Publications

No. Topic Publication Year
A Comprehensive Review of Course Recommendation Techniques for Learners in E-Learning, E Ahsraf, S Manickam, S Karuppayah
Journal of Educators Online, 2021
2021
SLAAC Attack Detection Mechanism, N Omar, S Manickam
International Journal of Information Security Science 9 (1), 24-43, 2020
2020
Threats Against Information Privacy and Security in Social Networks: A Review, A Al-Charchafchi, S Manickam, ZNM Alqattan
Advances in Cyber Security 1132, 358-372, 2020
2020
Iraqi’s Organizations Awareness to Prompt Open Source Cloud Computing (OSCC) in Their Service: A Study, HA Albaroodi, M Abomaali, S Manickam
Advances in Cyber Security 1132, 305-319, 2020
2020
Performance Analysis of EMM an EDoS Mitigation Technique in Cloud Computing Environment, P Singh, S Ul Rehman, S Manickam
Advances in Cyber Security 1132, 123-137, 2020
2020
A Brief Review of Blockchain-based DNS Systems, S Manickam, S Al Mashhadi
International Journal of Internet Technology and Secured Transactions 1 (1), 1, 2020
2020
Brief of Intrusion Detection Systems in Detecting ICMPv6 Attacks, AH Bdair, R Abdullah, S Manickam, AK Al-Ani
Computational Science and Technology, 199-213, 2020
2020
Effectiveness of Open Source Cloud Computing in Developing Countries: Empirical Study, H Albaroodi, M Abomaali, A Ismael, S Manickam
Journal of Engineering and Applied Sciences 14 (4), 7313-7319, 2019
2019
INTERNET OF THINGS BOTNET (MIRAI): A SYSTEMATIC REVIEW, BS Hameed, S Manickam, K Alieyan
Science International 31 (4), 607-616, 2019
2019
A Brief Review on MQTT’s Security Issues within the Internet of Things (IoT), A Hintaw J., S Manickam, S Karuppayah, M Faiz Aboalmaaly
Journal of Communications 14 (6), 463-469, 2019
2019
Comparative Analysis of State-of-the-Art EDoS Mitigation Techniques in Cloud Computing Environment, P Singh, SU Rehman, S Manickam
arXiv preprint arXiv:1905.13447, 2019
2019
An Efficient Indoor Event Detection Mechanism Using Wireless Sensor Network, LR Missif, SM Hanshi, S Karuppayah, S Manickam, H Labbad
2019 2nd International Conference on Computer Applications & Information …, 2019
2019
Detection and defense mechanisms on duplicate address detection process in IPv6 link-local network: a survey on limitations and requirements, AK Al-Ani, M Anbar, S Manickam, CY Wey, YB Leau, A Al-Ani
Arabian Journal for Science and Engineering 44 (4), 3745-3763, 2019
2019
Lightweight Secure Router Discovery Mechanism To Overcome DOS Attack In IPv6 Network, NC Arjuman, S Manickam, S Karuppayah
International Journal of Computing and Digital Systems 8 (02), 179-187, 2019
2019
DDoS attack aware environment with secure clustering and routing based on RPL protocol operation, BA Alabsi, M Anbar, S Manickam, OE Elejla
IET Circuits, Devices & Systems 13 (6), 748-755, 2019
2019
A brief review of messaging protocol standards for internet of things (IoT), AAO Bahashwan, S Manickam
Journal of Cyber Security and Mobility 8 (1), 1-14, 2019
2019
DAD-match; Security technique to prevent denial of service attack on duplicate address detection process in IPv6 link-local network, AK Al-Ani, M Anbar, S Manickam, A Al-Ani
PloS one 14 (4), 2019
2019
Preventing Denial of Service Attacks on Address Resolution in IPv6 Link-local Network: AR-match Security Technique, A K. Al-Ani, M Anbar, S Manickam, L Yu-Beng
4th.Computational Science and Technology (ICCST) 481, 305-314, 2018
2018
DAD-match: Technique to prevent DoS attack on duplicate address detection process in IPv6 link-local network, A Al-Ani, M Anbar, A Manickam, Selvakumar, Al-Ani
Journal of Communications 13 (6), 317-324, 2018
2018
A Comprehensive Review on Security Attacks in Dynamic Wireless Sensor Networks based on RPL protocol, M Anbar, S Manickam, B Al Absi
