default search action
Shankar Karuppayah
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j17]Nadia Alfriehat, Mohammed Anbar, Mohammad Adnan Aladaileh, Iznan Husainy Hasbullah, Tamarah A. Shurbaji, Shankar Karuppayah, Ammar Almomani:
RPL-based attack detection approaches in IoT networks: review and taxonomy. Artif. Intell. Rev. 57(9): 248 (2024) - [j16]Arkan Hammoodi Hasan Kabla, Achmad Husni Thamrin, Mohammed Anbar, Selvakumar Manickam, Shankar Karuppayah:
Peer-to-peer botnets: exploring behavioural characteristics and machine/deep learning-based detection. EURASIP J. Inf. Secur. 2024(1): 20 (2024) - 2023
- [j15]Irfan Ali Kandhro, Sultan Munadi Alanazi, Fayyaz Ali, Asadullah Kehar, Kanwal Fatima, Mueen Uddin, Shankar Karuppayah:
Detection of Real-Time Malicious Intrusions and Attacks in IoT Empowered Cybersecurity Infrastructures. IEEE Access 11: 9136-9148 (2023) - [j14]Sham-ul-Arfeen Laghari, Selvakumar Manickam, Ayman Khallel Ibrahim Al-Ani, Mahmood A. Al-Shareeda, Shankar Karuppayah:
ES-SECS/GEM: An Efficient Security Mechanism for SECS/GEM Communications. IEEE Access 11: 31813-31828 (2023) - [j13]Ahmed J. Hintaw, Selvakumar Manickam, Shankar Karuppayah, Mohammad Adnan Aladaileh, Mohammed Faiz Aboalmaaly, Sham-ul-Arfeen Laghari:
A Robust Security Scheme Based on Enhanced Symmetric Algorithm for MQTT in the Internet of Things. IEEE Access 11: 43019-43040 (2023) - [j12]Aidmar Wainakh, Ephraim Zimmer, Sandeep Subedi, Jens Keim, Tim Grube, Shankar Karuppayah, Alejandro Sánchez Guinea, Max Mühlhäuser:
Federated Learning Attacks Revisited: A Critical Discussion of Gaps, Assumptions, and Evaluation Setups. Sensors 23(1): 31 (2023) - [c17]Richard August See, Maximilian Gehring, Mathias Fischer, Shankar Karuppayah:
Binary Sight-Seeing: Accelerating Reverse Engineering via Point-of-Interest-Beacons. ACSAC 2023: 594-608 - [i4]Leon Böck, Valentin Sundermann, Isabella Fusari, Shankar Karuppayah, Max Mühlhäuser, Dave Levin:
The End of the Canonical IoT Botnet: A Measurement Study of Mirai's Descendants. CoRR abs/2309.01130 (2023) - 2022
- [j11]Arkan Hammoodi Hasan Kabla, Mohammed Anbar, Selvakumar Manickam, Taief Alaa Alamiedy, Peterson Bernabe Cruspe, Ahmed K. Al-Ani, Shankar Karuppayah:
Applicability of Intrusion Detection System on Ethereum Attacks: A Comprehensive Review. IEEE Access 10: 71632-71655 (2022) - [j10]Arkan Hammoodi Hasan Kabla, Mohammed Anbar, Selvakumar Manickam, Shankar Karuppayah:
Eth-PSD: A Machine Learning-Based Phishing Scam Detection Approach in Ethereum. IEEE Access 10: 118043-118057 (2022) - [j9]Leon Böck, Martin Fejrskov, Katerina Demetzou, Shankar Karuppayah, Max Mühlhäuser, Emmanouil Vasilomanolakis:
Processing of botnet tracking data under the GDPR. Comput. Law Secur. Rev. 45: 105652 (2022) - [j8]Arkan Hammoodi Hasan Kabla, Achmad Husni Thamrin, Mohammed Anbar, Selvakumar Manickam, Shankar Karuppayah:
PeerAmbush: Multi-Layer Perceptron to Detect Peer-to-Peer Botnet. Symmetry 14(12): 2483 (2022) - 2021
- [j7]Abdijalil Abdullahi, Selvakumar Manickam, Shankar Karuppayah:
A Review of Scalability Issues in Software-Defined Exchange Point (SDX) Approaches: State-of-the-Art. IEEE Access 9: 74499-74509 (2021) - [j6]Ayman Ghaben, Mohammed Anbar, Iznan Husainy Hasbullah, Shankar Karuppayah:
Mathematical Approach as Qualitative Metrics of Distributed Denial of Service Attack Detection Mechanisms. IEEE Access 9: 123012-123028 (2021) - [j5]Sham-ul-Arfeen Laghari, Selvakumar Manickam, Ayman Khallel Ibrahim Al-Ani, Shafiq Ul Rehman, Shankar Karuppayah:
SECS/GEMsec: A Mechanism for Detection and Prevention of Cyber-Attacks on SECS/GEM Communications in Industry 4.0 Landscape. IEEE Access 9: 154380-154394 (2021) - [c16]Navaneethan C. Arjuman, Selvakumar Manickam, Shankar Karuppayah:
An Improved Secure Router Discovery Mechanism to Prevent Fake RA Attack in Link Local IPv6 Network. ACeS 2021: 248-276 - [c15]Alwan Abdullah, Shams-ul-Arfeen Laghari, Ashish Jaisan, Shankar Karuppayah:
OSINT Explorer: A Tool Recommender Framework for OSINT Sources. ACeS 2021: 389-400 - [c14]Noor Al-Mi'ani, Mohammed Anbar, Yousef K. Sanjalawe, Shankar Karuppayah:
