Sathish Kumar

ORCID: 0000-0003-4256-4106
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Network Security and Intrusion Detection
  • Blockchain Technology Applications and Security
  • Opportunistic and Delay-Tolerant Networks
  • Advanced Malware Detection Techniques
  • Internet Traffic Analysis and Secure E-voting
  • Quantum Information and Cryptography
  • Vehicular Ad Hoc Networks (VANETs)
  • Cryptography and Data Security
  • Hate Speech and Cyberbullying Detection
  • Software-Defined Networks and 5G
  • Cloud Data Security Solutions
  • Cryptographic Implementations and Security
  • Spam and Phishing Detection
  • User Authentication and Security Systems
  • Software Engineering Research
  • Wireless Body Area Networks
  • Mobile Ad Hoc Networks
  • Software Reliability and Analysis Research
  • Software Engineering Techniques and Practices
  • Spectroscopy Techniques in Biomedical and Chemical Research
  • Misinformation and Its Impacts
  • EEG and Brain-Computer Interfaces
  • Quantum Mechanics and Applications

Cleveland State University
2020-2024

REVA University
2023

Vellore Institute of Technology University
2011

10.1016/j.iot.2023.100927 article EN publisher-specific-oa Internet of Things 2023-09-01

Distributed Denial of Service (DDoS) attacks aims exhausting the target network with malicious traffic, which is a threat to availability service. Many detection systems, specifically Intrusion Detection System (IDS) have been proposed throughout last two decades as Internet evolved, although users and organizations find it continuously challenging defeated while dealing DDoS. Though, IDS first point defense for protecting critical networks against ever evolving issues intrusive activities,...

10.1109/aike48582.2020.00028 article EN 2020-12-01

Network slicing plays a crucial role in supporting Fifth Generation (5G) mobile network, which is designed to efficiently accommodate diverse range of services with varying service level requirements. In this work, our efforts are largely aimed at exposing security flaws 5G network from Distributed Denial Service (DDoS) attack perspective. Time consuming authentication process during the inter-slice handover procedure exploited launch DDoS attack. To address issue, we offer novel detection...

10.1109/ccnc51644.2023.10060402 article EN 2023-01-08

Abstract: With the approbation of portable proficiency and communal media growing, information is voluntarily accessible. The spread deceptive broadcast has extensive consequences like generating prejudiced state observance inducing biased race to preserve certain aspirants. Furthermore, spammers exploit appealing news structures return income relating notifications over click baits. In this article, we recommend accomplish a parallel arrangement divergent sections accessible online with...

10.22214/ijraset.2023.53225 article EN International Journal for Research in Applied Science and Engineering Technology 2023-06-09

10.23883/ijrter.conf.20190322.081.zwbc2 article EN International Journal of Recent Trends in Engineering and Research 2019-01-01
Coming Soon ...