
K S KuppusamyPondicherry University · Department of Computer Science
K S Kuppusamy
Ph.D
About
85
Publications
23,844
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,130
Citations
Introduction
Additional affiliations
November 2006 - present
January 2009 - December 2012
Education
June 2000 - May 2002
Publications
Publications (85)
This paper presents a novel model for scoring web pages, entitled SCOPAS (Semantic COmputation of PAge Score). With the prolific growth in the number of users of World Wide Web and the heterogeneity of their information needs, it becomes mandatory to evaluate the relevance of a web page in terms of user specific requirements. SCOPAS is aimed at mod...
Completely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA) is one of the major security components in the provision of fair web access by differentiating human access from malicious, automated access by bots. Though the CAPTCHA strengthens the security aspect of web access, their accessibility to people with visual impairm...
Non-visual web access depends on the textual description of various non-text elements of web pages. The existing methods of describing images for non-visual access do not provide a strong coupling between described images and their description. If an image is reused multiple times either in a single Web site or across multiple times, it is required...
With the emergence of Android as a leading operating system in mobile devices, it becomes mandatory to develop specialized, predictive and robust security measures to provide a dependable environment for users. Extant reactive and proactive security techniques would not be enough to tackle the fast-growing security challenges in the Android environ...
Inclusion of online videos on a website attracts a large number of audience because of its ease of perception. Even though rendering videos on the web is advantageous, persons with disabilities face difficulties in accessing the content. Web Content Accessibility Guidelines (WCAG) has recommended closed captions for persons with hearing problems an...
In today's world of ever-increasing cyber threats, safeguarding digital accounts is paramount. Traditional passwords are often vulnerable to brute force attacks and can be easily guessed, leading to a shift towards passphrases. However, using monolingual passphrases can pose several challenges, such as lack of diversity, predictability, memorabilit...
The proliferation of digital services and the imperative for secure authentication have necessitated the management of an expanding array of passwords, imposing a significant cognitive burden on users. The predominant method for authentication remains the use of passwords. However, a critical issue with this approach is that individuals frequently...
Usable security is an area of active research. Several factors needs to be considered while making the security usable. As the digital platforms have evolved into the primary source of information and service consumption, it is essential to make digital space secure and usable for all categories of users which certainly includes persons with visual...
User authentication is the cornerstone of providing secure access to the services in the digital ecosystem. Critical applications such as Banking use Personal Identification Number (PIN)-based passwords and One Time Passwords (OTP), for transactions to strengthen security. However, persons with visual impairments have often been a soft target for c...
Text-based password authentication is the most common password authentication in the digital space. People often need help to create secure and strong passwords for their digital accounts. People with visual impairments have inherent barriers in the user interface in identifying whether the password is secure. Though the visual feedback is provided...
Persons with visual impairments have often been a soft target for cybercriminals, and they are more susceptible to cyber attacks in the digital environment. The attacks, as mentioned above, are because they are visually/aurally exposed to the other sighted users. Visually impaired computer users suffer from secrecy and privacy issues on digital pla...
Phishing scams are increasing drastically, which affects Internet users in compromising personal
credentials. This paper proposes a novel feature utilization method for phishing URL detection called the
Polymorphic property of features. In the initial stage, the URL-related features (46 features) were
extracted. Later, a subset of features (19 out...
Accessibility of information for all, especially for People with Disabilities (PwDs) is a
major concern in today's digital world. In order to address this access need, it is important to have an assessment statement of websites regarding access for PwDs. With respect to Indian tourism, Online Travel Aggregators' (OTAs) websites are the major source...
Learning Management Systems mainly depends on the Internet in their working process. The internet has evolved into a venue for various malicious activities, and the learning management systems are now increasingly exposed to such activities and threats. The digital education sector faces various security-related issues, because it deals with sensit...
Malware is a top threat to the current digital world. It will be more devastating in coming years due to the expansion of information technology in various fields of life, engagement of different type of users, and increased technical sophistication in malware. The changing motivations, multi-resource investment in malware development and Return on...
