Back close
Publications
Malware Analysis for Proactive Defence on Cyber Threat Vulnerabilities

Citation : Gowtham Pushkar Bhatraju, Udhayakumar Shanmugam, B Indira, Uma Nandhini D, Malware Analysis for Proa ...

Publisher :IEEE

Publications
An Adaptive Threat Defence Mechanism Through Self Defending Network to Prevent Hijacking in WiFi Network

Citation : Datta Sai Manikanta Narayana, Sai Bharadwaj Nookala, Shraddha Chopra, Udhayakumar Shanmugam, An Adap ...

Publisher :IEEE

Publications
Prevention Strategy to Detect Reverse Shell using Security Onion in Hoax Shell

Citation : Perla Sai Nikhil, Angela Raj Chadha, Udhayakumar Shanmugam, Prevention Strategy to Detect Reverse Sh ...

Publisher :IEEE

Publications
Explainable AI for Medical Imaging: Advancing Transparency and Trust in Diagnostic Decision-Making

Citation : Rajaraman PV, Udhayakumar Shanmugam, Explainable AI for Medical Imaging: Advancing Transparency and ...

Publisher :IEEE

Publications
Advances In EEG-Based Multimodal Emotion Recognition: A Comprehensive Review

Citation : Rajasekhar Pillalamarri, Udhayakumar Shanmugam, Advances In EEG-Based Multimodal Emotion Recognition ...

Publisher :IEEE

Publications
A Boosting-Based Machine Learning Approach for Intrusion Detection in Vehicle Address Verification Systems

Citation : Siva Gayatri Venkata Naga, Datta Sai Ammanamanchi, Angela Raj Chadha, Kethamreddy Karthikeya Reddy, ...

Publisher :IEEE

Publications
Digital Evidence Extraction and Analysis of Disk Image

Citation : Sai Pavan Rangu, Abhiram Patel U, Tata Seetha Rama Sai Vamshi Krishna, Udhayakumar S, Digital Eviden ...

Publisher :IEEE

Publications
Discernment and Enumeration of Security Vulnerabilities Present in Docker Images

Citation : Dr. UdhayaKumar S, Discernment and Enumeration of Security Vulnerabilities Present in Docker Images, ...

Publisher :Elsevier B.V.

Publications
Deep Learning-Based Optical Character Recognition for Robust Real-World Conditions: A Comparative Analysis

Citation : Aniket Mishra, Jayanta Sikdar, S Udhaya Kumar, Deep Learning-Based Optical Character Recognition for ...

Publisher :IEEE

Publications
Forensic Analysis and Detection of Illicit Transactions in Bitcoin Network

Citation : Fiyan Mehfil Ayoob, Melvina Jose, S Udhaya Kumar, Forensic Analysis and Detection of Illicit Transac ...

Publisher :IEEE

Publications
Zero Trust Security for Web Applications in Microservice-Based Environments

Citation : Jayaraj Viswanathan, Dinesh Kumar. N, S. Udhaya Kumar, Zero Trust Security for Web Applications in M ...

Publisher :IEEE

Publications
Amazon Web Services Cloud Compliance Automation with Open Policy Agent

Citation : Alen Paul, Rishi Manoj, Udhayakumar S, Amazon Web Services Cloud Compliance Automation with Open Pol ...

Publisher :IEEE

Admissions Apply Now