Ganthan Narayana Samy

Orcid: 0000-0001-6169-3400

According to our database1, Ganthan Narayana Samy authored at least 15 papers between 2009 and 2022.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
A Systematic Review of Radio Frequency Threats in IoMT.
J. Sens. Actuator Networks, 2022

Assessing Cloud Computing Security Threats in Malaysian Organization Using Fuzzy Delphi Method.
Proceedings of the Recent Advances in Soft Computing and Data Mining, 2022

2020
Fractional Active Contour Model for Edge Detector on Medical Image Segmentation.
Proceedings of the IVSP '20: 2nd International Conference on Image, 2020

Current State of Cloud Computing Risk Assessment in Malaysian Private Sector.
Proceedings of the ICCTA 2020: 6th International Conference on Computer and Technology Applications, 2020

2019
A Systematic Literature Review of Authentication in Internet of Things for Heterogeneous Devices.
J. Comput. Networks Commun., 2019

Detecting False Messages in the Smartphone Fault Reporting System.
Proceedings of the Emerging Trends in Intelligent Computing and Informatics, 2019

2016
Towards designing an EA readiness instrument: A systematic review.
Proceedings of the 4th IEEE International Colloquium on Information Science and Technology, 2016

2014
Security risk assessment framework for cloud computing environments.
Secur. Commun. Networks, 2014

Information Privacy Concerns in Electronic Medical Records: A Preliminary Investigation.
Proceedings of the Knowledge Management in Organizations - 9th International Conference, 2014

2013
A Conceptual Model for Privacy Preferences in Healthcare Environment.
Proceedings of the 8th International Conference on Knowledge Management in Organizations, 2013

2010
Security threats categories in healthcare information systems.
Health Informatics J., 2010

Fuzzy Based Threat Analysis in Total Hospital Information System.
Proceedings of the Advances in Computer Science and Information Technology, 2010

A framework for integrated risk management process using survival analysis approach in information security.
Proceedings of the Sixth International Conference on Information Assurance and Security, 2010

2009
Threats to Health Information Security.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

Threats Identification in Healthcare Information Systems Using Genetic Algorithm and Cox Regression.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009


  Loading...