Skip to main content

Showing 1–16 of 16 results for author: Nagamalai, D

Searching in archive cs. Search in all archives.
.
  1. Lattice Structural Analysis on Sniffing to Denial of Service Attacks

    Authors: B. Prabadevi, N. Jeyanthi, Nur Izura Udzir, Dhinaharan Nagamalai

    Abstract: Sniffing is one of the most prominent causes for most of the attacks in the digitized computing environment. Through various packet analyzers or sniffers available free of cost, the network packets can be captured and analyzed. The sensitive information of the victim like user credentials, passwords, a PIN which is of more considerable interest to the assailants can be stolen through sniffers. Thi… ▽ More

    Submitted 29 July, 2019; originally announced July 2019.

    Comments: 19 Pages, 8 Figures

    Journal ref: International Journal of Computer Networks & Communications (IJCNC) Vol.11, No.4, July 2019

  2. Neural Network based classification of bone metastasis by primary cacinoma

    Authors: Marija Prokopijević, Aleksandar Stančić, Jelena Vasiljević, Željko Stojković, Goran Dimić, Jelena Sopta, Dalibor Ristić, Dhinaharan Nagamalai

    Abstract: Neural networks have been known for a long time as a tool for different types of classification, but only just in the last decade they have showed their entire power. Along with appearing of hardware that is capable to support demanding matrix operations and parallel algorithms, the neural network, as a universal function approximation framework, turns out to be the most successful classification… ▽ More

    Submitted 8 October, 2018; originally announced October 2018.

    Comments: 13 pages, 9 figures

    Journal ref: Computer Science & Information Technology (CS & IT), 7th International Conference on Information Technology Convergence and Services (ITCSE 2018), Vienna, Austria, May 26~27, 2018

  3. Medical Images Analysis in Cancer Diagnostic

    Authors: Jelena Vasiljević, Ivica Milosavljević, Vladimir Krstić, Nataša Zivić, Lazar Berbakov, Luka Lopušina, Dhinaharan Nagamalai, Milutin Cerović

    Abstract: This paper shows results of computer analysis of images in the purpose of finding differences between medical images in order of their classifications in terms of separation malign tissue from a normal and benign tissue. The diagnostics of malign tissue is of the crucial importance in medicine. Therefore, ascertainment of the correlation between multifractals parameters and "chaotic" cells could b… ▽ More

    Submitted 4 October, 2018; originally announced October 2018.

    Comments: 11 pages, 6 figures, 11th International Conference on Security and its Applications (CNSA 2018), Zurich, Switzerland,

    Journal ref: Computer Science & Information Technology (CS & IT), 2018

  4. Effective Personalized Web Mining by Utilizing The Most Utilized Data

    Authors: L. K. Joshila Grace, V. Maheswari, Dhinaharan Nagamalai

    Abstract: Looking into the growth of information in the web it is a very tedious process of getting the exact information the user is looking for. Many search engines generate user profile related data listing. This paper involves one such process where the rating is given to the link that the user is clicking on. Rather than avoiding the uninterested links both interested links and the uninterested links a… ▽ More

    Submitted 9 September, 2011; originally announced September 2011.

    Comments: 9 pages, journal paper

    Journal ref: International Journal of Database Management Systems ( IJDMS ), Vol.3, No.3, August 2011

  5. arXiv:1109.1989  [pdf

    cs.IR

    Efficient Personalized Web Mining: Utilizing The Most Utilized Data

    Authors: L. K. Joshila Grace, V. Maheswari, Dhinaharan Nagamalai

    Abstract: Looking into the growth of information in the web it is a very tedious process of getting the exact information the user is looking for. Many search engines generate user profile related data listing. This paper involves one such process where the rating is given to the link that the user is clicking on. Rather than avoiding the uninterested links both interested links and the uninterested links a… ▽ More

    Submitted 9 September, 2011; originally announced September 2011.

    Comments: conference paper

  6. arXiv:1108.1593  [pdf

    cs.CR

    Multilayer Approach to Defend Phishing Attacks

    Authors: Cynthia Dhinakaran, Dhinaharan Nagamalai, Jae Kwang Lee

    Abstract: Spam messes up users inbox, consumes resources and spread attacks like DDoS, MiM, phishing etc. Phishing is a byproduct of email and causes financial loss to users and loss of reputation to financial institutions. In this paper we examine the characteristics of phishing and technology used by Phishers. In order to counter anti-phishing technology, phishers change their mode of operation; therefore… ▽ More

    Submitted 7 August, 2011; originally announced August 2011.

    Comments: 8 Pages, Journal of Internet Technology (JIT) 2010

  7. arXiv:1101.5668  [pdf

    cs.DB

    Analysis of Web Logs and Web User in Web Mining

    Authors: L. K. Joshila Grace, V. Maheswari, Dhinaharan Nagamalai

    Abstract: Log files contain information about User Name, IP Address, Time Stamp, Access Request, number of Bytes Transferred, Result Status, URL that Referred and User Agent. The log files are maintained by the web servers. By analysing these log files gives a neat idea about the user. This paper gives a detailed discussion about these log files, their formats, their creation, access procedures, their uses,… ▽ More

    Submitted 29 January, 2011; originally announced January 2011.

    Comments: 12 pages,6 figures,CCSIT 2011

    Journal ref: International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.1, January 2011

  8. arXiv:1012.1665  [pdf

    cs.CR cs.NI

    An In-depth Analysis of Spam and Spammers

    Authors: Dhinaharan Nagamalai, Beatrice Cynthia Dhinakaran, Jae Kwang Lee

    Abstract: Electronic mail services have become an important source of communication for millions of people all over the world. Due to this tremendous growth, there has been a significant increase in spam traffic. Spam messes up user's inbox, consumes network resources and spread worms and viruses. In this paper we study the characteristics of spam and the technology used by spammers. In order to counter ant… ▽ More

    Submitted 7 December, 2010; originally announced December 2010.

    Comments: 14 pages, 8 Figures,5 tables, IJSA Vol 2, No 2, 2008

    Journal ref: International Journal of Security and its Applications,Vol. 2, No. 2, April, 2008

  9. arXiv:1012.0610  [pdf

    cs.CR cs.NI

    Novel Mechanism to Defend DDoS Attacks Caused by Spam

    Authors: Dhinaharan Nagamalai, Cynthia Dhinakaran, Jae-Kwang Lee

    Abstract: Corporate mail services are designed to perform better than public mail services. Fast mail delivery, large size file transfer as an attachments, high level spam and virus protection, commercial advertisement free environment are some of the advantages worth to mention. But these mail services are frequent target of hackers and spammers. Distributed Denial of service attacks are becoming more comm… ▽ More

    Submitted 2 December, 2010; originally announced December 2010.

    Comments: 14 Pages, 6 Figures, IJSA Vol 1, No 2,July 2007

    Journal ref: IJSA Vol 1, No 2,July 2007

  10. Bayesian Based Comment Spam Defending Tool

    Authors: Dhinaharan Nagamalai, Beatrice Cynthia Dhinakaran, Jae Kwang Lee

    Abstract: Spam messes up user's inbox, consumes network resources and spread worms and viruses. Spam is flooding of unsolicited, unwanted e mail. Spam in blogs is called blog spam or comment spam.It is done by posting comments or flooding spams to the services such as blogs, forums,news,email archives and guestbooks. Blog spams generally appears on guestbooks or comment pages where spammers fill a comment b… ▽ More

    Submitted 14 November, 2010; originally announced November 2010.

