K S Kuppusamy

K S Kuppusamy
Pondicherry University · Department of Computer Science

Ph.D

About

85
Publications
23,844
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,130
Citations
Additional affiliations
November 2006 - present
Pondicherry University
Position
  • Professor (Assistant)
January 2009 - December 2012
Pondicherry University
Education
June 2000 - May 2002
Madurai Kamaraj University
Field of study
  • Computer Science and Information Technology

Publications

Publications (85)
Article
Full-text available
This paper presents a novel model for scoring web pages, entitled SCOPAS (Semantic COmputation of PAge Score). With the prolific growth in the number of users of World Wide Web and the heterogeneity of their information needs, it becomes mandatory to evaluate the relevance of a web page in terms of user specific requirements. SCOPAS is aimed at mod...
Article
Full-text available
Completely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA) is one of the major security components in the provision of fair web access by differentiating human access from malicious, automated access by bots. Though the CAPTCHA strengthens the security aspect of web access, their accessibility to people with visual impairm...
Article
Full-text available
Non-visual web access depends on the textual description of various non-text elements of web pages. The existing methods of describing images for non-visual access do not provide a strong coupling between described images and their description. If an image is reused multiple times either in a single Web site or across multiple times, it is required...
Article
With the emergence of Android as a leading operating system in mobile devices, it becomes mandatory to develop specialized, predictive and robust security measures to provide a dependable environment for users. Extant reactive and proactive security techniques would not be enough to tackle the fast-growing security challenges in the Android environ...
Article
Full-text available
Inclusion of online videos on a website attracts a large number of audience because of its ease of perception. Even though rendering videos on the web is advantageous, persons with disabilities face difficulties in accessing the content. Web Content Accessibility Guidelines (WCAG) has recommended closed captions for persons with hearing problems an...
Article
In today's world of ever-increasing cyber threats, safeguarding digital accounts is paramount. Traditional passwords are often vulnerable to brute force attacks and can be easily guessed, leading to a shift towards passphrases. However, using monolingual passphrases can pose several challenges, such as lack of diversity, predictability, memorabilit...
Article
The proliferation of digital services and the imperative for secure authentication have necessitated the management of an expanding array of passwords, imposing a significant cognitive burden on users. The predominant method for authentication remains the use of passwords. However, a critical issue with this approach is that individuals frequently...
Chapter
Usable security is an area of active research. Several factors needs to be considered while making the security usable. As the digital platforms have evolved into the primary source of information and service consumption, it is essential to make digital space secure and usable for all categories of users which certainly includes persons with visual...
Article
User authentication is the cornerstone of providing secure access to the services in the digital ecosystem. Critical applications such as Banking use Personal Identification Number (PIN)-based passwords and One Time Passwords (OTP), for transactions to strengthen security. However, persons with visual impairments have often been a soft target for c...
Article
Full-text available
Text-based password authentication is the most common password authentication in the digital space. People often need help to create secure and strong passwords for their digital accounts. People with visual impairments have inherent barriers in the user interface in identifying whether the password is secure. Though the visual feedback is provided...
Preprint
Full-text available
Persons with visual impairments have often been a soft target for cybercriminals, and they are more susceptible to cyber attacks in the digital environment. The attacks, as mentioned above, are because they are visually/aurally exposed to the other sighted users. Visually impaired computer users suffer from secrecy and privacy issues on digital pla...
Article
Full-text available
Phishing scams are increasing drastically, which affects Internet users in compromising personal credentials. This paper proposes a novel feature utilization method for phishing URL detection called the Polymorphic property of features. In the initial stage, the URL-related features (46 features) were extracted. Later, a subset of features (19 out...
Article
Full-text available
Accessibility of information for all, especially for People with Disabilities (PwDs) is a major concern in today's digital world. In order to address this access need, it is important to have an assessment statement of websites regarding access for PwDs. With respect to Indian tourism, Online Travel Aggregators' (OTAs) websites are the major source...
Conference Paper
Learning Management Systems mainly depends on the Internet in their working process. The internet has evolved into a venue for various malicious activities, and the learning management systems are now increasingly exposed to such activities and threats. The digital education sector faces various security-related issues, because it deals with sensit...
Chapter
Malware is a top threat to the current digital world. It will be more devastating in coming years due to the expansion of information technology in various fields of life, engagement of different type of users, and increased technical sophistication in malware. The changing motivations, multi-resource investment in malware development and Return on...
Article
Evaluating readability of web documents has gained attention due to several factors such as improving the effectiveness of writing and to reach a wider spectrum of audience. Current practices in this direction follow several statistical measures in evaluating readability of the document. In this paper, we have proposed a machine learning-based mode...
Article
Full-text available
Authorized access to resources by legitimate users plays a crucial role in providing a secure and hassle-free user experience in the digital environments. Password remains the major authentication mechanism though there exist various drawbacks like leakage due to phishing and shoulder surfing, etc. This paper proposes two stronger transformations o...
Chapter
Today’s Digital World is evolving rapidly and the smartphone usage has became mandatory. People use smartphones to get services like email, education, business, social communication, etc. For each service category, there are plenty of applications (Apps) available in the market. Along with Apps usage, it is obvious that a user need knowledge on sec...
Article
The power of the WWW (World Wide Web) lies in the adoption of multiple types of media, which makes effective communication of content. Videos have emerged into a quick and efficient information delivery channel for users. To make a video accessible to persons with disabilities, several approaches have been proposed, which include various accessibil...
Thesis
Phishing is a dominant threat in cyberspace where the attacker collects sensitive information from the victims by designing a fake site that appears highly similar to a legitimate website. The aim of the phishing attack is to steal sensitive credentials such as passwords, social security numbers. Recently, the phishing attacks have been expanding e...
Article
The higher education institutions across the globe are steadily increasing their usage of the web platforms to disseminate information to its stakeholders. In this background, it becomes important to make these resources inclusive. An inclusive website of a higher education institution will facilitate seamless access to its resources for Persons wi...
Article
The World Wide Web Consortium (W3C) has provided the most important set of guidelines for web accessibility which is popularly known as Web Content Accessibility Guidelines (WCAG). The accessibility analysis of higher education websites becomes paramount important to make them inclusive considering the growing number of enrollments of persons with...
Article
Full-text available
In this study, we selected top eight social websites and five Persons with Disabilities (PwDs), for the evaluation process in two perspectives- Psychological (Psycho) and Technological (Tech) called Psycho-Tech, to explore the Psycho-Tech determinants to modify the behaviour towards positive for PwDs. For this process, twelve psychological paramete...
Chapter
The present age is the age of Information Technology (IT) and the Governments across the globe focuses on e-governance services. The websites serve as an excellent information dissemination platform, which is used by both disabled and non-disabled population. This study investigates the web usability and content accessibility called WUCA of webpage...
Chapter
Identification of complex words is an interesting research problem with various application scenarios such as text simplification. There are various approaches to identify complex words either by incorporating the complete sentence in which the word appears or by focusing only on the word. This paper falls under the later category, which employs in...
Article
Full-text available
In this study, we selected top eight social websites and five Persons with Disabilities (PwDs), for the evaluation process in two perspectives-Psychological (Psycho) and Technological (Tech) called Psycho-Tech, to explore the Psycho-Tech determinants to modify the behaviour towards positive for PwDs. For this process, twelve psychological parameter...
Chapter
Visually impaired smartphone users are more vulnerable to cyber attacks such as visual/oral eavesdropping and shoulder surfing. One of the prime reasons is that these users are soft-target for the aforementioned attacks as they expose the visual and aural cues easier than the sighted users. Visually impaired people ultimately suffers from privacy t...
Conference Paper
Full-text available
Nowadays, feature extraction from the web in terms of web accessibility standard is very important for making the websites accessible for all called Accessibility for All (A4A). There are machine learning techniques that play a vital role in feature extraction from the web. This feature extraction data used for preprocessing to train the machine le...
Article
With the ongoing prolific expansion of the size of the World Wide Web, the quantity of video content is also expanding. With this massive increase in size, users encounter a serious problem when trying to decide which videos to spend their time on. Moreover, as a result of our modern-day faster lifestyles, users wish to consume the contents of the...
Poster
Full-text available
Nowadays, feature extraction from the web in terms of web accessibility standard is very important for making the websites accessible for all called Accessibility for All (A4A). There are machine learning techniques that play a vital role in feature extraction from the web. This feature extraction data used for preprocessing to train the machine le...
Research
Web accessibility refers to allowing people with diverse capabilities to use the Internet, interact with it and contribute to it. The Web offers content and services to users, which is primarily monetized through advertisements. Web accessibility issues arise when a homogeneous team of web designers and developers produce homogeneous content and se...
Article
Purpose: This paper proposes a model entitled MMSPhiD (Multidimensional similarity metrics Model for Screen reader user to Phishing Detection) which amalgamate multiple approaches to detect phishing Design/methodology/approach: The model consists of three major components: 1) Machine-learning based approach 2) Typosquatting based approach 3) Phone...
Article
Advertisement identification and filtering in web pages gain significance due to various factors such as accessibility, security, privacy, and obtrusiveness. Current practices in this direction involve maintaining URL-based regular expressions called filter lists. Each URL obtained on a web page is matched against this filter list. While effectual,...
Article
Phishing has become a serious cyber-security issue, and it is spreading through various media such as e-mail, SMS to capture the victim’s critical profile information. Although many novel anti-phishing techniques have been developed to forestall the progress of phishing, it remains an unresolved issue. Smishing is an incarnation of Phishing attack,...
Poster
Full-text available
Internet connects the world and brings people closer with the help of Web Technology. It is web, which plays a vital role in almost every aspect of Information Technology in terms of information retrieval and also, provides full democracy of its accessing the resources. But, at the same, there are lots of obstacles called mismatches between a perso...
Presentation
Web accessibility Status of Social websites and their Psychological Consequences.
Conference Paper
Internet connects the world and brings people closer with the help of Web Technology. It is web, which plays a vital role in almost every aspect of Information Technology in terms of information retrieval and also, provides full democracy of its accessing the resources. But, at the same, there are lots of obstacles called mismatches between a perso...
Conference Paper
Full-text available
In society, there are two types of persons with respect to abilities- one is called abled and another is called disabled. Both the types need to communicate friendly in the society. Traditionally, social identity has been achieved by face-to-face interactions. But, now the social identities can be developed and explored among the people by using th...
Conference Paper
Presently, the social identities can be developed and explored among the people by using social websites like Facebook, WhatsApp, Twitter, Telegram, Instagram, Viber, etc. Generally, every society consists of two types of persons with respect to abilities called normal as well as abnormal (Persons with Disabilities). So, there is a need to communic...
Article
Full-text available
The Web has become a popular and important medium of transmitting information from one place to another place. For making information accessible to all, we need to check their accessibility and readability score. Readability is a metric to measure the success of information being successfully conveyed to a large population when people are trying to...
Book
This book is compiled from twenty-five articles which I wrote for Open Source For Magazine. This book has 25 stand-alone chapters each of which cover a modular, stand-alone development in the cyberspace. The primary focus of this book is to make the reader realize the volatile nature of technologies and concepts in cyberspace and the importance of...
Article
The World Wide Web (WWW) is expanding exponentially. It has evolved into a standard resource to access the required information by people with diverse capabilities, information requirements and language abilities. In the present form, WWW incorporates a large number of human languages. Multilingual Information access involves websites offering cont...
Article
Purpose: Nature of being accessible to all categories of users is one of the primary factors for enabling the wider reach of the resources published through World Wide Web. The accessibility of websites has been analyzed through W3C guidelines with the help of various tools. This paper presents a multi-tool accessibility assessment of government de...
Article
Phishing remains a basic security issue in the cyberspace. In phishing, assailants steal sensitive information from victims by providing a fake site which looks like the visual clone of a legitimate site. Phishing shall be handled using various approaches. It is established that single filter methods would be insufficient to detect different catego...
Article
Full-text available
With the emergence of World Wide Web (WWW) as the primary reference channel of information, the need for making it barrier-free for all categories of users has evolved into a critical factor. Making the web resources barrier-free for users requires action across various dimensions such as accessibility and readability. This paper presents an analys...
Article
Full-text available
Malware is one of the top most obstructions for expansion and growth of digital acceptance among the users. Both enterprises and common users are struggling to get protected from the malware in the cyberspace, which emphasizes the importance of developing efficient methods of malware detection. In this work, we propose a machine learning based solu...
