Change search
Refine search result
1 - 17 of 17
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Rows per page
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sort
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
Select
The maximal number of hits you can export is 250. When you want to export more records please use the Create feeds function.
  • 1. Anand, K.
    et al.
    Ganapathy, S.
    Kulothungan, K.
    Yogesh, P.
    Kannan, Anand
    KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS.
    A Rule Based Approach for Attribute Selection and Intrusion Detection in Wireless Sensor Networks2012In: International Conference On Modelling Optimization And Computing, Elsevier, 2012, p. 1658-1664Conference paper (Refereed)
    Abstract [en]

    In this paper, we propose a new rule based attribute selection algorithm for removing the redundant attributes which are used in decision making on intrusions in wireless sensor networks. This work focuses mainly on finding important attributes to find Denial of Service attacks. In addition, we used an enhanced MSVM classification algorithm that was developed by extending the existing MSVM algorithm. The experimental results show that the proposed methods provide high detection rates and reduce false alarm rate. This system has been tested using KDD'99 Cup data set.

  • 2. Chithra, G. K.
    et al.
    Uma, K.
    Kannan, Anand
    KTH, School of Electrical Engineering and Computer Science (EECS).
    Android application for ticket collector in trains2017In: Journal of Advanced Research in Dynamical and Control Systems, ISSN 1943-023X, Vol. 9, no Special Issue 2, p. 1015-1022Article in journal (Refereed)
    Abstract [en]

    The main objective of this android app is that the ticket collector checks the traveller price tag and updates the traveller list to the information whether or not the passengers are travelling in the train according to their tickets with their individual dates of a journey. This app starts with a login page. The ticket collector updates the user id and watchword manually to IRCTC and therefore the management stores his user-id and watchword within the information. So, the ticket collector 1st needs to login to the app together with his individual user-id and password. Then once logging in to the app, HOME page is displayed. during this page, the ticket collector needs to select the train range and so the date of journey and therefore the diary number and then submits this page. Then he gets the traveller list and therefore the ticket collector checks the traveller list and updates the list supported who is travelling. And at that time submits the checked traveller list and then it gets updated to the information. This app helps the ticket collector most. Some passengers take the general price tag and request ticket collector for the berth or seat within the reservation coach. So, at this time this app helps the ticket collector to look at the quantity of vacant seats. It reduces the looking out time for the ticket collector. the quantity of vacant seats is displayed once the ticket collector simply clicks the quantity of vacant seat availability option. The porter asks the traveller regarding his/her supply and destination that he needed the price tag. So, supported the traveller necessities the ticket collector chooses the supply and destination that the traveller desires the seat or berth. So, if the seats square measure vacant then the ticket collector checks the number to be paid by the traveller as fine and so asks the fine and if the traveller pays the fine to the ticket collector then he updates the traveller details who need the price tag and so he updates the traveller details to the database.

  • 3.
    Kannan, Anand
    KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS.
    Performance evaluation of security mechanisms in Cloud Networks2012Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    Infrastructure as a Service (IaaS) is a cloud service provisioning model which largely focuses on data centre provisioning of computing and storage facilities. The networking aspects of IaaS beyond the data centre are a limiting factor preventing communication services that are sensitive to network characteristics from adopting this approach. Cloud networking is a new technology which integrates network provisioning with the existing cloud service provisioning models thereby completing the cloud computing picture by addressing the networking aspects. In cloud networking, shared network resources are virtualized, and provisioned to customers and end-users on-demand in an elastic fashion. This technology allows various kinds of optimization, e.g., reducing latency and network load. Further, this allows service providers to provision network performance guarantees as a part of their service offering. However, this new approach introduces new security challenges. Many of these security challenges are addressed in the CloNe security architecture.

    This thesis presents a set of potential techniques for securing different resource in a cloud network environment which are not addressed in the existing CloNe security architecture. The thesis begins with a holistic view of the Cloud networking, as described in the Scalable and Adaptive Internet Solutions (SAIL) project, along with its proposed architecture and security goals. This is followed by an overview of the problems that need to be solved and some of the different methods that can be applied to solve parts of the overall problem, specifically a comprehensive, tightly integrated, and multi-level security architecture, a key management algorithm to support the access control mechanism, and an intrusion detection mechanism. For each method or set of methods, the respective state of the art is presented. Additionally, experiments to understand the performance of these mechanisms are evaluated on a simple cloud network test bed.

