Shankar Karuppayah
Shankar Karuppayah
Verified email at nav6.usm.my - Homepage
TitleCited byYear
Taxonomy and survey of collaborative intrusion detection
E Vasilomanolakis, S Karuppayah, M Mühlhäuser, M Fischer
ACM Computing Surveys (CSUR) 47 (4), 55, 2015
1582015
Botnet-based distributed denial of service (DDoS) attacks on web servers: classification and art
E Alomari, S Manickam, BB Gupta, S Karuppayah, R Alfaris
arXiv preprint arXiv:1208.0403, 2012
1542012
A honeypot-driven cyber incident monitor: lessons learned and steps ahead
E Vasilomanolakis, S Karuppayah, P Kikiras, M Mühlhäuser
Proceedings of the 8th International Conference on Security of Information …, 2015
392015
On advanced monitoring in resilient and unstructured P2P botnets
S Karuppayah, M Fischer, C Rossow, M Mühlhäuser
2014 IEEE International Conference on Communications (ICC), 871-877, 2014
172014
On the resilience of P2P-based botnet graphs
S Haas, S Karuppayah, S Manickam, M Mühlhäuser, M Fischer
2016 IEEE Conference on Communications and Network Security (CNS), 225-233, 2016
132016
This network is infected: HosTaGe-a low-interaction honeypot for mobile devices
E Vasilomanolakis, S Karuppayah, M Fischer, M Mühlhäuser, ...
Proceedings of the Third ACM workshop on Security and privacy in smartphones …, 2013
132013
Hide and seek: detecting sensors in P2P botnets
L Böck, S Karuppayah, T Grube, M Mühlhäuser, M Fischer
2015 IEEE Conference on Communications and Network Security (CNS), 731-732, 2015
112015
Zeus Milker: Circumventing the P2P Zeus Neighbor List Restriction Mechanism
S Karuppayah, S Roos, C Rossow, M Mühlhäuser, M Fischer
2015 IEEE 35th International Conference on Distributed Computing Systems …, 2015
112015
Hostage: a mobile honeypot for collaborative defense
E Vasilomanolakis, S Karuppayah, M Mühlhäuser, M Fischer
Proceedings of the 7th International Conference on Security of Information …, 2014
92014
BoobyTrap: On autonomously detecting and characterizing crawlers in P2P botnets
S Karuppayah, E Vasilomanolakis, S Haas, M Mühlhäuser, M Fischer
2016 IEEE International Conference on Communications (ICC), 1-7, 2016
82016
Sensorbuster: On identifying sensor nodes in p2p botnets
S Karuppayah, L Böck, T Grube, S Manickam, M Mühlhäuser, M Fischer
Proceedings of the 12th International Conference on Availability …, 2017
52017
Next generation p2p botnets: Monitoring under adverse conditions
L Böck, E Vasilomanolakis, M Mühlhäuser, S Karuppayah
International Symposium on Research in Attacks, Intrusions, and Defenses …, 2018
42018
I trust my zombies: a trust-enabled botnet
E Vasilomanolakis, JH Wolf, L Böck, S Karuppayah, M Mühlhäuser
arXiv preprint arXiv:1712.03713, 2017
32017
A review on features' robustness in high diversity mobile traffic classifications
Y Aun, S Manickam, S Karuppayah
International journal of communication networks and information security 9 …, 2017
32017
A review on the role of blockchain technology in the healthcare domain
HD Zubaydi, YW Chong, K Ko, SM Hanshi, S Karuppayah
Electronics 8 (6), 679, 2019
22019
Advanced monitoring in P2P botnets
S Karuppayah
Technische Universität Darmstadt, 2016
22016
Lightweight Secure Router Discovery Mechanism To Overcome DOS Attack In IPv6 Network
NC Arjuman, S Manickam, S Karuppayah
International Journal of Computing and Digital Systems 8 (02), 179-187, 2019
12019
Detection Techniques for DDoS Attacks in Cloud Environment
ST Alanazi, M Anbar, S Karuppayah, AK Al-Ani, YK Sanjalawe
Intelligent and Interactive Computing, 337-354, 2019
12019
A temporal-aware signature extraction method using sliding-window mechanism for scalable, cost-effective and accurate traffic classification
Y Aun, S Manickam, S Karuppayah
2017 7th IEEE International Conference on Control System, Computing and …, 2017
12017
Review of Security Issues in IPv6 Router Discovery
N Arjuman, S Manickam, S Karuppayah, SU Rehman
Conference: 4th International Conference on Mathematical Sciences and …, 2017
12017
The system can't perform the operation now. Try again later.
Articles 1–20