Selvakumar Manickam

Orcid: 0000-0003-4378-1954

According to our database1, Selvakumar Manickam authored at least 76 papers between 2001 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A systematic literature review of recent lightweight detection approaches leveraging machine and deep learning mechanisms in Internet of Things networks.
J. King Saud Univ. Comput. Inf. Sci., January, 2024

Illuminating Healthcare Management: A Comprehensive Review of IoT-Enabled Chronic Disease Monitoring.
IEEE Access, 2024

Majority Voting Ensemble Classifier for Detecting Keylogging Attack on Internet of Things.
IEEE Access, 2024

2023
Privacy calculus model for online social networks: a study of Facebook users in a Malaysian university.
Educ. Inf. Technol., June, 2023

Efficient Authentication Scheme for 5G-Enabled Vehicular Networks Using Fog Computing.
Sensors, April, 2023

Secured-KDS: Secret key distribution and authentication scheme for resource-constrained devices.
IET Networks, January, 2023

A Systematic Literature Review on Machine Learning and Deep Learning Approaches for Detecting DDoS Attacks in Software-Defined Networking.
Sensors, 2023

Enhancement of NTSA Secure Communication with One-Time Pad (OTP) in IoT.
Informatica (Slovenia), 2023

Feature Selection for Detecting ICMPv6-Based DDoS Attacks Using Binary Flower Pollination Algorithm.
Comput. Syst. Sci. Eng., 2023

Exploring the Potential of Metaverse Technology in Healthcare: Applications, Challenges, and Future Directions.
IEEE Access, 2023

Unveiling the Metaverse: Exploring Emerging Trends, Multifaceted Perspectives, and Future Challenges.
IEEE Access, 2023

FC-PA: Fog Computing-Based Pseudonym Authentication Scheme in 5G-Enabled Vehicular Networks.
IEEE Access, 2023

Uncovering the Cloak: A Systematic Review of Techniques Used to Conceal Phishing Websites.
IEEE Access, 2023

ES-SECS/GEM: An Efficient Security Mechanism for SECS/GEM Communications.
IEEE Access, 2023

A Robust Security Scheme Based on Enhanced Symmetric Algorithm for MQTT in the Internet of Things.
IEEE Access, 2023

A Systematic Literature Review on Security of Vehicular Ad-Hoc Network (VANET) Based on VEINS Framework.
IEEE Access, 2023

Scaling IoT MUD Enforcement using Programmable Data Planes.
Proceedings of the NOMS 2023, 2023

Modified Flower Pollination Algorithm for ICMPv6-Based DDoS Attacks Anomaly Detection.
Proceedings of the 14th International Conference on Ambient Systems, 2023

2022
Man-in-the-Middle Attacks in Mobile Ad Hoc Networks (MANETs): Analysis and Evaluation.
Symmetry, 2022

PeerAmbush: Multi-Layer Perceptron to Detect Peer-to-Peer Botnet.
Symmetry, 2022

CM-CPPA: Chaotic Map-Based Conditional Privacy-Preserving Authentication Scheme in 5G-Enabled Vehicular Networks.
Sensors, 2022

A Secure Pseudonym-Based Conditional Privacy-Preservation Authentication Scheme in Vehicular Ad Hoc Networks.
Sensors, 2022

SADetection: Security Mechanisms to Detect SLAAC Attack in IPv6 Link-Local Network.
Informatica (Slovenia), 2022

An enhanced mechanism for detection of Domain Name System-based distributed reflection denial of service attacks depending on modified metaheuristic algorithms and adaptive thresholding techniques.
IET Networks, 2022

Intrusion Detection Systems Using Blockchain Technology: A Review, Issues and Challenges.
Comput. Syst. Sci. Eng., 2022

Review of Peer-to-Peer Botnets and Detection Mechanisms.
CoRR, 2022

Review of Advanced Monitoring Mechanisms in Peer-to-Peer (P2P) Botnets.
CoRR, 2022

Security Methods in Internet of vehicles.
CoRR, 2022

Eth-PSD: A Machine Learning-Based Phishing Scam Detection Approach in Ethereum.
IEEE Access, 2022

Applicability of Intrusion Detection System on Ethereum Attacks: A Comprehensive Review.
IEEE Access, 2022

MSR-DoS: Modular Square Root-Based Scheme to Resist Denial of Service (DoS) Attacks in 5G-Enabled Vehicular Networks.
IEEE Access, 2022

NDPsec: Neighbor Discovery Protocol Security Mechanism.
IEEE Access, 2022

2021
SE-CPPA: A Secure and Efficient Conditional Privacy-Preserving Authentication Scheme in Vehicular Ad-Hoc Networks.
Sensors, 2021

Security and Privacy Schemes in Vehicular Ad-Hoc Network With Identity-Based Cryptography Approach: A Survey.
IEEE Access, 2021

Towards Identity-Based Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks.
IEEE Access, 2021

SECS/GEMsec: A Mechanism for Detection and Prevention of Cyber-Attacks on SECS/GEM Communications in Industry 4.0 Landscape.
IEEE Access, 2021

A Review of Scalability Issues in Software-Defined Exchange Point (SDX) Approaches: State-of-the-Art.
IEEE Access, 2021

Enhance Robotic Process Automation Using a Rule-Based Approach.
Proceedings of the 11th International Conference on Robotics, Vision, Signal Processing and Power Applications, 2021

2020
An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Secure Communication in a Vehicular Ad Hoc Network.
Symmetry, 2020

