Author of the publication

The Security Development Lifecycle in the Context of Accreditation Policies and Standards.

, and . IEEE Secur. Priv., 15 (1): 52-57 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Kalaimannan, Ezhil
add a person with the name Kalaimannan, Ezhil
 

Other publications of authors with the same name

Simulating deferrable loads for the development of next generation energy systems: poster abstract., and . BuildSys@SenSys, page 284-285. ACM, (2022)eBot: Approach Towards Modeling an Advanced P2P Botnet., , , and . TrustCom/BigDataSE, page 391-396. IEEE, (2018)NCHR: A Nonthreshold-Based Cluster-Head Rotation Scheme for IEEE 802.15.4 Cluster-Tree Networks., , , , and . IEEE Internet Things J., 8 (1): 168-178 (2021)Scheduling Energy Flexible Devices Under Constrained Peak Load Consumption in Smart Grid., , and . ICCPS, page 316-317. IEEE, (2022)FogAutho: Leveraging a novel authentication scheme for securing fog-cloud systems in smart home applications., , , and . UEMCON, page 748-753. IEEE, (2023)Selective scheduling: Controlling non-preemptive devices in smart grid environment., and . ISGT, page 1-5. IEEE, (2017)Design of cybersecurity hands-on laboratory exercises using secDLC framework., , and . ACM Southeast Regional Conference, page 36:1. ACM, (2018)A Sequential Investigation Model for Solving Time Critical Digital Forensic Cases Involving a Single Investigator., , and . NCS, volume 1055 of Advances in Intelligent Systems and Computing, page 202-219. Springer, (2019)Using machine learning techniques to identify rare cyber-attacks on the UNSW-NB15 dataset., , , , and . Secur. Priv., (2019)Impact of Targeted Cyber Attacks on Electrical Power Systems., , and . NCS, volume 1055 of Advances in Intelligent Systems and Computing, page 278-292. Springer, (2019)