The SCEAS System
Navigation Menu

Search the dblp DataBase


Vallipuram Muthukkumarasamy: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Steve Green, Michael Blumenstein, Vallipuram Muthukkumarasamy, Jun Jo
    Investigation of a Classification-based Technique to Detect Illicit Objects for Aviation Security. [Citation Graph (0, 0)][DBLP]
    Artificial Intelligence and Applications, 2005, pp:825-830 [Conf]
  2. Elankayer Sithirasenan, Saad Zafar, Vallipuram Muthukkumarasamy
    Formal Verification of the IEEE 802.11i WLAN Security Protocol. [Citation Graph (0, 0)][DBLP]
    ASWEC, 2006, pp:181-190 [Conf]
  3. Steve Glass, Vallipuram Muthukkumarasamy
    802.11 DCF Denial of Service Vulnerabilities. [Citation Graph (0, 0)][DBLP]
    Australian Computer, Network & Information Forensics Conference, 2005, pp:8-14 [Conf]
  4. Kyung Seob Moon, Vallipuram Muthukkumarasamy, Anne Thuy-Anh Nguyen
    Efficiently Maintaining Consistency Using Tree-Based P2P Network System in Distributed Network Games. [Citation Graph (0, 0)][DBLP]
    Edutainment, 2006, pp:648-657 [Conf]
  5. Stephane Armand, Michael Blumenstein, Vallipuram Muthukkumarasamy
    Off-line Signature Verification based on the Modified Direction Feature. [Citation Graph (0, 0)][DBLP]
    ICPR (4), 2006, pp:509-512 [Conf]
  6. Michael Blumenstein, Steve Green, Ann Nguyen, Vallipuram Muthukkumarasamy
    GAME: A Generic Automated Marking Environment for Programming Assessment. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:212-0 [Conf]
  7. Elankayer Sithirasenan, Vallipuram Muthukkumarasamy
    A model for object-based distributed processing using behaviour trees. [Citation Graph (0, 0)][DBLP]
    IASTED Conf. on Software Engineering and Applications, 2004, pp:477-482 [Conf]

  8. Trust Management Scheme for Mobile Ad-Hoc Networks. [Citation Graph (, )][DBLP]

  9. Detecting Man-in-the-Middle and Wormhole Attacks in Wireless Mesh Networks. [Citation Graph (, )][DBLP]

  10. Trust Formalization in Mobile Ad-Hoc Networks. [Citation Graph (, )][DBLP]

  11. Off-line Signature Verification Using Enhanced Modified Direction Features in Conjunction with Neural Classifiers and Support Vector Machines. [Citation Graph (, )][DBLP]

  12. Off-line Signature Verification using the Enhanced Modified Direction Feature and Neural-based Classification. [Citation Graph (, )][DBLP]

  13. An experimental analysis of GAME: a generic automated marking environment. [Citation Graph (, )][DBLP]

  14. A software-defined radio receiver for APCO project 25 signals. [Citation Graph (, )][DBLP]

  15. Substantiating Security Threats Using Group Outlier Detection Techniques. [Citation Graph (, )][DBLP]

  16. A Study of the TKIP Cryptographic DoS Attack. [Citation Graph (, )][DBLP]

  17. Detecting Security Threats in Wireless LANs Using Timing and Behavioral Anomalies. [Citation Graph (, )][DBLP]

  18. Enhancing Trust on e-Government: A Decision Fusion Module. [Citation Graph (, )][DBLP]

  19. Implementation and Analysis of Sensor Security Protocols in a Home Health Care System. [Citation Graph (, )][DBLP]

Search in 0.002secs, Finished in 0.003secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002