default search action
Dhinaharan Nagamalai
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2019
- [i16]B. Prabadevi, N. Jeyanthi, Nur Izura Udzir, Dhinaharan Nagamalai:
Lattice Structural Analysis on Sniffing to Denial of Service Attacks. CoRR abs/1907.12735 (2019) - 2018
- [i15]Jelena Vasiljevic, Ivica Milosavljevic, Vladimir Krstic, Natasa Zivic, Lazar Berbakov, Luka Lopusina, Dhinaharan Nagamalai, Milutin Cerovic:
Medical Images Analysis in Cancer Diagnostic. CoRR abs/1810.02495 (2018) - [i14]Marija Prokopijevic, Aleksandar Stancic, Jelena Vasiljevic, Zeljko Stojkovic, Goran Dimic, Jelena Sopta, Dalibor Ristic, Dhinaharan Nagamalai:
Neural Network based classification of bone metastasis by primary cacinoma. CoRR abs/1810.05725 (2018) - 2013
- [e6]Natarajan Meghanathan, Dhinaharan Nagamalai, Nabendu Chaki:
Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology (ACITY) July 13-15, 2012, Chennai, India - Volume 2. Advances in Intelligent Systems and Computing 177, Springer 2013, ISBN 978-3-642-31551-0 [contents] - [e5]Natarajan Meghanathan, Dhinaharan Nagamalai, Nabendu Chaki:
Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology (ACITY) July 13-15, 2012, Chennai, India - Volume 3. Advances in Intelligent Systems and Computing 178, Springer 2013, ISBN 978-3-642-31599-2 [contents] - 2012
- [c12]Ozcan Abdulkadir, Dhinaharan Nagamalai:
Efficiency Improvement of a-Si: H/μc-Si: H Tandem Solar Cells by Adding a-SiOx: H Layer between Ag Nano Particles and the Active Layer. ACITY (2) 2012: 289-297 - [c11]L. K. Joshila Grace, V. Maheswari, Dhinaharan Nagamalai:
Personalised High Quality Search with in a Web Site: No User Profiling. ACITY (1) 2012: 307-316 - [e4]Natarajan Meghanathan, Dhinaharan Nagamalai, Nabendu Chaki:
Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology (ACITY) July 13-15, 2012, Chennai, India - Volume 1. Advances in Intelligent Systems and Computing 176, Springer 2012, ISBN 978-3-642-31512-1 [contents] - 2011
- [e3]Abdulkadir Özcan, Jan Zizka, Dhinaharan Nagamalai:
Recent Trends in Wireless and Mobile Networks - Third International Conferences, WiMo 2011 and CoNeCo 2011, Ankara, Turkey, June 26-28, 2011. Proceedings. Communications in Computer and Information Science 162, Springer 2011, ISBN 978-3-642-21936-8 [contents] - [i13]L. K. Joshila Grace, V. Maheswari, Dhinaharan Nagamalai:
Analysis of Web Logs and Web User in Web Mining. CoRR abs/1101.5668 (2011) - [i12]Beatrice Cynthia Dhinakaran, Dhinaharan Nagamalai, Jae-Kwang Lee:
Multilayer Approach to Defend Phishing Attacks. CoRR abs/1108.1593 (2011) - [i11]L. K. Joshila Grace, V. Maheswari, Dhinaharan Nagamalai:
Efficient Personalized Web Mining: Utilizing The Most Utilized Data. CoRR abs/1109.1989 (2011) - [i10]L. K. Joshila Grace, V. Maheswari, Dhinaharan Nagamalai:
Effective Personalized Web Mining by Utilizing The Most Utilized Data. CoRR abs/1109.1991 (2011) - 2010
- [e2]Natarajan Meghanathan, Selma Boumerdassi, Nabendu Chaki, Dhinaharan Nagamalai:
Recent Trends in Network Security and Applications - Third International Conference, CNSA 2010, Chennai, India, July 23-25, 2010. Proceedings. Communications in Computer and Information Science 89, Springer 2010, ISBN 978-3-642-14477-6 [contents] - [e1]Abdulkadir Özcan, Nabendu Chaki, Dhinaharan Nagamalai:
Recent Trends in Wireless and Mobile Networks - Second International Conference, WiMo 2010, Ankara, Turkey, June 26-28, 2010. Proceedings. Communications in Computer and Information Science 84, 2010, ISBN 978-3-642-14170-6 [contents] - [i9]Kamaljit I. Lakhtaria, Dhinaharan Nagamalai:
Analyzing Web 2.0 Integration with Next Generation Networks for Services Rendering. CoRR abs/1009.1121 (2010) - [i8]Kamaljit I. Lakhtaria, Dhinaharan Nagamalai:
Design & Deploy Web 2.0 enable services over Next Generation Network Platform. CoRR abs/1009.1122 (2010) - [i7]Dhinaharan Nagamalai, Beatrice Cynthia Dhinakaran, Jae-Kwang Lee:
Multi Layer Approach to Defend DDoS Attacks Caused by Spam. CoRR abs/1010.1583 (2010) - [i6]Beatrice Cynthia Dhinakaran, Jae-Kwang Lee, Dhinaharan Nagamalai:
"Reminder: please update your details": Phishing Trends. CoRR abs/1010.2802 (2010) - [i5]Beatrice Cynthia Dhinakaran, Dhinaharan Nagamalai, Jae-Kwang Lee:
An Empirical Study of Spam and Spam Vulnerable email Accounts. CoRR abs/1011.0792 (2010) - [i4]Beatrice Cynthia Dhinakaran, Dhinaharan Nagamalai, Jae-Kwang Lee:
Characterizing Spam traffic and Spammers. CoRR abs/1011.1050 (2010) - [i3]Dhinaharan Nagamalai, Beatrice Cynthia Dhinakaran, Jae-Kwang Lee:
Bayesian Based Comment Spam Defending Tool. CoRR abs/1011.3279 (2010) - [i2]Dhinaharan Nagamalai, Beatrice Cynthia Dhinakaran, Jae-Kwang Lee:
Novel Mechanism to Defend DDoS Attacks Caused by Spam. CoRR abs/1012.0610 (2010) - [i1]Dhinaharan Nagamalai, Beatrice Cynthia Dhinakaran, Jae-Kwang Lee:
An In-depth Analysis of Spam and Spammers. CoRR abs/1012.1665 (2010)
2000 – 2009
- 2009
- [j1]Natarajan Meghanathan, Dhinaharan Nagamalai:
Guest Editorial. Int. J. Comput. Sci. Appl. 6(3) (2009) - [c10]Asish K. Mukhopadhyay, Sajal Saha, Suranjan Ghose, Debasish Saha, Dhinaharan Nagamalai:
An Analytical Model of Multi-service Call Admission Control in Next Generation Wireless Overlay Networks. NetCoM 2009: 98-103 - [c9]Beatrice Cynthia Dhinakaran, Jae-Kwang Lee, Dhinaharan Nagamalai:
"Reminder: please update your details": Phishing Trends. NetCoM 2009: 295-300 - [c8]Sajal Saha, Subhasree Bhattacharjee, Rajib Nath Bhowmick, Asish K. Mukhopadhyay, Dhinaharan Nagamalai:
Analysis of Hierarchical Mobile IP Based Fast Mobility Management Schemes. NetCoM 2009: 338-343 - [c7]Beatrice Cynthia Dhinakaran, Dhinaharan Nagamalai, Jae-Kwang Lee:
Bayesian Approach Based Comment Spam Defending Tool. ISA 2009: 578-587 - 2007
- [c6]Dhinaharan Nagamalai, Beatrice Cynthia Dhinakaran, Jae-Kwang Lee:
Multi Layer Approach to Defend DDoS Attacks Caused by Spam. MUE 2007: 97-102 - 2005
- [c5]Dhinaharan Nagamalai, Beatrice Cynthia Dhinakaran, P. Sasikala, Seoung-Hyeon Lee, Jae-Kwang Lee:
Security Threats and Countermeasures in WLAN. AINTEC 2005: 168-182 - [c4]Dhinaharan Nagamalai, Beatrice Cynthia Dhinakaran, Byoung-Sun Choi, Jae-Kwang Lee:
V-TCP: A Novel TCP Enhancement Technique. ICN (2) 2005: 125-132 - [c3]Dhinaharan Nagamalai, Seoung-Hyeon Lee, Won Goo Lee, Jae-Kwang Lee:
SCTP over High Speed Wide Area Networks. ICN (1) 2005: 628-634 - [c2]Dhinaharan Nagamalai, Dong-Ho Kang, Ki-Young Moon, Jae-Kwang Lee:
V-TCP: A Novel TCP Enhancement Technique for Wireless Mobile Environments. ICOIN 2005: 122-131 - 2004
- [c1]Beatrice Cynthia Dhinakaran, Dhinaharan Nagamalai, Lee Sang Gap:
Performance evaluation of TCP/IP in 802.11 wireless networks. Parallel and Distributed Computing and Networks 2004: 549-554
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:43 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint