P. Santhi Thilagam
According to our database1, P. Santhi Thilagam authored at least 37 papers between 2007 and 2019.
Legend:Book In proceedings Article PhD thesis Other
Approaches and challenges of privacy preserving search over encrypted data.
Inf. Syst., 2019
Influence maximisation in social networks.
DDoS Attacks at the Application Layer: Challenges and Research Perspectives for Safeguarding Web Applications.
IEEE Communications Surveys and Tutorials, 2019
Time synchronization problem of wireless sensor network using maximum probability theory.
Int. J. Systems Assurance Engineering and Management, 2018
DetLogic: A black-box approach for detecting logic vulnerabilities in web applications.
J. Network and Computer Applications, 2018
Discovering spammer communities in twitter.
J. Intell. Inf. Syst., 2018
Black-box detection of XQuery injection and parameter tampering vulnerabilities in web applications.
Int. J. Inf. Sec., 2018
Applications nature aware virtual machine provisioning in cloud.
Privacy-Preserving Searchable Encryption Scheme over Encrypted Data Supporting Dynamic Update.
Proceedings of the Security in Computing and Communications - 6th International Symposium, 2018
An Efficient Multi-User Searchable Encryption Scheme without Query Transformation over Outsourced Encrypted Data.
Proceedings of the 9th IFIP International Conference on New Technologies, 2018
Live migration of virtual machines with their local persistent storage in a data intensive cloud.
Discovering suspicious behavior in multilayer social networks.
Computers in Human Behavior, 2017
An effective analysis on intrusion detection systems in wireless mesh networks.
Proceedings of the 2017 International Conference on Advances in Computing, 2017
Target specific influence maximization: An approach to maximize adoption in labeled social networks.
Proceedings of the 9th International Conference on Communication Systems and Networks, 2017
Securing native XML database-driven web applications from XQuery injection vulnerabilities.
Journal of Systems and Software, 2016
Mining social networks for anomalies: Methods and challenges.
J. Network and Computer Applications, 2016
Securing web applications from injection and logic vulnerabilities: Approaches and challenges.
Information & Software Technology, 2016
HiRE - A Heuristic Approach for User Generated Record Extraction.
Proceedings of the Distributed Computing and Internet Technology, 2016
Diffusion models and approaches for influence maximization in social networks.
Proceedings of the 2016 International Conference on Advances in Computing, 2016
Heuristics based server consolidation with residual resource defragmentation in cloud data centers.
Future Generation Comp. Syst., 2015
Dynamics of multi-campaign propagation in online social networks.
Proceedings of the 2015 IEEE International Conference on Data Science and Advanced Analytics, 2015
Time stamp based set covering greedy algorithm.
Proceedings of the Second ACM IKDD Conference on Data Sciences, 2015
Dynamics of Multi-Campaign Propagation in Online Social Networks.
Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2015
Reputation-based cross-layer intrusion detection system for wormhole attacks in wireless mesh networks.
Security and Communication Networks, 2014
A broker based approach for cloud provider selection.
Proceedings of the 2014 International Conference on Advances in Computing, 2014
Optimization of countour based template matching using GPGPU based hexagonal framework.
Proceedings of the 14th International Conference on Hybrid Intelligent Systems, 2014
Hierarchical Homomorphic Encryption Based Privacy Preserving Distributed Association Rule Mining.
Proceedings of the 2014 International Conference on Information Technology, 2014
Constructing and Exploring Composite Items Using Max-valid Bundles.
Proceedings of the 12th IEEE International Conference on Data Mining Workshops, 2012
Cross-layer IDS for Rushing attack in Wireless Mesh Networks.
Proceedings of the Second International Conference on Computational Science, 2012
Intrusion Detection Technique for Wormhole and Following Jellyfish and Byzantine Attacks in Wireless Mesh Network.
Proceedings of the Advanced Computing, Networking and Security - International Conference, 2011
Applications of Social Network Analysis.
Proceedings of the Handbook of Social Network Technologies and Applications, 2010
An Efficient Search to Improve Neighbour Selection Mechanism in P2P Network.
Proceedings of the Information Systems, Technology and Management, 2009
A Linear Hash Based Indexing Scheme for Location Dependent Data Broadcast.
Proceedings of the ARTCom 2009, 2009
Extraction and optimization of fuzzy association rules using multi-objective genetic algorithm.
Pattern Anal. Appl., 2008
An Abstraction Based Communication Efficient Distributed Association Rule Mining.
Proceedings of the Distributed Computing and Networking, 9th International Conference, 2008
A QoS Broker Based Architecture for Dynamic Web Service Selection.
Proceedings of the Second Asia International Conference on Modelling and Simulation, 2008
Semantic Partition Based Association Rule Mining across Multiple Databases Using Abstraction.
Proceedings of the Sixth International Conference on Machine Learning and Applications, 2007