Sivakumar Rela

affiliation not provided to SSRN

SCHOLARLY PAPERS

17

DOWNLOADS
Rank 22,894

SSRN RANKINGS

Top 22,894

in Total Papers Downloads

4,157

SSRN CITATIONS
Rank 6,156

SSRN RANKINGS

Top 6,156

in Total Papers Citations

283

CROSSREF CITATIONS

0

Scholarly Papers (17)

1.

Analyzing and Fixing Cyber Security Threats for Supply Chain Management

International Journal For Technological Research In Engineering Volume 4, Issue 5, January-2017
Number of pages: 4 Posted: 11 Dec 2019
Charisma University, affiliation not provided to SSRN, affiliation not provided to SSRN, affiliation not provided to SSRN and affiliation not provided to SSRN
Downloads 910 (48,340)
Citation 2

Abstract:

Loading...

2.

Mitigating Cyber Security Threats of Industrial Control Systems (Scada & Dcs)

3rd International Conference on Emerging Technologies in Engineering, Biomedical, Medical and Science (ETEBMS – July 2017)
Number of pages: 4 Posted: 11 Dec 2019
Charisma University, affiliation not provided to SSRN, affiliation not provided to SSRN, affiliation not provided to SSRN and affiliation not provided to SSRN
Downloads 696 (69,224)

Abstract:

Loading...

3.

Uses of Different Cyber Security Service to Prevent Attack on Smart Home Infrastructure

International Journal For Technological Research In Engineering Volume 1, Issue 11, July-2014
Number of pages: 5 Posted: 11 Dec 2019
Charisma University, affiliation not provided to SSRN, affiliation not provided to SSRN and affiliation not provided to SSRN
Downloads 528 (98,781)
Citation 36

Abstract:

Loading...

4.

Mitigating IoT Security and Privacy Challenges Using Distributed Ledger Based Blockchain (Dl-BC) Technology

International Journal For Technological Research In Engineering Volume 4, Issue 8, April-2017
Number of pages: 6 Posted: 11 Dec 2019
Charisma University, affiliation not provided to SSRN, affiliation not provided to SSRN, affiliation not provided to SSRN and affiliation not provided to SSRN
Downloads 342 (162,250)
Citation 1

Abstract:

Loading...

5.

To Classify Cyber-Security Threats in Automotive Doming Using Different Assessment Methodologies

International Journal For Technological Research In Engineering Volume 3, Issue 3, November-2015
Number of pages: 6 Posted: 11 Dec 2019
Charisma University, affiliation not provided to SSRN, affiliation not provided to SSRN and affiliation not provided to SSRN
Downloads 330 (168,641)
Citation 37

Abstract:

Loading...

6.

A Comprehensive Survey on Security in Cloud Computing

International Conference on Emerging Technologies in Engineering, Biomedical, Medical and Science (ETEBMS - 2016)
Number of pages: 4 Posted: 11 Dec 2019
Charisma University, affiliation not provided to SSRN, affiliation not provided to SSRN and affiliation not provided to SSRN
Downloads 280 (200,297)
Citation 1

Abstract:

Loading...

7.

Identifying & Mitigating Cyber Security Threats in Vehicular Technologies

International Journal For Technological Research In Engineering Volume 3, Issue 7, March-2016
Number of pages: 4 Posted: 11 Dec 2019
Charisma University, affiliation not provided to SSRN, affiliation not provided to SSRN and affiliation not provided to SSRN
Downloads 229 (244,238)
Citation 43

Abstract:

Loading...

8.

Uses of Artificial Intelligent Techniques to Build Accurate Models for Intrusion Detection System

International Journal For Technological Research In Engineering Volume 2, Issue 12, August-2015
Number of pages: 5 Posted: 11 Dec 2019
Charisma University, affiliation not provided to SSRN, affiliation not provided to SSRN, affiliation not provided to SSRN and affiliation not provided to SSRN
Downloads 210 (265,000)
Citation 45

Abstract:

Loading...

9.

Uses of Cluster Computing Techniques to Perform Big Data Analytics for Smart Grid Automation System

International Journal For Technological Research In Engineering Volume 1, Issue 7, March-2014
Number of pages: 5 Posted: 11 Dec 2019
Charisma University, affiliation not provided to SSRN, affiliation not provided to SSRN and affiliation not provided to SSRN
Downloads 155 (346,300)
Citation 36

Abstract:

Loading...

