P. Santhi Thilagam

ORCID: 0000-0002-8359-1330
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Network Security and Intrusion Detection
  • Complex Network Analysis Techniques
  • Caching and Content Delivery
  • IoT and Edge/Fog Computing
  • Cloud Computing and Resource Management
  • Mobile Ad Hoc Networks
  • Spam and Phishing Detection
  • Opinion Dynamics and Social Influence
  • Internet Traffic Analysis and Secure E-voting
  • Opportunistic and Delay-Tolerant Networks
  • Data Management and Algorithms
  • Data Mining Algorithms and Applications
  • Cryptography and Data Security
  • Web Application Security Vulnerabilities
  • Web Data Mining and Analysis
  • Advanced Malware Detection Techniques
  • Rough Sets and Fuzzy Logic
  • Recommender Systems and Techniques
  • Security and Verification in Computing
  • Distributed and Parallel Computing Systems
  • Privacy-Preserving Technologies in Data
  • Text and Document Classification Technologies
  • Topic Modeling
  • Peer-to-Peer Network Technologies
  • Network Time Synchronization Technologies

National Institute of Technology Karnataka
2016-2025

Sardar Vallabhbhai National Institute of Technology Surat
2015-2016

Jawaharlal Nehru University
2012

Yahoo (United Kingdom)
2006

Distributed denial of service (DDoS) attacks are some the most devastating against Web applications. A large number these aim to exhaust network bandwidth server, and called layer DDoS attacks. They volumetric rely on a volume packets throttle bandwidth. However, as time passed, infrastructure became more robust defenses also advanced. Recently, have started targeting application layer. Unlike attacks, can be carried out with relatively low attack volume. utilize legitimate requests, which...

10.1109/comst.2018.2870658 article EN IEEE Communications Surveys & Tutorials 2018-09-17

10.1016/j.jnca.2016.02.021 article EN Journal of Network and Computer Applications 2016-04-18

10.1007/s10844-017-0494-z article EN Journal of Intelligent Information Systems 2018-01-10

The increasing number of Web services over the makes requester to use tools search for suitable available throughout globe. UDDI is first step towards meeting these demands. However requester’s demand may include not only functional aspects but also non-functional like Quality Service (QoS). There a need select most (qualitatively optimal) service based on QoS requirements and preferences. In this paper we explore different types (demands) with illustrations. We propose broker architecture...

10.1109/ams.2008.94 article EN 2008-05-01

Asymmetric application layer DDoS attacks using computationally intensive HTTP requests are an extremely dangerous class of capable taking down web servers with relatively few attacking connections. These consume limited network bandwidth and similar to legitimate traffic, which makes their detection difficult. Existing mechanisms for these use indirect representations actual user behaviour complex modelling techniques, leads a higher false positive rate (FPR) longer time, them unsuitable...

10.1109/tifs.2020.3017928 article EN IEEE Transactions on Information Forensics and Security 2020-08-19

10.1016/j.engappai.2022.105731 article EN Engineering Applications of Artificial Intelligence 2022-12-21

Climate change, environmental stresses, and evolving pathogens pose major threats to global food security. Developing resilient crops with robust defense mechanisms is crucial ensure sustainable agricultural production in the face of these challenges. CRISPR-based genome editing has emerged as a powerful tool for precisely modifying plant genes enhance stress tolerance disease resistance. This review explores recent advancements CRISPR-mediated modification defense-related crops. We discuss...

10.56557/pcbmb/2025/v26i1-29059 article EN cc-by PLANT CELL BIOTECHNOLOGY AND MOLECULAR BIOLOGY 2025-01-20

10.14569/ijacsa.2025.01603110 article EN International Journal of Advanced Computer Science and Applications 2025-01-01

Association rule mining activity is both computationally and I/O intensive. A majority of ARM algorithms reported in the literature efficient handling high dimensional data but single database based. Many enterprises maintain several databases independently to serve different purposes. There could be an implicit association among various parts such data. In this paper, we investigate a mechanism generate rules (ARs) between sets values which are subsets domains attributes occurring relations...

10.1109/icmla.2007.44 article EN 2007-12-01

Distributed Denial of Service (DDoS) attacks using the HTTP protocol have started gaining popularity in recent years. A trend this direction has been use computationally expensive requests to launch attacks. These attacks, called Asymmetric Workload can bring down servers limited resources, and are extremely difficult detect. The introduction HTTP/2 welcomed by developers because it improves user experience efficiency. This was made possible ability transport their associated inline...

10.1109/tifs.2019.2950121 article EN IEEE Transactions on Information Forensics and Security 2019-10-29

Cloud computing is an upcoming trend in the field of computer science recent years. In cloud, resources are provided as service form virtual machine to its clients across globe based on demand. Huge demand for cloud results overutilization servers whenever there a heavy load. It necessary distribute load by taking into consideration allocating right amount dynamically improve performance applications running machines. this paper we present algorithm which allocate need and servers. We...

10.1109/indcon.2013.6726147 article EN 2013-12-01

Efficient and low power utilizing clock synchronization is a challenging task for wireless-sensor network (WSN). Therefore, it crucial to design light weight protocols these networks. An adaptive offset prediction model WSN proposed in this paper that exchanges fewer messages improve the accuracy efficiency. Timing information required collected by setting small set up investigate soil condition control irrigation agriculture. The networks soils moisture, temperature, humidity, pressure...

10.1109/jsen.2018.2818302 article EN IEEE Sensors Journal 2018-03-22

The increasing demand in computing resources and widespread adaptation of Service Oriented Architecture (SOA) has made cloud as a new IT delivery mechanism. In cloud, are provided to the requester service, which include Software (SaaS), Platform (PaaS) Infrastructure (IaaS). Cloud Computing is still developing stage faces many challenges. Out various issues, scheduling plays very important role determining efficient execution tasks environment. this paper we present algorithm uses tree based...

10.1109/eait.2012.6407881 article EN 2012-11-01

Rapid growth of internet technology made many IaaS providers arise across the globe to meet needs small IT companies. Number companies started using resources provider due elastic and pay as you go nature. Increasing number cloud results in difficulty for requester select suitable based on requirements. In this paper we present a broker architecture selecting from multiple providers. The measure quality each prioritize them requester. experiment is conducted cloudsim simulator shows that...

10.1109/icacci.2014.6968439 article EN 2014-09-01
Coming Soon ...