Suku Nair

Affiliations:
  • Southern Methodist University, Dallas, Texas, USA


According to our database1, Suku Nair authored at least 77 papers between 1988 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
SDP Based Zero-Trust Architectures.
Proceedings of the IWSPA@CODASPY 2022: Proceedings of the 2022 ACM on International Workshop on Security and Privacy Analytics, 2022

2021
Objective Measures of Cognitive Load Using Deep Multi-Modal Learning: A Use-Case in Aviation.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2021

IllumiCore: Optimization Modeling and Implementation for Efficient VNF Placement.
Proceedings of the International Conference on Software, 2021

Building a Software Defined Perimeter (SDP) for Network Introspection.
Proceedings of the 2021 IEEE Conference on Network Function Virtualization and Software Defined Networks, 2021

Predicting Throughput of Cloud Network Infrastructure Using Neural Networks.
Proceedings of the 2021 IEEE Conference on Computer Communications Workshops, 2021

5G Deployment Considerations to Enable Consumer Innovation.
Proceedings of the IEEE International Conference on Consumer Electronics, 2021

Efficient Batch Scheduling of Large Numbers of Cloud Benchmarks.
Proceedings of the 10th IEEE International Conference on Cloud Networking, CloudNet 2021, 2021

2020
A New Privacy-Enhanced Technology for Fair Matchmaking With Identity Linked Wishes.
IEEE Syst. J., 2020

A framework for automated evaluation of security metrics.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020

2017
A Feasibility Evaluation of Fair and Privacy-Enhanced Matchmaking with Identity Linked Wishes.
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017

2016
The Prom Problem: Fair and privacy-enhanced matchmaking with identity linked wishes.
Proceedings of the IEEE International Carnahan Conference on Security Technology, 2016

2015
A Predictive Framework for Cyber Security Analytics using Attack Graphs.
CoRR, 2015

Predictive Cyber-security Analytics Framework: A non-homogenous Markov model for Security Quantification.
CoRR, 2015

A Novel Architecture for Predictive CyberSecurity Using Non-homogenous Markov Models.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

PupilWare: towards pervasive cognitive load measurement using commodity devices.
Proceedings of the 8th ACM International Conference on PErvasive Technologies Related to Assistive Environments, 2015

Work-in-Progress, PupilWare-M: Cognitive Load Estimation Using Unmodified Smartphone Cameras.
Proceedings of the 12th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2015

Exploitability analysis using predictive cybersecurity framework.
Proceedings of the 2nd IEEE International Conference on Cybernetics, 2015

2014
Cognitive and context-aware applications.
Proceedings of the 7th International Conference on PErvasive Technologies Related to Assistive Environments, 2014

Semi-Synthetic Data for Enhanced SMS Spam Detection: [Using Synthetic Minority Oversampling TEchnique SMOTE].
Proceedings of the 6th International Conference on Management of Emergent Digital EcoSystems, 2014

2013
State Machine-Based Security Fusion for Resource-Constrained Environments.
IEEE Syst. J., 2013

Applying error correction codes to achieve security and dependability.
Comput. Stand. Interfaces, 2013

Smartphone applications security: Survey of new vectors and solutions.
Proceedings of the ACS International Conference on Computer Systems and Applications, 2013

A joint scheme for secure and reliable communication in wireless sensor networks.
Proceedings of the ACS International Conference on Computer Systems and Applications, 2013

2011
Security Fusion: A New Security Architecture for Resource-Constrained Environments.
Proceedings of the 6th USENIX Workshop on Hot Topics in Security, 2011

Security architecture for resource-limited environments.
Proceedings of the 7th International Wireless Communications and Mobile Computing Conference, 2011

Cyber-physical security using system-level PUFs.
Proceedings of the 7th International Wireless Communications and Mobile Computing Conference, 2011

Placement of trust anchors in embedded computer systems.
Proceedings of the HOST 2011, 2011

Security fusion based on state machine compositions.
Proceedings of the 2011 IEEE Symposium on Computational Intelligence in Cyber Security, 2011

Cloaking RFID tags.
Proceedings of the 2011 IEEE Consumer Communications and Networking Conference, 2011

2010
Private computing on public platforms: portable application security.
Wirel. Commun. Mob. Comput., 2010

Circumventing security toolbars and phishing filters <i>via</i> rogue wireless access points.
Wirel. Commun. Mob. Comput., 2010

Lightweight key agreement with key chaining.
Proceedings of the IEEE 7th International Conference on Mobile Adhoc and Sensor Systems, 2010

2009
Encryption Key Protection for Private Computing on Public Platforms.
Proceedings of the Seventh Annual IEEE International Conference on Pervasive Computing and Communications, 2009

Distributed Phishing Detection by Applying Variable Selection Using Bayesian Additive Regression Trees.
Proceedings of IEEE International Conference on Communications, 2009

2008
Bandwidth sensitive fast failure recovery scheme for Metro Ethernet.
Comput. Networks, 2008

Developing a SSE-CMM-based security risk assessment process for patient-centered healthcare systems.
Proceedings of the 6th international workshop on Software quality, 2008

Secure Context Switch for Private Computing on Public Platforms.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

Bypassing Security Toolbars and Phishing Filters via DNS Poisoning.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

A distributed architecture for phishing detection using Bayesian Additive Regression Trees.
Proceedings of the 2008 eCrime Researchers Summit, 2008

Privacy Protected ELF for Private Computing on Public Platforms.
Proceedings of the The Third International Conference on Availability, 2008

