Year : 2026
A Defensive Mechanism Against Rubber Ducky Devices and Keystroke Injection Attacks
Cite this Research Publication : Subramanian R, Udhayakumar S, A Defensive Mechanism Against Rubber Ducky Devices and Keystroke Injection Attacks, 2026 IEEE International Conference on Interdisciplinary Approaches in Technology and Management for Social Innovation (IATMSI), IEEE, 2026, https://doi.org/10.1109/iatmsi68868.2026.11465244
Publisher : IEEE
Year : 2025
Implementing an NFT by Developing a Smart Contract in OpenSea Marketplace
Cite this Research Publication : Udhayakumar Shanmugam, Kotte Mohan Krisha, Silviya Nancy John Mari Vienni, D. Uma Nandhini, Implementing an NFT by Developing a Smart Contract in OpenSea Marketplace, Communications in Computer and Information Science, Springer Nature Switzerland, 2025, https://doi.org/10.1007/978-3-031-84059-3_19
Publisher : Springer Nature Switzerland
Year : 2025
Software Composition Analysis for Proactive Threat Detection in Software Dependencies with Real-Time Security Monitoring
Cite this Research Publication : Chinni Krishna Kowsik P, Uday Reddy H, Udhayakumar S, Saranya G, Software Composition Analysis for Proactive Threat Detection in Software Dependencies with Real-Time Security Monitoring, 2025 2nd International Conference on Computing and Data Science (ICCDS), IEEE, 2025, https://doi.org/10.1109/iccds64403.2025.11209681
Publisher : IEEE
Year : 2025
PatchOps: An Automated Vulnerability Detection and Patch Management System for Windows Environments
Cite this Research Publication : Kiruthik Pranav P V, Harishkar B, S Udhaya Kumar, K Geetha, PatchOps: An Automated Vulnerability Detection and Patch Management System for Windows Environments, 2025 Innovations in Power and Advanced Computing Technologies (i-PACT), IEEE, 2025, https://doi.org/10.1109/i-pact65952.2025.11308003
Publisher : IEEE
Year : 2025
Enhanced Malware Detection: Leveraging Volatility Analysis and Machine Learning Synergy
Cite this Research Publication : Panchadarla Shiva Poojitha, Podile Sruthi, Udhayakumar Shanmugam, K. Deepak, Enhanced Malware Detection: Leveraging Volatility Analysis and Machine Learning Synergy, Communications in Computer and Information Science, Springer Nature Switzerland, 2025, https://doi.org/10.1007/978-3-031-84059-3_29
Publisher : Springer Nature Switzerland
Year : 2025
Exploratory Data Analysis of Phishing URL Detection Using Gradient Boosting Classifier
Cite this Research Publication : Varun Kishore Srinivasan, Nirmal Shanmugam, Udhayakumar Shanmugam, K. Deepak, Exploratory Data Analysis of Phishing URL Detection Using Gradient Boosting Classifier, Communications in Computer and Information Science, Springer Nature Switzerland, 2025, https://doi.org/10.1007/978-3-031-84062-3_13
Publisher : Springer Nature Switzerland
Year : 2025
A Comprehensive Framework for Advanced API Security and Real-Time Monitoring
Cite this Research Publication : Terli Sai Krishna, Thanusree Pyatlo, S Udhaya Kumar, A Comprehensive Framework for Advanced API Security and Real-Time Monitoring, 2025 Innovations in Power and Advanced Computing Technologies (i-PACT), IEEE, 2025, https://doi.org/10.1109/i-pact65952.2025.11307868
Publisher : IEEE
Year : 2025
Exploiting Bluetooth Low Energy Vulnerabilities in Smartwatches Through UUID Manipulation
Cite this Research Publication : Dharshini Sri S U, Mohanraj Venkatesan, Udhaya Kumar S, Exploiting Bluetooth Low Energy Vulnerabilities in Smartwatches Through UUID Manipulation, 2025 Innovations in Power and Advanced Computing Technologies (i-PACT), IEEE, 2025, https://doi.org/10.1109/i-pact65952.2025.11307963
Publisher : IEEE
Year : 2025
Enhancing Smart Contract Security: A Comprehensive Vulnerability Assessment Framework
Cite this Research Publication : Aditya Shewale, Dhanyasree Thallapalli, S. Udhayakumar, Enhancing Smart Contract Security: A Comprehensive Vulnerability Assessment Framework, 2025 2nd International Conference on Computing and Data Science (ICCDS), IEEE, 2025, https://doi.org/10.1109/iccds64403.2025.11209716
