{"id":93,"date":"2025-05-23T16:09:36","date_gmt":"2025-05-23T16:09:36","guid":{"rendered":"https:\/\/academic.csuohio.edu\/kumar-sathish\/?page_id=93"},"modified":"2025-05-23T16:09:36","modified_gmt":"2025-05-23T16:09:36","slug":"publications","status":"publish","type":"page","link":"https:\/\/academic.csuohio.edu\/kumar-sathish\/publications\/","title":{"rendered":"Publications"},"content":{"rendered":"\n<h1 class=\"wp-block-heading has-text-align-center\">Publications<\/h1>\n\n\n\n<p class=\"has-text-align-center\"><strong>[ *Graduate Student Co-Author and\u00a0%Undergraduate student Co-Author]<\/strong><\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>R. Uddin\u00a0<sup>*<\/sup>and\u00a0<strong>S. Kumar<\/strong>, \u201c SDN-based Federated Learning approach for Satellite-IoT Framework to Enhance Data Security and Privacy in Space Communication\u201d, IEEE Journal of Radio Frequency Identification, May 2023 [<a href=\"https:\/\/drive.google.com\/file\/d\/1Kb5UQRMx1jPrZcGw5HhfhpkBvivhihLp\/view?usp=sharing\">Manuscript Link <\/a>]<\/li>\n\n\n\n<li>H. Bisht, M. Patra and\u00a0<strong>S. Kumar<\/strong>, \u201c Detection and Localization of DDoS attack during Inter-Slice Handover in 5G Network Slicing\u201d, 20th IEEE Internatonal Conference on Consumer Communications, January 2023 [<a href=\"https:\/\/drive.google.com\/file\/d\/1Dqual2Al8fgT1MWT8AUEAd_XiGioZ-XO\/view?usp=sharing\">Manuscript Link <\/a>]<\/li>\n\n\n\n<li>A. Halder, P. Chattopadhyay and\u00a0<strong>S. Kumar<\/strong>, \u201c Gait transformation network for gait de-identification with pose preservation\u201d, Springer Journal of Signal, Video and Image Processing, November 2022 [<a href=\"https:\/\/drive.google.com\/file\/d\/1qwXc5wamQR1OApL-WesMMUkFH19PmnOV\/view?usp=sharing\">Manuscript Link <\/a>]<\/li>\n\n\n\n<li><strong>S. Kumar<\/strong>, M. Pillai and Z. Li, \u201c Global Perception of Telemedicine before and after COVID-19 : A Text Mining Analysis\u201d, IEEE Symposium Series on Computational Intelligence, Singapore, 2022 [<a href=\"https:\/\/drive.google.com\/file\/d\/1hiiY7YmSpKGp3RsmoObCmRNoDO0hDKsH\/view?usp=sharing\">Manuscript Link <\/a>]<\/li>\n\n\n\n<li>P. Hart\u00a0<sup>%<\/sup>, T. Rahman and\u00a0<strong>S. Kumar<\/strong>, \u201c Emotion and Sentiment Recognition using Natural Language Processing and Machine Learning Techniques during Disaster Situation\u201d, IEEE Symposium Series on Computational Intelligence, Singapore, 2022 [<a href=\"https:\/\/drive.google.com\/file\/d\/1AMaIMaLvmYMKUsrnSmQY5duyJLOUdYmd\/view?usp=sharing\">Manuscript Link <\/a>]<\/li>\n\n\n\n<li>C. Liptak\u00a0<sup>*<\/sup>, S. Mal-Sarkar and\u00a0<strong>S. Kumar<\/strong>, \u201c Power Analysis Side Channel Attacks and Countermeasures for the Internet of Things\u201d, IEEE International Conference on Physical Assurance and Inspection of Electronics (PAINE), Huntsville, AL, 2022 [<a href=\"https:\/\/drive.google.com\/file\/d\/1lf_ywKhlvo2Ek236Dbxd7a5S6iKL5Lcr\/view?usp=sharing\">Manuscript Link <\/a>]<\/li>\n\n\n\n<li><strong>S. Kumar<\/strong>, N.Ahmad and A. Bikos, \u201c SWIoTA: Anomaly Detection for Distributed Ledger Technology-based Internet of Things (IOTA) using Sliding Window (SW) Technique \u201d, 5th IFIP International Internet of Things Conference, Amsterdam, Netherlands, October 2022 [<a href=\"https:\/\/drive.google.com\/file\/d\/1L8G_3s-TkWIURU6K5PxnVHXG5TleIw0K\/view?usp=sharing\">Manuscript Link <\/a>]<\/li>\n\n\n\n<li>R. Uddin\u00a0<sup>*<\/sup>and\u00a0<strong>S. Kumar<\/strong>, \u201c SDN-based Federated Learning approach for Satellite-IoT Framework to Enhance Data Security and Privacy in Space Communication\u201d, 10th Annual IEEE International Conference on Wireless for Space and Extreme Environments (IEEE WiSEE 2022), Winnipeg, Canada [<a href=\"https:\/\/drive.google.com\/file\/d\/1xhYxTa6G9ZVBCuhQ3TBV2B4OTfdaufGg\/view?usp=sharing\">Manuscript Link <\/a>]<\/li>\n\n\n\n<li>A. Bikos and\u00a0<strong>S. Kumar<\/strong>, \u201c Securing Digital Ledger Technologies-Enabled IoT Devices: Taxonomy, Challenges, and Solutions\u201d, IEEE Access, April 2022 [<a href=\"https:\/\/drive.google.com\/file\/d\/1UzrSpu09hu6hzJmeuLwWQ7EozuRy94u0\/view?usp=sharing\">Manuscript Link <\/a>]<\/li>\n\n\n\n<li>V. Venkatesh, P. Raj,\u00a0<strong>S. Kumar<\/strong>, T. Suriya Praba and R. Anusha Devi, \u201c Demystifying Next-Generation Cyber-Physical Healthcare Systems\u201d, Cyber-Physical Systems and Industry 4.0: Practical Applications and Security Management (2022): 149-175. CRC Press, Taylor and Francis [<a href=\"https:\/\/drive.google.com\/file\/d\/1iH61-P53T0tCe9uMM4I7Vf7vGfnz3fgP\/view?usp=sharing\">Manuscript Link <\/a>]<\/li>\n\n\n\n<li>S.C. Sandeep, T. Rayan, Kumudavalli, and\u00a0<strong>S. Kumar<\/strong>, \u201c Case Studies on 5G and IoT Security Issues from the Leading 5G and IoT System Integration Vendors\u201d, Secure Communication for 5G and IoT Networks. EAI\/Springer Innovations in Communication and Computing. Springer, Cham. Springer. [<a href=\"https:\/\/drive.google.com\/file\/d\/1YK09y5kPyUhJLr3KD-7rDcOpXK1_eAtN\/view?usp=sharing\">Manuscript Link <\/a>]<\/li>\n\n\n\n<li>A. Bikos and\u00a0<strong>S. Kumar<\/strong>, \u201c Reinforcement Learning-Based Anomaly Detection for Internet of Things Distributed Ledger Technology\u201d, in proceedings of IEEE Symposium on Computers and Communications (ISCC), Athens, Greece, September 2021. [<a href=\"https:\/\/drive.google.com\/file\/d\/1hFIAgAJq1GdOXa2Cx0-lZ4VxkOSGtjZM\/view?usp=sharing\">Manuscript Link <\/a>]<\/li>\n\n\n\n<li>A. Sharifia, A. Valizadeh and\u00a0<strong>S. Kumar<\/strong>, and M. Ahmadi, \u201c Presentation of A Novel Method for Prediction of Traffic with Climate Condition Based on Ensemble Learning of Neural Architecture Search (NAS) And Linear Regression\u201d, Hindawi Complexity, August 2021. [<a href=\"https:\/\/drive.google.com\/file\/d\/1RAkAAE5vl4Bb29ww2bUqbHM48ItmkXy4\/view?usp=sharing\">Manuscript Link <\/a>]<\/li>\n\n\n\n<li>S. Sullivan<sup>*<\/sup>, A. Brighente,\u00a0<strong>S. Kumar<\/strong>, and M. Conti, \u201c 5G Security Challenges and Solutions: A Review by OSI Layer\u201d, IEEE Access, August 2021. [<a href=\"https:\/\/drive.google.com\/file\/d\/1MeZCgRc_ldbS7nAoH362ju8pAJz46qWT\/view?usp=sharing\">Manuscript Link <\/a>]<\/li>\n\n\n\n<li>A. Suresh, R. R. Nair, S. Neeba, and\u00a0<strong>S. Kumar<\/strong>, \u201c Recurrent Neural Network for Genome Sequencing for Personalized Cancer Treatment in Precision Healthcare\u201d, Springer-Nature Neural Processing Letters, July 2021. [<a href=\"https:\/\/drive.google.com\/file\/d\/1kCPc-AXrdXzS0dPyj97m4jsDBrbjQ6Pw\/view?usp=sharing\">Manuscript Link <\/a>]<\/li>\n\n\n\n<li>D. Agrawal, S. Minocha, S. Namasudra and\u00a0<strong>S. Kumar<\/strong>, \u201c Ensemble Algorithm using Transfer Learning for Sheep Breed Classification\u201d, in proceedings of IEEE 15th International Symposium on Applied Computational Intelligence and Informatics (SACI 2021), May 2021. [<a href=\"https:\/\/drive.google.com\/file\/d\/1Fvk4zwD0u1Jft114_8RgPnK_-jIv9Re2\/view?usp=sharing\">Manuscript Link <\/a>]<\/li>\n\n\n\n<li><strong>S. Kumar<\/strong>, S. Velliangiri, M. Karthikeyan, S. Kumari, S. Kumar and M.K. Khan\u201c A Survey on the Blockchain Techniques for the Internet of Vehicles Security\u201d, Wiley Transactions on Emerging Telecommunications Technologies, April 2021. [<a href=\"https:\/\/drive.google.com\/file\/d\/1n70vE9LC6rG62VIA1bN-gWTrjpnBmzGI\/view?usp=sharing\">Manuscript Link <\/a>]<\/li>\n\n\n\n<li><strong>S.A.P. Kumar<\/strong>, R. R. Nair, E. Kannan, E, A. Suresh, and S. Raj Anand\u201c Intelligent Vehicle Parking System (IVPS) Using Wireless Sensor Networks\u201d, Springer-Nature Wireless Personal Communications, March 2021. [<a href=\"https:\/\/drive.google.com\/file\/d\/1UtxfhE__XYplwKMGDNiXhkSkKKYz8F-K\/view?usp=sharing\">Manuscript Link <\/a>]<\/li>\n\n\n\n<li><strong>S.A.P. Kumar<\/strong>, A. Suresh, S. R. Anand, K Chokkanathan, and M Vijayasarathy \u201c Hybridization of Mean Shift Clustering and Deep Packet Inspected Classification for Network Traffic Analysis\u201d, Springer-Nature Wireless Personal Communications, February 2021. [<a href=\"https:\/\/drive.google.com\/file\/d\/1FLx2O-r3ln9ldc_cSWwwYTltatqgFSv2\/view?usp=sharing\">Manuscript Link <\/a>]<\/li>\n\n\n\n<li>E. Kannan, S. Ravikumar, A. Anitha,\u00a0<strong>S.A.P. Kumar<\/strong>, and M Vijayasarathy \u201c Analyzing uncertainty in cardiotocogram data for the prediction of fetal risks based on machine learning techniques using rough set\u201d, Springer Journal of Ambient Intelligence Human Computing, January 2021. [<a href=\"https:\/\/drive.google.com\/file\/d\/1Tmf8w31CrY9eyv1WmtKIITD5jDs7fLkd\/view?usp=sharing\">Manuscript Link <\/a>]<\/li>\n\n\n\n<li>I. Vayansky\u00a0<sup>*<\/sup>\u00a0and\u00a0<strong>S. Kumar<\/strong>, \u201c Review of Topic Modeling Methods\u201d, Elsevier Information Systems Journal, May 2020.. [<a href=\"https:\/\/drive.google.com\/file\/d\/1ppuroGrmLjeYxGVH7_uiexBTw63UE8et\/view?usp=sharing\">Manuscript Link <\/a>]<\/li>\n\n\n\n<li>H. M. R. Afzal, S. Luo, H. M. R. Afzal, G. Chaudhary, M. Khari, and\u00a0<strong>S. Kumar<\/strong>\u00a0\u201c 3D Face Reconstruction from Single 2D Image Using Distinctive Features,in IEEE Access\u201d, vol. 8, pp. 180681-180689, 2020, doi: 10.1109\/ACCESS.2020.3028106. [<a href=\"https:\/\/drive.google.com\/file\/d\/19-yONy7PXM2lPueCRKZ2Iuca644UKWcY\/view?usp=sharing\">Manuscript Link <\/a>]<\/li>\n\n\n\n<li>S. Velliangiri,\u00a0<strong>Sathish A.P. Kumar<\/strong>, and Karthikeyan\u201c Internet of Things: Integration and Security Challenges\u201d, CRC Press, Boca Raton, FL Decemeber 2020[<a href=\"https:\/\/www.taylorfrancis.com\/books\/internet-things-velliangiri-sathish-kumar-karthikeyan\/e\/10.1201\/9781003032441\">\u00a0Book Link <\/a>]<\/li>\n\n\n\n<li>J. Shelley<sup>*<\/sup>, M. Pillai and\u00a0<strong>S. Kumar,\u00a0<\/strong>\u201c Data Analysis of Lead Contamination in New York\u201d, in Proceedings of\u00a0 2020 IEEE International Symposium Series on Computational Intelligence (IEEE SSCI), 2020. [<a href=\"https:\/\/drive.google.com\/file\/d\/14_8eC8NfnrPfH_nFPNEKwFl3F8ecKcr7\/view?usp=sharing\">Manuscript Link <\/a>]<\/li>\n\n\n\n<li>M. Gokhil*, and\u00a0<strong>S. Kumar<\/strong>, \u201cEvaluation of Classification algorithms for Distributed Denial of Service Attack Detection\u201d, in Proceedings of The Third IEEE International Conference on Artificial Intelligence and Knowledge Engineering (IEEE AIKE). [<a href=\"https:\/\/drive.google.com\/file\/d\/1LNtFICwAuATdPAZH7Y5xNRR2UfgEpt8K\/view?usp=sharing\">Manuscript Link <\/a>]<\/li>\n\n\n\n<li>J. Harvey<sup>*<\/sup>,\u00a0<strong>S. Kumar,\u00a0<\/strong>, and S. Bao \u201c Machine Learning-Based Models for Assessing Impacts Before, During and After Hurricane Michael\u201d, in Proceedings of\u00a0 2020 IEEE International Symposium Series on Computational Intelligence, 2020. [<a href=\"https:\/\/drive.google.com\/file\/d\/1aycYGL4yb0Ld2yeziiCHn3LYT0LCit9Y\/view?usp=sharing\">Manuscript Link <\/a>]<\/li>\n\n\n\n<li><strong>Sathish A.P. Kumar,\u00a0<\/strong>and M. Brown\u201c Reflective Neural Network Based Learning Framework for Intelligent Physical Systems\u201d, in Proceedings of\u00a0 6th IEEE International Conference on High Performance and Smart Computing (IEEE HPSC 2020), 2020. [<a href=\"https:\/\/drive.google.com\/file\/d\/1YCgi_nm_WLbwYoehwvMGm3Umtc9-u6RW\/view?usp=sharing\">Manuscript Link <\/a>]<\/li>\n\n\n\n<li>J. Harvey<sup>*<\/sup>\u00a0and\u00a0<strong>S . Kumar,\u00a0<\/strong>\u201c A Survey of Intelligent Transportation Systems Security: Challenges and Solutions\u201d, in Proceedings of\u00a0 5th IEEE International Conference on Intelligent Data and Security (IEEE IDS 2020), 2020. [<a href=\"https:\/\/drive.google.com\/file\/d\/1AkV-TPp6YuDHB_r0MKCGSI2lxcPjmc-J\/view?usp=sharing\">Manuscript Link <\/a>]<\/li>\n\n\n\n<li><strong>Kumar, S.A.P<\/strong>., Bao, S., Singh, V and J. Hallstrom, \u201cFlooding disaster resilience information framework for smart and connected communities&#8221;, Springer Journal of Reliable Intelligent Environments, Feb 2019, pp. 1-13.