Article
Malware is the main threat for all computing environments. It also acts as launching platform for many other cyber threats. Traditional malware detection system is not able to detect " modern " , " unknown " and " zero-day " malware. Recent developments in computing hardware and machine learning techniques have emerged as alternative solution for m...
Conference Paper
The popularity of smartphones usage especially Android mobile platform has increased to 80% of share in global smartphone operating systems market, as a result of which it is on the top in the attacker's target list. The fact of having more private data and low security assurance letting the attacker to write several malware programs in different w...
Conference Paper
Phishing is one of the major issues in cyber security. In phishing, attackers steal sensitive information from users by impersonation of legitimate websites. This information captured by phisher is used for variety of scenarios such as buying goods using online transaction illegally or sometime may sell the collected user data to illegal sources. T...
Conference Paper
Indian Government is promoting the concept of Digital India for transforming the country with the recent digital innovations. Indian Railways, which is an integral part of Indian Government, is directly connected with millions of people in India. With the growing emphasis on online dissemination of services it becomes mandatory to analyze the acces...
Article
Full-text available
Websites have evolved into an excellent medium of information dissemination and visibility. Hence governments and organizations around the world have websites as primary medium for information communication. The universal accessibility of this web medium remains a major challenge for both web developers and accessibility researchers. Conformance of...
Conference Paper
The evolution of steganography to use web pages as cover medium has raised challenging research questions. Web page information hiding is a way to conceal information apart from its privacy policies like confidentiality, reliability and availability. This paper proposes a Tag repository and attributes truth table based method to hide data into web...
Conference Paper
With the prolific increase in utility of smartphones across the spectrum of users, universal accessibility becomes mandatory without compromising security. This paper proposes an approach to authenticate users with a multimodal mechanism which is better suitedfor visually impaired. The model incorporates text medium in the form of braille, kinetic...
Conference Paper
The relevancy and usability of the contents retrieved are the two major factors for deciding the utility value of web resources. In the case of persons with disabilities the usability aspect of the interface is solely dependent on the accessibility of the web contents. This paper proposes a model termed PARSER — Personalized Accessibility based Re-...
Conference Paper
Vehicular Ad hoc Network (VANET) is a special kind of Mobile Ad hoc Network. VANETs are becoming a technology for connecting vehicle to computer networks. VANETs consist of dynamic nodes in the form of fast moving vehicles whose movements are restricted to road layouts and static nodes in the form of Road Side Units (RSU). Frequent communication di...
Article
Full-text available
This paper focuses on building a blog search engine which doesn't focus only on keyword search but includes extended search capabilities. It also incorporates the blog-post concept clustering which is based on the category extracted from the blog post semantic content analysis. The proposed approach is titled as "BloSen (Blog Search Engine)". It in...
Article
Full-text available
With the prolific growth in usage of smartphones across the spectrum of people in the society it becomes mandatory to handle and configure these devices effectively to achieve optimum results from it. This paper proposes a context sensitive model termed COSMOS (COntext Sensitive MOdel for Smartphones) for configuring the smartphones using multifact...
Article
Full-text available
In today's instant communication era, mobile phones play an important role in the efficient communication with respect to both individual and official communication strata. With the drastic explosion in the quantity of calls received and made, there is a need for analyses of patterns in these call logs to assist the user of the mobile device in the...
Article
Full-text available
The mammoth growth in the information technology sector in terms of both quantity and pervasiveness has opened up a Pandora's Box of issues which are relevant in technical and social aspects. This paper attempts to address one of the critical issues among them which is concerned with the proper utilization of computer systems and mobile devices by...
Article
Full-text available
Users who visit a web page repeatedly at frequent intervals are more interested in knowing the recent changes that have occurred on the page than the entire contents of the web page. Because of the increased dynamism of web pages, it would be difficult for the user to identify the changes manually. This paper proposes an enhanced model for detectin...
Chapter
The World Wide Web is the largest distributed information source which is accessed by billions of people all across the world. A unique content source on the web can be accessed by various users for different purposes. Hence it becomes mandatory to capture specific information requirements of each user. This paper proposes a model for building user...
Article
Full-text available
The World Wide Web is the largest distributed information source which is accessed by billions of people all across the world. A unique content so urce on the web can be accessed byvarious users for different purposes. Hence it becomes mandatory tocapture specific information requirements of each user. This paper proposes a multimodal approach to b...