Publisher : IEEE
Year : 2025
A novel hybrid grid index structure combined R-tree for improving the query response time in location aware spatial data over B-tree
Cite this Research Publication : Charan Teja Reddy Voddu, S. Udhayakumar, A novel hybrid grid index structure combined R-tree for improving the query response time in location aware spatial data over B-tree, AIP Conference Proceedings, AIP Publishing, 2025, https://doi.org/10.1063/5.0270571
Publisher : AIP Publishing
Year : 2024
A Boosting-Based Machine Learning Approach for Intrusion Detection in Vehicle Address Verification Systems
Cite this Research Publication : Siva Gayatri Venkata Naga, Datta Sai Ammanamanchi, Angela Raj Chadha, Kethamreddy Karthikeya Reddy, Udhaya Kumar Shanmugam, A Boosting-Based Machine Learning Approach for Intrusion Detection in Vehicle Address Verification Systems, 2024 5th International Conference on Electronics and Sustainable Communication Systems (ICESC), IEEE, 2024, https://doi.org/10.1109/icesc60852.2024.10690016
Publisher : IEEE
Year : 2024
Digital Evidence Extraction and Analysis of Disk Image
Cite this Research Publication : Sai Pavan Rangu, Abhiram Patel U, Tata Seetha Rama Sai Vamshi Krishna, Udhayakumar S, Digital Evidence Extraction and Analysis of Disk Image, 2024 International Conference on Smart Technologies for Sustainable Development Goals (ICSTSDG), IEEE, 2024, https://doi.org/10.1109/icstsdg61998.2024.11026458
Publisher : IEEE
Year : 2024
Discernment and Enumeration of Security Vulnerabilities Present in Docker Images
Cite this Research Publication : Dr. UdhayaKumar S, Discernment and Enumeration of Security Vulnerabilities Present in Docker Images, 2024
Publisher : Elsevier B.V.
Year : 2024
Deep Learning-Based Optical Character Recognition for Robust Real-World Conditions: A Comparative Analysis
Cite this Research Publication : Aniket Mishra, Jayanta Sikdar, S Udhaya Kumar, Deep Learning-Based Optical Character Recognition for Robust Real-World Conditions: A Comparative Analysis, 2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT), IEEE, 2024, https://doi.org/10.1109/icccnt61001.2024.10726007
Publisher : IEEE
Year : 2024
Forensic Analysis and Detection of Illicit Transactions in Bitcoin Network
Cite this Research Publication : Fiyan Mehfil Ayoob, Melvina Jose, S Udhaya Kumar, Forensic Analysis and Detection of Illicit Transactions in Bitcoin Network, 2024 5th International Conference on Smart Electronics and Communication (ICOSEC), IEEE, 2024, https://doi.org/10.1109/icosec61587.2024.10722590
Publisher : IEEE
Year : 2024
Zero Trust Security for Web Applications in Microservice-Based Environments
Cite this Research Publication : Jayaraj Viswanathan, Dinesh Kumar. N, S. Udhaya Kumar, Zero Trust Security for Web Applications in Microservice-Based Environments, 2024 First International Conference on Data, Computation and Communication (ICDCC), IEEE, 2024, https://doi.org/10.1109/icdcc62744.2024.10960955
Publisher : IEEE
Year : 2024
Amazon Web Services Cloud Compliance Automation with Open Policy Agent
Cite this Research Publication : Alen Paul, Rishi Manoj, Udhayakumar S, Amazon Web Services Cloud Compliance Automation with Open Policy Agent, 2024 International Conference on Expert Clouds and Applications (ICOECA), IEEE, 2024, https://doi.org/10.1109/icoeca62351.2024.00063
Publisher : IEEE
Year : 2024
TeleForensic: Delving into Digital Evidence with CDR Forensics
Cite this Research Publication : Srish N, Sridharan S, Udhaya Kumar S, TeleForensic: Delving into Digital Evidence with CDR Forensics, 2024 IEEE International Conference on Blockchain and Distributed Systems Security (ICBDS), IEEE, 2024, https://doi.org/10.1109/icbds61829.2024.10837446
Publisher : IEEE
Year : 2024
Shallow-Sec: Malware Detection in Real-Time Devices using Feature Weightage and Shallow Learning Models
Cite this Research Publication : Panaganti Priyanka, Udhayakumar, K. Deepak, Shallow-Sec: Malware Detection in Real-Time Devices using Feature Weightage and Shallow Learning Models, 2024 5th International Conference on Electronics and Sustainable Communication Systems (ICESC), IEEE, 2024, https://doi.org/10.1109/icesc60852.2024.10690023