    Comments: 14 Pages,4 Figures, International Journal of Network Security & Its Applications (IJNSA), Vol.2, No.4, October 2010

  11. Characterizing Spam traffic and Spammers

    Authors: Cynthia Dhinakaran, Dhinaharan Nagamalai, Jae Kwang Lee

    Abstract: There is a tremendous increase in spam traffic these days. Spam messages muddle up users inbox, consume network resources, and build up DDoS attacks, spread worms and viruses. Our goal is to present a definite figure about the characteristics of spam and spammers. Since spammers change their mode of operation to counter anti spam technology,continues evaluation of the characteristics of spam and s… ▽ More

    Submitted 3 November, 2010; originally announced November 2010.

    Comments: 6 pages, 4 Figures, ICCIT 2007, IEEE CS

  12. An Empirical Study of Spam and Spam Vulnerable email Accounts

    Authors: Cynthia Dhinakaran, Dhinaharan Nagamalai, Jae Kwang Lee

    Abstract: Spam messages muddle up users inbox, consume network resources, and build up DDoS attacks, spread malware. Our goal is to present a definite figure about the characteristics of spam and spam vulnerable email accounts. These evaluations help us to enhance the existing technology to combat spam effectively. We collected 400 thousand spam mails from a spam trap set up in a corporate mail server for a… ▽ More

    Submitted 2 November, 2010; originally announced November 2010.

    Comments: 6 pages, 5 Figures, FGCN 2007, IEEE CS

  13. "Reminder: please update your details": Phishing Trends

    Authors: Cynthia Dhinakaran, Jae Kwang lee, Dhinaharan Nagamalai

    Abstract: Spam messes up users inbox, consumes resources and spread attacks like DDoS, MiM, Phishing etc., Phishing is a byproduct of email and causes financial loss to users and loss of reputation to financial institutions. In this paper we study the characteristics of phishing and technology used by phishers. In order to counter anti phishing technology, phishers change their mode of operation; therefore… ▽ More

    Submitted 13 October, 2010; originally announced October 2010.

    Comments: 6 pages, 6 Figures, NETCOM 2009, IEEE CS

  14. Multi Layer Approach to Defend DDoS Attacks Caused by Spam

    Authors: Dhinaharan Nagamalai, Cynthia Dhinakaran, Jae Kwang Lee

    Abstract: Corporate mail services are designed to perform better than public mail services. Fast mail delivery, large size file transfer as an attachments, high level spam and virus protection, commercial advertisement free environment are some of the advantages worth to mention. But these mail services are frequent target of hackers and spammers. Distributed Denial of service attacks are becoming more comm… ▽ More

    Submitted 7 October, 2010; originally announced October 2010.

    Comments: 6 pages,5 figures,MUE 2007, IEEE CS

    Journal ref: MUE 2007, IEEE CS

  15. Design & Deploy Web 2.0 enable services over Next Generation Network Platform

    Authors: Kamaljit I. Lakhtaria, Dhinaharan Nagamalai

    Abstract: The Next Generation Networks (NGN) aims to integrate for IP-based telecom infrastructures and provide most advance & high speed emerging value added services. NGN capable to provide higher innovative services, these services will able to integrate communication and Web service into a single platform. IP Multimedia Subsystem, a NGN leading technology, enables a variety of NGN-compliant communicat… ▽ More

    Submitted 6 September, 2010; originally announced September 2010.

    Journal ref: International Journal of Database Management Systems (IJDMS) Vol.2, No.3, August 2010

  16. arXiv:1009.1121  [pdf

    cs.NI

    Analyzing Web 2.0 Integration with Next Generation Networks for Services Rendering

    Authors: Kamaljit I. Lakhtaria, Dhinaharan Nagamalai

    Abstract: The Next Generation Networks (NGN) aims to integrate for IP-based telecom infrastructures and provide most advance & high speed emerging value added services. NGN capable to provide higher innovative services, these services will able to integrate communication and Web service into a single platform. IP Multimedia Subsystem, a NGN leading technology, enables a variety of NGN-compliant communicat… ▽ More

    Submitted 6 September, 2010; originally announced September 2010.

    Report number: International Conferences, NeCoM 2010, India, July 23-25, 2010, ISBN: 978-3-642-14492-9