Evaluating readability of web documents has gained attention due to several factors such as improving the effectiveness of writing and to reach a wider spectrum of audience. Current practices in this direction follow several statistical measures in evaluating readability of the document. In this paper, we have proposed a machine learning-based mode...
Authorized access to resources by legitimate users plays a crucial role in providing a secure and hassle-free user experience in the digital environments. Password remains the major authentication mechanism though there exist various drawbacks like leakage due to phishing and shoulder surfing, etc. This paper proposes two stronger transformations o...
Today’s Digital World is evolving rapidly and the smartphone usage has became mandatory. People use smartphones to get services like email, education, business, social communication, etc. For each service category, there are plenty of applications (Apps) available in the market. Along with Apps usage, it is obvious that a user need knowledge on sec...
The power of the WWW (World Wide Web) lies in the adoption of multiple types of media, which makes effective communication of content. Videos have emerged into a quick and efficient information delivery channel for users. To make a video accessible to persons with disabilities, several approaches have been proposed, which include various accessibil...
Phishing is a dominant threat in cyberspace where the attacker collects sensitive information from the victims by designing a fake site that appears highly similar to a legitimate website. The aim of the phishing attack is to steal sensitive credentials such as passwords, social security numbers. Recently, the phishing attacks have been expanding e...
The higher education institutions across the globe are steadily increasing their usage of the web platforms to disseminate information to its stakeholders. In this background, it becomes important to make these resources inclusive. An inclusive website of a higher education institution will facilitate seamless access to its resources for Persons wi...
The World Wide Web Consortium (W3C) has provided the most important set of guidelines for web accessibility which is popularly known as Web Content Accessibility Guidelines (WCAG). The accessibility analysis of higher education websites becomes paramount important to make them inclusive considering the growing number of enrollments of persons with...
In this study, we selected top eight social websites and five Persons with Disabilities (PwDs), for
the evaluation process in two perspectives- Psychological (Psycho) and Technological (Tech)
called Psycho-Tech, to explore the Psycho-Tech determinants to modify the behaviour towards
positive for PwDs. For this process, twelve psychological paramete...
The present age is the age of Information Technology (IT) and the Governments across the globe focuses on e-governance services. The websites serve as an excellent information dissemination platform, which is used by both disabled and non-disabled population. This study investigates the web usability and content accessibility called WUCA of webpage...
Identification of complex words is an interesting research problem with various application scenarios such as text simplification. There are various approaches to identify complex words either by incorporating the complete sentence in which the word appears or by focusing only on the word. This paper falls under the later category, which employs in...
In this study, we selected top eight social websites and five Persons with Disabilities (PwDs), for the evaluation process in two perspectives-Psychological (Psycho) and Technological (Tech) called Psycho-Tech, to explore the Psycho-Tech determinants to modify the behaviour towards positive for PwDs. For this process, twelve psychological parameter...
Visually impaired smartphone users are more vulnerable to cyber attacks such as visual/oral eavesdropping and shoulder surfing. One of the prime reasons is that these users are soft-target for the aforementioned attacks as they expose the visual and aural cues easier than the sighted users. Visually impaired people ultimately suffers from privacy t...
Nowadays, feature extraction from the web in terms of web accessibility standard is very important for making the websites accessible for all called Accessibility for All (A4A). There are machine learning techniques that play a vital role in feature extraction from the web. This feature extraction data used for preprocessing to train the machine le...
With the ongoing prolific expansion of the size of the World Wide Web, the quantity of video content is also expanding. With this massive increase in size, users encounter a serious problem when trying to decide which videos to spend their time on. Moreover, as a result of our modern-day faster lifestyles, users wish to consume the contents of the...
Nowadays, feature extraction from the web in terms of web accessibility standard is very important for making the websites accessible for all called Accessibility for All (A4A). There are machine learning techniques that play a vital role in feature extraction from the web. This feature extraction data used for preprocessing to train the machine le...
Web accessibility refers to allowing people with diverse capabilities to use the Internet, interact with it and contribute to it. The Web offers content and services to users, which is primarily monetized through advertisements. Web accessibility issues arise when a homogeneous team of web designers and developers produce homogeneous content and se...
Purpose: This paper proposes a model entitled MMSPhiD (Multidimensional similarity metrics Model for Screen reader user to Phishing Detection) which amalgamate multiple approaches to detect phishing
Design/methodology/approach: The model consists of three major components: 1) Machine-learning based approach 2) Typosquatting based approach 3) Phone...
Advertisement identification and filtering in web pages gain significance due to various factors such as accessibility, security, privacy, and obtrusiveness. Current practices in this direction involve maintaining URL-based regular expressions called filter lists. Each URL obtained on a web page is matched against this filter list. While effectual,...
Phishing has become a serious cyber-security issue, and it is spreading through various media such as e-mail, SMS to capture the victim’s critical profile information. Although many novel anti-phishing techniques have been developed to forestall the progress of phishing, it remains an unresolved issue. Smishing is an incarnation of Phishing attack,...
Internet connects the world and brings people closer with the help of Web Technology. It is web, which plays a vital role in almost every aspect of Information Technology in terms of information retrieval and also, provides full democracy of its accessing the resources. But, at the same, there are lots of obstacles called mismatches between a perso...
Web accessibility Status of Social websites and their Psychological Consequences.
Internet connects the world and brings people closer with the help of Web Technology. It is web, which plays a vital role in almost every aspect of Information Technology in terms of information retrieval and also, provides full democracy of its accessing the resources. But, at the same, there are lots of obstacles called mismatches between a perso...
In society, there are two types of persons with respect to abilities- one is called abled and another is called disabled. Both the types need to communicate friendly in the society. Traditionally, social identity has been achieved by face-to-face interactions. But, now the social identities can be developed and explored among the people by using th...
Presently, the social identities can be developed and explored among the people by using social websites like Facebook, WhatsApp, Twitter, Telegram, Instagram, Viber, etc. Generally, every society consists of two types of persons with respect to abilities called normal as well as abnormal (Persons with Disabilities). So, there is a need to communic...
The Web has become a popular and important medium of transmitting information from one place to another place. For making information accessible to all, we need to check their accessibility and readability score. Readability is a metric to measure the success of information being successfully conveyed to a large population when people are trying to...
This book is compiled from twenty-five articles which I wrote for Open Source For Magazine. This book has 25 stand-alone chapters each of which cover a modular, stand-alone development in the cyberspace. The primary focus of this book is to make the reader realize the volatile nature of technologies and concepts in cyberspace and the importance of...
The World Wide Web (WWW) is expanding exponentially. It has evolved into a standard resource to access the required information by people with diverse capabilities, information requirements and language abilities. In the present form, WWW incorporates a large number of human languages. Multilingual Information access involves websites offering cont...
Purpose: Nature of being accessible to all categories of users is one of the primary factors for enabling the wider reach of the resources published through World Wide Web. The accessibility of websites has been analyzed through W3C guidelines with the help of various tools. This paper presents a multi-tool accessibility assessment of government de...
Phishing remains a basic security issue in the cyberspace. In phishing, assailants steal sensitive information from victims by providing a fake site which looks like the visual clone of a legitimate site. Phishing shall be handled using various approaches. It is established that single filter methods would be insufficient to detect different catego...
With the emergence of World Wide Web (WWW) as the primary reference channel of information, the need for making it barrier-free for all categories of users has evolved into a critical factor. Making the web resources barrier-free for users requires action across various dimensions such as accessibility and readability. This paper presents an analys...
Malware is one of the top most obstructions for expansion and growth of digital acceptance among the users. Both enterprises and common users are struggling to get protected from the malware in the cyberspace, which emphasizes the importance of developing efficient methods of malware detection. In this work, we propose a machine learning based solu...
