Sign in
Back

Dr. Ezhil Selvam Kalaimannan

Associate Professor in Cybersecurity

Computer Security  Higher Education  Operations Research  Wireless Communication Systems  Network security  Digital forensics  wireless networking  algorithmic theory  cybersecurity education

List of works

Journal article   Peer reviewed

by Patrick AnsahCaroline JohnSumit Kumar Tetarave and Ezhil Kalaimannan

Published 12/01/2025

International journal of data science and analytics, 21, 1, 31

Journal article   Peer reviewed

by Fawzia Omer AlbasheerEzhil Kalaimannan and Mayank Agarwal

First online publication 07/24/2025

International journal of machine learning and cybernetics, online ahead of print

Journal article   Open access   Peer reviewed

by Vidhya Prakash RajendranDeepalakshmi PerumalsamyChinnasamy Ponnusamy and Ezhil Kalaimannan

Published 07/2025

Future internet, 17, 7, 307

Journal article

by Nikumani ChoudhuryRakesh MatamMithun MukherjeeJaime Lloret and Ezhil Kalaimannan

Published 01/01/2021

IEEE internet of things journal, 8, 1, 168 - 178

Journal article   Open access   Peer reviewed

by Amitabh MishraThomas ReichherzerEzhil KalaimannanNorman Wilde and Ruben Ramirez

Published 2020

International Journal of Distributed Sensor Networks, 16, 2

Journal article   Peer reviewed

by Sikha BaguiEzhil KalaimannanSubhash BaguiDebarghya Nandi and Anthony Pinto

Published 11/01/2019

Security and privacy, 2, 6, e91

Journal article   Peer reviewed

by Stephen Hopkins and Ezhil Kalaimannan

Published 01/02/2019

Journal of cyber security, 3, 1, 47 - 59

Journal article   Open access   Peer reviewed

by Sumit Kumar TetaraveSomanath TripathyEzhil KalaimannanCaroline John and Anshika Srivastava

Published 2019

IEEE access, 7, 67983 - 67995

Journal article   Peer reviewed

by Sikha BaguiXingang FangEzhil KalaimannanSubhash C. Bagui and Joseph Sheehan

Published 04/02/2017

Journal of cyber security, 1, 2, 108 - 126

Journal article   Peer reviewed

by Ezhil KalaimannanSharon K. JohnTheresa DuBose and Anthony Pinto

Published 01/02/2017

Journal of cyber security, 1, 1, 23 - 31

Logo image