Publisher : IEEE
Year : 2024
Identifying Multiple Faces in Newspapers Using Textual Analysis
Cite this Research Publication : Peruri Shakthi Bharath, Udhaya Kumar S, Identifying Multiple Faces in Newspapers Using Textual Analysis, 2024 International Conference on Computing and Data Science (ICCDS), IEEE, 2024, https://doi.org/10.1109/iccds60734.2024.10560408
Publisher : IEEE
Year : 2024
Blockchain-based Decentralized Digital Forensics Case Management System using IPFS
Cite this Research Publication : Jayaraj Viswanathan, S. Udhaya Kumar, Blockchain-based Decentralized Digital Forensics Case Management System using IPFS, 2024 IEEE International Conference on Blockchain and Distributed Systems Security (ICBDS), IEEE, 2024, https://doi.org/10.1109/icbds61829.2024.10837089
Publisher : IEEE
Year : 2024
An enhanced novel prediction of occurrence of cardiovascular disease by comparing decision tree over logistic regression
Cite this Research Publication : Vonteddu Vijendra Reddy, S. Udhaya Kumar, An enhanced novel prediction of occurrence of cardiovascular disease by comparing decision tree over logistic regression, AIP Conference Proceedings, AIP Publishing, 2024, https://doi.org/10.1063/5.0198487
Publisher : AIP Publishing
Year : 2024
Evaluating the driver behavior and car movement and assessment of third party insurance using novel AdaBoost classifier over SVM
Cite this Research Publication : Kongara Bhargav Naidu, S. Udhayakumar, Evaluating the driver behavior and car movement and assessment of third party insurance using novel AdaBoost classifier over SVM, AIP Conference Proceedings, AIP Publishing, 2024, https://doi.org/10.1063/5.0198483
Publisher : AIP Publishing
Year : 2023
Malware Analysis for Proactive Defence on Cyber Threat Vulnerabilities
Cite this Research Publication : Gowtham Pushkar Bhatraju, Udhayakumar Shanmugam, B Indira, Uma Nandhini D, Malware Analysis for Proactive Defence on Cyber Threat Vulnerabilities, 2023 Innovations in Power and Advanced Computing Technologies (i-PACT), IEEE, 2023, https://doi.org/10.1109/i-pact58649.2023.10434439
Publisher : IEEE
Year : 2023
An Adaptive Threat Defence Mechanism Through Self Defending Network to Prevent Hijacking in WiFi Network
Cite this Research Publication : Datta Sai Manikanta Narayana, Sai Bharadwaj Nookala, Shraddha Chopra, Udhayakumar Shanmugam, An Adaptive Threat Defence Mechanism Through Self Defending Network to Prevent Hijacking in WiFi Network, 2023 International Conference on Advances in Electronics, Communication, Computing and Intelligent Information Systems (ICAECIS), IEEE, 2023, https://doi.org/10.1109/icaecis58353.2023.10170470
Publisher : IEEE
Year : 2023
Prevention Strategy to Detect Reverse Shell using Security Onion in Hoax Shell
Cite this Research Publication : Perla Sai Nikhil, Angela Raj Chadha, Udhayakumar Shanmugam, Prevention Strategy to Detect Reverse Shell using Security Onion in Hoax Shell, 2023 Innovations in Power and Advanced Computing Technologies (i-PACT), IEEE, 2023, https://doi.org/10.1109/i-pact58649.2023.10434368
Publisher : IEEE
Year : 2023
Explainable AI for Medical Imaging: Advancing Transparency and Trust in Diagnostic Decision-Making
Cite this Research Publication : Rajaraman PV, Udhayakumar Shanmugam, Explainable AI for Medical Imaging: Advancing Transparency and Trust in Diagnostic Decision-Making, 2023 Innovations in Power and Advanced Computing Technologies (i-PACT), IEEE, 2023, https://doi.org/10.1109/i-pact58649.2023.10434658
Publisher : IEEE
Year : 2023
Advances In EEG-Based Multimodal Emotion Recognition: A Comprehensive Review
Cite this Research Publication : Rajasekhar Pillalamarri, Udhayakumar Shanmugam, Advances In EEG-Based Multimodal Emotion Recognition: A Comprehensive Review, 2023 Innovations in Power and Advanced Computing Technologies (i-PACT), IEEE, 2023, https://doi.org/10.1109/i-pact58649.2023.10434480
Publisher : IEEE