Naveen Chilamkurti’s research while affiliated with La Trobe University and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (321)


Data Leakage Threats and Protection in Split Learning: A Survey
  • Conference Paper

December 2024

·

1 Read

Ngoc Duy Pham

·

Naveen Chilamkurti


Figure 2. Workflow cloning and deploying clients via FOG server.
Figure 5. EMS threat evasion methodology showing the phases involved in evaluating an EMS security tool's deceptive nature.
List of evasive vectors applied to Microsoft Windows 10 OS.
Hydrakon, a Framework for Measuring Indicators of Deception in Emulated Monitoring Systems
  • Article
  • Full-text available

December 2024

·

2 Reads

Future Internet

The current cybersecurity ecosystem is proving insufficient in today’s increasingly sophisticated cyber attacks. Malware authors and intruders have pursued innovative avenues to circumvent emulated monitoring systems (EMSs) such as honeypots, virtual machines, sandboxes and debuggers to continue with their malicious activities while remaining inconspicuous. Cybercriminals are improving their ability to detect EMS, by finding indicators of deception (IoDs) to expose their presence and avoid detection. It is proving a challenge for security analysts to deploy and manage EMS to evaluate their deceptive capability. In this paper, we introduce the Hydrakon framework, which is composed of an EMS controller and several Linux and Windows 10 clients. The EMS controller automates the deployment and management of the clients and EMS for the purpose of measuring EMS deceptive capabilities. Experiments were conducted by applying custom detection vectors to client real machines, virtual machines and sandboxes, where various artifacts were extracted and stored as csv files on the EMS controller. The experiment leverages the cosine similarity metric to compare and identify similar artifacts between a real system and a virtual machine or sandbox. Our results show that Hydrakon offers a valid approach to assess the deceptive capabilities of EMS without the need to target specific IoD within the target system, thereby fostering more robust and effective emulated monitoring systems.

Download


Figure 3. Taxonomy blockchain applications for small firms Source: own elaboration.
Figure 6. Opportunity and risk framework for blockchain-based SME finance literature Source: own elaboration.
A taxonomy of blockchain technology application and adoption by small and medium-sized enterprises

September 2024

·

157 Reads

·

3 Citations

Entrepreneurial Business and Economics Review

Objective: The objective of the article is to comprehensively examine the application and adoption of blockchain technology in SMEs. Recently, blockchain technology has garnered substantial attention owing to its transformative potential across diverse industries. Blockchain represents a decentralized and distributed ledger system that ensures data transparency, security, and immutability. This unique set of attributes has garnered attention from various sectors, ranging from finance and healthcare to supply chain and beyond. While predominant attention has been directed towards its impact on large corporations and financial institutions, the application and adoption of blockchain technology in small and medium-sized enterprises (SMEs) remains a relatively unexplored area. Research Design & Methods: This research utilized a narrative and critical literature review of the existing literature on blockchain technology and SMEs. Findings: We identified the key areas of application and drivers and barriers to SMEs’ adoption of blockchain technology. Supply chain and finance have emerged as primary domains witnessing heightened blockchain implementation. The intricate nature of supply chain operations involving a multitude of stakeholders and the centralized nature of financing with inherent information asymmetry have propelled blockchain adoption within these sectors. However, the complex nature of technology, regulatory uncertainty, and lack of technological capabilities of SMEs have been the barriers inhibiting the widespread adoption of blockchain technology in SMEs. Implications & Recommendations: The insights derived from this study can facilitate the successful design and implementation of blockchain-based solutions for SMEs. Blockchain solution providers must understand and tailor the solutions to SMEs. Blockchain-as-a-service (BaaS) can accelerate flexible application development, expediting blockchain integration in SMEs. Government, regulatory bodies, and SME groups are urged to collaborate in enhancing technological literacy among SMEs, facilitating their capacity to harness the advantages offered by blockchain technology. Contribution & Value Added: This research contributes to the field by shedding light on the underexplored realm of blockchain technology in SMEs. The created taxonomy, examination of adoption drivers and barriers, and the formulated opportunities-challenges framework provide valuable tools for understanding and navigating blockchain technology’s application and adoption-related challenges in SMEs. The identified gaps and proposed areas for future research further contribute to the ongoing discourse in this evolving field.