    The proposed key management scheme uses a hierarchical key management approach that provides fast and secure key update when member join and member leave operations are carried out. Experiments show that the proposed key management scheme enhances the security and increases the availability and integrity.

    A newly proposed genetic algorithm based feature selection technique has been employed for effective feature selection. Fuzzy SVM has been used on the data set for effective classification. Experiments have shown that the proposed genetic based feature selection algorithm reduces the number of features and hence decreases the classification time, while improving detection accuracy of the fuzzy SVM classifier by minimizing the conflicting rules that may confuse the classifier. The main advantages of this intrusion detection system are the reduction in false positives and increased security.

  • 4.
    Kannan, Anand
    et al.
    KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS.
    Maguire Jr., Gerald Q.
    KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS.
    Sharma, A.
    Schoo, P.
    Genetic algorithm based feature selection algorithm for effective intrusion detection in cloud networks2012In: Proceedings - 12th IEEE International Conference on Data Mining Workshops, ICDMW 2012, IEEE , 2012, p. 416-423Conference paper (Refereed)
    Abstract [en]

    Cloud computing is expected to provide on-demand, agile, and elastic services. Cloud networking extends cloud computing by providing virtualized networking functionalities and allows various optimizations, for example to reduce latency while increasing flexibility in the placement, movement, and interconnection of these virtual resources. However, this approach introduces new security challenges. In this paper, we propose a new intrusion detection model in which we combine a newly proposed genetic based feature selection algorithm and an existing Fuzzy Support Vector Machines (SVM) for effective classification as a solution. The feature selection reduces the number of features by removing unimportant features, hence reducing runtime. Moreover, when the Fuzzy SVM classifier is used with the reduced feature set, it improves the detection accuracy. Experimental results of the proposed combination of feature selection and classification model detects anomalies with a low false alarm rate and a high detection rate when tested with the KDD Cup 99 data set.

  • 5.
    Kannan, Anand
    et al.
    KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS.
    Maguire Jr., Gerald
    KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS.
    Sharma, A.
    Fusenig, V.
    Schoo, P.
    N-ary tree based key distribution in a network as a service provisioning model2012In: ICACCI '12 Proceedings of the International Conference on Advances in Computing, Communications and Informatics, ACM Digital Library, 2012, p. 952-960Conference paper (Refereed)
    Abstract [en]

    Cloud networking is a new technology which integrates network provisioning with the existing cloud service provisioning models. This integration allows service providers to provision network resources together with network performance guarantees as a part of their service offering. However, the introduction of multiple providers and service levels introduces many security challenges. One such challenge is identity management, especially authentication of different entities. This paper presents an analysis of a management scheme deployed in a simulated cloud network test bed. Our results show that this scheme is faster than binary and erasure encoding schemes. The scheme uses an N-ary approach and thus allows the placement of n entities at each level, unlike the binary scheme which is restricted to two entities.

  • 6.
    Kannan, Anand
    et al.
    KTH, School of Information and Communication Technology (ICT).
    Venkatesan, Karthik Gururajan
    KTH, School of Information and Communication Technology (ICT).
    Stagkopoulou, Alexandra
    KTH, School of Information and Communication Technology (ICT).
    Li, Sheng
    KTH, School of Information and Communication Technology (ICT).
    Krishnan, S.
    Rahman, A.
    A novel cloud intrusion detection system using feature selection and classification2015In: International Journal of Intelligent Information Technologies, ISSN 1548-3657, E-ISSN 1548-3665, Vol. 11, no 4, p. 1-15Article in journal (Refereed)
    Abstract [en]

    This paper proposes a new cloud intrusion detection system for detecting the intruders in a traditional hybrid virtualized, cloud environment. The paper introduces an effective feature selection algorithm called Temporal Constraint based on Feature Selection algorithm and also proposes a classification algorithm called hybrid decision tree. This hybrid decision tree has been developed by extending the Enhanced C4.5 algorithm an existing decision tree based classifier. Furthermore, the experiments conducted on the sample Cloud Intrusion Detection Datasets (CIDD) show that the proposed cloud intrusion detection system provides better detection accuracy than the existing work and reduces the false positive rate.

  • 7. Monika, K.
    et al.
    Ragavi, V.
    Anitha, S.
    Uma, K.
    Kannan, Anand
    KTH, School of Information and Communication Technology (ICT).
    Theft vehicle scheme using cloud computing techniques2017In: Journal of Advanced Research in Dynamical and Control Systems, ISSN 1943-023X, Vol. 9, no Special Issue 2, p. 1023-1031Article in journal (Refereed)
    Abstract [en]

    Due to proliferation in the metropolitan areas there existing problem of poor traffic congestion has grown at alarming event and it is not easy to find the stolen vehicles. So here we use Theft vehicle detection system for finding the theft vehicles using open source hardware of RASPBERRY PI.This system make use of RFID and embedded technology. Here each vehicle is placed with RFID tag. Whenever the RFID reader reads the RFID tag in the stolen vehicle it alert the traffic police and the signal will be automatically changed into red light until the vehicle is recovered from the stolen person. This is achieved by connecting cloud technology with server which is handle by the traffic police. When the traffic controller ensures that the particular vehicle is missed then, whenever that particular vehicle crossed by the any signal red light blinks automatically then cloud displays the message with vehicle number.By using this system, we can alert the signal and can easily find the stolen vehicle by tracking the RFID tag.

  • 8. Rangarajan, S.
    et al.
    Verma, M.
    Kannan, Anand
    KTH, School of Information and Communication Technology (ICT).
    Sharma, A.
    Schoen, I.
    V2C: A secure vehicle to cloud framework for virtualized and on-demand service provisioning2012In: ICACCI '12 Proceedings of the International Conference on Advances in Computing, Communications and Informatics, 2012, p. 148-154Conference paper (Refereed)
    Abstract [en]

    Cloud computing has revolutionized the IT industry by enabling a virtualized resource provisioning model for organizations. The Network-as-a-Service (NaaS) provisioning model enables new ways of providing virtually isolated and on-demand networking capabilities in existing cloud provisioning models, resulting in best-effort performance, scalable data throughput, reduced latency, and reduced configuration complexity. In this paper we propose V2C, an elastic Vehicle-to-Cloud infrastructure that integrates NaaS into the automotive ecosystem and enables provisioning of vehicle-based services for automobile users. However, V2C introduces various security challenges and the main objective of this paper is to propose a secure provisioning model to address them.

  • 9.
    Rangarajan, Sathyanarayanan
    et al.
    Fraunhofer AISEC, Parkring 4, D-85748 Garching, Germany..
    Verma, Monica
    Siemens CERT, D-81739 Munich, Germany..
    Kannan, Anand
    KTH, School of Information and Communication Technology (ICT). Royal Inst Technol, KTH, Sch Informat & Commun Technol, Stockholm, Sweden..
    Sharma, Ayush
    Fraunhofer AISEC, Parkring 4, D-85748 Garching, Germany..
    Schoen, Ingmar
    Fraunhofer AISEC, Parkring 4, D-85748 Garching, Germany..
    V2C: A Secure Vehicle to Cloud Framework for Virtualized and On-Demand Service Provisioning2012In: PROCEEDINGS OF THE 2012 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI'12) / [ed] Thampi, SM ElAlfy, ES Aguiar, J, ASSOC COMPUTING MACHINERY , 2012, p. 148-154Conference paper (Refereed)
    Abstract [en]

    Cloud computing has revolutionized the IT industry by enabling a virtualized resource provisioning model for organizations. The Network-as-a-Service (NaaS) provisioning model enables new ways of providing virtually isolated and on-demand networking capabilities in existing cloud provisioning models, resulting in best-effort performance, scalable data throughput, reduced latency, and reduced configuration complexity. In this paper we propose V2C, an elastic Vehicle-to-Cloud infrastructure that integrates NaaS into the automotive ecosystem and enables provisioning of vehicle-based services for automobile users. However, V2C introduces various security challenges and the main objective of this paper is to propose a secure provisioning model to address them.

  • 10. Razia Sulthana, A.
    et al.
    Uma, K.
    Sairamesh, L.
    Kannan, Anand
    KTH.
    Improvement on software testing techniques and tools2017In: Journal of Advanced Research in Dynamical and Control Systems, ISSN 1943-023X, Vol. 9, no 2 Special Issue, p. 1049-1058Article in journal (Refereed)
    Abstract [en]

    Programming Testing is a procedure of discovering mistakes while executing a program with the goal that we get a zero deformity programming. It is gone for assessing the ability or ease of use of a program. Programming testing is an essential methods for getting to nature of programming. Despite the fact that a great deal of progressions have been done in formal strategies and check procedures, still we require programming to be completely tried before it could be dealt with to the client side. Subsequently there are various trying systems and instruments made to finish the undertaking. Programming testing is a vital zone of research and a great deal of advancement has been made in this field. In this paper, testing systems and apparatuses have been depicted. Some run of the mill most recent inquiries about have been outlined. Programming testing is increasing increasingly significance later on. 

  • 11. Sharma, A.
    et al.
    Fusenig, V.
    Schoen, I.
    Kannan, Anand
    KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS.
    Bridging the security drawbacks of virtualized network resource provisioning model2012In: EWDCC '12 Proceedings of the 1st European Workshop on Dependable Cloud Computing, ACM , 2012Conference paper (Refereed)
    Abstract [en]

    Cloud networking receives a lot of attention from the research community, especially due to its ability to bridge the dependability gaps in the existing cloud service provisioning models by enabling provisioning of virtualized network resources and providing network guarantees to the end-user. In cloud networking, network resources shared between multiple tenants are virtualized, and provisioned to customers in an elastic fashion. However, the existing cloud networking systems have many drawbacks pertaining to security, management, and performance. Therefore, it is necessary to develop new security architectures and suitable algorithms to provide effective security to the virtualized network resources available in the cloud. In this paper, we propose a new architecture which focuses on providing a security mechanism for cloud network resource provisioning models. The central feature of this architecture is a hierarchical, multi-domain, and multi-level security goal translation function which promotes security of the virtualized network resources and trust management between the service providers.

  • 12. Sravani, K.
    et al.
    Kruthi, S.
    Uma, K.
    Kannan, Anand
    KTH, School of Electrical Engineering (EES).
    Prescription viewer medcare application using android programming2017In: Journal of Advanced Research in Dynamical and Control Systems, ISSN 1943-023X, Vol. 9, no Special Issue 2, p. 1360-1370Article in journal (Refereed)
    Abstract [en]

    Living healthy is valuable to everyone. The expert assumes an essential part in sparing one's life by giving the therapeutic solution. The issues faced by patients in their busy lives can't keep the records of prescription safely, inappropriate and overdosed admission of meds furthermore neglecting to get meeting with specialist by going to doctor's facility. This can be explained by Medcare application using android programming. Android is the Operating System that has huge development as of late. The fundamental plan of this paper is to make patients sensible about the application, through which they can see the medicine given by specialist, set suggestion to planned drug, find adjacent drug stores and can alter next meeting with particular branch of specialist without going to healing facility.

  • 13. Tamil Priya, D.
    et al.
    Uma, K.
    Kannan, Anand
    KTH.
    Similarity based face identification using metrics analysis2017In: Journal of Advanced Research in Dynamical and Control Systems, ISSN 1943-023X, Vol. 9, no Special Issue 2, p. 1371-1378Article in journal (Refereed)
    Abstract [en]

    Confront acknowledgment framework is one of the biometrics strategies that are utilized as a part of assortment of uses utilizing the picture handling systems. Confront acknowledgment framework is produced utilizing the Mat lab condition with the systems took after by main segment investigation and the straight discriminant examination. The execution is measured utilizing the time rate, remove rate, pixel values and the element separated determination rate. The ideal acknowledgment is executed when the time traverse around half and the separation rate around the 90 %. What’s more, on account of pixel and determination, when the pixel qualities are expanding then the determination calculate ought to likewise be an expanding request. On the off chance that the removed element contains more pixels then the determination element is progressively that identifies with the quality in separating the element. The execution is measured utilizing the two distinctive programming metric techniques to be specific spearmen and Pearson metric. At that point the general measure is characterized by picking up with the two metric strategies. The execution is plotted utilizing the diagram to foresee the rate of time and extricated include.

  • 14. Uma, K.
    et al.
    Kalyanpur, K.
    Ambarkar, H.
    Saranya, R.
    Kannan, Anand
    KTH.
    Scanned compound images using different compression techniques2017In: Journal of Advanced Research in Dynamical and Control Systems, ISSN 1943-023X, Vol. 9, no Special Issue 2, p. 994-1000Article in journal (Refereed)
    Abstract [en]

    This Paper involves a detailed study of different compression techniques of scanned compound images. A compound image is a different kind of image that contains text, natural image and graphic image. Some of the Image compression techniques which include DCT,JPEG, H.264,MMP AND APM-MMP have been reviewed and presented in this paper. Discrete cosine transform (DCT) is a method which compresses the compound image without any loss of data. To compress image DCT is computed using two dimensional functions (2D).Join Picture Expert Group(JPEG) is mostly used as standard format for compressed images. Due to loss of data the compressed image differs from the original image.H.264 is a video compression standard which is also capable of compressing a compound image.MMP is specifically calculated to encode separately the macro blocks information of text and image. Since complexity is high in these above techniques the proposed technique Adaptive Probability Model-MMP solves the limitations like redundant data removal and enhances the image quality. It also improves the encoding efficiency thus modifying the MMP’s character.

  • 15. Uma, K.
    et al.
    Kannan, Anand
    KTH.
    A novel method for smart vehicle safety2017In: Journal of Advanced Research in Dynamical and Control Systems, ISSN 1943-023X, Vol. 2017, no Special Issue 2, p. 1259-1269Article in journal (Refereed)
    Abstract [en]

    This to a great extent reduces the manpower, saves time and operates efficiently without human intervention. With the advent in technology, the existing systems are developed to have in built intelligence. The proposed work to monitor the pressure of the vehicle tire using the Arduino, this will be very much helpful to avoid the burst of tire and to understand about the tire pressure under various load situation of a vehicle. fuel level and the location can be updated during abnormal condition using wireless technology. The accident can be monitored using the high level vibration sensor and if the accident has occurred in any location it can immediately inform to the nearby hospital or ambulance service, the location of the accident. It is tire pressure monitoring. Pressure sensor acts as a main role to monitor the pressure of the vehicle, and it reports to the owner of the vehicle when the pressure gets low with the help of GSM work. This GSM work and the pressure sensor is connected to the Arduino board with the help of connecting wires. It is fuel level monitoring. Fuel level sensor is used to monitor the fuel of the vehicle and when the fuel gets low a message is automatically sent to the owner of the vehicle with the help of GSM work. This GSM work and the fuel sensor is connected to the arduino board with the help of connecting wires. It is accident tracking and intimating to nearby hospital. If the accident happens to the vehicle, with the help of vibration sensor the accident is recorded. The vibration is transmitted to GPS, GPS tracks the location of the vehicle and sent to GSM. It sends message to the nearby hospital and the hospital management has to take the responsibility in taking patient to the hospital for treatment.

  • 16. Uma, K.
    et al.
    Kannan, Anand
    KTH, School of Electrical Engineering (EES).
    The challenges and issues on big data analytics2017In: Journal of Advanced Research in Dynamical and Control Systems, ISSN 1943-023X, Vol. 2017, no Special Issue 2, p. 1242-1258Article in journal (Refereed)
    Abstract [en]

    A tremendous store of terabytes of information is created every day from present day data frameworks and advanced innovations, for example, Internet of Things and cloud computing. Analysing of these terabytes of information requires a ton of activities at various levels to extract data from knowledge base. In this manner, big data examination is a momentum region of innovative work. The fundamental goal of this paper is to analyse the potential effect of big data challenges, open research issues, and different tools related with it. Accordingly, this article gives a stage to investigate big data information at various stages. It finally provides the researchers to develop the solution based upon their challenges and also provides research issues.

  • 17. Vijayakumar, P.
    et al.
    Anand, Kannan
    KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS.
    Bose, S.
    Maheswari, V.
    Kowsalya, R.
    Kannan, A.
    Hierarchical key management scheme for securing mobile agents with optimal computation time2012In: International Conference on Modelling Optimization and Computing, Elsevier, 2012, Vol. 38, p. 1432-1443Conference paper (Refereed)
    Abstract [en]

    The Mobile agents are well suited for accessing contents of distributed web based applications including internet business. Such kinds of access must be secure enough enabling only authorized mobile agents to retrieve the contents from the distributed servers. This kind of security is provided by several algorithms including RSA based digital signature and elliptic curve digital signature cryptography. The main differences among the algorithms of the past literatures lie in the computational time of encryption and decryption of the keys used for encrypting and decrypting the content. In this paper we propose a modified hierarchical date constrained key management scheme which potentially reduces the overall computation time needed for key derivation and key signature check operations. Different algorithms are compared with our proposed mechanism and the experimental results show that the proposed method reduces the overall key derivation and key signature check computational time.

1 - 17 of 17
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf