default search action
Sureswaran Ramadass
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j6]M. E. Abdelhafez, Sureswaran Ramadass, Mustafa Abdelwahab:
TLS Guard for TLS 1.3 zero round-trip time (0-RTT) in a distributed environment. J. King Saud Univ. Comput. Inf. Sci. 35(10): 101797 (2023)
2010 – 2019
- 2014
- [j5]Sazid Zaman Khan, Thilek Silvadorai, Chen-Wei Tan, Sureswaran Ramadass, Toni Anwar:
Context Aware Handover Algorithms for Mobile Positioning Systems. Comput. Sci. 15(2): 133-158 (2014) - [j4]Shubair Abdulla, Sureswaran Ramadass, Altyeb Altaher Altyeb, Amer Al-Nassiri:
Employing machine learning algorithms to detect unknown scanning and email worms. Int. Arab J. Inf. Technol. 11(2): 140-148 (2014) - [j3]Shubair Abdulla, Sureswaran Ramadass, Altyeb Altaher Altyeb:
kENFIS: kNN-based evolving neuro-fuzzy inference system for computer worms detection. J. Intell. Fuzzy Syst. 26(4): 1893-1908 (2014) - [j2]Salah Noori Saleh, Maryam Feily, Sureswaran Ramadass, Alireza Shahrestani:
Semi-Fluid content distribution model for fast data dissemination in heterogeneous overlay networks. Peer-to-Peer Netw. Appl. 7(2): 159-174 (2014) - 2013
- [j1]Karim Al-Saedi, Selvakumar Manickam, Sureswaran Ramadass, Wafaa A. H. Al-Salihy, Ammar Almomani:
Research Proposal: an Intrusion Detection System Alert Reduction and Assessment Framework based on Data Mining. J. Comput. Sci. 9(4): 421-426 (2013) - [c24]Nibras Abdullah, Mahmoud Baklizi, Sureswaran Ramadas, Ola Ahmed Al-wesabi:
Multi-constrained routing using genetic algorithm. RFID-TA 2013: 1-4 - [c23]Ammar Waysi AlTuhafi, Sureswaran Ramadass, Yung-Wey Chong:
Concepts and types of peer-to-peer network topology for live video streaming. RFID-TA 2013: 1-4 - [c22]Ali Abdulrazzaq Khudher, Leau Yu Beng, Sureswaran Ramadass:
A comparative study of direct and indirect static peering for inter-domain sip calls. RFID-TA 2013: 1-5 - [c21]Supriyanto, Raja Kumar Murugesan, Azlan Osman, Sureswaran Ramadass:
Security mechanism for IPv6 router discovery based on distributed trust management. RFID-TA 2013: 1-6 - [i5]Azruddin Ahmad, Gobithasan Rudrusamy, Rahmat Budiarto, Azman Samsudin, Sureswaran Ramadass:
A Hybrid Rule Based Fuzzy-Neural Expert System For Passive Network Monitoring. CoRR abs/1304.7843 (2013) - [i4]Gobithasan Rudrusamy, Azrudin Ahmad, Rahmat Budiarto, Azman Samsudin, Sureswaran Ramadass:
Fuzzy Based Diagnostics System for Identifying Network Traffic Flow Anomalies. CoRR abs/1304.7864 (2013) - 2012
- [c20]Doris Hooi-Ten Wong, Sureswaran Ramadass:
Generating adaptive network data visualization to different levels of users. CCIS 2012: 771-775 - [c19]Maryam Feily, Salah Noori Saleh, Sureswaran Ramadass:
A hybrid Content Distribution Model for fast data dissemination in overlay networks. CCNC 2012: 702-704 - [c18]Mohammod Sazid Zaman Khan, Chen-Wei Tan, Thilek Silvadorai, Sureswaran Ramadass:
Novel algorithms to ensure smooth and unobtrusive handover among positioning systems. CAMP 2012: 229-234 - 2011
- [c17]Altyeb Altaher Altyeb, Sureswaran Ramadass, Ammar Ali:
A dual stack IPv4/IPv6 testbed for malware detection in IPv6 networks. ICCSCE 2011: 168-170 - [c16]Ahmad Naebi, Farhoud Hoseinpour, Moharam Habibnejad Korayem, Sureswaran Ramadass, Andrew Meulenberg:
