Phishing email detection based on structural properties M Chandrasekaran, K Narayanan, S Upadhyaya NYS cyber security conference 3, 2-8, 2006 | 307 | 2006 |
Quantifying trust in mobile ad-hoc networks M Virendra, M Jadliwala, M Chandrasekaran, S Upadhyaya International Conference on Integration of Knowledge Intensive Multi-Agent …, 2005 | 159 | 2005 |
Phoney: Mimicking user response to detect phishing attacks M Chandrasekaran, R Chinchani, S Upadhyaya 2006 International Symposium on a World of Wireless, Mobile and Multimedia …, 2006 | 112 | 2006 |
Racoon: rapidly generating user command data for anomaly detection from customizable template R Chinchani, A Muthukrishnan, M Chandrasekaran, S Upadhyaya 20th Annual Computer Security Applications Conference, 189-202, 2004 | 44 | 2004 |
Spycon: Emulating user activities to detect evasive spyware M Chandrasekaran, S Vidyaraman, S Upadhyaya 2007 IEEE International Performance, Computing, and Communications …, 2007 | 40 | 2007 |
Position: The user is the enemy S Vidyaraman, M Chandrasekaran, S Upadhyaya Proceedings of the 2007 Workshop on New Security Paradigms, 75-80, 2008 | 33 | 2008 |
Towards modeling trust based decisions: a game theoretic approach V Sankaranarayanan, M Chandrasekaran, S Upadhyaya Computer Security–ESORICS 2007: 12th European Symposium On Research In …, 2007 | 28 | 2007 |
Towards phishing e-mail detection based on their structural properties M Chandrasekaran, K Karayanan, S Upadhyaya New York State Cyber Security Conference, 2006 | 20 | 2006 |
CUSP: customizable and usable spam filters for detecting phishing emails M Chandrasekaran, V Sankaranarayanan, S Upadhyaya Proceeding 3r Annual Symposium on Information Assurance (ASIA’08), Albany …, 2008 | 18 | 2008 |
Design of TAREEN (trust aware routing with energy efficient network) and enactment of TARF: A trust-aware routing framework for wireless sensor networks M Udhayavani, M Chandrasekaran Cluster Computing 22 (Suppl 5), 11919-11927, 2019 | 15 | 2019 |
Dynamic programming inspired virtual machine instances allocation in cloud computing P Karthikeyan, M Chandrasekaran Journal of Computational and Theoretical Nanoscience 14 (1), 551-560, 2017 | 14 | 2017 |
AVARE: aggregated vulnerability assessment and response against zero-day exploits M Chandrasekaran, M Baig, S Upadhyaya 2006 IEEE International Performance Computing and Communications Conference …, 2006 | 11 | 2006 |
Post varicella angiopathy. CJ Selvakumar, C Justin, TR Gnaneswaran, M Chandrasekaran The Journal of the Association of Physicians of India 58, 572-574, 2010 | 10 | 2010 |
Framework to forecast environment changes by optimized predictive modelling based on rough set and Elman neural network S Selvi, M Chandrasekaran Soft Computing 24 (14), 10467-10480, 2020 | 9 | 2020 |
An intelligent agent based talent evaluation system, using a knowledge base R Lakshmipathi, M Chandrasekaran, V Mohanraj, J Senthilkumar, ... international journal of information technology and knowledge management 2 …, 2010 | 9 | 2010 |
Retinal blood vessels extraction and detection of exudates using wavelet transform and pnn approach for the assessment of diabetic retinopathy C Nivetha, S Sumathi, M Chandrasekaran 2017 International Conference on Communication and Signal Processing (ICCSP …, 2017 | 8 | 2017 |
Power quality conditioners for railway traction—A review N Gunavardhini, M Chandrasekaran automatika 57 (1), 150-162, 2016 | 8 | 2016 |
Multimachine stability analysis using meta-heuristic PSO algorithm for HGTG and SGTG systems R Shivakumar, R Lakshmipathi, M Chandrasekaran International Journal of Modelling, Identification and Control 15 (1), 55-68, 2012 | 8 | 2012 |
Distance based dual path ad hoc on demand distance vector routing protocol for mobile ad hoc networks PEI Dorathy, M Chandrasekaran 2017 4th International Conference on Advanced Computing and Communication …, 2017 | 7 | 2017 |
Time situate recurrence estimation technique for efficient data collection in war field sensor network A Sangeetha, M Chandrasekaran, G Kavithaa Microprocessors and Microsystems 73, 102988, 2020 | 6 | 2020 |