Online purchase intention: Effects of trust and security perception F Meskaran, Z Ismail, B Shanmugam Australian journal of basic and applied sciences, 307-315, 2013 | 311 | 2013 |
A comprehensive survey for intelligent spam email detection A Karim, S Azam, B Shanmugam, K Kannoorpatti, M Alazab Ieee Access 7, 168261-168295, 2019 | 229 | 2019 |
Intrusion detection system for the internet of things based on blockchain and multi-agent systems C Liang, B Shanmugam, S Azam, A Karim, A Islam, M Zamani, ... Electronics 9 (7), 1120, 2020 | 129 | 2020 |
Security risk assessment framework for cloud computing environments SH Albakri, B Shanmugam, GN Samy, NB Idris, A Ahmed | 106 | 2014 |
Machine learning based PV power generation forecasting in alice springs K Mahmud, S Azam, A Karim, S Zobaed, B Shanmugam, D Mathur IEEE Access 9, 46117-46128, 2021 | 94 | 2021 |
Artificial intelligence techniques applied to intrusion detection NB Idris, B Shanmugam 2005 Annual IEEE India Conference-Indicon, 52-55, 2005 | 86 | 2005 |
Preprocessing of breast cancer images to create datasets for deep-CNN AR Beeravolu, S Azam, M Jonkman, B Shanmugam, K Kannoorpatti, ... IEEE Access 9, 33438-33463, 2021 | 81 | 2021 |
A review of threat modelling approaches for APT-style attacks M Tatam, B Shanmugam, S Azam, K Kannoorpatti Heliyon 7 (1), 2021 | 77 | 2021 |
AcneNet-a deep CNN based classification approach for acne classes MS Junayed, AA Jeny, ST Atik, N Neehal, A Karim, S Azam, ... 2019 12th International Conference on Information & Communication Technology …, 2019 | 69 | 2019 |
Hybrid intelligent intrusion detection system N Bashah, IB Shanmugam, AM Ahmed World Academy of Science, Engineering and Technology 11, 23-26, 2005 | 68 | 2005 |
Improved intrusion detection system using fuzzy logic for detecting anamoly and misuse type of attacks B Shanmugam, NB Idris 2009 International Conference of Soft Computing and Pattern Recognition, 212-217, 2009 | 66 | 2009 |
Intrusion detection system for Internet of Things based on a machine learning approach C Liang, B Shanmugam, S Azam, M Jonkman, F De Boer, ... 2019 International Conference on Vision Towards Emerging Trends in …, 2019 | 63 | 2019 |
Enabling data hiding for resource sharing in cloud computing environments based on DNA sequences MR Abbasy, B Shanmugam 2011 IEEE World Congress on Services, 385-390, 2011 | 56 | 2011 |
Efficient clustering of emails into spam and ham: The foundational study of a comprehensive unsupervised framework A Karim, S Azam, B Shanmugam, K Kannoorpatti IEEE Access 8, 154759-154788, 2020 | 53 | 2020 |
A systematic literature review on privacy by design in the healthcare sector FH Semantha, S Azam, KC Yeo, B Shanmugam Electronics 9 (3), 452, 2020 | 53 | 2020 |
Comparative analysis of different techniques of encryption for secured data transmission AV Mota, S Azam, B Shanmugam, KC Yeo, K Kannoorpatti 2017 IEEE International Conference on Power, Control, Signals and …, 2017 | 50 | 2017 |
An overview of blockchain applications and attacks RR Vokerla, B Shanmugam, S Azam, A Karim, F De Boer, M Jonkman, ... 2019 international conference on vision towards emerging trends in …, 2019 | 49 | 2019 |
A parallel technique for improving the performance of signature-based network intrusion detection system FI Shiri, B Shanmugam, NB Idris 2011 IEEE 3rd International Conference on Communication Software and …, 2011 | 46 | 2011 |
An intelligent spam detection model based on artificial immune system AJ Saleh, A Karim, B Shanmugam, S Azam, K Kannoorpatti, M Jonkman, ... Information 10 (6), 209, 2019 | 42 | 2019 |
A systematic literature review of authentication in Internet of Things for heterogeneous devices S Kavianpour, B Shanmugam, S Azam, M Zamani, G Narayana Samy, ... Journal of Computer Networks and Communications 2019, 2019 | 41 | 2019 |