default search action
Geethapriya Thamilarasu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2020
- [j6]Geethapriya Thamilarasu, Adedayo Odesile, Andrew Hoang:
An Intrusion Detection System for Internet of Medical Things. IEEE Access 8: 181560-181576 (2020) - 2019
- [j5]Geethapriya Thamilarasu, Shiven Chawla:
Towards Deep-Learning-Driven Intrusion Detection for the Internet of Things. Sensors 19(9): 1977 (2019) - 2018
- [j4]Michael Lenning, Joseph Fortunato, Tai Le, Isaac Clark, Ang Sherpa, Soyeon Yi, Peter Hofsteen, Geethapriya Thamilarasu, Jingchun Yang, Xiaolei Xu, Huy-Dung Han, Tzung K. Hsiai, Hung Cao:
Real-Time Monitoring and Analysis of Zebrafish Electrocardiogram with Anomaly Detection. Sensors 18(1): 61 (2018) - 2016
- [j3]Geethapriya Thamilarasu:
iDetect: an intelligent intrusion detection system for wireless body area networks. Int. J. Secur. Networks 11(1/2): 82-93 (2016) - 2012
- [j2]Geethapriya Thamilarasu, Ramalingam Sridhar:
A cross-layer game for energy-efficient jamming detection in ad hoc networks. Secur. Commun. Networks 5(4): 364-373 (2012) - 2011
- [j1]Geethapriya Thamilarasu, Sumita Mishra, Ramalingam Sridhar:
Improving Reliability of Jamming Attack Detection in Ad hoc Networks. Int. J. Commun. Networks Inf. Secur. 3(1) (2011)
Conference and Workshop Papers
- 2024
- [c15]Benjamin Birchman, Geethapriya Thamilarasu:
Securing Federated Learning: Enhancing Defense Mechanisms against Poisoning Attacks. ICCCN 2024: 1-6 - 2023
- [c14]Arun Sarma, Geethapriya Thamilarasu:
Inferring Sensitive User Information Through Biosignals Using Deep Learning. ICCCN 2023: 1-2 - 2020
- [c13]Erin Beckwith, Geethapriya Thamilarasu:
BA-TLS: Blockchain Authentication for Transport Layer Security in Internet of Things. IoTSMS 2020: 1-8 - 2019
- [c12]Medha Srivastava, Geethapriya Thamilarasu:
MSF: A Comprehensive Security Framework for mHealth Applications. FiCloud Workshops 2019: 70-75 - 2017
- [c11]Adedayo Odesile, Geethapriya Thamilarasu:
Distributed intrusion detection using mobile agents in wireless body area networks. EST 2017: 144-149 - [c10]Geethapriya Thamilarasu, Christopher Lakin:
A Security Framework for Mobile Health Applications. FiCloud Workshops 2017: 221-226 - [c9]Sida Gao, Geethapriya Thamilarasu:
Machine-Learning Classifiers for Security in Connected Medical Devices. ICCCN 2017: 1-5 - 2015
- [c8]Geethapriya Thamilarasu:
Genetic algorithm based intrusion detection system for wireless body area networks. ISCC 2015: 160-165 - [c7]Geethapriya Thamilarasu, Zhiyuan Ma:
Autonomous mobile agent based intrusion detection framework in wireless body area networks. WOWMOM 2015: 1-3 - 2009
- [c6]Geethapriya Thamilarasu, Ramalingam Sridhar:
XLSEC - A Distributed Cross-Layer Framework for Security in Wireless Sensor Networks. CCNC 2009: 1-2 - [c5]Sudha Krishnamurthy, Geethapriya Thamilarasu, Christian Bauckhage:
MALADY: A Machine Learning-Based Autonomous Decision-Making System for Sensor Networks. CSE (2) 2009: 93-100 - [c4]Geethapriya Thamilarasu, Ramalingam Sridhar:
Game Theoretic Modeling of Jamming Attacks in Ad hoc Networks. ICCCN 2009: 1-6 - 2007
- [c3]Geethapriya Thamilarasu, Ramalingam Sridhar:
Toward Building a Multi-level Robust Intrusion Detection Architecture for Distributed Mobile Networks. ICDCS Workshops 2007: 5 - [c2]Vidya Bharrgavi Balasubramanyn, Geethapriya Thamilarasu, Ramalingam Sridhar:
Security Solution For Data Integrity InWireless BioSensor Networks. ICDCS Workshops 2007: 79 - 2005
- [c1]Geethapriya Thamilarasu, Aruna Balasubramanian, Sumita Mishra, Ramalingam Sridhar:
A cross-layer based intrusion detection approach for wireless ad hoc networks. MASS 2005
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-12 03:25 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint