Follow
Shankar Karuppayah
Shankar Karuppayah
Deputy Director and Senior Lecturer at Universiti Sains Malaysia
Verified email at usm.my - Homepage
Title
Cited by
Cited by
Year
Taxonomy and survey of collaborative intrusion detection
E Vasilomanolakis, S Karuppayah, M Mühlhäuser, M Fischer
ACM computing surveys (CSUR) 47 (4), 1-33, 2015
3772015
Botnet-based distributed denial of service (DDoS) attacks on web servers: classification and art
E Alomari, S Manickam, BB Gupta, S Karuppayah, R Alfaris
arXiv preprint arXiv:1208.0403, 2012
2762012
A review on the role of blockchain technology in the healthcare domain
HD Zubaydi, YW Chong, K Ko, SM Hanshi, S Karuppayah
Electronics 8 (6), 679, 2019
1042019
A honeypot-driven cyber incident monitor: lessons learned and steps ahead
E Vasilomanolakis, S Karuppayah, P Kikiras, M Mühlhäuser
Proceedings of the 8th International Conference on Security of Information …, 2015
862015
MQTT vulnerabilities, attack vectors and solutions in the internet of things (IoT)
AJ Hintaw, S Manickam, MF Aboalmaaly, S Karuppayah
IETE Journal of Research 69 (6), 3368-3397, 2023
382023
Fake news on social media: Brief review on detection techniques
ZI Mahid, S Manickam, S Karuppayah
2018 Fourth international conference on advances in computing, communication …, 2018
382018
On advanced monitoring in resilient and unstructured P2P botnets
S Karuppayah, M Fischer, C Rossow, M Mühlhäuser
2014 IEEE International Conference on Communications (ICC), 871-877, 2014
342014
Hostage: a mobile honeypot for collaborative defense
E Vasilomanolakis, S Karuppayah, M Mühlhäuser, M Fischer
Proceedings of the 7th International Conference on Security of Information …, 2014
282014
On the resilience of P2P-based botnet graphs
S Haas, S Karuppayah, S Manickam, M Mühlhäuser, M Fischer
2016 IEEE Conference on Communications and Network Security (CNS), 225-233, 2016
262016
Zeus milker: circumventing the p2p zeus neighbor list restriction mechanism
S Karuppayah, S Roos, C Rossow, M Mühlhäuser, M Fischer
2015 IEEE 35th International Conference on Distributed Computing Systems …, 2015
242015
This network is infected: Hostage-a low-interaction honeypot for mobile devices
E Vasilomanolakis, S Karuppayah, M Fischer, M Mühlhäuser, ...
Proceedings of the Third ACM workshop on Security and privacy in smartphones …, 2013
242013
Theory-based model and prediction analysis of information security compliance behavior in the Saudi healthcare sector
S T. Alanazi, M Anbar, S A. Ebad, S Karuppayah, HA Al-Ani
Symmetry 12 (9), 1544, 2020
222020
Next generation p2p botnets: Monitoring under adverse conditions
L Böck, E Vasilomanolakis, M Mühlhäuser, S Karuppayah
Research in Attacks, Intrusions, and Defenses: 21st International Symposium …, 2018
202018
BoobyTrap: On autonomously detecting and characterizing crawlers in P2P botnets
S Karuppayah, E Vasilomanolakis, S Haas, M Mühlhäuser, M Fischer
2016 IEEE International Conference on Communications (ICC), 1-7, 2016
202016
Detection of real-time malicious intrusions and attacks in IoT empowered cybersecurity infrastructures
IA Kandhro, SM Alanazi, F Ali, A Kehar, K Fatima, M Uddin, S Karuppayah
IEEE Access 11, 9136-9148, 2023
192023
A review on SECS/GEM: A machine-to-machine (M2M) communication protocol for industry 4.0
SA Laghari, S Manickam, S Karuppayah
International Journal of Electrical and Electronic Engineering …, 2021
192021
A Brief Review on MQTT's Security Issues within the Internet of Things (IoT).
AJ Hintaw, S Manickam, S Karuppayah, MF Aboalmaaly
J. Commun. 14 (6), 463-469, 2019
182019
Applicability of intrusion detection system on Ethereum attacks: a comprehensive review
AHH Kabla, M Anbar, S Manickam, TA Al-Amiedy, PB Cruspe, AK Al-Ani, ...
IEEE Access 10, 71632-71655, 2022
172022
Advanced Monitoring in P2P Botnets: A Dual Perspective
S Karuppayah
Springer, 2018
172018
Sensorbuster: On identifying sensor nodes in p2p botnets
S Karuppayah, L Böck, T Grube, S Manickam, M Mühlhäuser, M Fischer
Proceedings of the 12th International Conference on Availability …, 2017
172017
The system can't perform the operation now. Try again later.
Articles 1–20