Back close
Publications
Implementing an NFT by Developing a Smart Contract in OpenSea Marketplace

Citation : Udhayakumar Shanmugam, Kotte Mohan Krisha, Silviya Nancy John Mari Vienni, D. Uma Nandhini, Implemen ...

Publisher :Springer Nature Switzerland

Publications
Software Composition Analysis for Proactive Threat Detection in Software Dependencies with Real-Time Security Monitoring

Citation : Chinni Krishna Kowsik P, Uday Reddy H, Udhayakumar S, Saranya G, Software Composition Analysis for P ...

Publisher :IEEE

Publications
PatchOps: An Automated Vulnerability Detection and Patch Management System for Windows Environments

Citation : Kiruthik Pranav P V, Harishkar B, S Udhaya Kumar, K Geetha, PatchOps: An Automated Vulnerability Det ...

Publisher :IEEE

Publications
Enhanced Malware Detection: Leveraging Volatility Analysis and Machine Learning Synergy

Citation : Panchadarla Shiva Poojitha, Podile Sruthi, Udhayakumar Shanmugam, K. Deepak, Enhanced Malware Detect ...

Publisher :Springer Nature Switzerland

Publications
The Many Faces of Masculinity: Wolves, Sheep and the Path to True Manhood in The Kite Runner

Citation : Ng Miew Luan, Megala Rajendran, Jeyalakshmi Subramanian, Ashraf Tajmeeh, Tan Tiam Lai, Prakash A, Ke ...

Publisher :Sciedu Press

Publications
Exploratory Data Analysis of Phishing URL Detection Using Gradient Boosting Classifier

Citation : Varun Kishore Srinivasan, Nirmal Shanmugam, Udhayakumar Shanmugam, K. Deepak, Exploratory Data Analy ...

Publisher :Springer Nature Switzerland

Publications
Reimagining Disability as Knowledge: Empowerment and Identity in Selected Speculative Fiction

Citation : Keerthana R., Prakash A., Jeyalakshmi Subramanian, Ramesh S., Reimagining Disability as Knowledge: E ...

Publisher :Academy Publication

Publications
A Comprehensive Framework for Advanced API Security and Real-Time Monitoring

Citation : Terli Sai Krishna, Thanusree Pyatlo, S Udhaya Kumar, A Comprehensive Framework for Advanced API Secu ...

Publisher :IEEE

Publications
Exploiting Bluetooth Low Energy Vulnerabilities in Smartwatches Through UUID Manipulation

Citation : Dharshini Sri S U, Mohanraj Venkatesan, Udhaya Kumar S, Exploiting Bluetooth Low Energy Vulnerabilit ...

Publisher :IEEE

Publications
Enhancing Smart Contract Security: A Comprehensive Vulnerability Assessment Framework

Citation : Aditya Shewale, Dhanyasree Thallapalli, S. Udhayakumar, Enhancing Smart Contract Security: A Compreh ...

Publisher :IEEE

Publications
A review on EEG-based multimodal learning for emotion recognition

Citation : Rajasekhar Pillalamarri, Udhayakumar Shanmugam, A review on EEG-based multimodal learning for emotio ...

Publisher :Springer Science and Business Media LLC

Publications
A novel hybrid grid index structure combined R-tree for improving the query response time in location aware spatial data over B-tree

Citation : Charan Teja Reddy Voddu, S. Udhayakumar, A novel hybrid grid index structure combined R-tree for imp ...

Publisher :AIP Publishing

Admissions Apply Now