Smart Grid; Data Analytics; Big Data; Apache Spark; Anomaly based algorithm; Classification algorithms; Data communication; Denial of service attack; Intrusion detection; Cyber Security; Cloud Security; Network ; Cyber; Cyber Threats; Threat Analysis ; Information Security; Data security

10.

A Study Paper on Security Related Issue Before Adopting Cloud Computing Service Model

International Journal For Technological Research In Engineering Volume 3, Issue 4, December-2015
Number of pages: 4 Posted: 11 Dec 2019
Charisma University, affiliation not provided to SSRN, affiliation not provided to SSRN and affiliation not provided to SSRN
Downloads 151 (353,993)
Citation 38

Abstract:

Loading...

11.

Embedding Machine & Deep Learning for Mitigating Security & Privacy Issues in IoT Enabled Devices & Networks

International Journal For Technological Research In Engineering, 2018
Number of pages: 25 Posted: 11 Dec 2019
Charisma University, affiliation not provided to SSRN, affiliation not provided to SSRN, affiliation not provided to SSRN and affiliation not provided to SSRN
Downloads 100 (483,127)
Citation 1

Abstract:

Loading...

12.

Preventing and Detecting Cyber Attacks (Stl & Amf) on Additive Manufacturing (Am) Process Chain

International Journal For Technological Research In Engineering Volume 5, Issue 9, May-2018
Number of pages: 8 Posted: 11 Dec 2019
Charisma University, affiliation not provided to SSRN, affiliation not provided to SSRN, affiliation not provided to SSRN and affiliation not provided to SSRN
Downloads 79 (559,703)

Abstract:

Loading...

DSSE: Distributed Security Shielded Execution for Communicable Cyber Threats Analysis

International Journal of Current Research Vol. 11, Issue, 04, pp.3274-3282, April, 2019
Number of pages: 9 Posted: 11 Dec 2019
Satinderjeet Singh, Anil Lamba and Sivakumar Rela
affiliation not provided to SSRN, Charisma University and affiliation not provided to SSRN
Downloads 36 (823,681)
Citation 1

Abstract:

Loading...

DSSE: Distributed Security Shielded Execution for Communicable Cyber Threats Analysis

International Journal of Current Research Vol. 11, Issue, 04, pp.3274-3282, April, 2019
Number of pages: 9 Posted: 19 Dec 2019
Satinderjeet Singh, Anil Lamba and Sivakumar Rela
affiliation not provided to SSRN, Charisma University and affiliation not provided to SSRN
Downloads 29 (883,821)

Abstract:

Loading...

14.

Deriving Intelligent Data Analytics Using Anomaly Detection Framework for IoT Network and Smart Environments

International Journal For Technological Research In Engineering Volume 4, Issue 6, February-2017
Number of pages: 5 Posted: 11 Dec 2019
Charisma University, affiliation not provided to SSRN, affiliation not provided to SSRN, affiliation not provided to SSRN and affiliation not provided to SSRN
Downloads 49 (711,520)

Abstract:

Loading...

15.

A Role of Data Mining Analysis to Identify Suspicious Activity Alert System

International Journal For Technological Research In Engineering Volume 2, Issue 3, November-2014
Number of pages: 12 Posted: 11 Dec 2019
Charisma University, affiliation not provided to SSRN, affiliation not provided to SSRN and affiliation not provided to SSRN
Downloads 33 (825,142)
Citation 37

Abstract:

Loading...

16.

A Comprehensive Survey on Security in Cloud Computing

International Conference on Emerging Technologies in Engineering, Biomedical, Medical and Science (ETEBMS - 2016)
Posted: 19 Dec 2019
Charisma University, affiliation not provided to SSRN, affiliation not provided to SSRN and affiliation not provided to SSRN

Abstract:

Loading...

17.

Uses of Cluster Computing Techniques to Perform Big Data Analytics for Smart Grid Automation System

International Journal For Technological Research In Engineering Volume 1, Issue 7, March-2014
Posted: 19 Dec 2019
Charisma University, affiliation not provided to SSRN, affiliation not provided to SSRN and affiliation not provided to SSRN

Abstract:

Loading...

Smart Grid; Data Analytics; Big Data; Apache Spark; Anomaly based algorithm; Classification algorithms; Data communication; Denial of service attack; Intrusion detection; Cyber Security; Cloud Security; Network ; Cyber; Cyber Threats; Threat Analysis ; Information Security; Data security