Visual Data and Pattern Analysis for Smart Education: A Robust DRL-Based Early Warning System for Student Performance Prediction

June 2024

·

25 Reads

·

1 Citation

Future Internet

Artificial Intelligence (AI) and Deep Reinforcement Learning (DRL) have revolutionised e-learning by creating personalised, adaptive, and secure environments. However, challenges such as privacy, bias, and data limitations persist. E-FedCloud aims to address these issues by providing more agile, personalised, and secure e-learning experiences. This study introduces E-FedCloud, an AI-assisted, adaptive e-learning system that automates personalised recommendations and tracking, thereby enhancing student performance. It employs federated learning-based authentication to ensure secure and private access for both course instructors and students. Intelligent Software Agents (ISAs) evaluate weekly student engagement using the Shannon Entropy method, classifying students into either engaged or not-engaged clusters. E-FedCloud utilises weekly engagement status, demographic information, and an innovative DRL-based early warning system, specifically ID2QN, to predict the performance of not-engaged students. Based on these predictions, the system categorises students into three groups: risk of dropping out, risk of scoring lower in the final exam, and risk of failing the end exam. It employs a multi-disciplinary ontology graph and an attention-based capsule network for automated, personalised recommendations. The system also integrates performance tracking to enhance student engagement. Data are securely stored on a blockchain using the LWEA encryption method.


Two-Layered Multi-Factor Authentication Using Decentralized Blockchain in IoT Environment

June 2024

·

69 Reads

Sensors

Internet of Things (IoT) technology is evolving over the peak of smart infrastructure with the participation of IoT devices in a wide range of applications. Traditional IoT authentication methods are vulnerable to threats due to wireless data transmission. However, IoT devices are resource- and energy-constrained, so building lightweight security that provides stronger authentication is essential. This paper proposes a novel, two-layered multi-factor authentication (2L-MFA) framework using blockchain to enhance IoT devices and user security. The first level of authentication is for IoT devices, one that considers secret keys, geographical location, and physically unclonable function (PUF). Proof-of-authentication (PoAh) and elliptic curve Diffie–Hellman are followed for lightweight and low latency support. Second-level authentication for IoT users, which are sub-categorized into four levels, each defined by specific factors such as identity, password, and biometrics. The first level involves a matrix-based password; the second level utilizes the elliptic curve digital signature algorithm (ECDSA); and levels 3 and 4 are secured with iris and finger vein, providing comprehensive and robust authentication. We deployed fuzzy logic to validate the authentication and make the system more robust. The 2L-MFA model significantly improves performance, reducing registration, login, and authentication times by up to 25%, 50%, and 25%, respectively, facilitating quicker cloud access post-authentication and enhancing overall efficiency.


Summary of Literature Survey.
Numeric results of Accuracy.
Numeric results of F1-score.
Numeric results of Precision.
Numerical Evaluation of Proposed vs. Existing Methods.
Visual Data and Pattern Analysis for Smart Education: A Robust Drl-Based Early Warning System for Student Performance Prediction

April 2024

·

45 Reads

·

1 Citation

Artificial Intelligence (AI) and Deep Reinforcement Learning (DRL) have revolutionised e-learning by creating personalised, adaptive, and secure environments. However, challenges such as privacy, bias, and data limitations persist. E-FedCloud aims to address these issues by providing more agile, personalised, and secure e-learning experiences. This study introduces E-FedCloud, an AI-assisted adaptive e-learning system that automates personalised recommendations and tracking, thereby enhancing student performance. It employs federated learning-based authentication to ensure secure and private access for both course instructors and students. Intelligent Software Agents (ISAs) evaluate weekly student engagement using the Shannon Entropy method, classifying students into either engaged or not-engaged clusters. E-FedCloud utilises weekly engagement status, demographic information, and an innovative DRL-based early warning system, specifically ID2QN, to predict the performance of not-engaged students. Based on these predictions, the system categorises students into three groups: risk of dropping out, risk of scoring lower in the final exam, and risk of failing the end exam. It employs a multi-disciplinary ontology graph and an attention-based capsule network for automated, personalised recommendations. The system also integrates performance tracking to enhance student engagement. Data is securely stored on a blockchain using the LWEA encryption method.



