Rajesh Ganesan

ORCID: 0000-0003-1875-548X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Network Security and Intrusion Detection
  • Information and Cyber Security
  • Smart Grid Security and Resilience
  • Software System Performance and Reliability
  • Air Traffic Management and Optimization
  • Traffic control and management
  • Aviation Industry Analysis and Trends
  • Advanced Malware Detection Techniques
  • Fault Detection and Control Systems
  • Advanced machining processes and optimization
  • Liver Disease and Transplantation
  • Experimental Learning in Engineering
  • Mobile Learning in Education
  • Livestock Management and Performance Improvement
  • Energy Efficient Wireless Sensor Networks
  • Organ Transplantation Techniques and Outcomes
  • Liver Disease Diagnosis and Treatment
  • Diverse Educational Innovations Studies
  • Misinformation and Its Impacts
  • Genetic and phenotypic traits in livestock
  • Adversarial Robustness in Machine Learning
  • Simulation Techniques and Applications
  • Mobile Agent-Based Network Management
  • Quality and Supply Management
  • Agricultural Systems and Practices

Mahatma Gandhi Medical College and Research Institute
2024

George Mason University
2012-2023

Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology
2018-2023

Vellore Institute of Technology University
2021-2023

Anna University, Chennai
2020

Institute of Science and Technology
2018

Pondicherry University
2013-2015

Tamil Nadu Veterinary and Animal Sciences University
2014

University of South Florida
2003-2005

An important component of the cyber-defense mechanism is adequate staffing levels its cybersecurity analyst workforce and their optimal assignment to sensors for investigating dynamic alert traffic. The ever-increasing threats faced by today’s digital systems require a strong that both reactive in response mitigate known risk proactive being prepared handling unknown risks. In order be risks, above must scheduled dynamically so system adaptive meet day-to-day stochastic demands on (both size...

10.1145/2882969 article EN ACM Transactions on Intelligent Systems and Technology 2016-07-25

Vulnerability remediation is a critical task in operational software and network security management. In this article, an effective vulnerability management strategy, called VULCON (VULnerability CONtrol), developed evaluated. The strategy based on two fundamental performance metrics: (1) time-to-vulnerability (TVR) (2) total exposure (TVE). takes as input real scan reports, metadata about the discovered vulnerabilities, asset criticality, personnel resources. uses mixed-integer...

10.1145/3196884 article EN ACM Transactions on Privacy and Security 2018-06-12

Cybersecurity threats are on the rise with evermore digitization of information that many day-to-day systems depend upon. The demand for cybersecurity analysts outpaces supply, which calls optimal management analyst resource. Therefore, a key component defense system is scheduling its analysts. Sensor data analyzed by automatic processing systems, and alerts generated. A portion these considered to be significant , requires thorough examination analyst. Risk, in this article, defined as...

10.1145/2914795 article EN ACM Transactions on Intelligent Systems and Technology 2017-02-24

A Cybersecurity Operations Center (CSOC) performs various tasks to protect an organization from cyber threats. Several types of personnel collaborate function effectively as a team analyze the threat signals, in form alerts, arriving sources. Teams are often formed ad hoc, resulting imbalance their performances and thereby increasing risk associated with low-performing teams. The current approach taken by behavioral scientists forming effective teams focuses on first qualitatively assessing...

10.1109/tsc.2023.3253307 article EN IEEE Transactions on Services Computing 2023-03-06

Existing approaches to cyber defense have been inadequate at defending the targets from advanced persistent threats (APTs). APTs are stealthy and orchestrated attacks, which target both corporations governments exfiltrate important data. In this paper, we present a novel comprehensibility manipulation framework (CMF) generate haystack of hard comprehend fake documents, can be used for deceiving attackers increasing cost data exfiltration by wasting their time resources. CMF requires an...

10.1109/mis.2018.2877277 article EN IEEE Intelligent Systems 2018-09-01

Modern botnets can persist in networked systems for extended periods of time by operating a stealthy manner. Despite the progress made area botnet prevention, detection, and mitigation, continue to pose significant risk enterprises. Furthermore, existing enterprise-scale solutions require resources operate effectively, thus they are not practical. In order address this important problem resource-constrained environment, we propose reinforcement learning based approach optimally dynamically...

10.1145/3140549.3140552 article EN 2017-10-30

Advanced cyber attackers can penetrate enterprise networks and steal critical documents containing intellectual property despite all access control measures. Cyber deception is one of many solutions to protect after an attacker penetrates the network. It requires generation deployment decoys such as fake text. The comprehensibility a text document affect required time effort for attack succeed. However, existing cybersecurity research has given limited attention exploring features...

10.1109/jsyst.2020.2980177 article EN IEEE Systems Journal 2020-04-28

Cognitive Radio Sensor Network (CRSN) is known as a distributed network of wireless cognitive radio sensor nodes. Such system senses an event signal and ensures collaborative dynamic communication processes over the spectrum bands. Here, concept Dynamic Spectrum Access (DSA) denes method reaching progressively to unused range band. As among essential CRSN user types, Primary User (PU) has license access On other hand, Secondary (SU) tries eciently, by not disturbing PU. Considering that...