International Journal of Pure and Applied Mathematics 118 (20), 653-667, 2018
2018
A Survey of Quality of Service Routing Enhancement Techniques in Video Streaming over Software Defined Networks, N Balasubramanian, C Yung-Wey, S Manickam
International Conference on Electrical, Electronics, Computers …, 2018
2018
A Brief Review of Cyber Attacks on Internet of Things and its Mitigation Techniques, S Manickam
International Conference on Innovations in Computer Science and Information …, 2018
2018
Fake News on Social Media: Brief Review on Detection Techniques, Z Iradah, S Manickam, S Karuppayah
Fourth International Conference On Advances In Computing, Communication …, 2018
2018
Classification of Fake News on Social Media: A Brief Review, Z Iradah, S Karuppayah, S Manickam
International Conference on New Approaches in Information Technology …, 2018
2018
Proposed DAD-match security technique based on hash function to secure duplicate address detection in IPv6 link-local network, AK Al-Ani, M Anbar, S Manickam, A Al-Ani, YB Leau
Proceedings of the 2017 International Conference on Information Technology …, 2017
2017
Proposed DAD-match mechanism for securing duplicate address detection process in IPv6 link-local network based on symmetric-key algorithm, AK Al-Ani, M Anbar, S Manickam, A Al-Ani, YB Leau
International Conference on Computational Science and Technology, 108-118, 2017
2017
A temporal-aware signature extraction method using sliding-window mechanism for scalable, cost-effective and accurate traffic classification, Y Aun, S Manickam, S Karuppayah
2017 7th IEEE International Conference on Control System, Computing and …, 2017
2017
Enhanced Mechanism to Detect and Mitigate Economic Denial of Sustainability (EDoS) Attack in Cloud Computing Environments, P Singh Bawa, S Ul Rehman, S Manickam
International Journal of Advanced Computer Science and Applications (IJACSA …, 2017
2017
A review on features' robustness in high diversity mobile traffic classifications, Y Aun, S Manickam, S Karuppayah
International journal of communication networks and information security 9 …, 2017
2017
SensorBuster: On Identifying Sensor Nodes in P2P Botnets, S Karuppayah, Böck, Leon, T Grube, S Manickam, M Mühlhäuser, ...
12th International Conference on Availability, Reliability and Security …, 2017
2017
A Rule-Based Mechanism for Detecting HTTP Denial of Service Attacks During Flash Crowd Event, S Alsaleem, S Manickam, M Anbar, A Alnajjar, E Saleh
Advanced Science Letters 23 (6), 5423–5425, 2017
2017
Review of Security Issues in IPv6 Router Discovery, N Arjuman C., S Manickam, S Karuppayah, shafiq Ul Rehman
The 4th International Conference on Mathematical Sciences and Computer …, 2017
2017
Intelligent IPv6 Based IoT Network Monitoring and Alerting System on Cooja Framework, J Subramaniam, H Yean Li, S Manickam
The Research in Applied Sciences and Knowledge Engineering International …, 2017
2017
An Adaptive Assessment and Prediction Mechanism in Network Security Situation Awareness, YB Leau, A AbdulRazzaq, S Manickam, S Al-salem
Journal of Computer Science 13 (5), 114-129, 2017
2017
Rule-based detection technique for ICMPv6 anomalous behaviour, RMA Saad, M Anbar, S Manickam
Neural Computing and Applications, 1-10, 2017
2017
Improved Mechanism to Prevent Denial of Service Attack in IPv6 Duplicate Address Detection Process, S Ul Rehman, S Manickam
International Journal of Advanced Computer Science and Applications 8 (2), 63-70, 2017
2017
A cost-sensitive entropy-based network security situation assessment model, YB Leau, S Manickam
Advanced Science Letters 22 (10), 2865-2870, 2016
2016