Article
Full-text available
The evaluation of web pages against a query is the pivot around which the Information Retrieval domain revolves around. The context sensitive, semantic evaluation of web pages is a non-trivial problem which needs to be addressed immediately. This research work proposes a model to evaluate the web pages by cumulating the segment scores which are com...
Article
Full-text available
The process of web page summarization differs from the traditional text summarization due to the inherent features in the structure of web pages comparing with normal documents. This paper proposes a model for web page summarization based on the segmentation approach. The proposed model performs an "inclusive summarization" by representing entities...
Article
Physical location of users in a multi-agent system is crucial in order to provide them with context -awareness services. A context -aware system can answer to the requests of its users in a more effective way, being able of consider the conditioners that affect them. In this paper we focus in how to provide a FIPA multiagent system with a generic l...
Article
Full-text available
Though World Wide Web is the single largest source of information, it is ill-equipped to serve the people with vision related problems. With the prolific increase in the interest to make the web accessible to all sections of the society, solving this accessibility problem becomes mandatory. This paper presents a technique for making web pages acces...
Article
Full-text available
The World Wide Web caters to the needs of billions of users in heterogeneous groups. Each user accessing the World Wide Web might have his / her own specific interest and would expect the web to respond to the specific requirements. The process of making the web to react in a customized manner is achieved through personalization. This paper propose...
Article
Full-text available
With the tremendous growth in the information communication sector, the mobile phones have become the prime information communication devices. The convergence of traditional telephony with the modern web enabled communication in the mobile devices has made the communication much effective and simpler. As mobile phones are becoming the crucial sourc...
Article
Full-text available
The smartphone usage among people is increasing rapidly. With the phenomenal growth of smartphone use, smartphone theft is also increasing. This paper proposes a model to secure smartphones from theft as well as provides options to access a smartphone through other smartphone or a normal mobile via Short Message Service. This model provides option...
Article
Full-text available
The result listing from search engines includes a link and a snippet from the web page for each result item. The snippet in the result listing plays a vital role in assisting the user to click on it. This paper proposes a novel approach to construct the snippets based on a semantic evaluation of the segments in the page. The target segment(s) is/ar...
Article
Full-text available
The tremendous amount of increase in the quantity of information resources available on the web has made the total time that the user spends on a single page very minimal. Users revisiting the same page would be able to fetch the required information much faster if the information that they consumed during the previous visit(s) gets presented to th...
Article
Full-text available
The results rendered by the search engines are mostly a linear snippet list. With the prolific increase in the dynamism of web pages there is a need for enhanced result lists from search engines in order to cope-up with the expectations of the users. This paper proposes a model for dynamic construction of a resultant page from various results fetch...
Article
Full-text available
With the phenomenal growth of content in the World Wide Web, the diversity of user supplied queries have become vivid. Searching for people on the web has become an important type of search activity in the web search engines. This paper proposes a model named "We.I.Pe" to identify people on the World Wide Web using e-mail Id as the primary input. T...
Article
Full-text available
The web page usage mining plays a vital role in enriching the page's content and structure based on the feedbacks received from the user's interactions with the page. This paper proposes a model for micro-managing the tracking activities by fine-tuning the mining from the page level to the segment level. The proposed model enables the web-master to...
Article
Full-text available
The evaluation of a web page with respect to a query is a vital task in the web information retrieval domain. This paper proposes the evaluation of a web page as a bottom-up process from the segment level to the page level. A model for evaluating the relevancy is proposed incorporating six different dimensions. An algorithm for evaluating the segme...
Article
Full-text available
In the view of massive content explosion in World Wide Web through diverse sources, it has become mandatory to have content filtering tools. The filtering of contents of the web pages holds greater significance in cases of access by minor-age people. The traditional web page blocking systems goes by the Boolean methodology of either displaying the...
Conference Paper
This work aims at a multi-step feedback centric Web search engine ensuring the retrieval of relevant fresh live results instead of those existing in the indexes. The methodology is based on the new concept called "micro search" which in turn creates the "micro indexes". These micro-indexes are the key factors utilized in re-ranking the selected doc...

Network

Cited By