Search Results - "Sudarsan, Sithu D."
-
1
DNS Intrusion Detection (DID) — A SNORT-based solution to detect DNS Amplification and DNS Tunneling attacks
Published in Franklin Open (01-03-2023)“…Domain Name System (DNS) plays a critical role in the Internet ecosystem, translating numerical IP addresses to memorable domain names and vice versa. The…”
Get full text
Journal Article -
2
Health Assessment of 1485 Top Level Domain's Name Servers
Published in 2023 15th International Conference on COMmunication Systems & NETworkS (COMSNETS) (03-01-2023)“…Domain Name System (DNS) has evolved as a critical component in the accessibility of Internet services and has therefore become a key attack vector in major…”
Get full text
Conference Proceeding -
3
Machine Vision based Automation to Improve Process and Quality Control in Rolling Mills
Published in 2020 25th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA) (01-09-2020)“…Steel manufacturing industries take advantage of growing infrastructure market by producing high volumes of rolling products like rebars. However, in the face…”
Get full text
Conference Proceeding -
4
Proximity Contours: Vision based Detection and Tracking of Objects in Manufacturing Plants using Industrial Control Systems
Published in 2019 IEEE 17th International Conference on Industrial Informatics (INDIN) (01-07-2019)“…In a typical manufacturing setup, field sensors are used to detect the presence of moving material on the production line. Sensory information is interfaced…”
Get full text
Conference Proceeding -
5
Agent Based Modelling for Migration of Industrial Control Systems
Published in 2019 IEEE International Conference on Systems, Man and Cybernetics (SMC) (01-10-2019)“…Keeping industrial control systems on par with state-of-the-art is required to (i) make industrial plants greener with reduced energy consumption and…”
Get full text
Conference Proceeding -
6
Cyber security threats in industrial control systems and protection
Published in 2019 International Conference on Advances in Computing and Communication Engineering (ICACCE) (01-04-2019)“…Industrial automation and control systems are increasingly based on open communication protocols and platforms that are also commonly used in corporate IT…”
Get full text
Conference Proceeding -
7
Graceful Reincarnation of Legacy Industrial Control Systems
Published in 2018 IEEE 3rd International Conference on Computing, Communication and Security (ICCCS) (01-10-2018)“…Challenge of graceful migration through upgrades and updates is a daunting task for process control systems. Issues confronted include aging hardware and…”
Get full text
Conference Proceeding -
8
Discovering likely mappings between APIs using text mining
Published in 2015 IEEE 15th International Working Conference on Source Code Analysis and Manipulation (SCAM) (01-09-2015)“…Developers often release different versions of their applications to support various platform/programming-language application programming interfaces (APIs)…”
Get full text
Conference Proceeding -
9
Industrial Control Systems - Legacy System Documentation and Augmentation
Published in 2018 IEEE 3rd International Conference on Computing, Communication and Security (ICCCS) (01-10-2018)“…Industrial control systems are used to automate process industries. Over 50 billion USD worth such systems are more than 20 years old resulting in their…”
Get full text
Conference Proceeding -
10
Role of attributes selection in classification of Chronic Kidney Disease patients
Published in 2015 International Conference on Computing, Communication and Security (ICCCS) (01-12-2015)“…In the present days the Chronic Kidney Disease (CKD) is a common problem to the public. CKD is generally considered as kidney damage and is usually measured…”
Get full text
Conference Proceeding -
11
Recognizing eye tracking traits for source code review
Published in 2017 22nd IEEE International Conference on Emerging Technologies and Factory Automation (ETFA) (01-09-2017)“…Source code review is a core activity in software engineering where a reviewer examines the code with the intention of finding bugs in the program. A lot of…”
Get full text
Conference Proceeding -
12
Message from Workshop Chair
Published in 2015 Second International Conference on Advances in Computing and Communication Engineering (01-05-2015)“…Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved with the…”
Get full text
Conference Proceeding -
13
A big data perspective of current ETL techniques
Published in 2016 International Conference on Advances in Computing and Communication Engineering (ICACCE) (01-11-2016)“…Dynamic data stream processing using real time ETL techniques is currently a high concern as the amount of data generated is increasing day by day with the…”
Get full text
Conference Proceeding -
14
Message from the organizing chairs
Published in 2016 International Conference on Advances in Computing and Communication Engineering (ICACCE) (01-11-2016)“…Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved with the…”
Get full text
Conference Proceeding -
15
Signal Detection Framework Using Semantic Text Mining Techniques
Published 2009“…Signal detection is a challenging task for regulatory and intelligence agencies. Subject matter experts in those agencies analyze documents, generally…”
Get full text
Dissertation -
16
R3ToS based Partially Reconfigurable Data Flow Pipelined Network on chip
Published in 2018 NASA/ESA Conference on Adaptive Hardware and Systems (AHS) (01-08-2018)“…The incorporation of Data Flow Pipelining (DFP) along with the concept of Partial Reconfiguration (PR) in R3TOS based NoC is projected in this paper. Our…”
Get full text
Conference Proceeding -
17
Signal detection framework using semantic text mining techniques
Get full text
Dissertation -
18
Pseudo Random Number Generation for Parallelized Jobs on Clusters
Published in 2012 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (ccgrid 2012) (01-05-2012)“…Pseudo random number generators designed for use in programs to be run serially do not function as intended when multiple instances of the programs are run in…”
Get full text
Conference Proceeding