On the Resilience of P2P-based Botnet Graphs, S Haas, S Karuppayah, S Manickam, M Fischer, M Mühlhäuser
International Conference on Communications and Network Security (CNS), 2016
2016
A Survey on Prominent Application Classification Methods, A Yi Chiet, S Manickam, S Ramadass
International Conference on Advances on Mathematics and Computer Engineering …, 2016
2016
DDoS attacks in VoIP: a brief review of detection and mitigation techniques, S Narayanan, S Manickam, YB Leau
International Journal of Advanced and Applied Sciences 3 (9), 90-96, 2016
2016
QRphish: An Automated QR Code Phishing Detection Approach, AY Alnajjar, M Anbar, S Manickam, O Elejla, H El-Taj
Journal of Engineering and Applied Sciences 11 (3), 553-560, 2016
2016
Denial of Service Attack in IPv6 Duplicate Address Detection Process, S Ul Rehman, S Manickam
International Journal of Advanced Computer Science and Applications 7 (6 …, 2016
2016
A study of smart home environment and its security threats, S Ul Rehman, S Manickam
International Journal of Reliability, Quality and Safety Engineering 23 (03 …, 2016
2016
An intelligent icmpv6 ddos flooding-attack detection framework (v6iids) using back-propagation neural network, RMA Saad, M Anbar, S Manickam, E Alomari
IETE Technical Review 33 (3), 244-255, 2016
2016
An enhanced adaptive grey verhulst prediction model for network security situation, YB Leau, S Manickam
International Journal of Computer Science and Network Security (IJCSNS) 16 …, 2016
2016
An Enhanced Adaptive Grey Verhulst Prediction Model for Network Security Situation, L Yu-Beng, S Manickam
International Journal of Computer Science and Network Security 16 (5), 13-20, 2016
2016
A Survey of Botnet-Based DDoS Flooding Attacks of Application Layer: Detection and Mitigation Approaches, E Alomari, S Manickam, BB Gupta, M Anbar, R M. A. Saad, S Alsaleem
Handbook of Research on Modern Cryptographic Solutions for Computer and …, 2016
2016
A Rule-Based Mechanism for Detecting HTTP Denial of Service Attacks During Flash Crowd Event, S Al-salem, S Manickam, M Anbar, AY Alnajjar, E Alomari
3rd International Conference on Computer, Communication and Control …, 2016
2016
Novel Mechanism to Prevent Denial of Service (DoS) Attacks in IPv6 Duplicate Address Detection Process, S Ul Rehman, S Manickam
International Journal of Security and Its Applications 10 (4), 143-154, 2016
2016
A Survey of Botnet-Based DDoS Flooding Attacks of Application Layer, E Alomari, S Manickam, BB Gupta, M Anbar, RMA Saad, S Alsaleem
2016
Awareness of Open Source Cloud Computing (OSCC): A Case Study in Malaysian Organizations, Malaysia, HA Albaroodi, S Manickam
INTERNATIONAL TRANSACTION JOURNAL OF ENGINEERING MANAGEMENT & APPLIED …, 2016
2016
TrustQR: A New Technique for Detection of Phishing Attacks on QR Code, AY Alnajjar, S Manickam, M Anbar, S Al-saleem, O Elejla
International Symposium of Information and Internet Technology (SYMINTECH) 2016, 2016
2016
A novel adaptive Grey Verhulst model for network security situation prediction, YB Leau, S Manickam
International Journal of Advanced Computer Science and Applications 7 (1), 2016
2016
Awareness of Open Source Cloud Computing (OSCC): A Case Study in Malaysian Organizations, HA Albaroodi, S Manickam
INTERNATIONAL JOURNAL OF ENGINEERING MANAGEMENT AND ECONOMICS 7 (1), 2016
2016
BADUW: Behavioural based Approach for Detecting, UDP Worm
Indian Journal of Science and Technology 8, 35, 2015
2015
Significance of Duplicate Address Detection Mechanism in Ipv6 and its Security Issues: A Survey, S Ul Rehman, S Manickam
Indian Journal of Science and Technology 8 (30), 1-8, 2015
2015
Integrated framework to detect and mitigate denial of service (DoS) attacks on duplicate address detection process in IPv6 link local communication, SU Rehman, S Manickam
Int. J. Secur. Appl. 9 (11), 77-86, 2015
2015
A UNIVERSAL SERVER DISCOVERY METHOD FOR GENERIC SERVER INDEXING, A Yichiet, S Ramadass, S Manickam
Proceedings of the Asia-Pacific Advanced Network 40, 83-93, 2015
2015
Design and Deployment of OpenStack-SDN based Test-bed for EDoS, P Singh, S Manickam
2015 4th International Conference on Reliability, Infocom Technologies and …, 2015
2015
Rule-Based Mechanism to Detect Denial of Service (DoS) Attacks on Duplicate Address Detection Process in IPv6 Link Local Communication, UR Shafiq, S Manickam
2015 4th International Conference on Reliability, Infocom Technologies and …, 2015
2015
Critical Review of Economical Denial of Sustainability (EDoS) Mitigation Techniques, PS Bawa, S Manickam
Journal of Computer Science 11 (7), 855, 2015
2015
A Review on ICMPv6 Vulnerabilities and Its Mitigation Techniques: Classification and Art, NC Arjuman, S Manickam
International Conference on Computer, Communication, and Control Technology …, 2015
2015
Dynamic Queue Velocity-based Probability Function for Congestion Avoidance in High-speed Networks, M Kadhum, S Manickam
2015 IEEE International Broadband and Photonics Conference (IBP 2015), 24-28, 2015
2015
Network security situation prediction: a review and discussion, YB Leau, S Manickam
International Conference on Soft Computing, Intelligence Systems, and …, 2015
2015
A Proposed Framework for Outsourcing and Secure Encrypted Data on OpenStack Object Storage (Swift), H Albaroodi, S Manickam, M Anbar
Journal of Computer Science 11 (3), 590-597, 2015
2015
Network security situation assessment: A review and discussion, YB Leau, S Manickam, YW Chong
Information Science and Applications, 407-414, 2015
2015
Operational Analysis of Interarrival Rate-based Queuing Management Mechanism for High-speed Networks, MM Kadhum, S Manickam
Information Science and Applications, 111-124, 2015
2015
Control update frequency of queue changes velocity for congestion management in high-speed networks, MM Kadhum, S Manickam
2014 IEEE International Conference on Communication, Networks and Satellite …, 2014
2014
A survey of mitigation techniques against Economic Denial of Sustainability (EDoS) attack on cloud computing architecture, P Singh, S Manickam, SU Rehman
Proceedings of 3rd International Conference on Reliability, Infocom …, 2014
2014
Review of Smart Home Security Threats and Mitigation Techniques, S Ul Rehman, Manickam, P Selvakumar, Singh
Infocom Technologies and Optimization (ICRITO), 2014
2014
DESIGN & DEPLOYMENT OF TESTBED BASED ON ICMPv6 FLOODING ATTACK., R Saad, S Manickam, E ALOMARI, M ANBAR, P SINGH
Journal of Theoretical & Applied Information Technology 64 (3), 2014
2014
A survey of intrusion alert correlation and its design considerations, L Yu Beng, S Ramadass, S Manickam, T Soo Fun
IETE Technical Review 31 (3), 233-240, 2014
2014
Connection failure message-based approach for detecting sequential and random TCP scanning, M Anbar, S Ramadass, S Manickam, A Al-Wardi
Indian Journal of Science and Technology 7 (5), 628, 2014
2014
Design, deployment and use of HTTP-based botnet (HBB) testbed, E Alomari, S Manickam, BB Gupta, P Singh, M Anbar
16th International Conference on Advanced Communication Technology, 1265-1269, 2014
2014
ICMPv6 flood attack detection using DENFIS algorithms, RMA Saad, A Almomani, A Altaher, BB Gupta, S Manickam
Indian Journal of Science and Technology 7 (2), 168, 2014
2014
Intrusion Detection System in IPv6 Network Based on Data Mining Techniques–Survey, S Ramadass
2014
EXCELLENT PUBLISHING HOUSE, VK Kishangarh
2014
A review of peer-to-peer botnet detection techniques, MJ Elhalabi, S Manickam, LB Melhim, M Anbar, H Alhalabi
Journal of Computer Science 10 (1), 169, 2014
2014
Critical Review of OpenStack Security: Issues and Weaknesses., H Albaroodi, S Manickam, PS Bawa
JCS 10 (1), 23-33, 2014
2014
A study on packet capture mechanisms in real time network traffic, SB Alias, S Manickam, MM Kadhum
2013 International Conference on Advanced Computer Science Applications and …, 2013
2013
A comparative study of alert correlations for intrusion detection, LY Beng, S Ramadass, S Manickam, TS Fun
2013 International Conference on Advanced Computer Science Applications and …, 2013
2013
Review Study on Techniques for Network worm Signatures Automation, M Anbar, S Ramadass, S Manickam, SB Alias, A Alalousi, M Elhalabi
Advances in Information Sciences and Service Sciences 5 (17), 8, 2013
2013
The classification and arts of open source cloud computing: A review, HA Albaroodi, S Manickam, MF Aboalmaaly
Advances in Information Sciences and Service Sciences 5 (16), 16, 2013
2013
Utilizing Data Mining Approches in the Detection of Intrusion in IPv6 Network: Review & Analysis, RMA Saad, S Manickam, S Ramadass
International Journal on Network Security 4 (1), 35, 2013
2013
Utilizing Data Mining Approches in the Detection of Intrusion in IPv6 Network: Review & Analysis, SR Redhwan M. A. Saad, Selvakumar Manickam
ACEEE International Journal on Network Security 4 (1), 2013
2013
Highly Effective Filtration and Prevention Framework for Secure Incoming VoIP Calls, AN Jaber, Supriyanto, S Manickam, S Ramadass
International Journal of Control and Automation 6 (3), 95-102, 2013
2013
Highly effective filtration and prevention framework for secure incoming VoIP calls, S Ramadass
International Journal of Control and Automation 6 (3), 2013
2013
High Filtration and Prevention Framework to Secure Incoming VoIP Calls, A Jaber, S Manickam
International Journal of Computer Application, 2013
2013
Intrusion Detection System in IPv6 Network Based on Data Mining Techniques–Survey, SR Redhwan M. A. Saad, Selvakumar Manickam
Proc. of the Second Intl. Conf. on Advances in Computer and Information …, 2013
2013
research proposal: An Intrusion Detection System Alert Reduction and Assessment Framework Based on Data Mining, K Al-Saedi, S Manickam, S Ramadass, W Al-Salihy, A Almomani
Journal of Computer Science 9 (4), 421, 2013
2013
A Pilot Study on Open Source Cloud Computing (OSCC) Awareness in the UniversitiSains Malaysia Education Sector, HA Ibrahim, S Manickam, M Faiz Aboalmaal, H Palakarnim
International Journal of Advancements in Computing Technology Theories and …, 2013
2013
Phishing dynamic evolving neural fuzzy framework for online detection zero-day phishing email, A Almomani, BB Gupta, TC Wan, A Altaher, S Manickam
arXiv preprint arXiv:1302.0629, 2013
2013
A study on detecting ICMPv6 flooding attack based on IDS, RMA Saad, S Ramadass, S Manickam
Australian Journal of Basic and Applied Sciences 7 (2), 175-181, 2013
2013
Intrusion detection system in IPv6 network based on data mining techniques—Survey, RMA Saad, S Manickam, S Ramadass
Proceedings of 2nd International Conference on Advances in Computer and …, 2013
2013
An Ontology-Driven Methodology To Derive Cases From Structured And Unstructured Sources, S Manickam
Universiti Sains Malaysia, 2013
2013
Collection mechanism and reduction of IDS alert, KH Al-Saedi, S Ramadass, A Almomani, S Manickam, WAA Alsalihy
International Journal of Computer Applications 975, 8887, 2012
2012
A study of SIP trunk security and challenges, AN Jabel, S Manickam, S Ramdas
2012 IEEE International Conference on Electronics Design, Systems and …, 2012
2012
Statistical cross-relation approach for detecting TCP and UDP random and sequential network scanning (SCANS), M Anbar, A Manasrah, S Manickam
International Journal of Computer Mathematics 89 (15), 1952-1969, 2012
2012
Botnet-based distributed denial of service (DDoS) attacks on web servers: classification and art, E Alomari, S Manickam, BB Gupta, S Karuppayah, R Alfaris
arXiv preprint arXiv:1208.0403, 2012
2012
Framework for enhancing sip confidentiality to prevent unexpected high sip server attacks by using crypto-gateway sip server (cgs), AN Jaber, KD Rajoo, S Manickam, AB Osman, A Khudher, CW Tan
4th International Conference on Computer Research and Development 39, 2012
2012
Session Initiation Protocol Security: A Brief Review, AN Jaber, CW Tan, S Manickam, AA Khudher
Journal of Computer Science 8 (3), 348, 2012
2012
An Approach to Assessment of Network Worm Detection Using Threatening-Database Mining, K Hashim Al-Saedi, H Al-Khafaji, A ALmomani, S Manickam, S Ramadass
Australian Journal of Basic & Applied Sciences;2011, Vol. 5 Issue 12, p2676, 2011
2011
Transmission Power Level Selection Method Based On Binary Search Algorithm for HiLOW, LV Chandra, S Manickam, KS Chai, S Ramadass
International Journal of Computer Science Issues (IJCSI) 8 (3), 348, 2011
2011
An approach to assessment of network worm detection using threatening-database mining, S Ramadass
Australian Journal of Basic and Applied Sciences 5 (12), 2676-2683, 2011
2011
Behaviour based worm detection and signature automation, M Anbar, S Manickam, AS Hosam, KS Chai, M Baklizi, A Almomani
Journal of Computer Science 7 (11), 1724, 2011
2011
Intelligent expertise classification approach: An innovative artificial intelligence approach to accelerate network data visualization, D Hooi-Ten Wong, S Manickam
2010 3rd International Conference on Advanced Computer Theory and …, 2010
2010
Study on advanced visualization tools in network monitoring platform, DWH Ten, S Manickam, S Ramadass, HA Al Bazar
2009 Third UKSim European Symposium on Computer Modeling and Simulation, 445-449, 2009
2009
Autonomous Knowledge Extraction in Medical Domain: Convergence of Multi-Level, Multi-Source Knowledge Acquisition Techniques in Populating Medical Case Base, S Manickam, C Yu-N
MMU International Symposium on Information and Communications Technologies …, 2007
2007
Promoting Knowledge Sharing Among Science Teachers by Leveraging Communites of Practice (CoP), B Muniandy, S Manickam, H Yunus, F Soon Fook
XII IOSTE Symposium: Science and Technology Education in the Service of …, 2006
2006
Improving the Accuracy of Medical Decision Support via a Knowledge Discovery Pipeline using Ensemble Techniques, S Karthigasoo, YN Cheah, S Manickam
Management 2 (1), 1, 2005
2005
USING ENSEMBLE AND LEARNING TECHNIQUES TOWARDS EXTENDING, THE KNOWLEDGE DISCOVERY PIPELINE, YN Cheah, S Karthigasoo, S Manickam
International Conference on Enterprise Information Systems 3, 408-411, 2005
2005
A knowledge discovery pipeline for medical decision support using clustering ensemble and neural network ensemble., S Karthigasoo, YN Cheah, S Manickam
IADIS AC, 336-343, 2005
2005
Admi: a multi-agent architecture to autonomously generate data mining services, SZH Zaidi, SSR Abidi, S Manikam, C Yu-N
2004 2nd International IEEE Conference on'Intelligent Systems'. Proceedings …, 2004
2004
A MULTI-AGENT MODEL AND ARCHITECTURE FOR MULTI-MODAL KNOWLEDGE ASSISTANCE AND CAPITALIZATION, ZI HASHMI
2004
A Platform for Enterprise-Wide Healthcare Knowledge Management, YN Cheah, YH Chong, S Manickam
Proceedings of the Knowledge Management International Conference and …, 2004
2004
ADMI: Towards an Organizational-Strength Open Agent Architecture, SZH ZAIDI, SSR ABIDI, S Manickam, H Z. I.
