Sureswaran Ramadass

According to our database1, Sureswaran Ramadass authored at least 35 papers between 1994 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
TLS Guard for TLS 1.3 zero round-trip time (0-RTT) in a distributed environment.
J. King Saud Univ. Comput. Inf. Sci., December, 2023

2014
Semi-Fluid content distribution model for fast data dissemination in heterogeneous overlay networks.
Peer-to-Peer Netw. Appl., 2014

kENFIS: kNN-based evolving neuro-fuzzy inference system for computer worms detection.
J. Intell. Fuzzy Syst., 2014

Employing machine learning algorithms to detect unknown scanning and email worms.
Int. Arab J. Inf. Technol., 2014

Context Aware Handover Algorithms for Mobile Positioning Systems.
Comput. Sci., 2014

2013
Research Proposal: an Intrusion Detection System Alert Reduction and Assessment Framework based on Data Mining.
J. Comput. Sci., 2013

Fuzzy Based Diagnostics System for Identifying Network Traffic Flow Anomalies
CoRR, 2013

A Hybrid Rule Based Fuzzy-Neural Expert System For Passive Network Monitoring
CoRR, 2013

Security mechanism for IPv6 router discovery based on distributed trust management.
Proceedings of the 2013 IEEE International Conference on RFID-Technologies and Applications, 2013

A comparative study of direct and indirect static peering for inter-domain sip calls.
Proceedings of the 2013 IEEE International Conference on RFID-Technologies and Applications, 2013

Concepts and types of peer-to-peer network topology for live video streaming.
Proceedings of the 2013 IEEE International Conference on RFID-Technologies and Applications, 2013

Multi-constrained routing using genetic algorithm.
Proceedings of the 2013 IEEE International Conference on RFID-Technologies and Applications, 2013

2012
Novel algorithms to ensure smooth and unobtrusive handover among positioning systems.
Proceedings of the 2012 International Conference on Information Retrieval & Knowledge Management, 2012

A hybrid Content Distribution Model for fast data dissemination in overlay networks.
Proceedings of the 2012 IEEE Consumer Communications and Networking Conference (CCNC), 2012

Generating adaptive network data visualization to different levels of users.
Proceedings of the 2nd IEEE International Conference on Cloud Computing and Intelligence Systems, 2012

2011
Simulation of Routing in Nano-Manipulation for Creating Pattern with Atomic Force Microscopy Using Hybrid GA and PSO-AS Algorithms.
Proceedings of the Advances in Swarm Intelligence - Second International Conference, 2011

Simulation of routing in nano-manipulation for creating pattern with atomic force microscopy using hybrid PSO-AS.
Proceedings of the 2011 Spring Simulation Multi-conference, 2011

A dual stack IPv4/IPv6 testbed for malware detection in IPv6 networks.
Proceedings of the 2011 IEEE International Conference on Control System, 2011

2010
Safety Message Power Transmission Control for Vehicular Ad hoc Networks
CoRR, 2010

Design of Simple and Efficient Revocation List Distribution in Urban areas for VANET's
CoRR, 2010

Case Study: Visualization Methodology for Analysing Network Data.
Proceedings of the 12th UKSim, 2010

Discovery of Invariant Bot Behavior through Visual Network Monitoring System.
Proceedings of the Fourth International Conference on Emerging Security Information Systems and Technologies, 2010

Forthcoming Aggregating Intrusion Detection System Alerts Framework.
Proceedings of the Fourth International Conference on Emerging Security Information Systems and Technologies, 2010

A behavior based algorithm to detect Spam bots.
Proceedings of the 2010 International Symposium on Collaborative Technologies and Systems, 2010

A Hybrid Address Allocation Algorithm for IPv6.
Proceedings of the Recent Trends in Network Security and Applications, 2010

Expert-Aware Approach: A New Approach to Improve Network Security Visualization Tool.
Proceedings of the Second International Conference on Computational Intelligence, 2010

A plausible approach for further decentralization of IPv6 address distribution.
Proceedings of the AINTEC '10, 2010

2009
Detecting Botnet Activities Based on Abnormal DNS traffic
CoRR, 2009

A Survey of Botnet and Botnet Detection.
Proceedings of the Third International Conference on Emerging Security Information, 2009

Study on Advanced Visualization Tools In Network Monitoring Platform.
Proceedings of the EMS 2009, 2009

2008
A Sequential Hierarchical Superset Implementation of Neocortex Memory System and its Case Study of Automated Network Forensic Analysis.
Proceedings of the 2008 International Conference on Artificial Intelligence, 2008

2006
Node Density Effects on Reactive Routing Protocols for Mobile Ad Hoc Wireless Networks.
Proceedings of the Technologies for Advanced Heterogeneous Networks II, 2006

2003
Satellite Bandwidth Requirements for an MCS Based Multimedia Conference.
Proceedings of the 2003 Symposium on Applications and the Internet Workshops (SAINT 2003), 27-31 January 2003, 2003

Socket Level Implementation of MCS Conferencing System in IPv6.
Proceedings of the Information Networking, 2003

1994
Distributed Databases using Novell Netware.
Proceedings of the 12st IASTED International Conference on Applied Informatics, 1994


  Loading...