References
- H. Thakkar and R. Lal, “An Analysis of Elliptic Curve Cryptography Secret Keys For Use In Cloud Workload Balancing And Security Provisioning,” 2023 International Conference on Applied Intelligence and Sustainable Computing (ICAISC), Dharwad, India, 2023, pp. 1–7
- R. R. Dornala, S. Ponnapalli, A. R. Lakshmi and K. T. Sai, “An Advanced Cloud Security and Load Balancing in Health Care Systems,” 2023 International Conference on Self Sustainable Artificial Intelligence Systems (ICSSAS), Erode, India, 2023, pp. 1–6
- M. A. Shibli, N. Ahmad, A. Kanwal and A. Ghafoor, “Secure virtual machine migration (SV2M) in cloud federation,” 2014 11th International Conference on Security and Cryptography (SECRYPT), Vienna, Austria, 2014
- S. Barjatiya and P. Saripalli, “BlueShield: A Layer 2 Appliance for Enhanced Isolation and Security Hardening among Multi-tenant Cloud Workloads,” 2012 IEEE Fifth International Conference on Utility and Cloud Computing, Chicago, IL, USA, 2012, pp. 195–198
- Sibi Chakkaravarthy Sethuraman, Devi Priya VS, Tarun Reddi, Mulka Sai Tharun Reddy, Muhammad Khurram Khan, “A Comprehensive Examination of Email Spoofing: Issues and Prospects for Email Security”, Computers & Security, Elsevier, vol. 135, 103490, 2023
- L. Wang, H. V. Ramasamy, R. Mahindru and R. Harper, “Activating Protection and Exercising Recovery Against Large-Scale Outages on the Cloud,” 2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshop (DSN-W), Toulouse, France, 2016, pp. 264–264
- S. Gopikrishnan, Sibi Chakkaravarthy Sethuraman, Gautam Srivastava, T Sudhakar, “CyTFS: Cyber-Twin Fog System for Delay Efficient Task Offloading in 6G Mobile Networks”, IEEE Internet of Things Journal, vol. 11, no. 14, pp. 24698–24714, 2024
- C. P. Smith, A. Jindal, M. Chadha, M. Gerndt and S. Benedict, “FaDO: FaaS Functions and Data Orchestrator for Multiple Serverless Edge-Cloud Clusters,” 2022 IEEE 6th International Conference on Fog and Edge Computing (ICFEC), Messina, Italy, 2022, pp. 17–25
- Aravinth T.M, Sibi Chakkaravarthy Sethuraman, Devi Priya VS, “mCaptcha: Replacing Captchas with Rate limiters to Improve Security and Accessibility”, Communications of the ACM, Volume 67, Issue 10, pp. 70 – 80, 2024
- C. Gritti, M. Önen and R. Molva, “CHARIOT: Cloud-Assisted Access Control for the Internet of Things,” 2018 16th Annual Conference on Privacy, Security and Trust (PST), Belfast, Ireland, 2018, pp. 1–6
- Sibi Chakkaravarthy Sethuraman, Devi Priya, Saraju P Mohanty, “Flow based containerized honeypot approach for network traffic analysis: An empirical study”, Computer Science Review, Elsevier, vol. 50, 100600, 2023
- G. Kornaros, D. Bakoyiannis, O. Tomoutzoglou and M. Coppola, “From Cloud to IoT Device Authenticity under Kubernetes Management,” 2024 11th International Conference on Internet of Things: Systems, Management and Security (IOTSMS), Malmö, Sweden, 2024, pp. 218–223
- Devi Priya, Sibi Chakkaravarthy Sethuraman, Muhammad Khurram Khan, “Container Security: Precaution levels, Mitigation Strategies, and Research Perspectives”, Computers & Security, Elsevier, vol. 135, 103490, 2023
- K. Gai, M. Qiu and S. A. Elnagdy, “Security-Aware Information Classifications Using Supervised Learning for Cloud-Based Cyber Risk Management in Financial Big Data,” 2016 IEEE 2nd International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing (HPSC), and IEEE International Conference on Intelligent Data and Security (IDS), New York, NY, USA, 2016, pp. 197–202
- Devi Priya VS, Sibi Chakkaravarthy Sethuraman, “Containerized cloud-based honeypot deception for tracking attackers”, Scientific Reports, Nature, Vol. 13, Issue.1, 1437
- S. Berger et al., “Security intelligence for cloud management infrastructures,” in IBM Journal of Research and Development, vol. 60, no. 4, pp. 11:1–11:13, July–Aug. 2016
- M. Gopinath, Sibi Chakkaravarthy Sethuraman, “A comprehensive survey on deep learning-based malware detection techniques”, Computer Science Review, Vol. 47, 100529, Elsevier, February 2023
- B. D. Deebak and F. Al-Turjman, “Smart Mutual Authentication Protocol for Cloud Based Medical Healthcare Systems Using Internet of Medical Things,” in IEEE Journal on Selected Areas in Communications, vol. 39, no. 2, pp. 346–360, Feb. 2021
- Sibi Chakkaravarthy Sethuraman, Aditya Mitra, Kuan-Ching Li, Anisha Ghosh, M Gopinath, Nitin Sukhija, “Loki: A Physical Security Key Compatible IoT Based Lock for Protecting Physical Assets”, IEEE Access, Vol.10, 112721–112730, IEEE
- Q. Wang, Q. Wang, H. Zhu and X. Wang, “Enabling Collaborative Computing Sustainably Through Computational Latency-Based Pricing,” in IEEE Transactions on Sustainable Computing, vol. 5, no. 4, pp. 541–551, 1 Oct.–Dec. 2020
- Dedipyaman Das, Sibi Chakkaravarthy Sethuraman, Suresh Chandra Satapathy, “A Decentralized Open Web Cryptographic Standard”, Computers and Electrical Engineering, Elsevier, Volume 99, 107751, April, 2022
- S. Liu, L. Liu, J. Tang, B. Yu, Y. Wang and W. Shi, “Edge Computing for Autonomous Driving: Opportunities and Challenges,” in Proceedings of the IEEE, vol. 107, no. 8, pp. 1697–1716, Aug. 2019
- Pranav Kompally, Sibi Chakkaravarthy Sethuraman, Steven Walczak, Samuel Johnson, Meenaloshini Vimal Cruz, “MaLang: Decentralized Deep Learning Approach to Detect Abusive Textual Content”, Applied Sciences: Computing and Artificial Intelligence, 11, 8701, 2021
- M. Kucab, P. Boryło and P. Chołda, “Hardware-Assisted Static and Runtime Attestation for Cloud Deployments,” in IEEE Transactions on Cloud Computing, vol. 11, no. 4, pp. 3750–3765, Oct.–Dec. 2023
- Y. Cho, Y. Kim, K. Kim, J. Kim, H. -Y. Kim and Y. Kim, “Optimizing Multi-Level Checkpointing for Distributed Deep Learning Workloads on Cloud Spot VM Clusters,” in IEEE Access, vol. 12, pp. 116891–116904, 2024