IoT cyber risk: A holistic analysis of cyber risk assessment frameworks, risk vectors, and risk ranking process K Kandasamy, S Srinivas, K Achuthan, VP Rangan EURASIP Journal on Information Security 2020, 1-18, 2020 | 210 | 2020 |
Profiling SIEM tools and correlation engines for security analytics SS Sekharan, K Kandasamy 2017 International Conference on Wireless Communications, Signal Processing …, 2017 | 79 | 2017 |
Digital healthcare-cyberattacks in asian organizations: an analysis of vulnerabilities, risks, nist perspectives, and recommendations K Kandasamy, S Srinivas, K Achuthan, VP Rangan IEEE Access 10, 12345-12364, 2022 | 58 | 2022 |
An integrated approach to spam classification on Twitter using URL analysis, natural language processing and machine learning techniques K Kandasamy, P Koroth 2014 IEEE Students' Conference on Electrical, Electronics and Computer …, 2014 | 56 | 2014 |
Understanding and defending crypto-ransomware SS Ganorkar, K Kandasamy ARPN Journal of Engineering and Applied Sciences 12 (12), 3920-3925, 2017 | 23 | 2017 |
Database intrusion detection system using octraplet and machine learning S Jayaprakash, K Kandasamy 2018 second international conference on inventive communication and …, 2018 | 16 | 2018 |
IoT cyber risk: a holistic analysis of cyber risk assessment frameworks, risk vectors, and risk ranking process. EURASIP J Inf Secur 2020: 8 K Kandasamy, S Srinivas, K Achuthan | 6 | 2020 |
An Integrated Approach to Spam Classification on Twitter Using URL Analysis, Natural Language Processing, and Machine Learning Techniques, 2014 IEEE Students’ Conference on … PK Kamalanathan Kandasamy Electronics and Computer Science, 2014 | 2 | 2014 |
IoT cyber risk: a holistic analysis of cyber risk assessment frameworks, risk vectors, and risk ranking process [Digital resource] K Kandasamy, S Srinivas, K Achuthan, VP Rangan URL: https://link. springer. com/article/10.1186/s13635-020-00111-0 …, 0 | 2 | |
Capturing the captcha: a novel technique to build self updating multi-domain training dataset for researchers A Dhar, K Kandasamy, S Srinivas Proceedings of the 2014 International Conference on Interdisciplinary …, 2014 | 1 | 2014 |
Node failures, data aggregation delay and its impact on power optimization in balanced sensor networks K Kandasamy, AG Sreedevi, PV Rangan, MV Ramesh International Journal of Wireless & Mobile Networks 4 (3), 205, 2012 | 1 | 2012 |
Privacy Preservation Using Top K Multi-Keyword Synonym Fuzzy Search Scheme M Sekar, K Kandasamy Inventive Communication and Computational Technologies: Proceedings of …, 2020 | | 2020 |
Re-architecture of Database Software Stack with Planner module for query optimization in a Cloud Environment K Kandasamy, K Achuthan Proceedings of the First International Conference on Security of Internet of …, 2012 | | 2012 |
Performance comparison and node failure assessment of energy efficient two level balanced and progressive sensor networks MV Ramesh, AG Sreedevi, K Kandasamy, PV Rangan Proceedings of the International Conference on Advances in Computing …, 2012 | | 2012 |
Digital Healthcare in Asia A Qualitative Investigation of Cybersecurity Risks Maturity and Vulnerabilities K Kandasamy Coimbatore, 0 | | |