Follow
Bose Sundan
Bose Sundan
Professor, Dept. of CSE, Anna Univesity, Chennai -25, India
Verified email at cs.annauniv.edu
Title
Cited by
Cited by
Year
A novel intrusion detection system based on trust evaluation to defend against DDoS attack in MANET
M Poongodi, S Bose
Arabian Journal for Science and Engineering 40, 3583-3594, 2015
1602015
Detection and Prevention system towards the truth of convergence on decision using Aumann agreement theorem
M Poongodi, S Bose
Procedia Computer Science 50, 244-251, 2015
1292015
Design of Intrusion Detection and Prevention System (IDPS) using DGSOTFC in collaborative protection networks
M Poongodi, S Bose
2013 Fifth International Conference on Advanced Computing (ICoAC), 172-178, 2013
1272013
A firegroup mechanism to provide intrusion detection and prevention system against DDoS attack in collaborative clustered networks
M Poongodi, S Bose
International Journal of Information Security and Privacy (IJISP) 8 (2), 1-18, 2014
1242014
Stochastic model: reCAPTCHA controller based co-variance matrix analysis on frequency distribution using trust evaluation and re-eval by Aumann agreement theorem against DDoS …
M Poongodi, S Bose
Cluster Computing 18, 1549-1559, 2015
1212015
The effective intrusion detection system using optimal feature selection algorithm
M Poongodi, S Bose, N Ganeshkumar
International Journal of Enterprise Network Management 6 (4), 263-274, 2015
1202015
The COLLID based intrusion detection system for detection against DDOS attacks using trust evaluation
M Poongodi, S Bose
Adv. Nat. Appl. Sci 9 (6), 574-580, 2015
1152015
Chinese remainder theorem based centralised group key management for secure multicast communication
P Vijayakumar, S Bose, A Kannan
IET information Security 8 (3), 179-187, 2014
1022014
Centralized Key Distribution Protocol using the Greatest Common Divisor Method
P. Vijayakumar, S. Bose, A. Kannan
Computers & Mathematics with Applications 65 (9), 1360-1368, 2013
702013
An intrusion detection system for sdn using machine learning
G Logeswari, S Bose, T Anitha
Intelligent Automation & Soft Computing 35 (1), 867-880, 2023
652023
Multi-layer integrated anomaly intrusion detection system for mobile adhoc networks
S Bose, S Bharathimurugan, A Kannan
2007 International Conference on Signal Processing, Communications and …, 2007
592007
The combined approach for anomaly detection using neural networks and clustering techniques
AS Aneetha, S Bose
Computer Science & Engineering 2 (4), 37, 2012
442012
Detecting denial of service attacks using cross layer based intrusion detection system in wireless ad hoc networks
S Bose, A Kannan
2008 International Conference on Signal Processing, Communications and …, 2008
412008
A Dynamic Intrusion Detection System Based on Multivariate Hotelling’s T2 Statistics Approach for Network Environments
A Avalappampatty Sivasamy, B Sundan
The Scientific World Journal 2015 (1), 850153, 2015
362015
Hybrid network intrusion detection system using expert rule based approach
AS Aneetha, TS Indhu, S Bose
Proceedings of the Second International Conference on Computational Science …, 2012
312012
Impact of gray hole attack on adhoc networks
G Usha, S Bose
2013 International Conference on Information Communication and Embedded …, 2013
292013
Computation and communication efficient key distribution protocol for secure multicast communication
P Vijayakumar, S Bose, A Kannan, L Jegatha Deborah
KSII Transactions on Internet and Information Systems (TIIS) 7 (4), 878-894, 2013
282013
Rotation based secure multicast key management for batch rekeying operations
P Vijayakumar, S Bose, A Kannan
Networking Science 1, 39-47, 2012
282012
Adaptive multipath multimedia streaming architecture for mobile networks with proactive buffering using mobile proxies
A Kannan, S Bose
Journal of computing and information technology 15 (3), 215-226, 2007
282007
Hybrid defense mechanism against malicious packet dropping attack for MANET using game theory
S Vijayalakshmi, S Bose, G Logeswari, T Anitha
Cyber security and applications 1, 100011, 2023
272023
The system can't perform the operation now. Try again later.
Articles 1–20