Comparison of machine-learning algorithms for classification of VPN network traffic flow using time-related features S Bagui, X Fang, E Kalaimannan, SC Bagui, J Sheehan Journal of Cyber Security Technology 1 (2), 108-126, 2017 | 106 | 2017 |
Using machine learning techniques to identify rare cyber‐attacks on the UNSW‐NB15 dataset S Bagui, E Kalaimannan, S Bagui, D Nandi, A Pinto Security and Privacy 2 (6), e91, 2019 | 54 | 2019 |
A framework of cybersecurity approaches in precision agriculture H Chi, S Welch, E Vasserman, E Kalaimannan proceedings of the ICMLG2017 5th International Conference on Management …, 2017 | 35 | 2017 |
Influences on ransomware’s evolution and predictions for the future challenges E Kalaimannan, SK John, T DuBose, A Pinto Journal of Cyber Security Technology 1 (1), 23-31, 2017 | 35 | 2017 |
A heuristic for maximizing investigation effectiveness of digital forensic cases involving multiple investigators JND Gupta, E Kalaimannan, SM Yoo Computers & Operations Research 69, 1-9, 2016 | 20 | 2016 |
NCHR: A nonthreshold-based cluster-head rotation scheme for IEEE 802.15. 4 cluster-tree networks N Choudhury, R Matam, M Mukherjee, J Lloret, E Kalaimannan IEEE internet of things journal 8 (1), 168-178, 2020 | 19 | 2020 |
Towards establishing a security engineered SCADA framework S Hopkins, E Kalaimannan Journal of Cyber Security Technology 3 (1), 47-59, 2019 | 15 | 2019 |
Cyber resilience using state estimation updates based on cyber attack matrix classification S Hopkins, E Kalaimannan, CS John 2020 IEEE Kansas Power and Energy Conference (KPEC), 1-6, 2020 | 10 | 2020 |
A case study on the trade-offs between security, scalability, and efficiency in smart home sensor networks T Reichherzer, A Mishra, E Kalaimannan, N Wilde 2016 International Conference on Computational Science and Computational …, 2016 | 10 | 2016 |
Minimum cost security measurements for attack tree based threat models in smart grid N Chakraborty, E Kalaimannan 2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile …, 2017 | 9 | 2017 |
Foundations for research in cyber-physical system cyber resilience using state estimation S Hopkins, E Kalaimannan, CS John 2020 SoutheastCon, 1-2, 2020 | 8 | 2020 |
Trade-offs involved in the choice of cloud service configurations when building secure, scalable, and efficient Internet-of-Things networks A Mishra, T Reichherzer, E Kalaimannan, N Wilde, R Ramirez International Journal of Distributed Sensor Networks 16 (2), 1550147720908199, 2020 | 8 | 2020 |
The security development lifecycle in the context of accreditation policies and standards E Kalaimannan, JND Gupta IEEE Security & Privacy 15 (1), 52-57, 2017 | 8 | 2017 |
Smart Device Forensics-Acquisition, Analysis and Interpretation of Digital Evidences E Kalaimannan 2015 International Conference on Computational Science and Computational …, 2015 | 6 | 2015 |
A routing table poisoning model for peer-to-peer (P2P) botnets SK Tetarave, S Tripathy, E Kalaimannan, C John, A Srivastava IEEE access 7, 67983-67995, 2019 | 5 | 2019 |
eBot: Approach towards modeling an advanced P2P botnet SK Tetarave, S Tripathy, E Kalaimannan, C John 2018 17th IEEE International Conference On Trust, Security And Privacy In …, 2018 | 4 | 2018 |
Source anonymization of digital images: a counter–forensic attack on PRNU based source identification techniques P Sengupta, VU Sameer, R Naskar, E Kalaimannan | 4 | 2017 |
Sub-erroneous outlier detection of cyber attacks in a smart grid state estimation system S Hopkins, E Kalaimannan, CS John 2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile …, 2020 | 3 | 2020 |
Design of cybersecurity hands-on laboratory exercises using secDLC framework H Chi, T Aderibigbe, E Kalaimannan Proceedings of the ACMSE 2018 Conference, 1-1, 2018 | 3 | 2018 |
Maximizing investigation effectiveness in digital forensic cases E Kalaimannan, JND Gupta, SM Yoo 2013 International Conference on Social Computing, 618-623, 2013 | 3 | 2013 |