Scalable honeypot architecture for identifying malicious network activities GK Sadasivam, C Hota 2015 international conference on emerging information technology and …, 2015 | 23 | 2015 |
Honeynet Data Analysis and Distributed SSH Brute-Force Attacks GK Sadasivam, C Hota, A Bhojan The International Conference Towards Extensible and Adaptable Methods in …, 2018 | 21 | 2018 |
Honeynet Data Analysis and Distributed SSH Brute-Force Attacks GK Sadasivam, C Hota, A Bhojan Towards Extensible and Adaptable Methods in Computing 1, 107-118, 2018 | 21 | 2018 |
Classification of SSH Attacks Using Machine Learning Algorithms GK Sadasivam, C Hota, A Bhojan IT Convergence and Security (ICITCS), 2016 6th International Conference on, 1-6, 2016 | 21 | 2016 |
Detection of Severe SSH Attacks Using Honeypot Servers and Machine Learning Techniques GK Sadasivam, C Hota, A Bhojan Journal of Software Networking 2017 (1), 79-100, 2017 | 18 | 2017 |
Diagnosing Musculoskeletal Disorders from Shoulder Radiographs Using Deep Learning Models A Kavitha, T Kujani, SG Kannan, V Akila 2022 International Conference on Electronic Systems and Intelligent …, 2022 | 2 | 2022 |
Detection of stealthy single-source SSH password guessing attacks GK Sadasivam, C Hota, A Bhojan Journal of Evolving Systems, 2020 | 2 | 2020 |
Efficient Detection of Malwares using Low-Interaction Honeypots GK Sadasivam, C Hota 2014 National Conference on Intelligent systems, Computing and Information …, 2014 | 2* | 2014 |
Attendance Automation Using Deep Learning DGKS Vighnesh M S , Jayanth Kamath , Punit Naik , V. Sharan Reddy International Journal of Engineering Research & Technology (IJERT) 12 (3), 2023 | | 2023 |
Identification of Malicious SSH Network Activities using Honeynet GK SADASIVAM | | 2020 |
Honeypot Challenges and Countermeasures GK Sadasivam, C Hota Poster presentation at Symposium on Information Security (Held at BITS …, 2013 | | 2013 |