\u00a0 [<a href=\"https:\/\/drive.google.com\/open?id=1AChzYqx1zdXRgRfNTiJVaeN0bFqVgG5T\">Manuscript Link <\/a>]<\/li>\n\n\n\n<li>I. Vayansky*,\u00a0<strong>S. Kumar<\/strong>\u00a0and Z. Li, \u201cAn Evaluation of Geotagged Twitter Data during Hurricane Irma using Sentiment Analysis and Topic Modeling for Disaster Resilience, in Proceedings of 2019 IEEE International Symposium on Technology and Society conference (IEEE ISTAS) pp.1-6, Boston, MA, 2019. [<a href=\"https:\/\/drive.google.com\/open?id=1Wvt8JFwMuxfwmWX5WJk4ETnea1-W23tR\">Manuscript Link <\/a>]<\/li>\n\n\n\n<li>J. Harvey<sup>*<\/sup>\u00a0and\u00a0<strong>Sathish A.P. Kumar,\u00a0<\/strong>\u201cMachine Learning-Based Models for Assessing Impacts Before, During and After Hurricane Florence\u201d, in Proceedings of\u00a0 2019 IEEE International Symposium Series on Computational Intelligence (IEEE SSCI), pp. 714-721, Xiamen, China, 2019. [<a href=\"https:\/\/drive.google.com\/file\/d\/1ojXUdsghaYlPjpzsQtAIY3nLIauP47mB\/view?usp=sharing\">Manuscript Link <\/a>]<\/li>\n\n\n\n<li>J. Harvey<sup>*<\/sup>\u00a0and\u00a0<strong>Sathish A.P. Kumar,\u00a0<\/strong>\u201cMachine Learning for Predicting Development of Asthma in Children\u201d, in Proceedings of 2019 IEEE International Symposium Series on Computational Intelligence (IEEE SSCI), pp. 596-603, \u00a0Xiamen, China, 2019. [<a href=\"https:\/\/drive.google.com\/file\/d\/1hogIxHp31BpFsQZHX0HsAHfgMZQw3JpC\/view?usp=sharing\">Manuscript Link <\/a>]<\/li>\n\n\n\n<li>B. Dahal<sup>%<\/sup>,\u00a0<strong>S.A.P Kumar<\/strong>, Z. Li, &#8220;Topic Modeling and Sentiment Analysis of Global Climate Change Tweets&#8221;, Springer Social Network Analysis and Mining Journal, vol.9, 24, 2019. [<a href=\"https:\/\/drive.google.com\/file\/d\/1OU4hV7RaNMWicMDbk-vSVLsiVovohbjc\/view?usp=sharing\">Manuscript Link <\/a>]<\/li>\n\n\n\n<li>J. Harvey<sup>*<\/sup>\u00a0and\u00a0<strong>Sathish A.P. Kumar,\u00a0<\/strong>\u201cData Science for K-12 Education\u201d, in Proceedings of 2019 IEEE International Symposium Series on Computational Intelligence (IEEE SSCI), pp. 2482-2488, Xiamen, China, 2019. [<a href=\"https:\/\/drive.google.com\/open?id=1MaVBWSsOrTnrJJcKOZvMRDgOD_CnC6pp\">Manuscript Link <\/a>]<\/li>\n\n\n\n<li>J. Harvey<sup>*<\/sup>\u00a0and\u00a0<strong>Sathish A.P. Kumar,\u00a0<\/strong>\u201cA Practical Model for Educators to Predict Student Performance in K-12 Education using Machine Learning\u201d, \u00a0in Proceedings of 2019 IEEE International Symposium Series on Computational Intelligence (IEEE SSCI), \u00a0pp. 3004-3011, Xiamen, China, 2019. [<a href=\"https:\/\/drive.google.com\/file\/d\/11VSG8hvmmeJ5QA1NOTreIG7WYpAcrSBY\/view?usp=sharing\">Manuscript Link <\/a>]<\/li>\n\n\n\n<li>S. Velliangiri, Karthikeyan, I. T. Joseph, and\u00a0<strong>Sathish A.P. Kumar<\/strong>, \u201cInvestigation of Deep Learning Schemes in Medical Application,\u201d, 2019 International Conference on Computational Intelligence and Knowledge Economy (ICCIKE), Dubai, United Arab Emirates, 2019, pp. 87-92.[<a href=\"https:\/\/drive.google.com\/file\/d\/10m7ionUyZ0EyuSrJlp3wgUrBV8ro1nCd\/view?usp=sharing\">\u00a0Manuscript Link <\/a>]<\/li>\n\n\n\n<li><strong>Sathish A.P. Kumar\u00a0<\/strong>and B.Xu<strong>, \u201c<\/strong>A Machine Learning Based Approach to Detect Malicious Fast Flux Networks\u201d, in Proceedings of 2018 IEEE International Symposium Series on Computational Intelligence (IEEE SSCI), pp. 1676-1683, Bangalore, 2018. [<a href=\"https:\/\/drive.google.com\/open?id=1S9u_zQ1wmXRZiC6-hamVriZVQiwL0vNx\">Manuscript Link <\/a>]<\/li>\n\n\n\n<li><strong>Sathish A.P. Kumar\u00a0<\/strong>and M. Brown<strong>, \u201c<\/strong>Spatio-Temporal Reasoning within a Neural Network framework for Intelligent Physical Systems\u201d, in Proceedings of\u00a0 2018 IEEE International Symposium Series on Computational Intelligence (IEEE SSCI), pp. 274-280, Bangalore, 2018. [<a href=\"https:\/\/drive.google.com\/open?id=1peT0R1b3H6g_sdxnd-xfc6eVTtFVdE7G\">Manuscript Link <\/a>]<\/li>\n\n\n\n<li>S. Singleton<sup>%<\/sup><strong>, S. Kumar\u00a0<\/strong>and Z. Li, \u201cTwitter Analytics: Are the United States Coastal Regions Prepared for Climate Change\u201c, in Proceedings of 2018 IEEE International Symposium on Technology and Society conference (IEEE ISTAS), pp.150-155, Washington DC, 2018. [<a href=\"https:\/\/drive.google.com\/open?id=16kOiymJRK1w7kZNRXc-T7RTFYeJzJjw0\">Manuscript Link <\/a>]<\/li>\n\n\n\n<li><strong>Kumar, S.A.P<\/strong>., Madhumathi, R., Chelliah, P.R. et al. \u201cA novel digital twin-centric approach for driver intention prediction and traffic congestion avoidance\u201d, Springer Journal of Reliable Intelligent Environment, 2018. 