Bayesian Additive Regression Trees-Based Spam Detection for Enhanced Email Privacy.
Proceedings of the The Third International Conference on Availability, 2008

2007
PCPP: On Remote Host Assessment via Naive Bayesian Classification.
Proceedings of the 21th International Parallel and Distributed Processing Symposium (IPDPS 2007), 2007

Advances in Quantum Computing Fault Tolerance and Testing.
Proceedings of the Tenth IEEE International Symposium on High Assurance Systems Engineering (HASE 2007), 2007

A comparison of machine learning techniques for phishing detection.
Proceedings of the Anti-Phishing Working Groups 2nd Annual eCrime Researchers Summit 2007, 2007

2006
Distributed Restoration Method for Metro Ethernet.
Proceedings of the Fifth International Conference on Networking and the International Conference on Systems (ICN / ICONS / MCL 2006), 2006

Distributed fault management protocol for Heterogeneous Networks.
Proceedings of the 2006 IEEE/ACS International Conference on Computer Systems and Applications (AICCSA 2006), 2006

Differentiated Survivability in Ethernet-Based MAN/WAN.
Proceedings of the 2006 IEEE/ACS International Conference on Computer Systems and Applications (AICCSA 2006), 2006

Avoiding Denial of Service via Stress Testing.
Proceedings of the 2006 IEEE/ACS International Conference on Computer Systems and Applications (AICCSA 2006), 2006

An Experimental and Industrial Experience: Avoiding Denial of Service via Memory Profiling.
Proceedings of the 2006 IEEE/ACS International Conference on Computer Systems and Applications (AICCSA 2006), 2006

2005
Traffic Engineering in Enterprise Ethernet with Multiple Spanning Tree Regions.
Proceedings of the Systems Communications 2005 (ICW / ICHSN / ICMCS / SENET 2005), 2005

2004
Simulation Based Validation of Authentication Protocols.
Trans. SDPS, 2004

1999
Design and Evaluation of System-Level Checks for On-Line Control Flow Error Detection.
IEEE Trans. Parallel Distributed Syst., 1999

Behavioral synthesis of combinational logic using spectral-based heuristics.
ACM Trans. Design Autom. Electr. Syst., 1999

Optimization Based Algorithms for Finding Minimal Cost Ring Covers in Survivable Networks.
Comput. Optim. Appl., 1999

Improved survivability analysis for SONET SHRs.
Comput. Networks, 1999

1998
Accelerated Reliability Analysis for Self-Healing SONET Networks.
Proceedings of the ACM SIGCOMM 1998 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, August 31, 1998

Hierarchical Approach to Performance Analysis of Self-Healing SONET Networks.
Proceedings of the International Conference On Computer Communications and Networks (ICCCN 1998), 1998

1997
A Model for Software Development Effort and Cost Estimation.
IEEE Trans. Software Eng., 1997

Software fault tolerance for distributed object based computing.
J. Syst. Softw., 1997

Statistical analysis of nonstationary software metrics.
Inf. Softw. Technol., 1997

Design of a Portable Control-Flow Checking Technique.
Proceedings of the 2nd High-Assurance Systems Engineering Workshop (HASE '97), 1997

1996
Efficient Techniques for the Analysis of Algorithm-Based Fault Tolerance (ABFT) Schemes.
IEEE Trans. Computers, 1996

1995
Efficient calculation of spectral coefficients and their applications.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 1995

Software Fault Tolerance: Has it Arrived Yet?
Proceedings of the 19th International Computer Software and Applications Conference (COMPSAC'95), 1995

Application layer software fault tolerance for distributed object-oriented systems.
Proceedings of the 19th International Computer Software and Applications Conference (COMPSAC'95), 1995

1994
Parallel Memory Allocation and Data Alignment in Simd Machines.
Parallel Algorithms Appl., 1994

Area, performance, and sensitizable paths [logic design].
Proceedings of the Fourth Great Lakes Symposium on Design Automation of High Performance VLSI Systems, 1994

1993
A case for uniform memory access multiprocessors.
SIGARCH Comput. Archit. News, 1993

A Circulant Matrix Based Approach to Storage Schemes for Parallel Memory Systems.
Proceedings of the Fifth IEEE Symposium on Parallel and Distributed Processing, 1993

A hierarchical object-oriented approach to fault tolerance in distributed systems.
Proceedings of the Fourth International Symposium on Software Reliability Engineering, 1993

An iterative combinational logic synthesis technique using spectral information.
Proceedings of the European Design Automation Conference 1993, 1993

1992
Probabilistic Evaluation of On-Line Checks in Fault-Tolerant Multiprocessor Systems.
IEEE Trans. Computers, 1992

1990
Real-Number Codes for Bault-Tolerant Matrix Operations On Processor Arrays.
IEEE Trans. Computers, 1990

Algorithm-Based Fault Tolerance on a Hypercube Multiprocessor.
IEEE Trans. Computers, 1990

Hierarchical design and analysis of fault-tolerant multiprocessor systems using concurrent error detection.
Proceedings of the 20th International Symposium on Fault-Tolerant Computing, 1990

1988
General linear codes for fault-tolerant matrix operations on processor arrays.
Proceedings of the Eighteenth International Symposium on Fault-Tolerant Computing, 1988

An evaluation of system-level fault tolerance on the Intel hypercube multiprocessor.
Proceedings of the Eighteenth International Symposium on Fault-Tolerant Computing, 1988


  Loading...