Online purchase intention: Effects of trust and security perception F Meskaran, Z Ismail, B Shanmugam Australian journal of basic and applied sciences, 307-315, 2013 | 254 | 2013 |
A Comprehensive Survey for Intelligent Spam Email Detection A Karim, S Azam, B Shanmugam, K Kannoorpatti, M Alazab IEEE Access 7, 168261-168295, 2019 | 157 | 2019 |
Security risk assessment framework for cloud computing environments SH Albakri, B Shanmugam, GN Samy, NB Idris, A Ahmed | 95 | 2014 |
Artificial intelligence techniques applied to intrusion detection NB Idris, B Shanmugam 2005 Annual IEEE India Conference-Indicon, 52-55, 2005 | 83 | 2005 |
Intrusion detection system for the Internet of Things based on blockchain and multi-agent systems C Liang, B Shanmugam, S Azam, A Karim, A Islam, M Zamani, ... Electronics 9 (7), 1120, 2020 | 81 | 2020 |
Hybrid intelligent intrusion detection system N Bashah, IB Shanmugam, AM Ahmed World Academy of Science, Engineering and Technology 11, 23-26, 2005 | 68 | 2005 |
Improved intrusion detection system using fuzzy logic for detecting anamoly and misuse type of attacks B Shanmugam, NB Idris 2009 International Conference of Soft Computing and Pattern Recognition, 212-217, 2009 | 63 | 2009 |
AcneNet-A Deep CNN Based Classification Approach for Acne Classes MS Junayed, AA Jeny, ST Atik, N Neehal, A Karim, S Azam, ... 2019 12th International Conference on Information & Communication Technology …, 2019 | 57 | 2019 |
Enabling data hiding for resource sharing in cloud computing environments based on DNA sequences MR Abbasy, B Shanmugam 2011 IEEE World Congress on Services, 385-390, 2011 | 51 | 2011 |
Preprocessing of Breast Cancer Images to Create Datasets for Deep-CNN AR Beeravolu, S Azam, M Jonkman, B Shanmugam, K Kannoorpatti, ... IEEE Access 9, 33438-33463, 2021 | 49 | 2021 |
Machine Learning Based PV Power Generation Forecasting in Alice Springs K Mahmud, S Azam, A Karim, S Zobaed, B Shanmugam, D Mathur IEEE Access 9, 46117-46128, 2021 | 46 | 2021 |
A parallel technique for improving the performance of signature-based network intrusion detection system FI Shiri, B Shanmugam, NB Idris 2011 IEEE 3rd International Conference on Communication Software and …, 2011 | 42 | 2011 |
A review of threat modelling approaches for APT-style attacks M Tatam, B Shanmugam, S Azam, K Kannoorpatti Heliyon 7 (1), e05969, 2021 | 40 | 2021 |
A Systematic Literature Review on Privacy by Design in the Healthcare Sector FH Semantha, S Azam, KC Yeo, B Shanmugam Electronics 9 (3), 452, 2020 | 39 | 2020 |
Intrusion Detection System for Internet of Things based on a Machine Learning approach C Liang, B Shanmugam, S Azam, M Jonkman, F De Boer, ... 2019 International Conference on Vision Towards Emerging Trends in …, 2019 | 39 | 2019 |
Efficient Clustering of Emails Into Spam and Ham: The Foundational Study of a Comprehensive Unsupervised Framework A Karim, S Azam, B Shanmugam, K Kannoorpatti IEEE Access 8, 154759-154788, 2020 | 38 | 2020 |
Comparative analysis of different techniques of encryption for secured data transmission AV Mota, S Azam, B Shanmugam, KC Yeo, K Kannoorpatti 2017 IEEE International Conference on Power, Control, Signals and …, 2017 | 36 | 2017 |
An Intelligent Spam Detection Model Based on Artificial Immune System AJ Saleh, A Karim, B Shanmugam, S Azam, K Kannoorpatti, M Jonkman, ... Information 10 (6), 209, 2019 | 33 | 2019 |
A Systematic Literature Review of Authentication in Internet of Things for Heterogeneous Devices S Kavianpour, B Shanmugam, S Azam, M Zamani, G Narayana Samy, ... Journal of Computer Networks and Communications 2019, 2019 | 32 | 2019 |
An Overview of Blockchain Applications and Attacks RR Vokerla, B Shanmugam, S Azam, A Karim, F De Boer, M Jonkman, ... 2019 International Conference on Vision Towards Emerging Trends in …, 2019 | 31 | 2019 |