The 5th International Workshop on Agent-Based Simulation 2004, Portugal, 2004
2004
Novel Knowledge Discovery from Existing Knowledge Repository via Multi-dimensional Visualization Techniques: Towards Agent-based Dynamic Knowledge Visualization and …, S Manickam
Conference on Intellectual Capital and Knowledge Management, 2004
2004
Internet Mediated, Multi Layer Medical Terminologies Retriever: Towards We-based UMLS Thesauri and Semantic Search Engine., S Manickam, LW Sun, TP Suan
CITA, 106-111, 2003
2003
Automated Intelligent Health Monitoring System, S Manickam, S Singh
International Symposium on Information Technology 2003 (ITSim 2003), Kuala …, 2003
2003
Knowledge Based Cellular Automata for Knowledge Categorisation and Organasisation, S Singh, S Manickam, C Yu-N
2nd International Conference on Computational Intelligence, Robotics and …, 2003
2003
Analyzing Visual Field and Methodological Approach to Diagnose Glaucoma Progression using ANN Techniques, S Karthigasoo, S Manickam, C Yu-N
IADIS International WWW/Internet 2003 Conference, Portugal, 2003
2003
ADMI: A Platform for Intelligent Agents to Mine Healthcare Data, Z Syed Zahid Hassan, A S. S. R., S Manickam, H Z. I.
IADIS International WWW/Internet 2003 Conference, Portugal, 2003
2003
A Platform for Enterprise-Wide Healthcare Knowledge Management, C Yu-N, C Yong Han, S Manickam
Knowledge Management International Conference and Exhibition (KMICE’ 2003 …, 2003
2003
Analysing Visual Field and Diagnosing Glaucoma Progression using a Hybrid of per Location Differences and Artificial Neural Network Ensembles, S Karthigasoo, S Manickam, C Yu-N
Knowledge Management International Conference and Exhibition (KMICE’ 2003 …, 2003
2003
An Approach to Analyze Visual Field and Diagnose Glaucoma Progression Using Artificial Neural Network Techniques., S Karthigasoo, S Manickam, YN Cheah
ICWI, 861-864, 2003
2003
Leveraging XML-based electronic medical records to extract experiential clinical knowledge: An automated approach to generate cases for medical case-based reasoning systems, SSR Abidi, S Manickam
International Journal of Medical Informatics 68 (1-3), 187-203, 2002
2002
Distributed data mining from heterogeneous healthcare data repositories: towards an intelligent agent-based framework, SZH Zaidi, SSR Abidi, S Manickam
Proceedings of 15th IEEE Symposium on Computer-Based Medical Systems (CBMS …, 2002
2002
Leveraging intelligent agents for knowledge discovery from heterogeneous healthcare data repositories., SZ Zaidi, SS Abidi, S Manickam
Studies in health technology and informatics 90, 335-340, 2002
2002
Augmenting medical case base reasoning systems with clinical knowledge derived from heterogeneous electronic patient records, SSR Abidi, S Manickam
Proceedings 14th IEEE Symposium on Computer-Based Medical Systems. CBMS 2001 …, 2001
2001
Extracting clinical cases from XML-based electronic patient records for use in web-based medical case based reasoning systems, S Manickam, SSR Abidi
Studies in health technology and informatics, 643-647, 2001
2001
