A survey of distributed denial of service attack KN Mallikarjunan, K Muthupriya, SM Shalinie 2016 10th International Conference on Intelligent Systems and Control (ISCO …, 2016 | 86 | 2016 |
DDAM: Detecting DDoS Attacks Using Machine Learning Approach KN Mallikarjunan, A Bhuvaneshwaran, K Sundarakantham, SM Shalinie Computational Intelligence: Theories, Applications and Future Directions …, 2019 | 16 | 2019 |
Real Time Attacker Behavior Pattern Discovery and Profiling Using Fuzzy Rules KN Mallikarjunan, SM Shalinie, G Preetha Journal of Internet Technology 19 (5), 1567-1575, 2018 | 10 | 2018 |
Evaluation of Security Metrics for System Security Analysis KN Mallikarjunan, SM Shalinie, K Sundarakantham, M Aarthi Computational Intelligence: Theories, Applications and Future Directions …, 2019 | 8 | 2019 |
Model for cyber attacker behavioral analysis KN Mallikarjunan, S Prabavathy, K Sundarakantham, SM Shalinie 2015 IEEE Workshop on Computational Intelligence: Theories, Applications and …, 2015 | 6 | 2015 |
Fog Computing-Based Autonomic Security Approach to Internet of Things Applications S Prabavathy, K Sundarakantham, SM Shalinie, KN Mallikarjunan Computational Intelligence: Theories, Applications and Future Directions …, 2019 | 5 | 2019 |
CoDe—An collaborative detection algorithm for DDoS attacks SM Shalinie, MPM Kumar, M Karthikeyan, JD Sajani, VA Nachammai, ... 2011 International Conference on Recent Trends in Information Technology …, 2011 | 5 | 2011 |
BAIT: behaviour aided intruder testimony technique for attacker intention prediction in business data handling KN Mallikarjunan, SM Shalinie, A Bhuvaneshwaran International Journal of Business Intelligence and Data Mining 14 (1-2), 177-198, 2019 | 2 | 2019 |
Binding registration based on home agent priority queue scheduling in MIPv6 network AA Diana, V Ragavinodhini, K Sundarakantham, SM Shalinie, ... 2014 International Conference on Recent Trends in Information Technology, 1-7, 2014 | 2 | 2014 |