Online purchase intention: Effects of trust and security perception F Meskaran, Z Ismail, B Shanmugam Australian journal of basic and applied sciences, 307-315, 2013 | 311 | 2013 |
A comprehensive survey for intelligent spam email detection A Karim, S Azam, B Shanmugam, K Kannoorpatti, M Alazab Ieee Access 7, 168261-168295, 2019 | 235 | 2019 |
Intrusion detection system for the internet of things based on blockchain and multi-agent systems C Liang, B Shanmugam, S Azam, A Karim, A Islam, M Zamani, ... Electronics 9 (7), 1120, 2020 | 133 | 2020 |
Security risk assessment framework for cloud computing environments SH Albakri, B Shanmugam, GN Samy, NB Idris, A Ahmed | 105 | 2014 |
Machine learning based PV power generation forecasting in alice springs K Mahmud, S Azam, A Karim, S Zobaed, B Shanmugam, D Mathur IEEE Access 9, 46117-46128, 2021 | 97 | 2021 |
Artificial intelligence techniques applied to intrusion detection NB Idris, B Shanmugam 2005 Annual IEEE India Conference-Indicon, 52-55, 2005 | 86 | 2005 |
Preprocessing of breast cancer images to create datasets for deep-CNN AR Beeravolu, S Azam, M Jonkman, B Shanmugam, K Kannoorpatti, ... IEEE Access 9, 33438-33463, 2021 | 83 | 2021 |
A review of threat modelling approaches for APT-style attacks M Tatam, B Shanmugam, S Azam, K Kannoorpatti Heliyon 7 (1), 2021 | 81 | 2021 |
AcneNet-a deep CNN based classification approach for acne classes MS Junayed, AA Jeny, ST Atik, N Neehal, A Karim, S Azam, ... 2019 12th International Conference on Information & Communication Technology …, 2019 | 70 | 2019 |
Hybrid intelligent intrusion detection system N Bashah, IB Shanmugam, AM Ahmed World Academy of Science, Engineering and Technology 11, 23-26, 2005 | 67 | 2005 |
Intrusion detection system for Internet of Things based on a machine learning approach C Liang, B Shanmugam, S Azam, M Jonkman, F De Boer, ... 2019 International Conference on Vision Towards Emerging Trends in …, 2019 | 66 | 2019 |
Improved intrusion detection system using fuzzy logic for detecting anamoly and misuse type of attacks B Shanmugam, NB Idris 2009 International Conference of Soft Computing and Pattern Recognition, 212-217, 2009 | 66 | 2009 |
A systematic literature review on privacy by design in the healthcare sector FH Semantha, S Azam, KC Yeo, B Shanmugam Electronics 9 (3), 452, 2020 | 57 | 2020 |
Efficient clustering of emails into spam and ham: The foundational study of a comprehensive unsupervised framework A Karim, S Azam, B Shanmugam, K Kannoorpatti IEEE Access 8, 154759-154788, 2020 | 55 | 2020 |
Enabling data hiding for resource sharing in cloud computing environments based on DNA sequences MR Abbasy, B Shanmugam 2011 IEEE World Congress on Services, 385-390, 2011 | 54 | 2011 |
Comparative analysis of different techniques of encryption for secured data transmission AV Mota, S Azam, B Shanmugam, KC Yeo, K Kannoorpatti 2017 IEEE International Conference on Power, Control, Signals and …, 2017 | 52 | 2017 |
An overview of blockchain applications and attacks RR Vokerla, B Shanmugam, S Azam, A Karim, F De Boer, M Jonkman, ... 2019 international conference on vision towards emerging trends in …, 2019 | 51 | 2019 |
A parallel technique for improving the performance of signature-based network intrusion detection system FI Shiri, B Shanmugam, NB Idris 2011 IEEE 3rd International Conference on Communication Software and …, 2011 | 45 | 2011 |
A systematic literature review of authentication in Internet of Things for heterogeneous devices S Kavianpour, B Shanmugam, S Azam, M Zamani, G Narayana Samy, ... Journal of Computer Networks and Communications 2019 (1), 5747136, 2019 | 42 | 2019 |
An intelligent spam detection model based on artificial immune system AJ Saleh, A Karim, B Shanmugam, S Azam, K Kannoorpatti, M Jonkman, ... Information 10 (6), 209, 2019 | 38 | 2019 |