Sivaraman Eswaran

Sivaraman Eswaran
Verified
Sivaraman verified their affiliation via an institutional email.
Verified
Sivaraman verified their affiliation via an institutional email.
  • Doctor of Philosophy
  • Senior Lecturer at Curtin University Sarawak

About

68
Publications
14,333
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
453
Citations
Introduction
Skills and Expertise
Current institution
Curtin University Sarawak
Current position
  • Senior Lecturer
Additional affiliations
August 2018 - June 2022
PES University
Position
  • Professor (Associate)
Education
September 2012 - June 2019
Bharathiar University
Field of study
  • Computer Science

Publications

Publications (68)
Article
Full-text available
Healthcare data has risen as a top target for cyberattacks due to the rich amount of sensitive patient information. This negatively affects the potential of advanced analytics and collaborative research in healthcare. Homomorphic encryption (HE) has emerged as a promising technology for securing sensitive healthcare data while enabling computations...
Chapter
This survey explores the landscape of Intrusion Detection Systems (IDS) in 5G wireless networks, with a specific emphasis on those leveraging Machine Learning (ML) techniques. The deployment of 5G is poised to revolutionize telecommunications with unprecedented data rates, reduced latency, and enhanced capacity. However, the advanced infrastructure...
Article
Full-text available
Intrusion detection has been an active development area due to its importance in highly digitally connected ecosystems. Most of the existing developments have focused on the use of complex machine learning models that are black-box in nature. There is an urgent need to investigate a more transparent model approach for determining the features assoc...
Article
Full-text available
This study explores the application of Artificial Intelligence (AI), specifically Convolutional Neural Networks (CNNs), for detecting rice plant diseases using ARM Cortex-M microprocessors. Given the significant role of rice as a staple food, particularly in Malaysia where the rice self-sufficiency ratio dropped from 65.2% in 2021 to 62.6% in 2022,...
Article
Full-text available
This article presents a virtual machine placement technique aimed at minimizing power usage in heterogeneous cloud data centers. In this study, an innovative model for minimizing the power usage of a datacenter’s network is provided. The Enriched Discrete Butterfly Optimization method (EDBOA) is used as a meta-heuristic method in order to achieve a...
Article
Quantum computing represents a transformative advancement in computational power, with profound implications for cryptographic systems. This paper explores the intersection of quantum computing and cryptography, examining the potential for quantum computers to both break traditional cryptographic algorithms and enable new forms of secure communicat...
Article
Full-text available
The increasing need for efficient and sustainable agriculture has driven the adoption of advanced technologies like Artificial Intelligence (AI) in crop management. This study evaluates the feasibility of deploying AI models on ARM-M microcontrollers for real-time detection of rice plant diseases, crucial for early intervention and crop health mana...
Article
In this work, the classification of laryngeal cancer is attempted using deeply learned features obtained using Inception V3, Squeezenet, and VGG‐16 embedders in the Orange toolbox. Machine learning algorithms such as KNN, SVM, random forest, decision tree, and neural network classifiers are employed to classify the stages or categories of laryngeal...
Chapter
The Internet of Things (IoT) is rapidly getting popular throughout the globe. However, it is not in safe hands as it is facing many attacks from intruders. Malicious infections are at the pace of affecting IoT at a rate greater than 30%. Machine learning (ML) is one of the effective techniques for identifying malicious attacks on devices. Since IoT...
Article
Full-text available
In healthcare, patient information is a sparse critical asset considered as private data and is often protected by law. It is also the domain which is least explored in the field of Machine Learning. The main reason for this is to build efficient artificial intelligence (AI) based models for preliminary diagnosis of various diseases, it would requi...
Conference Paper
Abstract— In today’s post-covid culture, where everyone works from home, there is a huge possibility of serious long-term health problems. A lot of people have started taking up exercises at home and if done incorrectly, they can have major negative effects. Another one of the main contributors to these health issues is bad sitting posture, which i...
Article
Full-text available
The rise in frequency and consequence of cybercrimes enabled by artificial intelligence (AI) has been a cause of concern for decades. At the same time, we've seen the development of defensive capabilities. This article examines the mechanics of AI-enabled attacks. These include voice mimicking used for crime, and natural processing algorithms absor...
Article
Full-text available
The looming threat of quantum attacks on the digital infrastructure protected by conventional cryptographic protocol has generated urgency in identifying and deploying countermeasures that can mitigate the threat. There is a need for stronger cryptographic schemes that combine the strengths of both classic and quantum technologies. Post-Quantum Cry...
Article
Full-text available
Today’s modern enterprises are adjusting to new realities of connectivity. As companies become more distributed and autonomous, emerging applications demand more bandwidth, low latency, more spectrum, and higher reliability. 5G technology can aid many industries or enterprises to make quicker and better business decisions. Private 5G networks, also...
Article
Full-text available
Covid-19 has posed a serious threat to the existence of the human race. Early detection of the virus is vital to effectively containing the virus and treating the patients. Profound testing methods such as the Real-time reverse transcription-polymerase chain reaction (RT-PCR) test and the Rapid Antigen Test (RAT) are being used for detection, but t...
Article
Injection-based attacks have consistently made the Open Web Application Security Project (OWASP)Top 10 vulnerabilities for years. ¹ Common types of injection attacks include SQL injection, cross-site scripting (XSS) and code injection. Filter engines are used to detect and sanitise user inputs for these malicious attacks. The user input is assumed...
Article
Wireless communication is a process of transferring information from one place to another place through radio waves. The transfer of information can be either an image or numerical data or voice or video. The design of wireless modules were started to come for a general user in the late 20th century but it has not been accepted in many applications...
Chapter
Full-text available
Recent technological advancements in wireless communication and sensors made Wireless Sensor Networks (WSNs) as one of the demanding platforms in the current scenario. In WSN, tiny sensor nodes are collecting and monitoring the biological data or physical data or environmental data and transmits to the Base Station (BS) through gateway routers. The...
Article
Recent technological advancement in wireless communication and sensors made Wireless Sensor Networks (WSNs) as one of the demanding platforms in the current scenario. In WSN, tiny sensor nodes are collecting and monitoring the biological data or physical data or environmental data and transmitted to the base station (BS) through gateway routers. Th...
Article
Full-text available
Globally, the confirmed coronavirus (SARS-CoV2) cases are being increasing day by day. Coronavirus (COVID-19) causes an acute infection in the respiratory tract that started spreading in late 2019. Huge datasets of SARS-CoV2 patients can be incorporated and analyzed by machine learning strategies for understanding the pattern of pathological spread...
Article
Purpose In the recent era, banking infrastructure constructs various remotely handled platforms for users. However, the security risk toward the banking sector has also elevated, as it is visible from the rising number of reported attacks against these security systems. Intelligence shows that cyberattacks of the crawlers are increasing. Malicious...
Chapter
Full-text available
Card transaction is one of the most widely used transaction methods in the payment industry. There are more than 50.6 million credit cards and 840.6 million debit cards in India. These cards are so confidential that special care has to be taken while carrying and handling these cards. Carrying these cards everywhere and every time is fewer burdens...
Article
IT functions in organisations produce enormous quantities of data, logs and events. In the current IT world, handling a large amount of data is a challenging task and it is the responsibility of network administrators to transmit and store the data securely. If any data is disclosed or tampered with by an attacker, either locally or remotely, then...
Article
Full-text available
Smart environment is about incorporating smart thinking in the environment and implementing the technical intervention that improvise the city's environment. Artificial intelligence (AI) provides solutions in huge technological issues in various aspects of day-to-day life such as autonomous transportation, governance, healthcare, agriculture, maint...
Article
Full-text available
Virtual Machine Placement in Cloud Computing is to allocate the Virtual Machine (VM) (user request) to suitable Physical Machine’s (PM) so that the wastage of resources is reduced. Allocation of appropriate VM’s to suitable and effective PM’s will lead the service provider to be a better competitor with more available resources for affording a gre...
Article
Full-text available
Optimal management of the cloud resources for multimedia contents is the important aim of this research. In our previous work, multiple kernel learning with support vector machine (MKL-SVM) is introduced, which can achieve a balanced resource usage with multimedia user request. However, existing work do not concentrate on caching mechanism which mi...
Article
The data publishing is recently providing tremendous growth for data analysis. The data from various organizations are collected and it is used mainly for predictive analytics. The greatest issue for the organizations to provide the data for publishing is to maintain the data privacy of the record owners. The privacy of the record owners is maintai...
Article
Full-text available
2 Abstract: The issue of data privacy is at the forefront of everybody's mind. Media commercials advertise security merchandise and news programs oftentimes describe the most recent knowledge breach. Public perception aside, any organization incorporates a legal obligation to make sure that the privacy of their workers is protected. Laws compel som...

Network

Cited By