Follow
Santhi Thilagam
Santhi Thilagam
Professor
Verified email at nitk.edu.in - Homepage
Title
Cited by
Cited by
Year
Handbook of social network technologies and applications
B Furht
Springer Science & Business Media, 2010
2512010
DDoS attacks at the application layer: Challenges and research perspectives for safeguarding web applications
A Praseed, PS Thilagam
IEEE Communications Surveys & Tutorials 21 (1), 661-685, 2018
1802018
Securing web applications from injection and logic vulnerabilities: Approaches and challenges
G Deepa, PS Thilagam
Information and Software Technology 74, 160-180, 2016
1462016
A qos broker based architecture for dynamic web service selection
DA D'Mello, VS Ananthanarayana, S Thilagam
2008 Second Asia International Conference on Modelling & Simulation (AMS …, 2008
892008
Mining social networks for anomalies: Methods and challenges
PV Bindu, PS Thilagam
Journal of Network and Computer Applications 68, 213-229, 2016
842016
Discovering suspicious behavior in multilayer social networks
PV Bindu, PS Thilagam, D Ahuja
Computers in Human Behavior 73, 568-582, 2017
762017
Heuristics based server consolidation with residual resource defragmentation in cloud data centers
KS Rao, PS Thilagam
Future Generation Computer Systems 50, 87-98, 2015
692015
Discovering spammer communities in twitter
PV Bindu, R Mishra, PS Thilagam
Journal of Intelligent Information Systems 51, 503-527, 2018
622018
Crime base: Towards building a knowledge base for crime entities and their relationships from online news papers
K Srinivasa, PS Thilagam
Information Processing & Management 56 (6), 102059, 2019
472019
Load balancing in cloud based on live migration of virtual machines
R Achar, PS Thilagam, N Soans, PV Vikyath, S Rao, AM Vijeth
2013 Annual IEEE India Conference (INDICON), 1-5, 2013
442013
DetLogic: A black-box approach for detecting logic vulnerabilities in web applications
G Deepa, PS Thilagam, A Praseed, AR Pais
Journal of Network and Computer Applications 109, 89-109, 2018
412018
Optimal scheduling of computational task in cloud using virtual machine tree
R Achar, PS Thilagam, D Shwetha, H Pooja
2012 Third International Conference on Emerging Applications of Information …, 2012
392012
SQL injection attack mechanisms and prevention techniques
R Chandrashekhar, M Mardithaya, S Thilagam, D Saha
Advanced Computing, Networking and Security: International Conference …, 2012
352012
Modelling behavioural dynamics for asymmetric application layer DDoS detection
A Praseed, PS Thilagam
IEEE Transactions on Information Forensics and Security 16, 617-626, 2020
342020
Alleviating data sparsity and cold start in recommender systems using social behaviour
R Reshma, G Ambikesh, PS Thilagam
2016 international conference on recent trends in information technology …, 2016
332016
Application of non-linear gaussian regression-based adaptive clock synchronization technique for wireless sensor network in agriculture
D Upadhyay, AK Dubey, PS Thilagam
IEEE Sensors Journal 18 (10), 4328-4335, 2018
312018
Securing native XML database-driven web applications from XQuery injection vulnerabilities
N Palsetia, G Deepa, FA Khan, PS Thilagam, AR Pais
Journal of Systems and Software 122, 93-109, 2016
312016
Black-box detection of XQuery injection and parameter tampering vulnerabilities in web applications
G Deepa, PS Thilagam, FA Khan, A Praseed, AR Pais, N Palsetia
International Journal of Information Security 17, 105-120, 2018
282018
A broker based approach for cloud provider selection
R Achar, PS Thilagam
2014 International Conference on Advances in Computing, Communications and …, 2014
282014
Multiplexed asymmetric attacks: Next-generation DDoS on HTTP/2 servers
A Praseed, PS Thilagam
IEEE Transactions on Information Forensics and Security 15, 1790-1800, 2019
272019
The system can't perform the operation now. Try again later.
Articles 1–20