default search action
Sriram Sankaran
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j11]Vamshi Sunku Mohan, Sriram Sankaran, Vireshwar Kumar, Krishnashree Achuthan:
EP-CuMAC: Energy and performance-efficient integrity protection for narrow-band IoT. Internet Things 25: 101004 (2024) - [j10]Swapnoneel Roy, Sriram Sankaran, Mini Zeng:
Green Intrusion Detection Systems: A Comprehensive Review and Directions. Sensors 24(17): 5516 (2024) - 2023
- [j9]K. Nimmy, Sriram Sankaran, Krishnashree Achuthan:
A novel lightweight PUF based authentication protocol for IoT without explicit CRPs in verifier database. J. Ambient Intell. Humaniz. Comput. 14(5): 6227-6242 (2023) - [j8]K. Nimmy, M. Dilraj, Sriram Sankaran, Krishnashree Achuthan:
Leveraging power consumption for anomaly detection on IoT devices in smart homes. J. Ambient Intell. Humaniz. Comput. 14(10): 14045-14056 (2023) - [j7]Vamshi Sunku Mohan, Sriram Sankaran, Priyadarsi Nanda, Krishnashree Achuthan:
Enabling secure lightweight mobile Narrowband Internet of Things (NB-IoT) applications using blockchain. J. Netw. Comput. Appl. 219: 103723 (2023) - [c49]Nithya Nedungadi, Akshitha K. Subran, Sriram Sankaran:
Comparative Analysis of Intrusion Detection Systems for Internet of Things. ANTS 2023: 1-6 - [c48]Anudeep Gandla, Vamshi Sunku Mohan, Sriram Sankaran:
Identification Of Users with Social Behavioural Biometrics On Twitter. ICCCNT 2023: 1-7 - [c47]P. Shashank Kumar, Sriram Sankaran:
Explanatory Case Study: Digital Forensics Investigation on DJI Spark Drone. ICCCNT 2023: 1-7 - [c46]Varun Narayanan, Sriram Sankaran:
Electromagnetic Fault Injection Attack on ASCON Using ChipShouter. IFIPIoT (1) 2023: 114-131 - [c45]Akhil Raj, Sriram Sankaran:
Battery Drain using WiFi Beacons. ISDFS 2023: 1-6 - [c44]Amaldeep S, Sriram Sankaran:
Cross Protocol Attack on IPSec-based VPN. ISDFS 2023: 1-6 - [c43]P. Shashank Kumar, Sriram Sankaran:
Evaluating the Effectiveness of PRNU-Based Forensic Techniques in Mobile Devices using Peak Correlation Coefficient. iSES 2023: 335-340 - 2022
- [j6]K. Nimmy, Sriram Sankaran, Krishnashree Achuthan, Prasad Calyam:
Lightweight and Privacy-Preserving Remote User Authentication for Smart Homes. IEEE Access 10: 176-190 (2022) - [c42]K. Nimmy, Sriram Sankaran, Krishnashree Achuthan, Prasad Calyam:
Securing Remote User Authentication in Industrial Internet of Things. CCNC 2022: 244-247 - [c41]Mahipal Singh, Sriram Sankaran:
Energy-Performance-Security Trade-off in Mobile Edge Computing. IGSC 2022: 1-6 - [c40]Buddhadev Pusti, Sriram Sankaran:
Security and Energy-Aware Resource Allocation in Mobile Edge Computing (MEC). iSES 2022: 293-296 - [c39]Mahipal Singh, Sriram Sankaran:
Lightweight Security Architecture for IoT Edge Devices. iSES 2022: 455-458 - [c38]H. Manohar Reddy, P. C. Sajimon, Sriram Sankaran:
On the Feasibility of Homomorphic Encryption for Internet of Things. WF-IoT 2022: 1-6 - 2021
- [j5]J. Jithish, Sriram Sankaran:
A game-theoretic approach for ensuring trustworthiness in cyber-physical systems with applications to multiloop UAV control. Trans. Emerg. Telecommun. Technol. 32(5) (2021) - [j4]J. Jithish, Sriram Sankaran, Krishnashree Achuthan:
A Decision-centric approach for secure and energy-efficient cyber-physical systems. J. Ambient Intell. Humaniz. Comput. 12(1): 417-441 (2021) - [c37]Sriram Sankaran, Vamshi Sunku Mohan, A. Purushothaman:
Deep Learning Based Approach for Hardware Trojan Detection. iSES 2021: 177-182 - [c36]Narahari Komanduri, Sriram Sankaran:
Experimental Assessment of Wireless LANs against Rogue Access Points. iSES 2021: 406-409 - [c35]Megha Ajit, Sriram Sankaran, Kurunandan Jain:
Formal Verification of 5G EAP-AKA protocol. ITNAC 2021: 140-146 - 2020
- [c34]N. B. Gokul, Sriram Sankaran:
Identity Based Security Framework For Smart Cities. IEEE ANTS 2020: 1-4 - [c33]Jerin Sunny, Sriram Sankaran, Vishal Saraswat:
A Hybrid Approach for Fast Anomaly Detection in Controller Area Networks. IEEE ANTS 2020: 1-6 - [c32]Anjali J. Suresh, Sriram Sankaran:
A Framework for Evaluation of Software Obfuscation Tools for Embedded Devices. ATIS 2020: 1-13 - [c31]J. Jithish, Sriram Sankaran, Krishnashree Achuthan:
Towards Ensuring Trustworthiness in Cyber-Physical Systems: A Game-Theoretic Approach. COMSNETS 2020: 626-629 - [c30]Jerin Sunny, Sriram Sankaran, Vishal Saraswat:
Towards a Lightweight Blockchain Platform for Critical Infrastructure Protection. ICDCS 2020: 1287-1292 - [c29]Akshayhari Rajan, Sriram Sankaran:
Lightweight and Attack-resilient PUF for Internet of Things. iSES 2020: 139-142 - [c28]G. Surya, Paolo Maistri, Sriram Sankaran:
Local Clock Glitching Fault Injection with Application to the ASCON Cipher. iSES 2020: 271-276
2010 – 2019
- 2019
- [j3]J. Jithish, Sriram Sankaran:
A bio-inspired approach to secure networked control systems against adversarial delays. J. Intell. Fuzzy Syst. 36(4): 3779-3790 (2019) - [c27]Nithuna Pramod, Sriram Sankaran:
Blockchain Based Framework For Driver Profiling in Smart Cities. ANTS 2019: 1-6 - [c26]Jesty Santhosh, Sriram Sankaran:
Defending against Sybil Attacks in Vehicular Platoons. ANTS 2019: 1-6 - [c25]Jayant Pathak, Sriram Sankaran, Krishnashree Achuthan:
A SMART Goal-based Framework for Privacy Preserving Embedded Forensic Investigations. ISED 2019: 1-5 - [c24]Sriram Sankaran, M. R. Prabha:
Security over Voice Controlled Android Applications for Home IoT Systems. ISED 2019: 1-5 - [c23]Sriram Sankaran, Nithuna Pramod, Krishnashree Achuthan:
Energy and Performance Comparison of Cryptocurrency Mining for Embedded Devices. ISED 2019: 1-5 - [c22]Prabha R, Sriram Sankaran:
An Experimental Platform for Security of Cyber Physical Systems. iSES 2019: 123-128 - [c21]M. Dilraj, K. Nimmy, Sriram Sankaran:
Towards Behavioral Profiling Based Anomaly Detection for Smart Homes. TENCON 2019: 1258-1263 - 2018
- [j2]Hong Min, Taesik Kim, Junyoung Heo, Tomás Cerný, Sriram Sankaran, Bestoun S. Ahmed, Jinman Jung:
Pattern Matching Based Sensor Identification Layer for an Android Platform. Wirel. Commun. Mob. Comput. 2018: 4734527:1-4734527:11 (2018) - [c20]J. Jithish, Sriram Sankaran:
Towards a decision-centric approach for securing cyber physical systems. COMSNETS 2018: 500-502 - [c19]Swapnoneel Roy, Sriram Sankaran, Preeti Singh, Ramalingam Sridhar, Asai Asaithambi:
Context-sec: Balancing Energy Consumption and Security of Mobile Devices. IGSC 2018: 1-6 - [c18]Sriram Sankaran, Sonam Sanju, Krishnashree Achuthan:
Towards Realistic Energy Profiling of Blockchains for Securing Internet of Things. ICDCS 2018: 1454-1459 - [c17]K. Nimmy, Sriram Sankaran, Krishnashree Achuthan:
A Novel Multi-factor Authentication Protocol for Smart Home Environments. ICISS 2018: 44-63 - [c16]Sriram Sankaran, Manish Gupta:
Game Theoretic Modeling of Power-Performance trade-offs for Mobile Devices. ISED 2018: 220-224 - [c15]Sonam Sanju, Sriram Sankaran, Krishnashree Achuthan:
Energy Comparison of Blockchain Platforms for Internet of Things. iSES 2018: 235-238 - [c14]Sriram Sankaran, Shivshankar S, K. Nimmy:
LHPUF: Lightweight Hybrid PUF for Enhanced Security in Internet of Things. iSES 2018: 275-278 - [c13]Swapnoneel Roy, Sriram Sankaran, Preeti Singh, Ramalingam Sridhar:
Modeling Context-Adaptive Energy-Aware Security in Mobile Devices. LCN Workshops 2018: 105-109 - 2017
- [c12]T. Varsha Ram, Sriram Sankaran:
Towards policy-driven power management for cloud computing. ANTS 2017: 1-5 - [c11]Sriram Sankaran, Manish Gupta:
Towards modeling vehicular networks with power-performance trade-offs. ANTS 2017: 1-6 - [c10]Anjana Rajan, J. Jithish, Sriram Sankaran:
Sybil attack in IOT: Modelling and defenses. ICACCI 2017: 2323-2327 - [c9]J. Jithish, Sriram Sankaran:
A Hybrid Adaptive Rule based System for Smart Home Energy Prediction. DIAS/EDUDM@ISEC 2017 - [c8]Athul Raj, J. Jithish, Sriram Sankaran:
Modelling the Impact of Code Obfuscation on Energy Usage. DIAS/EDUDM@ISEC 2017 - 2016
- [c7]Sriram Sankaran:
Modeling the performance of IoT networks. ANTS 2016: 1-6 - [c6]Sriram Sankaran:
Predictive modeling based power estimation for embedded multicore systems. Conf. Computing Frontiers 2016: 370-375 - [c5]Sriram Sankaran:
Lightweight security framework for IoTs using identity based cryptography. ICACCI 2016: 880-886 - 2013
- [c4]Sriram Sankaran, Ramalingam Sridhar:
User-adaptive energy-aware security for mobile devices. CNS 2013: 391-392 - [c3]Sriram Sankaran, Ramalingam Sridhar:
Energy modeling for mobile devices using performance counters. MWSCAS 2013: 441-444 - 2011
- [c2]Brad Calder, Ju Wang, Aaron Ogus, Niranjan Nilakantan, Arild Skjolsvold, Sam McKelvie, Yikang Xu, Shashwat Srivastav, Jiesheng Wu, Huseyin Simitci, Jaidev Haridas, Chakravarthy Uddaraju, Hemal Khatri, Andrew Edwards, Vaman Bedekar, Shane Mainali, Rafay Abbasi, Arpit Agarwal, Mian Fahim ul Haq, Muhammad Ikram ul Haq, Deepali Bhardwaj, Sowmya Dayanand, Anitha Adusumilli, Marvin McNett, Sriram Sankaran, Kavitha Manivannan, Leonidas Rigas:
Windows Azure Storage: a highly available cloud storage service with strong consistency. SOSP 2011: 143-157
2000 – 2009
- 2005
- [j1]Sriram Sankaran, Jeffrey M. Squyres, Brian Barrett, Vishal Sahay, Andrew Lumsdaine, Jason Duell, Paul Hargrove, Eric Roman:
The Lam/Mpi Checkpoint/Restart Framework: System-Initiated Checkpointing. Int. J. High Perform. Comput. Appl. 19(4): 479-493 (2005) - [c1]Sriram Sankaran, Rashid Ansari, Ashfaq A. Khokhar:
Adaptive multifoveation for low-complexity video compression with a stationary camera perspective. Electronic Imaging: Image and Video Communications and Processing 2005
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-21 02:38 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint