default search action
Ezhil Kalaimannan
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c13]Stephen Hopkins, Ezhil Kalaimannan, Caroline John:
Passive Operating System Fingerprinting Analysis Using Artificial Intelligence Techniques. ACR 2023: 178-191 - [c12]Rajkumar Gaur, Sumit Kumar Tetarave, Rabindra K. Barik, Ezhil Kalaimannan:
FogAutho: Leveraging a novel authentication scheme for securing fog-cloud systems in smart home applications. UEMCON 2023: 748-753 - 2022
- [c11]Nilotpal Chakraborty, Roshni Chakraborty, Ezhil Kalaimannan:
Scheduling Energy Flexible Devices Under Constrained Peak Load Consumption in Smart Grid. ICCPS 2022: 316-317 - [c10]Nilotpal Chakraborty, Ezhil Kalaimannan:
Simulating deferrable loads for the development of next generation energy systems: poster abstract. BuildSys@SenSys 2022: 284-285 - 2021
- [j6]Nikumani Choudhury, Rakesh Matam, Mithun Mukherjee, Jaime Lloret, Ezhil Kalaimannan:
NCHR: A Nonthreshold-Based Cluster-Head Rotation Scheme for IEEE 802.15.4 Cluster-Tree Networks. IEEE Internet Things J. 8(1): 168-178 (2021) - 2020
- [j5]Amitabh Mishra, Thomas Reichherzer, Ezhil Kalaimannan, Norman Wilde, Ruben Ramirez:
Trade-offs involved in the choice of cloud service configurations when building secure, scalable, and efficient Internet-of-Things networks. Int. J. Distributed Sens. Networks 16(2) (2020) - [c9]Nilotpal Chakraborty, Ezhil Kalaimannan:
Optimal Sizing of Hybrid Renewable Energy Sources via Efficient Demand Response in Microgrid. e-Energy 2020: 415-416 - [c8]Stephen Hopkins, Ezhil Kalaimannan, Caroline Sangeetha John:
Sub-Erroneous Outlier Detection of Cyber Attacks in a Smart Grid State Estimation System. UEMCON 2020: 447-454
2010 – 2019
- 2019
- [j4]Sumit Kumar Tetarave, Somanath Tripathy, Ezhil Kalaimannan, Caroline John, Anshika Srivastava:
A Routing Table Poisoning Model for Peer-to-Peer (P2P) Botnets. IEEE Access 7: 67983-67995 (2019) - [j3]Sikha Bagui, Ezhil Kalaimannan, Subhash C. Bagui, Debarghya Nandi, Anthony Pinto:
Using machine learning techniques to identify rare cyber-attacks on the UNSW-NB15 dataset. Secur. Priv. 2(6) (2019) - [c7]Jatinder N. D. Gupta, Ezhil Kalaimannan, Seong-Moo Yoo:
A Sequential Investigation Model for Solving Time Critical Digital Forensic Cases Involving a Single Investigator. NCS 2019: 202-219 - [c6]Caroline John, Bhuvana Ramachandran, Ezhil Kalaimannan:
Impact of Targeted Cyber Attacks on Electrical Power Systems. NCS 2019: 278-292 - 2018
- [c5]Hongmei Chi, Temilola Aderibigbe, Ezhil Kalaimannan:
Design of cybersecurity hands-on laboratory exercises using secDLC framework. ACM Southeast Regional Conference 2018: 36:1 - [c4]Sumit Kumar Tetarave, Somanath Tripathy, Ezhil Kalaimannan, Caroline John:
eBot: Approach Towards Modeling an Advanced P2P Botnet. TrustCom/BigDataSE 2018: 391-396 - 2017
- [j2]Ezhil Kalaimannan, Jatinder N. D. Gupta:
The Security Development Lifecycle in the Context of Accreditation Policies and Standards. IEEE Secur. Priv. 15(1): 52-57 (2017) - [c3]Nilotpal Chakraborty, Ezhil Kalaimannan:
Selective scheduling: Controlling non-preemptive devices in smart grid environment. ISGT 2017: 1-5 - [c2]Nilotpal Chakraborty, Ezhil Kalaimannan:
Minimum cost security measurements for attack tree based threat models in smart grid. UEMCON 2017: 614-618 - 2016
- [j1]Jatinder N. D. Gupta, Ezhil Kalaimannan, Seong-Moo Yoo:
A heuristic for maximizing investigation effectiveness of digital forensic cases involving multiple investigators. Comput. Oper. Res. 69: 1-9 (2016) - 2013
- [c1]Ezhil Kalaimannan, Jatinder N. D. Gupta, Seong-Moo Yoo:
Maximizing Investigation Effectiveness in Digital Forensic Cases. SocialCom 2013: 618-623
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:23 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint