Search Results - "Sudarsan, Sithu D."

  • Showing 1 - 18 results of 18
Refine Results
  1. 1

    DNS Intrusion Detection (DID) — A SNORT-based solution to detect DNS Amplification and DNS Tunneling attacks by Sanjay Adiwal, Balaji Rajendran, Pushparaj Shetty D., Sithu D. Sudarsan

    Published in Franklin Open (01-03-2023)
    “…Domain Name System (DNS) plays a critical role in the Internet ecosystem, translating numerical IP addresses to memorable domain names and vice versa. The…”
    Get full text
    Journal Article
  2. 2

    Health Assessment of 1485 Top Level Domain's Name Servers by Adiwal, Sanjay, Rajendran, Balaji, D, Pushparaj Shetty, Sudarsan, Sithu D

    “…Domain Name System (DNS) has evolved as a critical component in the accessibility of Internet services and has therefore become a key attack vector in major…”
    Get full text
    Conference Proceeding
  3. 3

    Machine Vision based Automation to Improve Process and Quality Control in Rolling Mills by Rao, Vidyadhar, S, Shishira, Sudarsan, Sithu D

    “…Steel manufacturing industries take advantage of growing infrastructure market by producing high volumes of rolling products like rebars. However, in the face…”
    Get full text
    Conference Proceeding
  4. 4

    Proximity Contours: Vision based Detection and Tracking of Objects in Manufacturing Plants using Industrial Control Systems by Shishira, S, Rao, Vidyadhar, Sudarsan, Sithu D

    “…In a typical manufacturing setup, field sensors are used to detect the presence of moving material on the production line. Sensory information is interfaced…”
    Get full text
    Conference Proceeding
  5. 5

    Agent Based Modelling for Migration of Industrial Control Systems by Mohan, Devina, Chandrika, K.R., Sudarsan, Sithu D.

    “…Keeping industrial control systems on par with state-of-the-art is required to (i) make industrial plants greener with reduced energy consumption and…”
    Get full text
    Conference Proceeding
  6. 6

    Cyber security threats in industrial control systems and protection by Marali, Mounesh, Sudarsan, Sithu D, Gogioneni, Ashok

    “…Industrial automation and control systems are increasingly based on open communication protocols and platforms that are also commonly used in corporate IT…”
    Get full text
    Conference Proceeding
  7. 7

    Graceful Reincarnation of Legacy Industrial Control Systems by Marali, Mounesh, Sudarsan, Sithu D

    “…Challenge of graceful migration through upgrades and updates is a daunting task for process control systems. Issues confronted include aging hardware and…”
    Get full text
    Conference Proceeding
  8. 8

    Discovering likely mappings between APIs using text mining by Pandita, Rahul, Jetley, Raoul Praful, Sudarsan, Sithu D., Williams, Laurie

    “…Developers often release different versions of their applications to support various platform/programming-language application programming interfaces (APIs)…”
    Get full text
    Conference Proceeding
  9. 9

    Industrial Control Systems - Legacy System Documentation and Augmentation by Sudarsan, Sithu D, Mohan, Devina, Rohit, S S

    “…Industrial control systems are used to automate process industries. Over 50 billion USD worth such systems are more than 20 years old resulting in their…”
    Get full text
    Conference Proceeding
  10. 10

    Role of attributes selection in classification of Chronic Kidney Disease patients by Chetty, Naganna, Vaisla, Kunwar Singh, Sudarsan, Sithu D.

    “…In the present days the Chronic Kidney Disease (CKD) is a common problem to the public. CKD is generally considered as kidney damage and is usually measured…”
    Get full text
    Conference Proceeding
  11. 11

    Recognizing eye tracking traits for source code review by Chandrika, K. R., Amudha, J., Sudarsan, Sithu D.

    “…Source code review is a core activity in software engineering where a reviewer examines the code with the intention of finding bugs in the program. A lot of…”
    Get full text
    Conference Proceeding
  12. 12

    Message from Workshop Chair

    “…Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved with the…”
    Get full text
    Conference Proceeding
  13. 13

    A big data perspective of current ETL techniques by Phanikanth, K. V., Sudarsan, Sithu D.

    “…Dynamic data stream processing using real time ETL techniques is currently a high concern as the amount of data generated is increasing day by day with the…”
    Get full text
    Conference Proceeding
  14. 14

    Message from the organizing chairs

    “…Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved with the…”
    Get full text
    Conference Proceeding
  15. 15

    Signal Detection Framework Using Semantic Text Mining Techniques by Sudarsan, Sithu D

    Published 2009
    “…Signal detection is a challenging task for regulatory and intelligence agencies. Subject matter experts in those agencies analyze documents, generally…”
    Get full text
    Dissertation
  16. 16

    R3ToS based Partially Reconfigurable Data Flow Pipelined Network on chip by Narayanasamy, Poornima, Muthurathinam, Santhi, Gopoalakrishnan, Seetharaman, Arslan, Tughrul, Sudarsan, Sithu D.

    “…The incorporation of Data Flow Pipelining (DFP) along with the concept of Partial Reconfiguration (PR) in R3TOS based NoC is projected in this paper. Our…”
    Get full text
    Conference Proceeding
  17. 17

    Signal detection framework using semantic text mining techniques by Sudarsan, Sithu D

    “…Signal detection is a challenging task for regulatory and intelligence agencies. Subject matter experts in those agencies analyze documents, generally…”
    Get full text
    Dissertation
  18. 18

    Pseudo Random Number Generation for Parallelized Jobs on Clusters by Mikailov, M., Sudarsan, S. D., Fu-Jyh Luo

    “…Pseudo random number generators designed for use in programs to be run serially do not function as intended when multiple instances of the programs are run in…”
    Get full text
    Conference Proceeding