Citations (74)


... Their work highlighted "fear of missing out" and the cautious approach many firms take when implementing the technology. Kumar et al. [24] gave the types of the application of blockchain in supply chain management for small and medium-sized enterprises. Their approach presented the growth rate among SMEs and focused on such values as transparency and cost efficacy and trust for companies with lesser supply networks. ...

Reference:

Blockchain-Based Solutions for Trust and Transparency in Supply Chain Management
A taxonomy of blockchain technology application and adoption by small and medium-sized enterprises

Entrepreneurial Business and Economics Review

... However, controversies also emerge regarding data privacy, ethics in the use of algorithms in educational contexts, and the ability of these systems to emulate the complexity of human learning. Some studies suggest that while AI systems can offer accurate recommendations, their inability to capture the richness of the educational context can result in overly reductionist teaching approaches that fail to meet individual students' needs [9,10]. ...

Visual Data and Pattern Analysis for Smart Education: A Robust DRL-Based Early Warning System for Student Performance Prediction

Future Internet

... Consequently, Sukuk tokenization substantially reduces issuance costs. Additionally, tokenization enables fractional ownership, which can attract retail investors in SME financing by enhancing the tradability and liquidity of assets (Kumar et al., 2023). ...

Filling the SME credit gap: a systematic review of blockchain-based SME finance literature

Journal of Trade Science

... Previous studies using FL for the EMS of a MEMG often require complex structures. For instance, 14 input parameters and 45 rules was used in [34], 27 inference rules and 3 input variables with 3 membership functions each in [35], and 3 membership functions for each of the 5 selected input variables in [36], resulting in a total of 243 rules. ...

A Novel Price Discovery Insurance Scheme for Outage Resilient Energy Management System

IEEE Transactions on Industry Applications

... Another tool supporting efficient energy management is digital twins-virtual models of real-world energy systems. They allow the simulation of various scenarios, such as failures, demand changes, or the integration of new energy sources, without risking the actual system [148][149][150][151][152][153][154]. This enables cities to better plan investments and manage resources [155][156][157][158]. ...

A Comprehensive Review of Digital Twin Technology for Grid-Connected Microgrid Systems: State of the Art, Potential and Challenges Faced

Energies

... Several studies [5,26,27] selectively optimize or transmit a fraction of the local model's parameters to reduce computational or communication resource consumption. Studies in [28][29][30] split the model into several sub-models and offload a subset of sub-models to the server for updating, therefore alleviating the training burden of clients. However, these heterogeneous FL frameworks commonly assume the data heterogeneity (i.e., non-IID data) exclusively involves distribution shifts in the number of samples and/or labels, while neglecting the existence of domain shifts. ...

Binarizing Split Learning for Data Privacy Enhancement and Computation Reduction
  • Citing Article
  • January 2023

IEEE Transactions on Information Forensics and Security

... A generative latentbased approach [27] has been proposed to tackle real-time road surveillance challenges, arising from adverse weather conditions, lighting levels, motion blur, and low-resolution recordings from CCTV cameras. [28] These innovative techniques demonstrate significant potential in improving image quality and overcoming practical obstacles in real-time surveillance systems. ...

Rain Streak Removal for Single Images Using Conditional Generative Adversarial Networks

Applied Sciences

... Another interesting use of blockchain technology that applies various access controls to IoT smart apps is smart contracts. Furthermore, the security and privacy of smart applications depend heavily on the provenance of data [19]- [22]. Access-based access control (ABAC) offers the fine-grained policies utilized to permit or prohibit different actions of smart ecosystems, as well as the flexibility and granularity required to properly protect the data collected and shared by smart entities. ...

Blockchain-Based Privacy Preservation for IoT-Enabled Healthcare System
  • Citing Article
  • December 2022

ACM Transactions on Sensor Networks

... These algorithms can enhance student satisfaction by providing personalized recommendations based on user behaviour and preferences, thereby optimizing the learning experience by recommending materials based on commonalities with other users [10]. Collaborative filtering algorithms can identify students who might need more intensive support to increase their level of engagement, hence improving their performance [29]. Memory-based methods use the rating matrix to issue recommendations based on the relationship between the queried user and the item with the rest of the matrix [10]. ...

AISAR: Artificial Intelligence-Based Student Assessment and Recommendation System for E-Learning in Big Data

Sustainability