10.3906/elk-1907-206 article EN TURKISH JOURNAL OF ELECTRICAL ENGINEERING & COMPUTER SCIENCES 2020-01-07

Flight delays have a significant impact on the nationpsilas economy. Taxi-out in particular constitute portion of block time flight. In future, it can be expected that accurate predictions dasiawheels-offpsila may used determining whether an aircraft meet its allocated slot time, thereby fitting into en-route traffic flow. Without taxi-out prediction for departures, there is no way to effectively manage fuel consumption, emissions, or cost. Dynamically changing operations at airport makes...

10.1109/dasc.2008.4702812 article EN 2011 IEEE/AIAA 30th Digital Avionics Systems Conference 2008-10-01

Wavelet-based multiscale analysis approaches have revolutionized the tasks of signal processing, such as image and data compression. However, scope wavelet-based methods in fields statistical applications, process monitoring, density estimation, defect identification, are still their early stages evolution. Recent literature contains some applications tool-life bearing monitoring ultra-precision processes. This paper presents a novel application method nanomachining [chemical mechanical...

10.1109/tsm.2003.818975 article EN IEEE Transactions on Semiconductor Manufacturing 2003-11-01

K. E. Muller and B. A. Fetterman Wiley, 2003, 566 pages, ISBN 0-471-46943-2 This book demonstrates an integrated approach using SAS software, which provides a thorough treatment of m...

10.1080/07408170490507855 article EN IIE Transactions 2004-10-25

Intrusion detection systems (IDSs) analyze data that are collected by sensors, which monitor the network traffic. Any alert generated IDS is transmitted to a cybersecurity operations center (CSOC), performs important task of analyzing alerts. In order deliver strong security against threats, an efficient CSOC requires following characteristics: 1) all alerts must be analyzed in timely manner; 2) there ideal mix analyst expertise levels organization because quality analysis performed depends...

10.1109/tifs.2018.2871744 article EN IEEE Transactions on Information Forensics and Security 2018-09-24

Flight delay is one of the pressing problems that have far-reaching effects on society and nation's economy. A primary cause flight in National Airspace System high taxi-out times (time between gate push-back wheels-off) at major airports. Accurate prediction time needed to make downstream schedule adjustments for better departure planning, which could mitigate delays, emissions, congestion ground. However, accurate difficult because uncertainties associated with dynamically changing airport...

10.3141/2052-07 article EN Transportation Research Record Journal of the Transportation Research Board 2008-01-01

The National Airspace System (NAS) is an important and a vast resource. Efficient management of airspace capacity to ensure safe systematic operation the NAS eventually resulting in maximum benefit stakeholders. Dynamic Configuration (DAC) one NextGen Concept Operations (ConOps) that aims at efficient allocation as technique. This paper proof concept for Approximate Programming (ADP) approach by static sectorization. objective this address issue sectorization partitioning based on controller...

10.1109/icnsurv.2011.5935295 article EN 2011-05-01

Sheep rearing is an important livelihood for a large number of small and marginal farmers in India as sheep make significant contribution to income generation, supply animal source food serve financial security the resource-poor rural households.Growth economic trait interest domestic animals.The present study was aimed at evaluating growth performance estimating genetic parameters traits Madras Red sheep, native breed Tamilnadu state India, under organized farm conditions.Monthly body...

10.9790/2380-0356973 article EN IOSR Journal of Agriculture and Veterinary Science 2013-01-01

The analysts at a cybersecurity operations center (CSOC) analyze the alerts that are generated by intrusion detection systems (IDSs). Under normal operating conditions, sufficient numbers of available to alert workload. For purpose this article, means in each shift can fully investigate and every is IDSs reasonable amount time perform their tasks shift. Normal include analysis time, attend training programs, report writing personal break update signatures on new patterns as detected IDS....

10.1145/3173457 article EN ACM Transactions on Intelligent Systems and Technology 2018-04-24

Efficient end point detection (EPD) in chemical mechanical planarization (CMP) is critical to quality and productivity of the wafer fabrication process. The cost over under polishing, ownership many expensive metrology-based EPD methods have motivated researchers seek effective efficient alternatives. This paper presents a novel method for EPD, which uses sequential probability ratio test (SPRT) on wavelet decomposed coefficient friction (CoF) data from CMP made suitable online application...

10.1109/tsm.2005.852085 article EN IEEE Transactions on Semiconductor Manufacturing 2005-08-01

In recent years, the run-by run (RbR) control mechanism has emerged as a useful tool for keeping complex semiconductor manufacturing processes on target during repeated short production runs. Many types of RbR controllers exist in literature which exponentially weighted moving average (EWMA) controller is widely used industry. However, EWMA are known to have several limitations. For example, presence multiscale disturbances and lack accurate process models, performance deteriorates often...

10.1109/tase.2006.879915 article EN IEEE Transactions on Automation Science and Engineering 2007-04-01

A Cyber Security Operations Center (CSOC) is responsible for investigating all the alerts generated from intrusion detection systems to identify suspicious activities in a timely manner. There exists critical gap between time needed (demand) and available (limited analyst resource) alert investigation at CSOC. Hence, prioritization important, which CSOCs employ ad-hoc filtering methods prune triage that are presented analysts investigation. One of major drawbacks they do not comprehensively...

10.1109/tifs.2018.2886465 article EN IEEE Transactions on Information Forensics and Security 2018-12-12
Coming Soon ...