4: 199. Publisher: Springer Nature, 2018. [<a href=\"https:\/\/drive.google.com\/open?id=1eLHFh9m5PRE7vclKNAsUuSMCYf41OZiU\">Manuscript Link <\/a>]<\/li>\n\n\n\n<li>Ike Vayansky<sup>*<\/sup>\u00a0and\u00a0<strong>Sathish A.P. Kumar, \u201c<\/strong>Phishing\u2013challenges and solutions\u201d, Elsevier Computer Fraud and Security, vol. 1, pp. 15-20, 2018. Publisher Elsevier. [<a href=\"https:\/\/drive.google.com\/open?id=1ph-hgnmnTr-LNsTqg38V3IGq_DTnXJVp\">Manuscript Link <\/a>]<\/li>\n\n\n\n<li>J. Liu, S. Wang, A. Zhou, X. Xu, S. Kumar, F.Yang, \u201cTowards Bandwidth Guaranteed Virtual Cluster Reallocation in the Cloud\u201d, The Oxford Computer Journal, vol. 61, no.9, 2018. [<a href=\"https:\/\/drive.google.com\/open?id=1i5w-C5PBSswUXAVOzEixF7-FrTDTqBCM\">Manuscript Link <\/a>]<\/li>\n\n\n\n<li>David Eastman<sup>%<\/sup>\u00a0and\u00a0<strong>Sathish A.P. Kumar, \u201c<\/strong>A Simulation Study to Detect Attacks on Internet of Things\u201d, in Proceedings of the\u00a0 15<sup>th<\/sup>\u00a0IEEE International Conference on Dependable, Autonomic and Secure Computing (IEEE DASC), pp. 645-650, Orlando, FL, USA, 2017. [\u00a0<a href=\"https:\/\/drive.google.com\/open?id=1VzeXfAHzW9MU8vcpyxK2p7Sy4bOXa6Oe\">Manuscript Link <\/a>]<\/li>\n\n\n\n<li><strong>Sathish A.P. Kumar,\u00a0\u00a0<\/strong>B. Bhargava, R. Macedo, and G. Mani,\u00a0<strong>\u201c<\/strong><a href=\"http:\/\/www.confhub.com\/MyPapers.php?cid=676\">Securing IoT-based Cyber-Physical Human Systems against Collaborative Attacks <\/a>\u201d, in Proceedings of the\u00a0 IEEE International Congress on Internet of Things (IEEE ICIOT), pp. 9-16, Honolulu, HI, USA, 2017. [<a href=\"https:\/\/drive.google.com\/open?id=1wz0xgwhagqAnvNnlAEcuCeRRP6qJ3Jhp\">Manuscript Link <\/a>]<\/li>\n\n\n\n<li>X.Wei, S. Wang, J. Xu,\u00a0<strong>S. Kumar<\/strong>, and F. Yang,<strong>\u00a0\u201c<\/strong>MVR: an Architecture for Computation Offloading in Mobile Edge Cloud\u201d, in Proceedings of the 14<sup>th<\/sup>\u00a0IEEE International Conference on Service Computing (IEEE SCC), pp. 232-235, Honolulu, HI, USA, 2017. [<a href=\"https:\/\/drive.google.com\/open?id=1e_pS3Y2HgB5cv9hGR9wN8dJNo_b77xLu\">Manuscript Link <\/a>]<\/li>\n\n\n\n<li><strong>Sathish A.P. Kumar and\u00a0<\/strong>Brian Xu<strong>, \u201c<\/strong>Vulnerability Assessment for Security in Aviation Cyber-Physical Systems\u201d, in Proceedings of the 4<sup>th<\/sup>\u00a0IEEE International Conference on Cybersecurity and Cloud computing, pp. 145-150, New York, USA, 2017. [<a href=\"https:\/\/drive.google.com\/open?id=1GA3hnbX3n-0iX3y4zXf1Vsg8i1qsIUKn\">Manuscript Link <\/a>]<\/li>\n\n\n\n<li>Pethuru Raj Chelliah and\u00a0<strong>Sathish A.P. Kumar, \u201c<\/strong>A Cloud-based Service Delivery Platform for effective Homeland Security\u201d, in Proceedings of the 4<sup>th<\/sup>\u00a0IEEE International Conference on Cybersecurity and Cloud computing, pp. 157-162, New York, USA, 2017. [<a href=\"https:\/\/drive.google.com\/open?id=16wt-jBdNe9S8j3jPZMMzSUt_hCX6EpnB\">Manuscript Link <\/a>]<\/li>\n\n\n\n<li>Pethuru Raj Chelliah and\u00a0<strong>Sathish A.P. Kumar, \u201c<\/strong>Big Data Analytics Processes and Platforms for Smart Cities\u201d, Book chapter in\u00a0 the book titled &#8216;Smart Cities: Foundations, Principles and Applications\u2019, pp. 23-52, \u00a0Publishers: Wiley, 2017. [<a href=\"https:\/\/drive.google.com\/open?id=18CNrc6afJ0blnOO0O7lST95OvBbFoO_D\">Manuscript Link <\/a>]<\/li>\n\n\n\n<li>Stephanie Revels<sup>*<\/sup>,\u00a0<strong>Sathish Kumar<\/strong>\u00a0and Ofir Ben-Assuli, &#8220;Predicting Obesity Rate and Obesity-Related Healthcare Costs using Data Analytics&#8221;, Elsevier Health Policy and Technology, vol. 6, no. 2, pp. 198-207, 2017 (Impact Factor: 0.63). [<a href=\"https:\/\/drive.google.com\/open?id=1OTWp4wH69QfpGkcPMCGpNfDAXSkqtTAb\">Manuscript Link <\/a>]<\/li>\n\n\n\n<li>J. Xu, S.Wang,\u00a0<strong>S. Kumar<\/strong>, and L.Wang, \u201cLatent Interest and Topic Mining on User-item Bipartite Network\u201d, in 13<sup>th<\/sup>\u00a0IEEE International Conference on Service Computing (IEEE SCC), pp. 778-781, 2016 (Acceptance Rate -38%). [<a href=\"https:\/\/drive.google.com\/open?id=1c9aKquJsGcYGv6pCUFbmnXxKjrKP9zF0\">Manuscript Link <\/a>]<\/li>\n\n\n\n<li>Jeeva Chelladhurai, Pethuru Raj Chelliah and\u00a0<strong>Sathish A.P. Kumar<\/strong>, \u201cSecuring Docker Containers from Denial of Service (DoS) Attacks\u201d in 13<sup>th<\/sup>\u00a0IEEE International Conference on Service Computing (IEEE SCC), pp. 856-859, 2016 (Acceptance Rate -38%). [<a href=\"https:\/\/drive.google.com\/open?id=19jltn2fIe_IfJxl1mEW1XURV4w3YByhx\">Manuscript Link <\/a>]<\/li>\n\n\n\n<li>J.Liu, S. Wang, A.Zhou,\u00a0<strong>S.Kumar<\/strong>\u00a0and R. Buyya, &#8220;Using Proactive Fault-Tolerance Approach to Enhance Cloud Service Reliability&#8221; in IEEE Transactions in Cloud Computing, vol. 6, no. 4, pp. 1191-1202, 2016 (Impact Factor: 2.365). [<a href=\"https:\/\/drive.google.com\/open?id=1eYagl4x4Bgx6KNf6VPjv-cJL20WCdO21\">Manuscript Link <\/a>]<\/li>\n\n\n\n<li><strong>Sathish Alampalayam Kumar,\u00a0<\/strong>Tyler Vealey<sup>%<\/sup>\u00a0and\u00a0Harshit Srivastava<sup>%<\/sup>, \u201cSecurity in Internet of Things: Challenges, Solutions and Future Directions\u201d, 49<sup>th<\/sup>\u00a0IEEE Hawaii International Conference on System Sciences (HICSS), pp. 5772-5781, Kauai, HI, 2016 (Acceptance Rate -48%). [<a href=\"https:\/\/drive.google.com\/open?id=1P88WIJP6tcJENm5-S7Ly0yef1tY9tGg6\">Manuscript Link <\/a>]<\/li>\n\n\n\n<li>Shaun Ralko<sup>%<\/sup>\u00a0and\u00a0<strong>Sathish Alampalayam Kumar,\u00a0<\/strong>\u201cSmart City Security\u201d, in Proceedings of the Cybersecurity Conference on Education, Research and Practice, Oct 2016, Kennesaw, GA. [<a href=\"https:\/\/drive.google.com\/open?id=1lOaxcSfRNoBdNfYnFuswYTGi4QBOt0Xp\">Manuscript Link <\/a>]<\/li>\n\n\n\n<li>B.Xu,\u00a0<strong>Sathish Alampalayam Kumar,<\/strong>\u00a0\u201cBig Data Analytics for System Health Monitoring\u201d, in Proceedings of the 4<sup>th<\/sup>\u00a0IEEE International. Congress on Big Data (IEEE Big Data Congress), , pp. 401-408, New York, NY, USA, 2015. (Acceptance Rate -19%). [<a href=\"https:\/\/drive.google.com\/open?id=1wUT5bZmoSNxSrBfx3x0boML_Fr0PnbsI\">Manuscript Link <\/a>]<\/li>\n\n\n\n<li>B.Xu and\u00a0<strong>Sathish Alampalayam Kumar,<\/strong>\u00a0\u201cA Text Mining Framework for Aviation Datasets\u201d, 25<sup>th<\/sup>\u00a0Workshop of Information Technology and Systems (WITS), Dallas, TX, 2015 (Acceptance Rate \u2013 37%). [<a href=\"https:\/\/drive.google.com\/open?id=1QI9RMRfbSzNuP8SoIqfSfO0jnqw15DqZ\">Manuscript Link <\/a>]<\/li>\n\n\n\n<li>Colton Chrane<sup>%<\/sup>\u00a0and\u00a0<strong>Sathish Alampalayam Kumar<\/strong>, An Examination of Tor Technology based Anonymous Internet, in Proceedings of the 15<sup>th<\/sup>\u00a0Informing Science Institute (InSite) International Conference, pp. 145-153, Tampa, FL, June 2015.\u00a0 [<a href=\"https:\/\/drive.google.com\/open?id=1Zd5yUGzD8emdgfF-ePOujkxM0dE1U99s\">Manuscript Link <\/a>]<\/li>\n\n\n\n<li>Harshit Srivastava<sup>%<\/sup>\u00a0and\u00a0<strong>Sathish Alampalayam Kumar,<\/strong>\u00a0\u201cControl Framework for Secure Cloud Computing\u201d, Journal of Information Security, vol. 6, no. 01, p.12, 2014. (Impact Factor: 1.29). [<a href=\"https:\/\/drive.google.com\/open?id=1qFN9sSTNxuRpm32HlgGbg6S3DEPSYrIQ\">Manuscript Link <\/a>]<\/li>\n\n\n\n<li>Manonmani Kumar,\u00a0<strong>Sathish A Kumar<\/strong>,\u00a0Layla N Baykal<sup>%<\/sup>,\u00a0Mallory J Banton<sup>%<\/sup>,\u00a0Maya M Outlaw<sup>%<\/sup>,\u00a0Kristen E Polivka<sup>%<\/sup>\u00a0and Rachel Hellmann Whitaker, \u201cZinc is the Molecular &#8220;Switch&#8221; that Controls the Catalytic Cycle of Bacterial Leucyl-tRNA Synthetase\u201d, Elsevier Journal of Inorganic Biochemistry, vol. 142, pp.59-67, 2014. (Impact Factor: 3.274). [<a href=\"https:\/\/drive.google.com\/open?id=1a9NKXYE54F1OQ-57lLtcAm-X2bjHXqJ-\">Manuscript Link <\/a>]<\/li>\n\n\n\n<li><strong>Sathish Alampalayam Kumar, \u201c<\/strong>Designing a Graduate Program in Information Security and Analytics\u201d, in the Proceedings of the 15<sup>th<\/sup>\u00a0ACM Conference on Information.\u00a0 Technology Education, SIGITE 2014, pp. 141-146, Atlanta, GA, USA, 2014. (Acceptance Rate -47%). [<a href=\"https:\/\/drive.google.com\/open?id=1bXqd4NYu8UD9j2Ffn_j1nfabLR29WTwK\">Manuscript Link <\/a>]<\/li>\n\n\n\n<li>B.Xu,\u00a0<strong>Sathish Alampalayam Kumar,<\/strong>\u00a0\u201cBig Data Analytics Framework for Improved Decision Making\u201d,\u00a0 in Proceedings of the 2014 Intl. Conference on Internet Computing and Big Data , p. 1. Las Vegas, NV, USA, 2014. [<a href=\"https:\/\/drive.google.com\/open?id=1PWsPJxCm77dgAurDr4t-6z3fUgtCsGOi\">Manuscript Link <\/a>]<\/li>\n\n\n\n<li><strong>Sathish Alampalayam Kumar,<\/strong>\u00a0\u201cOrganizational control related to cloud\u201d, Book Chapter in Security, Trust and Regulatory Aspects of the Cloud Computing in Business environments,\u00a0 pp. 234-246, IGI Publishers, USA, 2014. [<a href=\"https:\/\/drive.google.com\/open?id=1HONPtebNHzo24uyatMp1dxJFnpA8yaxt\">Manuscript Link <\/a>]<\/li>\n\n\n\n<li>B.Xu,\u00a0<strong>Sathish Alampalayam Kumar<\/strong>, and M. Kumar<strong>,<\/strong>\u00a0\u201cCloud Architecture for enabling Intuitive Decision Making\u201d, in proceedings of the 9<sup>th<\/sup>\u00a0 IEEE World Congress on Services (IEEE Services -2013), pp. 60-66, Santa Clara, USA 2013. (Acceptance Rate -36%). [<a href=\"https:\/\/drive.google.com\/open?id=1pRa6AwAAwMXkeZHrEl2lL9jGzXBhtGG2\">Manuscript Link <\/a>]<\/li>\n\n\n\n<li>M. Kumar and\u00a0<strong>Sathish A.P. Kumar,<\/strong>\u00a0\u201cPrediction of Type III Secretion Apparatus in Unannotated Bacterial Genomes\u201d, in proceedings of the 4<sup>th<\/sup>\u00a0 Intl Conference on Bioinformatics and Computational Biology (BICoB), Las Vegas, USA, 2012. [<a href=\"https:\/\/drive.google.com\/file\/d\/1LqLftnfzZSY6BjtsGw0xtYxUE4BHa9aG\/view\">Manuscript Link <\/a>]<\/li>\n\n\n\n<li>J. Duran<sup>%<\/sup>, and\u00a0<strong>Sathish A.P. Kumar<\/strong>, \u201cCUDA Based Multi Objective Parallel Genetic Algorithms: Adapting Evolutionary Algorithms for Document Searches\u201d, in Proceedings of the 2011 Intl Conference on Information and Knowledge Engineering,\u00a0 (IKE 2011), pp. 133-139, July 2011, Las Vegas, USA. [<a href=\"https:\/\/drive.google.com\/open?id=1LsON0TC3J6XxfShNjFt9gNx1eARYuyaP\">Manuscript Link <\/a>]<\/li>\n\n\n\n<li>S. Srinivasan and\u00a0<strong>S. P. Alampalayam\u00a0<\/strong>\u201cIntrusion Detection Algorithm for MANET\u201d, International Journal of Information Security and Privacy, Vol. 5 No. 3, pp. 36-49, 2011. [<a href=\"https:\/\/drive.google.com\/open?id=17WqwBximXn8OIwL7pjvzlXyla9QzHy-Z\">Manuscript Link <\/a>]<\/li>\n\n\n\n<li><strong>Sathish A.P. Kumar \u201c<\/strong>Security in Mobile Computing Systems &#8211; Classification and Review of Security Schemes in Mobile Computing\u201d, Ad hoc and Wireless Sensor Networks, Vol.2 No. 6, p. 419, 2010. (Impact Factor: 0.48). [<a href=\"https:\/\/drive.google.com\/open?id=1PTc5VS2YOskaXRZMuObTjvMPRXi3jLWg\">Manuscript Link <\/a>]<\/li>\n\n\n\n<li><strong>S. P. Alampalayam<\/strong>\u00a0and S. Srinivasan, \u201cIntrusion Recovery Framework for Tactical Mobile Ad hoc Networks\u201d, Intl Journal of Computer Science and Network Security, Vol. 9 No. 9, pp. 1-10, Oct 2009. [<a href=\"https:\/\/drive.google.com\/open?id=1FbFr9POEUt47EL1D72GV4et-Q9M-e27U\">Manuscript Link <\/a>]<\/li>\n\n\n\n<li><strong>S. P. Alampalayam<\/strong>\u00a0and E. Natsheh, \u201cMultivariate Fuzzy Analysis for Mobile Ad hoc Network Threat Detection\u201d, International Journal of Business Data Communications and Networking, Vol. 4 No. 3, pp. 1-30, 2008. [<a href=\"https:\/\/drive.google.com\/open?id=1qAZ2M0GmxOVdG4udTan1TSYlRFdo4bMQ\">Manuscript Link <\/a>]<\/li>\n\n\n\n<li><strong>S. P. Alampalayam<\/strong>, A. Kumar, and S.Srinivasan, \u201cStatistical Based Intrusion Detection Framework using Six Sigma Technique\u201d, International Journal of Computer Science and Network Security, Vol. 7 No. 10, pp. 333-342, October 2007.\u00a0 [<a href=\"https:\/\/drive.google.com\/open?id=1wsgMqLv3xEiM9JIO98DbVUM5IJctXN6L\">Manuscript Link <\/a>]<\/li>\n\n\n\n<li><strong>S. P. Alampalayam<\/strong>, A. Kumar, J. Graham, and S.Srinivasan, \u201cIntruder Identification and Response Framework for Mobile Ad hoc Networks\u201d, in Proceedings of 22<sup>nd<\/sup>International Conference on Computers And Their Applications, pp. 260-265, March 2007, Honolulu, Hawaii, USA. [<a href=\"https:\/\/drive.google.com\/open?id=1XwhkIPdMkCKBUsGrP5cxD3LiqetsUQPX\">Manuscript Link <\/a>]<\/li>\n\n\n\n<li><strong>S. P. Alampalayam<\/strong>, A. Kumar, and S. Srinivasan, \u201cMobile ad hoc networks security \u2013 a taxonomy\u201d, in Proceedings of the 7<sup>th<\/sup>\u00a0IEEE\u00a0 Intl Conf. on Advanced Communication Technologies ( IEEE ICACT), pp. 839-844, \u00a02005, Phoenix Park, Republic of Korea. [<a href=\"https:\/\/drive.google.com\/open?id=1Bh91_hjU-U7ScACCDePfiIFs05yA7N63\">Manuscript Link <\/a>]<\/li>\n\n\n\n<li><strong>S. P. Alampalayam<\/strong>\u00a0and A. Kumar, \u201cAn adaptive and predictive security model for mobile ad hoc networks\u201d, Springer Wireless Personal Communications Journal, Special Issue for Security in Next Generation Wireless Networks, vol. 29, pp. 263-281, June 2004. (Impact Factor: 0.98). [<a href=\"https:\/\/drive.google.com\/open?id=1bZWt7IJ-BOEdQu1t_gVuS0KQw38vMCGt\">Manuscript Link <\/a>]<\/li>\n\n\n\n<li><strong>S. P. Alampalayam<\/strong>\u00a0and A. Kumar, \u201cPredictive security model using data mining\u201d, in Proceedings of 47<sup>th<\/sup>\u00a0 IEEE Global Telecommunications (IEEE GlobeCom) Conference, 2004, , pp. 2208-2212, Dallas, Texas, USA.\u00a0 (Acceptance Rate -37.7%). [<a href=\"https:\/\/drive.google.com\/open?id=1L5qu-sU2O1GX0YO5fO6LifY860R_jOTR\">Manuscript Link <\/a>]<\/li>\n\n\n\n<li><strong>S. P. Alampalayam<\/strong>\u00a0and A. Kumar, \u201cAdaptive security model for mobile agents in wireless networks\u201d, in Proceedings of 46<sup>th<\/sup>\u00a0IEEE Global Telecommunications (IEEE GlobeCom) Conference, pp. 1516-1521, 2003, San Francisco, California, USA. (Acceptance Rate -36.3%). [<a href=\"https:\/\/drive.google.com\/open?id=1WT606arsLAVk6vmxH__lZRraMUekSJCi\">Manuscript Link <\/a>]<\/li>\n\n\n\n<li><strong>S. P. Alampalayam<\/strong>\u00a0and A. Kumar, \u201cSecurity model for routing attacks in wireless networks\u201d, in Proceedings of 58<sup>th<\/sup>\u00a0IEEE Vehicular Technology Conference(VTC), pp. 2122-2126, Fall 2003, Orlando, Florida, USA. (Acceptance Rate -30%). [<a href=\"https:\/\/drive.google.com\/open?id=1MXUPwIvI15qb6Qw4PyCqSwVQGDGT1XLG\">Manuscript Link <\/a>]<\/li>\n\n\n\n<li><strong>S.P. Alampalayam<\/strong>, A.Kumar, A.Sleem, R.K.Ragade and J.P. Wong, \u201cArtificial Neural Network for mobility prediction in enterprise integration\u201d, Proceedings of 38<sup>th<\/sup>ACM\/IEEE Design Automation Conference (DAC),2001, Las Vegas, Nevada, USA.\u00a0<\/li>\n<\/ol>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Publications [ *Graduate Student Co-Author and\u00a0%Undergraduate student Co-Author]<\/p>\n","protected":false},"author":139,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","footnotes":""},"class_list":["post-93","page","type-page","status-publish","hentry"],"featured_image_src":null,"_links":{"self":[{"href":"https:\/\/academic.csuohio.edu\/kumar-sathish\/wp-json\/wp\/v2\/pages\/93","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/academic.csuohio.edu\/kumar-sathish\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/academic.csuohio.edu\/kumar-sathish\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/academic.csuohio.edu\/kumar-sathish\/wp-json\/wp\/v2\/users\/139"}],"replies":[{"embeddable":true,"href":"https:\/\/academic.csuohio.edu\/kumar-sathish\/wp-json\/wp\/v2\/comments?post=93"}],"version-history":[{"count":1,"href":"https:\/\/academic.csuohio.edu\/kumar-sathish\/wp-json\/wp\/v2\/pages\/93\/revisions"}],"predecessor-version":[{"id":94,"href":"https:\/\/academic.csuohio.edu\/kumar-sathish\/wp-json\/wp\/v2\/pages\/93\/revisions\/94"}],"wp:attachment":[{"href":"https:\/\/academic.csuohio.edu\/kumar-sathish\/wp-json\/wp\/v2\/media?parent=93"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}