Transforming XML-based electronic patient records for use in medical case based reasoning systems, SSR Abidi, S Manickam
Studies in health technology and informatics, 709-713, 2000
2000
Unsupervised case classification using Kohonen "self-organizing feature map" in a case-based reasoning system, S Manickam, SSR Abidi
2000 TENCON Proceedings. Intelligent Systems and Technologies for the New …, 2000
2000
Experienced based medical diagnostics system over the World Wide Web (WWW), S Manickam, SSR Abidi
Proceedings of The First National Conference on Artificial Intelligence …, 1999
1999
Advances in Cyber Security, M Anbar, N Abdullah, S Manickam
USING ENSEMBLE AND LEARNING TECHNIQUES TOWARDS EXTRNDINF THF ‘. KNQWI. FD (1F. DI § CQVERV PIPE] JNE, YN Cheah, S Karthigasoo, S Manickam
Study On Advanced Visualization Tools In Network Monitoring Platform, S Manickam, R Sureswaran, H Al Bazar
A Literature review on Cyber Security in the field of IoT–Internet Of Things, A Lakshmanan, S Manickam
A Pilot Study on Open Source Cloud Computing (OSCC) Awareness in the Universiti Sains Malaysia Education Sector, HA Albaroodi, S Manickam, MF Aboalmaaly, H Palakarnim
IJACT 5, 1264-1273, 0
Common Types of Internet Security Attacks and Incidents in Organizations, TW Haur, S Manickam
Evaluating Activity Recognition Diversity as Readiness Measure Towards Mainstream Applicability, A Yichiet, S Pamadass, S Manickam
Proceedings of the Asia-Pacific Advanced Network 39, 1-19, 0
Botnet-Based Distributed Denial of Service Attacks on Web Servers: Classification and Art, E Alomari, BBG Selvakumar
International Journal of Computer Applications, July 2012, 0
ANALYZING VISUAL FIELD AND DIAGNOSING GLAUCOMA PROGRESSION USING A HYBRID OF PER LOCATION DIFFERENCES AND ROUGH SET TECHNIQUES, S Karthigasoo, S Manickam, YN Cheah
USING ENSEMBLE AND LEARNING TECHNIQUES TOWARDS, YN Cheah, S Karthigasoo, S Manickam
Intelligent Image Retrieval Engine: Novelty towards Leveraging, R Valliappan, S Manickam, P Sumari
Automatic Weight Assignment using Sensitivity Analysis for Case Retrieval and Matching, S Manickam
Göker00, 0

Technical Reports

No. Topic
Technological Overview, Tech Evaluation, Market Potential and In-depth Test & Analysis
Meta-Analysis Study of Factors Affecting Adaptation of Mobile Banking in Malaysia
IPv6 Deployment Strategy
Collaborative Immersive Virtual Reality Environment and 3D Telepresence
Study on Open Source Cloud Computing in Malaysia
Rapport de Stage (Surveillance Intelligent du Reseau)
IPv6 Forum Education Certification Logo Program
Server Monitoring System and Alerting Platform (Intelligent Web-based Enterprise Services/Network Monitoring and Alerting Platform)
Visualization of Data in an Attractive and Interactive Method
Evaluation of Qualcomm Atheros Chipset for the Development of 802.11ac Outdoor Wireless Mesh Platform
A Brief Review of Cybersecurity Issues in Iraq
Wifatch: Atypical Malware
Common Types of Internet Security Attacks and Incidents in Organizations
A Literature review on Cyber Security in the field of IoT-Internet Of Things