Malware is the main threat for all computing environments. It also acts as launching platform for many other cyber threats. Traditional malware detection system is not able to detect " modern " , " unknown " and " zero-day " malware. Recent developments in computing hardware and machine learning techniques have emerged as alternative solution for m...
The popularity of smartphones usage especially Android mobile platform has increased to 80% of share in global smartphone operating systems market, as a result of which it is on the top in the attacker's target list. The fact of having more private data and low security assurance letting the attacker to write several malware programs in different w...
Phishing is one of the major issues in cyber security. In phishing, attackers steal sensitive information from users by impersonation of legitimate websites. This information captured by phisher is used for variety of scenarios such as buying goods using online transaction illegally or sometime may sell the collected user data to illegal sources. T...
Indian Government is promoting the concept of Digital India for transforming the country with the recent digital innovations. Indian Railways, which is an integral part of Indian Government, is directly connected with millions of people in India. With the growing emphasis on online dissemination of services it becomes mandatory to analyze the acces...
Websites have evolved into an excellent medium of information dissemination and visibility. Hence governments and organizations around the world have websites as primary medium for information communication. The universal accessibility of this web medium remains a major challenge for both web developers and accessibility researchers. Conformance of...
The evolution of steganography to use web pages as cover medium has raised challenging research questions. Web page information hiding is a way to conceal information apart from its privacy policies like confidentiality, reliability and availability. This paper proposes a Tag repository and attributes truth table based method to hide data into web...
With the prolific increase in utility of smartphones across the spectrum of users, universal accessibility becomes mandatory without compromising security. This paper proposes an approach to authenticate users with a multimodal mechanism which is better suitedfor visually impaired. The model incorporates text medium in the form of braille, kinetic...
The relevancy and usability of the contents retrieved are the two major factors for deciding the utility value of web resources. In the case of persons with disabilities the usability aspect of the interface is solely dependent on the accessibility of the web contents. This paper proposes a model termed PARSER — Personalized Accessibility based Re-...
Vehicular Ad hoc Network (VANET) is a special kind of Mobile Ad hoc Network. VANETs are becoming a technology for connecting vehicle to computer networks. VANETs consist of dynamic nodes in the form of fast moving vehicles whose movements are restricted to road layouts and static nodes in the form of Road Side Units (RSU). Frequent communication di...
This paper focuses on building a blog search engine which doesn't focus only
on keyword search but includes extended search capabilities. It also
incorporates the blog-post concept clustering which is based on the category
extracted from the blog post semantic content analysis. The proposed approach
is titled as "BloSen (Blog Search Engine)". It in...
With the prolific growth in usage of smartphones across the spectrum of
people in the society it becomes mandatory to handle and configure these
devices effectively to achieve optimum results from it. This paper proposes a
context sensitive model termed COSMOS (COntext Sensitive MOdel for Smartphones)
for configuring the smartphones using multifact...
In today's instant communication era, mobile phones play an important role in
the efficient communication with respect to both individual and official
communication strata. With the drastic explosion in the quantity of calls
received and made, there is a need for analyses of patterns in these call logs
to assist the user of the mobile device in the...
The mammoth growth in the information technology sector in terms of both
quantity and pervasiveness has opened up a Pandora's Box of issues which are
relevant in technical and social aspects. This paper attempts to address one of
the critical issues among them which is concerned with the proper utilization
of computer systems and mobile devices by...
Users who visit a web page repeatedly at frequent intervals are more interested in knowing the recent changes that have occurred on the page than the entire contents of the web page. Because of the increased dynamism of web pages, it would be difficult for the user to identify the changes manually. This paper proposes an enhanced model for detectin...
The World Wide Web is the largest distributed information source which is accessed by billions of people all across the world. A unique content source on the web can be accessed by various users for different purposes. Hence it becomes mandatory to capture specific information requirements of each user. This paper proposes a model for building user...
The World Wide Web is the largest distributed information source which is accessed by billions of people all across the world. A unique content so urce on the web can be accessed byvarious users for different purposes. Hence it becomes mandatory tocapture specific information requirements of each user. This paper proposes a multimodal approach to b...
