 1995
1994
Parallel Algorithms Appl., 1994
Proceedings of the Fourth Great Lakes Symposium on Design Automation of High Performance VLSI Systems, 1994
1993
Proceedings of the Fifth IEEE Symposium on Parallel and Distributed Processing, 1993
Proceedings of the Fourth International Symposium on Software Reliability Engineering, 1993
Proceedings of the European Design Automation Conference 1993, 1993
1992
IEEE Trans. Computers, 1992
1990
IEEE Trans. Computers, 1990
IEEE Trans. Computers, 1990
Hierarchical design and analysis of fault-tolerant multiprocessor systems using concurrent error detection.
Proceedings of the 20th International Symposium on Fault-Tolerant Computing, 1990
1988
Proceedings of the Eighteenth International Symposium on Fault-Tolerant Computing, 1988
Proceedings of the Eighteenth International Symposium on Fault-Tolerant Computing, 1988