Simulation of routing in nano-manipulation for creating pattern with atomic force microscopy using hybrid PSO-AS. SpringSim (ANSS) 2011: 213-219 - [c15]Ahmad Naebi, Moharam Habibnejad Korayem, Farhoud Hoseinpour, Sureswaran Ramadass, Mojtaba Hoseinzadeh:
Simulation of Routing in Nano-Manipulation for Creating Pattern with Atomic Force Microscopy Using Hybrid GA and PSO-AS Algorithms. ICSI (1) 2011: 606-615 - 2010
- [c14]Raja Kumar Murugesan, Sureswaran Ramadass:
A plausible approach for further decentralization of IPv6 address distribution. AINTEC 2010: 1-8 - [c13]Doris Hooi-Ten Wong, Kok-Soon Chai, Sureswaran Ramadass, Nicolas Vavasseur:
Expert-Aware Approach: A New Approach to Improve Network Security Visualization Tool. CICSyN 2010: 227-231 - [c12]Raja Kumar Murugesan, Sureswaran Ramadass:
A Hybrid Address Allocation Algorithm for IPv6. CNSA 2010: 509-517 - [c11]Mohammed Fadhil Zamil, Ahmed M. Manasrah, Omar Amir, Sureswaran Ramadass:
A behavior based algorithm to detect Spam bots. CTS 2010: 453-462 - [c10]Homam El-Taj, Omar Abouabdalla, Ahmed M. Manasrah, Ahmed Al-Madi, Muhammad Imran Sarwar, Sureswaran Ramadass:
Forthcoming Aggregating Intrusion Detection System Alerts Framework. SECURWARE 2010: 40-44 - [c9]Alireza Shahrestani, Maryam Feily, Rodina Binti Ahmad, Sureswaran Ramadass:
Discovery of Invariant Bot Behavior through Visual Network Monitoring System. SECURWARE 2010: 182-188 - [c8]Doris Hooi-Ten Wong, Sureswaran Ramadass:
Case Study: Visualization Methodology for Analysing Network Data. UKSim 2010: 482-484 - [i3]Ghassan Samara, Sureswaran Ramadas, Wafaa A. H. Al-Salihy:
Design of Simple and Efficient Revocation List Distribution in Urban areas for VANET's. CoRR abs/1006.5113 (2010) - [i2]Ghassan Samara, Sureswaran Ramadas, Wafaa A. H. Al-Salihy:
Safety Message Power Transmission Control for Vehicular Ad hoc Networks. CoRR abs/1007.3058 (2010)
2000 – 2009
- 2009
- [c7]Doris Hooi-Ten Wong, Selvakumar Manickam, Sureswaran Ramadass, Hussein A. Al Bazar:
Study on Advanced Visualization Tools In Network Monitoring Platform. EMS 2009: 445-449 - [c6]Maryam Feily, Alireza Shahrestani, Sureswaran Ramadass:
A Survey of Botnet and Botnet Detection. SECURWARE 2009: 268-273 - [i1]Ahmed M. Manasrah, Awsan Hasan, Omar Amer Abouabdalla, Sureswaran Ramadass:
Detecting Botnet Activities Based on Abnormal DNS traffic. CoRR abs/0911.0487 (2009) - 2008
- [c5]Muhammad Fermi Pasha, Rahmat Budiarto, Sureswaran Ramadass, Mohammad Syukur:
A Sequential Hierarchical Superset Implementation of Neocortex Memory System and its Case Study of Automated Network Forensic Analysis. IC-AI 2008: 490-495 - 2006
- [c4]Hean-Loong Ong, Tat Chee Wan, Hean-Kuan Ong, Sureswaran Ramadass:
Node Density Effects on Reactive Routing Protocols for Mobile Ad Hoc Wireless Networks. AINTEC 2006: 206-221 - 2003
- [c3]Balan Sinniah, Gopinath Rao Sinniah, Sureswaran Ramadass:
Socket Level Implementation of MCS Conferencing System in IPv6. ICOIN 2003: 460-472 - [c2]Sureswaran Ramadass, Rahmat Budiarto, V. Siva:
Satellite Bandwidth Requirements for an MCS Based Multimedia Conference. SAINT Workshops 2003: 56-59
1990 – 1999
- 1994
- [c1]Sureswaran Ramadass, Siti Aishah Hamdan:
Distributed Databases using Novell Netware. Applied Informatics 1994: 273-275
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:12 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint