Distributed denial of service attack detection using an ensemble of neural classifier PAR Kumar, S Selvakumar Computer Communications 34 (11), 1328-1341, 2011 | 168 | 2011 |
Detection of distributed denial of service attacks using an ensemble of adaptive and hybrid neuro-fuzzy systems PAR Kumar, S Selvakumar Computer Communications 36 (3), 303-319, 2013 | 140 | 2013 |
Distributed denial-of-service (ddos) threat in collaborative environment-a survey on ddos attack tools and traceback mechanisms R Kumar, P Arun, S Selvakumar 2009 IEEE International Advance Computing Conference, 1275-1280, 2009 | 73 | 2009 |
SSENet-2011: a network intrusion detection system dataset and its comparison with KDD CUP 99 dataset AR Vasudevan, E Harshini, S Selvakumar 2011 second asian himalayas international conference on internet (AH-ICI), 1-5, 2011 | 63 | 2011 |
Multi-constraint qos unicast routing using genetic algorithm (muruga) R Leela, N Thanulekshmi, S Selvakumar Applied Soft Computing 11 (2), 1753-1761, 2011 | 46 | 2011 |
Anomaly detection framework for Internet of things traffic using vector convolutional deep learning approach in fog environment BA NG, S Selvakumar Future Generation Computer Systems 113, 255-265, 2020 | 44 | 2020 |
Detection of application layer DDoS attack by modeling user behavior using logistic regression S Yadav, S Selvakumar 2015 4th International Conference on Reliability, Infocom Technologies and …, 2015 | 38 | 2015 |
BIXSAN: Browser independent XSS sanitizer for prevention of XSS attacks. V Sharath Chandra, S Selvakumar ACM SIGSOFT Softw. Eng. Notes 36 (5), 1-7, 2011 | 34 | 2011 |
Deep radial intelligence with cumulative incarnation approach for detecting denial of service attacks BA NG, S Selvakumar Neurocomputing 340, 294-308, 2019 | 25 | 2019 |
Multi-measure multi-weight ranking approach for the identification of the network features for the detection of DoS and Probe attacks S Bhattacharya, S Selvakumar The Computer Journal 59 (6), 923-943, 2016 | 20 | 2016 |
Blind Image Steganalysis of JPEG images using feature extraction through the process of dilation P Pathak, S Selvakumar Digital Investigation 11 (1), 67-77, 2014 | 20 | 2014 |
Implementation and Comparison of Distributed Caching Schemes PP S.Selvakumar Conference Proceedings IEEE ICON 2000, Singapore, 2000 | 20 | 2000 |
Prevention of man-in-the-middle attacks using ID based signatures V Radhakishan, S Selvakumar 2011 Second International Conference on Networking and Distributed Computing …, 2011 | 19 | 2011 |
Distributed Denial-of-Service (DDoS) Threat in Collaborative Environment-A Survey on DDoS Attack Tools and Traceback Mechanisms P Arun Raj Kumar, S Selvakumar IEEE International Advance Computing conference (IACC 2009), 2009 | 16 | 2009 |
Local outlier factor and stronger one class classifier based hierarchical model for detection of attacks in network intrusion detection dataset SS Vasudevan A. R. Frontiers of Computer Science 10 (4), 755-766, 2016 | 15 | 2016 |
Ssenet-2014 dataset: A dataset for detection of multiconnection attacks S Bhattacharya, S Selvakumar 2014 3rd International Conference on Eco-friendly Computing and …, 2014 | 13 | 2014 |
Assessment of the risk factors for type II diabetes using an improved combination of particle swarm optimization and decision trees by evaluation with Fisher’s linear … A Sheik Abdullah, S Selvakumar Soft Computing 23 (20), 9995-10017, 2019 | 12 | 2019 |
M2KMIX: identifying the type of high rate flooding attacks using a mixture of expert systems PAR Kumar, S Selvakumar International journal of Computer Network and Information Security 4 (1), 1, 2012 | 12 | 2012 |
An online cross view difference and behavior based kernel rootkit detector C Mahapatra, S Selvakumar ACM SIGSOFT Software Engineering Notes 36 (4), 1-9, 2011 | 12 | 2011 |
Vcdeepfl: Vector convolutional deep feature learning approach for identification of known and unknown denial of service attacks NGB Amma, S Subramanian TENCON 2018-2018 IEEE Region 10 Conference, 0640-0645, 2018 | 11 | 2018 |