P. Santhi Thilagam

According to our database1, P. Santhi Thilagam authored at least 56 papers between 2007 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of five.



In proceedings 
PhD thesis 


Online presence:

On csauthors.net:


Leveraging Structural and Semantic Measures for JSON Document Clustering.
J. Univers. Comput. Sci., March, 2023

Hindi fake news detection using transformer ensembles.
Eng. Appl. Artif. Intell., March, 2023

Multi-layer perceptron based fake news classification using knowledge base triples.
Appl. Intell., March, 2023

Extracting Schema Variants from JSON Collections using JSVTree.
Proceedings of the 6th Joint International Conference on Data Science & Management of Data (10th ACM IKDD CODS and 28th COMAD), 2023

HTTP request pattern based signatures for early application layer DDoS detection: A firewall agnostic approach.
J. Inf. Secur. Appl., 2022

Modelling Behavioural Dynamics for Asymmetric Application Layer DDoS Detection.
IEEE Trans. Inf. Forensics Secur., 2021

Fuzzy Request Set Modelling for Detecting Multiplexed Asymmetric DDoS Attacks on HTTP/2 servers.
Expert Syst. Appl., 2021

Clustering and Bootstrapping Based Framework for News Knowledge Base Completion.
Comput. Informatics, 2021

Preserving Privacy of Co-occurring Keywords over Encrypted Data.
Proceedings of the Data and Applications Security and Privacy XXXV, 2021

Multiplexed Asymmetric Attacks: Next-Generation DDoS on HTTP/2 Servers.
IEEE Trans. Inf. Forensics Secur., 2020

Dynamic Data Retrieval Using Incremental Clustering and Indexing.
Int. J. Inf. Retr. Res., 2020

Broker-based mechanism for cloud provider selection.
Int. J. Comput. Sci. Eng., 2020

Naïve Bayes Classifier to Mitigate the DDoS Attacks Severity in Ad-Hoc Networks.
Int. J. Commun. Networks Inf. Secur., 2020

A Probabilistic Model of Clock Offset Estimator (PMCOE) for Clock Synchronization in Wireless Sensor Network.
Wirel. Pers. Commun., 2019

Searchable encryption approaches: attacks and challenges.
Knowl. Inf. Syst., 2019

Approaches and challenges of privacy preserving search over encrypted data.
Inf. Syst., 2019

Crime base: Towards building a knowledge base for crime entities and their relationships from online news papers.
Inf. Process. Manag., 2019

Influence maximisation in social networks.
Int. J. Comput. Sci. Eng., 2019

DDoS Attacks at the Application Layer: Challenges and Research Perspectives for Safeguarding Web Applications.
IEEE Commun. Surv. Tutorials, 2019

Time synchronization problem of wireless sensor network using maximum probability theory.
Int. J. Syst. Assur. Eng. Manag., 2018

DetLogic: A black-box approach for detecting logic vulnerabilities in web applications.
J. Netw. Comput. Appl., 2018

Discovering spammer communities in twitter.
J. Intell. Inf. Syst., 2018

Black-box detection of XQuery injection and parameter tampering vulnerabilities in web applications.
Int. J. Inf. Sec., 2018

Applications nature aware virtual machine provisioning in cloud.
Int. J. Ad Hoc Ubiquitous Comput., 2018

Privacy-Preserving Searchable Encryption Scheme over Encrypted Data Supporting Dynamic Update.
Proceedings of the Security in Computing and Communications - 6th International Symposium, 2018

An Efficient Multi-User Searchable Encryption Scheme without Query Transformation over Outsourced Encrypted Data.
Proceedings of the 9th IFIP International Conference on New Technologies, 2018

Live migration of virtual machines with their local persistent storage in a data intensive cloud.
Int. J. High Perform. Comput. Netw., 2017

Discovering suspicious behavior in multilayer social networks.
Comput. Hum. Behav., 2017

An effective analysis on intrusion detection systems in wireless mesh networks.
Proceedings of the 2017 International Conference on Advances in Computing, 2017

Target specific influence maximization: An approach to maximize adoption in labeled social networks.
Proceedings of the 9th International Conference on Communication Systems and Networks, 2017

Securing native XML database-driven web applications from XQuery injection vulnerabilities.
J. Syst. Softw., 2016

Mining social networks for anomalies: Methods and challenges.
J. Netw. Comput. Appl., 2016

Securing web applications from injection and logic vulnerabilities: Approaches and challenges.
Inf. Softw. Technol., 2016

HiRE - A Heuristic Approach for User Generated Record Extraction.
Proceedings of the Distributed Computing and Internet Technology, 2016

Diffusion models and approaches for influence maximization in social networks.
Proceedings of the 2016 International Conference on Advances in Computing, 2016

Heuristics based server consolidation with residual resource defragmentation in cloud data centers.
Future Gener. Comput. Syst., 2015

Dynamic Resource Allocation for Multi-tier Applications in Cloud.
Proceedings of Fifth International Conference on Soft Computing for Problem Solving, 2015

Dynamics of multi-campaign propagation in online social networks.
Proceedings of the 2015 IEEE International Conference on Data Science and Advanced Analytics, 2015

Time stamp based set covering greedy algorithm.
Proceedings of the Second ACM IKDD Conference on Data Sciences, 2015

Reputation-based cross-layer intrusion detection system for wormhole attacks in wireless mesh networks.
Secur. Commun. Networks, 2014

A broker based approach for cloud provider selection.
Proceedings of the 2014 International Conference on Advances in Computing, 2014

Optimization of countour based template matching using GPGPU based hexagonal framework.
Proceedings of the 14th International Conference on Hybrid Intelligent Systems, 2014

Hierarchical Homomorphic Encryption Based Privacy Preserving Distributed Association Rule Mining.
Proceedings of the 2014 International Conference on Information Technology, 2014

An Empirical Study of License Violations in Open Source Projects.
Proceedings of the 35th Annual IEEE Software Engineering Workshop, 2012

Constructing and Exploring Composite Items Using Max-valid Bundles.
Proceedings of the 12th IEEE International Conference on Data Mining Workshops, 2012

Cross-layer IDS for Rushing attack in Wireless Mesh Networks.
Proceedings of the Second International Conference on Computational Science, 2012

Intrusion Detection Technique for Wormhole and Following Jellyfish and Byzantine Attacks in Wireless Mesh Network.
Proceedings of the Advanced Computing, Networking and Security - International Conference, 2011

SQL Injection Attack Mechanisms and Prevention Techniques.
Proceedings of the Advanced Computing, Networking and Security - International Conference, 2011

Applications of Social Network Analysis.
Proceedings of the Handbook of Social Network Technologies and Applications, 2010

An Efficient Search to Improve Neighbour Selection Mechanism in P2P Network.
Proceedings of the Information Systems, Technology and Management, 2009

A Linear Hash Based Indexing Scheme for Location Dependent Data Broadcast.
Proceedings of the ARTCom 2009, 2009

Extraction and optimization of fuzzy association rules using multi-objective genetic algorithm.
Pattern Anal. Appl., 2008

An Abstraction Based Communication Efficient Distributed Association Rule Mining.
Proceedings of the Distributed Computing and Networking, 9th International Conference, 2008

CUM: An Efficient Framework for Mining Concept Units.
Proceedings of the 14th International Conference on Management of Data, 2008

A QoS Broker Based Architecture for Dynamic Web Service Selection.
Proceedings of the Second Asia International Conference on Modelling and Simulation, 2008

Semantic Partition Based Association Rule Mining across Multiple Databases Using Abstraction.
Proceedings of the Sixth International Conference on Machine Learning and Applications, 2007