Please note: This is a beta version of the new dblp website.
You can find the classic dblp view of this page here.
You can find the classic dblp view of this page here.
Dhinaharan Nagamalai
2010 – today
- 2013
[e4]Natarajan Meghanathan, Dhinaharan Nagamalai, Nabendu Chaki (Eds.): Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology (ACITY) July 13-15, 2012, Chennai, India - Volume 2. Advances in Intelligent Systems and Computing 177, Springer 2013, ISBN 978-3-642-31551-0
[e3]Natarajan Meghanathan, Dhinaharan Nagamalai, Nabendu Chaki (Eds.): Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology (ACITY) July 13-15, 2012, Chennai, India - Volume 3. Advances in Intelligent Systems and Computing 178, Springer 2013, ISBN 978-3-642-31599-2- 2012
[c12]Ozcan Abdulkadir, Dhinaharan Nagamalai: Efficiency Improvement of a-Si: H/μc-Si: H Tandem Solar Cells by Adding a-SiOx: H Layer between Ag Nano Particles and the Active Layer. ACITY (2) 2012: 289-297
[c11]L. K. Joshila Grace, V. Maheswari, Dhinaharan Nagamalai: Personalised High Quality Search with in a Web Site: No User Profiling. ACITY (1) 2012: 307-316
[e2]Natarajan Meghanathan, Dhinaharan Nagamalai, Nabendu Chaki (Eds.): Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology (ACITY) July 13-15, 2012, Chennai, India - Volume 1. Advances in Intelligent Systems and Computing 176, Springer 2012, ISBN 978-3-642-31512-1- 2011
[i13]L. K. Joshila Grace, V. Maheswari, Dhinaharan Nagamalai: Analysis of Web Logs and Web User in Web Mining. CoRR abs/1101.5668 (2011)
[i12]Beatrice Cynthia Dhinakaran, Dhinaharan Nagamalai, Jae-Kwang Lee: Multilayer Approach to Defend Phishing Attacks. CoRR abs/1108.1593 (2011)
[i11]L. K. Joshila Grace, V. Maheswari, Dhinaharan Nagamalai: Efficient Personalized Web Mining: Utilizing The Most Utilized Data. CoRR abs/1109.1989 (2011)
[i10]L. K. Joshila Grace, V. Maheswari, Dhinaharan Nagamalai: Effective Personalized Web Mining by Utilizing The Most Utilized Data. CoRR abs/1109.1991 (2011)- 2010
[e1]Natarajan Meghanathan, Selma Boumerdassi, Nabendu Chaki, Dhinaharan Nagamalai (Eds.): Recent Trends in Network Security and Applications - Third International Conference, CNSA 2010, Chennai, India, July 23-25, 2010. Proceedings. Communications in Computer and Information Science 89, Springer 2010, ISBN 978-3-642-14477-6
[i9]Kamaljit I. Lakhtaria, Dhinaharan Nagamalai: Analyzing Web 2.0 Integration with Next Generation Networks for Services Rendering. CoRR abs/1009.1121 (2010)
[i8]Kamaljit I. Lakhtaria, Dhinaharan Nagamalai: Design & Deploy Web 2.0 enable services over Next Generation Network Platform. CoRR abs/1009.1122 (2010)
[i7]Dhinaharan Nagamalai, Beatrice Cynthia Dhinakaran, Jae-Kwang Lee: Multi Layer Approach to Defend DDoS Attacks Caused by Spam. CoRR abs/1010.1583 (2010)
[i6]Beatrice Cynthia Dhinakaran, Jae-Kwang Lee, Dhinaharan Nagamalai: "Reminder: please update your details": Phishing Trends. CoRR abs/1010.2802 (2010)
[i5]Beatrice Cynthia Dhinakaran, Dhinaharan Nagamalai, Jae-Kwang Lee: An Empirical Study of Spam and Spam Vulnerable email Accounts. CoRR abs/1011.0792 (2010)
[i4]Beatrice Cynthia Dhinakaran, Dhinaharan Nagamalai, Jae-Kwang Lee: Characterizing Spam traffic and Spammers. CoRR abs/1011.1050 (2010)
[i3]Dhinaharan Nagamalai, Beatrice Cynthia Dhinakaran, Jae-Kwang Lee: Bayesian Based Comment Spam Defending Tool. CoRR abs/1011.3279 (2010)
[i2]Dhinaharan Nagamalai, Beatrice Cynthia Dhinakaran, Jae-Kwang Lee: Novel Mechanism to Defend DDoS Attacks Caused by Spam. CoRR abs/1012.0610 (2010)
[i1]Dhinaharan Nagamalai, Beatrice Cynthia Dhinakaran, Jae-Kwang Lee: An In-depth Analysis of Spam and Spammers. CoRR abs/1012.1665 (2010)
2000 – 2009
- 2009
[j1]
[c10]Asish K. Mukhopadhyay, Sajal Saha, Suranjan Ghose, Debasish Saha, Dhinaharan Nagamalai: An Analytical Model of Multi-service Call Admission Control in Next Generation Wireless Overlay Networks. NetCoM 2009: 98-103
[c9]Beatrice Cynthia Dhinakaran, Jae-Kwang Lee, Dhinaharan Nagamalai: "Reminder: please update your details": Phishing Trends. NetCoM 2009: 295-300
[c8]Sajal Saha, Subhasree Bhattacharjee, Rajib Nath Bhowmick, Asish K. Mukhopadhyay, Dhinaharan Nagamalai: Analysis of Hierarchical Mobile IP Based Fast Mobility Management Schemes. NetCoM 2009: 338-343
[c7]Beatrice Cynthia Dhinakaran, Dhinaharan Nagamalai, Jae-Kwang Lee: Bayesian Approach Based Comment Spam Defending Tool. ISA 2009: 578-587- 2007
[c6]Dhinaharan Nagamalai, Beatrice Cynthia Dhinakaran, Jae-Kwang Lee: Multi Layer Approach to Defend DDoS Attacks Caused by Spam. MUE 2007: 97-102- 2005
[c5]Dhinaharan Nagamalai, Beatrice Cynthia Dhinakaran, P. Sasikala, Seoung-Hyeon Lee, Jae-Kwang Lee: Security Threats and Countermeasures in WLAN. AINTEC 2005: 168-182
[c4]Dhinaharan Nagamalai, Beatrice Cynthia Dhinakaran, Byoung-Sun Choi, Jae-Kwang Lee: V-TCP: A Novel TCP Enhancement Technique. ICN (2) 2005: 125-132
[c3]Dhinaharan Nagamalai, Seoung-Hyeon Lee, Won Goo Lee, Jae-Kwang Lee: SCTP over High Speed Wide Area Networks. ICN (1) 2005: 628-634
[c2]Dhinaharan Nagamalai, Dong-ho Kang, Ki-Young Moon, Jae-Kwang Lee: V-TCP: A Novel TCP Enhancement Technique for Wireless Mobile Environments. ICOIN 2005: 122-131- 2004
[c1]Beatrice Cynthia Dhinakaran, Dhinaharan Nagamalai, Lee Sang Gap: Performance evaluation of TCP/IP in 802.11 wireless networks. Parallel and Distributed Computing and Networks 2004: 549-554
Coauthor Index
data released under the ODC-BY 1.0 license. See also our legal information page
last updated on 2013-10-02 11:22 CEST by the dblp team



