P. Santhi Thilagam

According to our database1, P. Santhi Thilagam authored at least 37 papers between 2007 and 2019.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Approaches and challenges of privacy preserving search over encrypted data.
Inf. Syst., 2019

Influence maximisation in social networks.
IJCSE, 2019

DDoS Attacks at the Application Layer: Challenges and Research Perspectives for Safeguarding Web Applications.
IEEE Communications Surveys and Tutorials, 2019

2018
Time synchronization problem of wireless sensor network using maximum probability theory.
Int. J. Systems Assurance Engineering and Management, 2018

DetLogic: A black-box approach for detecting logic vulnerabilities in web applications.
J. Network and Computer Applications, 2018

Discovering spammer communities in twitter.
J. Intell. Inf. Syst., 2018

Black-box detection of XQuery injection and parameter tampering vulnerabilities in web applications.
Int. J. Inf. Sec., 2018

Applications nature aware virtual machine provisioning in cloud.
IJAHUC, 2018

Privacy-Preserving Searchable Encryption Scheme over Encrypted Data Supporting Dynamic Update.
Proceedings of the Security in Computing and Communications - 6th International Symposium, 2018

An Efficient Multi-User Searchable Encryption Scheme without Query Transformation over Outsourced Encrypted Data.
Proceedings of the 9th IFIP International Conference on New Technologies, 2018

2017
Live migration of virtual machines with their local persistent storage in a data intensive cloud.
IJHPCN, 2017

Discovering suspicious behavior in multilayer social networks.
Computers in Human Behavior, 2017

An effective analysis on intrusion detection systems in wireless mesh networks.
Proceedings of the 2017 International Conference on Advances in Computing, 2017

Target specific influence maximization: An approach to maximize adoption in labeled social networks.
Proceedings of the 9th International Conference on Communication Systems and Networks, 2017

2016
Securing native XML database-driven web applications from XQuery injection vulnerabilities.
Journal of Systems and Software, 2016

Mining social networks for anomalies: Methods and challenges.
J. Network and Computer Applications, 2016

Securing web applications from injection and logic vulnerabilities: Approaches and challenges.
Information & Software Technology, 2016

HiRE - A Heuristic Approach for User Generated Record Extraction.
Proceedings of the Distributed Computing and Internet Technology, 2016

Diffusion models and approaches for influence maximization in social networks.
Proceedings of the 2016 International Conference on Advances in Computing, 2016

2015
Heuristics based server consolidation with residual resource defragmentation in cloud data centers.
Future Generation Comp. Syst., 2015

Dynamics of multi-campaign propagation in online social networks.
Proceedings of the 2015 IEEE International Conference on Data Science and Advanced Analytics, 2015

Time stamp based set covering greedy algorithm.
Proceedings of the Second ACM IKDD Conference on Data Sciences, 2015

Dynamics of Multi-Campaign Propagation in Online Social Networks.
Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2015

2014
Reputation-based cross-layer intrusion detection system for wormhole attacks in wireless mesh networks.
Security and Communication Networks, 2014

A broker based approach for cloud provider selection.
Proceedings of the 2014 International Conference on Advances in Computing, 2014

Optimization of countour based template matching using GPGPU based hexagonal framework.
Proceedings of the 14th International Conference on Hybrid Intelligent Systems, 2014

Hierarchical Homomorphic Encryption Based Privacy Preserving Distributed Association Rule Mining.
Proceedings of the 2014 International Conference on Information Technology, 2014

2012
Constructing and Exploring Composite Items Using Max-valid Bundles.
Proceedings of the 12th IEEE International Conference on Data Mining Workshops, 2012

Cross-layer IDS for Rushing attack in Wireless Mesh Networks.
Proceedings of the Second International Conference on Computational Science, 2012

2011
Intrusion Detection Technique for Wormhole and Following Jellyfish and Byzantine Attacks in Wireless Mesh Network.
Proceedings of the Advanced Computing, Networking and Security - International Conference, 2011

2010
Applications of Social Network Analysis.
Proceedings of the Handbook of Social Network Technologies and Applications, 2010

2009
An Efficient Search to Improve Neighbour Selection Mechanism in P2P Network.
Proceedings of the Information Systems, Technology and Management, 2009

A Linear Hash Based Indexing Scheme for Location Dependent Data Broadcast.
Proceedings of the ARTCom 2009, 2009

2008
Extraction and optimization of fuzzy association rules using multi-objective genetic algorithm.
Pattern Anal. Appl., 2008

An Abstraction Based Communication Efficient Distributed Association Rule Mining.
Proceedings of the Distributed Computing and Networking, 9th International Conference, 2008

A QoS Broker Based Architecture for Dynamic Web Service Selection.
Proceedings of the Second Asia International Conference on Modelling and Simulation, 2008

2007
Semantic Partition Based Association Rule Mining across Multiple Databases Using Abstraction.
Proceedings of the Sixth International Conference on Machine Learning and Applications, 2007


  Loading...