VPPCS: VANET-Based Privacy-Preserving Communication Scheme.
IEEE Access, 2020

Efficient Conditional Privacy Preservation With Mutual Authentication in Vehicular Ad Hoc Networks.
IEEE Access, 2020

LSWBVM: A Lightweight Security Without Using Batch Verification Method Scheme for a Vehicle Ad Hoc Network.
IEEE Access, 2020

Proposed Efficient Conditional Privacy-Preserving Authentication Scheme for V2V and V2I Communications Based on Elliptic Curve Cryptography in Vehicular Ad Hoc Networks.
Proceedings of the Advances in Cyber Security - Second International Conference, 2020

Rule-Based SLAAC Attack Detection Mechanism.
Proceedings of the Advances in Cyber Security - Second International Conference, 2020

A Labeled Transactions-Based Dataset on the Ethereum Network.
Proceedings of the Advances in Cyber Security - Second International Conference, 2020

2019
A Brief Review of Messaging Protocol Standards for Internet of Things (IoT).
J. Cyber Secur. Mobil., 2019

A Brief Review on MQTT's Security Issues within the Internet of Things (IoT).
J. Commun., 2019

DDoS attack aware environment with secure clustering and routing based on RPL protocol operation.
IET Circuits Devices Syst., 2019

Comparative Analysis of State-of-the-Art EDoS Mitigation Techniques in Cloud Computing Environment.
CoRR, 2019

Performance Analysis of EMM an EDoS Mitigation Technique in Cloud Computing Environment.
Proceedings of the Advances in Cyber Security - First International Conference, 2019

Iraqi's Organizations Awareness to Prompt Open Source Cloud Computing (OSCC) in Their Service: A Study.
Proceedings of the Advances in Cyber Security - First International Conference, 2019

Threats Against Information Privacy and Security in Social Networks: A Review.
Proceedings of the Advances in Cyber Security - First International Conference, 2019

2018
Rule-based detection technique for ICMPv6 anomalous behaviour.
Neural Comput. Appl., 2018

DAD-Match: Technique to Prevent DoS Attack on Duplicate Address Detection Process in IPv6 Link-local Network.
J. Commun., 2018

2017
An Adaptive Assessment and Prediction Mechanism in Network Security Situation Awareness.
J. Comput. Sci., 2017

A Review on Features' Robustness in High Diversity Mobile Traffic Classifications.
Int. J. Commun. Networks Inf. Secur., 2017

A temporal-aware signature extraction method using sliding-window mechanism for scalable, cost-effective and accurate traffic classification.
Proceedings of the 7th IEEE International Conference on Control System, 2017

SensorBuster: On Identifying Sensor Nodes in P2P Botnets.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2016
On the resilience of P2P-based botnet graphs.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

2015
Critical Review of Economical Denial of Sustainability (EDoS) Mitigation Techniques.
J. Comput. Sci., 2015

A Proposed Framework for Outsourcing and Secure Encrypted Data on OpenStack Object Storage (Swift).
J. Comput. Sci., 2015

2014
A Review of Peer-to-Peer Botnet Detection Techniques.
J. Comput. Sci., 2014

Critical Review of OpenStack Security: Issues and Weaknesses.
J. Comput. Sci., 2014

2013
Research Proposal: an Intrusion Detection System Alert Reduction and Assessment Framework based on Data Mining.
J. Comput. Sci., 2013

Phishing Dynamic Evolving Neural Fuzzy Framework for Online Detection Zero-day Phishing Email
CoRR, 2013

2012
Statistical cross-relation approach for detecting TCP and UDP random and sequential network scanning (SCANS).
Int. J. Comput. Math., 2012

Botnet-based Distributed Denial of Service (DDoS) Attacks on Web Servers: Classification and Art
CoRR, 2012

2009
Study on Advanced Visualization Tools In Network Monitoring Platform.
Proceedings of the EMS 2009, 2009

2005
Using ensemble and learning techniques towards extending the knowledge discovery pipeline.
Proceedings of the ICEIS 2005, 2005

A knowledge discovery pipeline for medical decision support using clustering ensemble and neural network ensemble.
Proceedings of the AC 2005, 2005

2003
An Approach to Analyze Visual Field and Diagnose Glaucoma Progression Using Artificial Neural Network Techniques.
Proceedings of the IADIS International Conference WWW/Internet 2003, 2003

Internet Mediated, Multi Layer Medical Terminologies Retriever: Towards We-based UMLS Thesauri and Semantic Search Engine.
Proceedings of the 3th International Conference on IT in Asia, 2003

2002
Leveraging XML-based electronic medical records to extract experiential clinical knowledge: An automated approach to generate cases for medical case-based reasoning systems.
Int. J. Medical Informatics, 2002

Distributed Data Mining From Heterogeneous Healthcare Data Repositories: Towards an Intelligent Agent-Based Framework.
Proceedings of the 15th IEEE Symposium on Computer-Based Medical Systems (CBMS 2002), 2002

2001
Extracting Clinical Cases from XML-Based Electronic Patient Records for Use in Web-based Medical Case Based Reasoning Systems.
Proceedings of the MEDINFO 2001, 2001

Augmenting Medical Case Base Reasoning Systems with Clinical Knowledge Derived from Heterogeneous Electronic Patient Records.
Proceedings of the 14th IEEE Symposium on Computer-Based Medical Systems (CBMS 2001), 2001


  Loading...