Securing Software Defined Networking Using Intrusion Detection System - A Review. ACeS 2021: 417-446 - [i3]August See, Maximilian Gehring, Max Mühlhäuser, Mathias Fischer, Shankar Karuppayah:
Malware Sight-Seeing: Accelerating Reverse-Engineering via Point-of-Interest-Beacons. CoRR abs/2109.04065 (2021) - 2020
- [j4]Sultan Alanazi, Mohammed Anbar, Shouki A. Ebad, Shankar Karuppayah, Hadeer A. Al-Ani:
Theory-Based Model and Prediction Analysis of Information Security Compliance Behavior in the Saudi Healthcare Sector. Symmetry 12(9): 1544 (2020)
2010 – 2019
- 2019
- [j3]Ahmed J. Hintaw, Selvakumar Manickam, Shankar Karuppayah, Mohammed Faiz Aboalmaaly:
A Brief Review on MQTT's Security Issues within the Internet of Things (IoT). J. Commun. 14(6): 463-469 (2019) - [c13]Leon Böck, Shankar Karuppayah, Kory Fong, Max Mühlhäuser, Emmanouil Vasilomanolakis:
Poster: Challenges of Accurately Measuring Churn in P2P Botnets. CCS 2019: 2661-2663 - 2018
- [b2]Shankar Karuppayah:
Advanced Monitoring in P2P Botnets - A Dual Perspective. Springer 2018, ISBN 978-981-10-9049-3, pp. 1-105 - [c12]Leon Böck, Emmanouil Vasilomanolakis, Max Mühlhäuser, Shankar Karuppayah:
Next Generation P2P Botnets: Monitoring Under Adverse Conditions. RAID 2018: 511-531 - 2017
- [j2]Aun Yichiet, Selvakumar Manickam, Shankar Karuppayah:
A Review on Features' Robustness in High Diversity Mobile Traffic Classifications. Int. J. Commun. Networks Inf. Secur. 9(2) (2017) - [c11]Shankar Karuppayah, Leon Böck, Tim Grube, Selvakumar Manickam, Max Mühlhäuser, Mathias Fischer:
SensorBuster: On Identifying Sensor Nodes in P2P Botnets. ARES 2017: 34:1-34:6 - [c10]Aun Yichiet, Selvakumar Manickam, Shankar Karuppayah:
A temporal-aware signature extraction method using sliding-window mechanism for scalable, cost-effective and accurate traffic classification. ICCSCE 2017: 156-161 - [i2]Emmanouil Vasilomanolakis, Jan Helge Wolf, Leon Böck, Shankar Karuppayah, Max Mühlhäuser:
I Trust my Zombies: A Trust-enabled Botnet. CoRR abs/1712.03713 (2017) - 2016
- [b1]Shankar Karuppayah:
Advanced monitoring in P2P botnets. Darmstadt University of Technology, Germany, 2016, pp. 1-147 - [c9]Steffen Haas, Shankar Karuppayah, Selvakumar Manickam, Max Mühlhäuser, Mathias Fischer:
On the resilience of P2P-based botnet graphs. CNS 2016: 225-233 - [c8]Shankar Karuppayah, Emmanouil Vasilomanolakis, Steffen Haas, Max Mühlhäuser, Mathias Fischer:
BoobyTrap: On autonomously detecting and characterizing crawlers in P2P botnets. ICC 2016: 1-7 - 2015
- [j1]Emmanouil Vasilomanolakis, Shankar Karuppayah, Max Mühlhäuser, Mathias Fischer:
Taxonomy and Survey of Collaborative Intrusion Detection. ACM Comput. Surv. 47(4): 55:1-55:33 (2015) - [c7]Leon Bock, Shankar Karuppayah, Tim Grube, Max Mühlhäuser, Mathias Fischer:
Hide and seek: Detecting sensors in P2P botnets. CNS 2015: 731-732 - [c6]Shankar Karuppayah, Stefanie Roos, Christian Rossow, Max Mühlhäuser, Mathias Fischer:
Zeus Milker: Circumventing the P2P Zeus Neighbor List Restriction Mechanism. ICDCS 2015: 619-629 - [c5]Emmanouil Vasilomanolakis, Shankar Karuppayah, Panayotis Kikiras, Max Mühlhäuser:
A honeypot-driven cyber incident monitor: lessons learned and steps ahead. SIN 2015: 158-164 - 2014
- [c4]Shankar Karuppayah, Mathias Fischer, Christian Rossow, Max Mühlhäuser:
On advanced monitoring in resilient and unstructured P2P botnets. ICC 2014: 871-877 - [c3]Emmanouil Vasilomanolakis, Shankar Karuppayah, Max Mühlhäuser, Mathias Fischer:
HosTaGe: a Mobile Honeypot for Collaborative Defense. SIN 2014: 330 - 2013
- [c2]Emmanouil Vasilomanolakis, Shankar Karuppayah, Mathias Fischer, Max Mühlhäuser, Mihai Plasoianu, Lars Pandikow, Wulf Pfeiffer:
This network is infected: HosTaGe - a low-interaction honeypot for mobile devices. SPSM@CCS 2013: 43-48 - 2012
- [i1]Esraa Alomari, Selvakumar Manickam, Brij B. Gupta, Shankar Karuppayah, Rafeef Alfaris:
Botnet-based Distributed Denial of Service (DDoS) Attacks on Web Servers: Classification and Art. CoRR abs/1208.0403 (2012) - 2011
- [c1]Shankar Karuppayah:
CAD+ : Detecting Colluding Nodes in Gray Hole Attacks. Informatiktage 2011: 279-282
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-19 21:39 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint