Follow
Subramanian Neelakantan
Title
Cited by
Cited by
Year
A Threat-Aware Anomaly-Based Intrusion-Detection Approach for Obtaining Network-Specific Useful Alarms
S Neelakantan, S Rao
International Conference on Distributed Computing and Networking, 175-180, 2009
25*2009
Behavior model for Detecting data Exfiltration in Network Environment
R Ramachandran, N Subramanian, AS Bidyarthy
Fifth International Conference on Internet Multimedia Services Architecture …, 2011
242011
Identification of malware families using stacking of textural features and machine learning
S Kumar, B Janet, S Neelakantan
Expert Systems with Applications 208, 118073, 2022
212022
A threat-aware signature based intrusion-detection approach for obtaining network-specific useful alarms
S Neelakantan, S Rao
2008 The Third International Conference on Internet Monitoring and …, 2008
212008
Development of a Comprehensive Intrusion Detection System–Challenges and Approaches
N Subramanian, P Pawar, M Bhatnagar, N Khedekar, S Guntupalli, ...
Information Systems Security, 332-335, 2005
152005
Visualization of flow data based on clustering technique for identifying network anomalies
MP Singh, Rajamenakshi, N Subramanian
Industrial Electronics & Applications, 2009. ISIEA 2009. IEEE Symposium on 2 …, 2009
92009
An architecture for self-configuration of network for QoS and security
N Subramanian, P Ampatt, N Muraleedharan, SCB Korimilli, A Parmar, ...
Communication Systems and Networks and Workshops, 2009. COMSNETS 2009. First …, 2009
7*2009
Using digital tokens to improve amortized performance of eSign
P Bakshi, N Subramanian, S Nandi
2018 IEEE 16th Intl Conf on Dependable, Autonomic and Secure Computing, 16th …, 2018
62018
A dynamic firewall architecture based on multi-source analysis
M Navarikuth, N Subramanian, K Sachan, UP Singh, R Kumar, A Mallick
CSI Transactions on ICT, 1-13, 2013
62013
A Threat-Aware Hybrid Intrusion – Detection Architecture for Dynamic Network Environments
N Subramanian, S Rao
CSI Journal of Computing 1 (3), 17, 2012
42012
Content-split based effective string-matching for multi-core based intrusion detection systems
S Neelakantan, S Rao
2009 First International Conference on Computational Intelligence …, 2009
32009
Experimentation on usage of PQC Algorithms for eSign
P Kurariya, A Bhargava, S Sailada, N Subramanian, J Bodhankar, ...
2022 IEEE International Conference on Public Key Infrastructure and its …, 2022
22022
Crystal dilithium algorithm for post quantum cryptography: experimentation and Usecase for eSign
S Sailada, N Vohra, N Subramanian
2022 First International Conference on Electrical, Electronics, Information …, 2022
22022
Model for Establishing Knowledge Platforms: A Case Study
N Subramanian, B R, P M
International Conference on Digital Libraries, 2006
22006
SAS: A system for security assessment in grid environment
UR Edara, N Subramanian, M Dwivedi, A Sinha
IEEE 4th International Conference on Internet Multimedia Services …, 2010
12010
Design and Development of Community Aware Distributed Content Networking Framework using JXTA
N Satyanarayana, N Subramanian, V NeelaNarayanan, E UshaRani
AICT-ICIW'06. International Conference on Internet and Web Applications and …, 2006
12006
A prototype for functionality based network management system
V Neelanarayanan, N Satyanarayana, N Subramanian, E Rani
EurAsia-ICT 2002: Information and Communication Technology, 110--116, 2002
12002
IMCNN: Intelligent Malware Classification using Deep Convolution Neural Networks as Transfer learning and ensemble learning in honeypot enabled organizational network
S Kumar, B Janet, S Neelakantan
Computer Communications 216, 16-33, 2024
2024
High-Speed Network Traffic Analysis: Challenges and Approaches
N Subramanian, N Muraleedharan
National Workshop on Network Security, 2010
2010
RUDRAA - An Intrusion Detection and Prevention Signature Formulation process
N Subramanian, N Sachin, M Mohammed, G Bishwa, Ranjan
International Conference on Advances in Computing, Communication and Control …, 2009
2009
The system can't perform the operation now. Try again later.
Articles 1–20