The evaluation of web pages against a query is the pivot around which the
Information Retrieval domain revolves around. The context sensitive, semantic
evaluation of web pages is a non-trivial problem which needs to be addressed
immediately. This research work proposes a model to evaluate the web pages by
cumulating the segment scores which are com...
The process of web page summarization differs from the traditional text summarization due to the inherent features in the structure of web pages comparing with normal documents. This paper proposes a model for web page summarization based on the segmentation approach. The proposed model performs an "inclusive summarization" by representing entities...
Physical location of users in a multi-agent system is crucial in order to provide them with context -awareness services. A context -aware system can answer to the requests of its users in a more effective way, being able of consider the conditioners that affect them. In this paper we focus in how to provide a FIPA multiagent system with a generic l...
Though World Wide Web is the single largest source of information, it is
ill-equipped to serve the people with vision related problems. With the
prolific increase in the interest to make the web accessible to all sections of
the society, solving this accessibility problem becomes mandatory. This paper
presents a technique for making web pages acces...
The World Wide Web caters to the needs of billions of users in heterogeneous
groups. Each user accessing the World Wide Web might have his / her own
specific interest and would expect the web to respond to the specific
requirements. The process of making the web to react in a customized manner is
achieved through personalization. This paper propose...
With the tremendous growth in the information communication sector, the
mobile phones have become the prime information communication devices. The
convergence of traditional telephony with the modern web enabled communication
in the mobile devices has made the communication much effective and simpler. As
mobile phones are becoming the crucial sourc...
The smartphone usage among people is increasing rapidly. With the phenomenal
growth of smartphone use, smartphone theft is also increasing. This paper
proposes a model to secure smartphones from theft as well as provides options
to access a smartphone through other smartphone or a normal mobile via Short
Message Service. This model provides option...
The result listing from search engines includes a link and a snippet from the
web page for each result item. The snippet in the result listing plays a vital
role in assisting the user to click on it. This paper proposes a novel approach
to construct the snippets based on a semantic evaluation of the segments in the
page. The target segment(s) is/ar...
The tremendous amount of increase in the quantity of information resources
available on the web has made the total time that the user spends on a single
page very minimal. Users revisiting the same page would be able to fetch the
required information much faster if the information that they consumed during
the previous visit(s) gets presented to th...
The results rendered by the search engines are mostly a linear snippet list.
With the prolific increase in the dynamism of web pages there is a need for
enhanced result lists from search engines in order to cope-up with the
expectations of the users. This paper proposes a model for dynamic construction
of a resultant page from various results fetch...
With the phenomenal growth of content in the World Wide Web, the diversity of
user supplied queries have become vivid. Searching for people on the web has
become an important type of search activity in the web search engines. This
paper proposes a model named "We.I.Pe" to identify people on the World Wide Web
using e-mail Id as the primary input. T...
The web page usage mining plays a vital role in enriching the page's content
and structure based on the feedbacks received from the user's interactions with
the page. This paper proposes a model for micro-managing the tracking
activities by fine-tuning the mining from the page level to the segment level.
The proposed model enables the web-master to...
The evaluation of a web page with respect to a query is a vital task in the
web information retrieval domain. This paper proposes the evaluation of a web
page as a bottom-up process from the segment level to the page level. A model
for evaluating the relevancy is proposed incorporating six different
dimensions. An algorithm for evaluating the segme...
In the view of massive content explosion in World Wide Web through
diverse sources, it has become mandatory to have content filtering
tools. The filtering of contents of the web pages holds greater
significance in cases of access by minor-age people. The traditional web
page blocking systems goes by the Boolean methodology of either
displaying the...
This work aims at a multi-step feedback centric Web search engine ensuring the retrieval of relevant fresh live results instead of those existing in the indexes. The methodology is based on the new concept called "micro search" which in turn creates the "micro indexes". These micro-indexes are the key factors utilized in re-ranking the selected doc...