default search action
Sitalakshmi Venkatraman
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j38]Anthony Overmars, Sitalakshmi Venkatraman:
Continued Fractions Applied to the One Line Factoring Algorithm for Breaking RSA. J. Cybersecur. Priv. 4(1): 41-54 (2024) - 2023
- [j37]Samuel Kaspi, Sitalakshmi Venkatraman:
Data-Driven Decision-Making (DDDM) for Higher Education Assessments: A Case Study. Syst. 11(6): 306 (2023) - 2022
- [j36]Kiran Fahd, Sitalakshmi Venkatraman, Shah Jahan Miah, Khandakar Ahmed:
Application of machine learning in higher education to assess student academic performance, at-risk, and attrition: A meta-analysis of literature. Educ. Inf. Technol. 27(3): 3743-3775 (2022) - [j35]Sitalakshmi Venkatraman, Fahri Benli, Ye Wei, Fiona Wahr:
Smart Classroom Teaching Strategy to Enhance Higher Order Thinking Skills (HOTS) - An Agile Approach for Education 4.0. Future Internet 14(9): 255 (2022) - [j34]Kiran Fahd, Yuan Miao, Shah Jahan Miah, Sitalakshmi Venkatraman, Khandakar Ahmed:
Knowledge graph model development for knowledge discovery in dementia research using cognitive scripting and next-generation graph-based database: a design science research approach. Soc. Netw. Anal. Min. 12(1): 61 (2022) - [j33]Sitalakshmi Venkatraman, Sazia Parvin:
Developing an IoT Identity Management System Using Blockchain. Syst. 10(2): 39 (2022) - 2021
- [j32]Suriya Priya R. Asaithambi, Sitalakshmi Venkatraman, Ramanathan Venkatraman:
Big Data and Personalisation for Non-Intrusive Smart Home Automation. Big Data Cogn. Comput. 5(1): 6 (2021) - [j31]Kiran Fahd, Shah Jahan Miah, Khandakar Ahmed, Sitalakshmi Venkatraman, Yuan Miao:
Integrating design science research and design based research frameworks for developing education support systems. Educ. Inf. Technol. 26(4): 4027-4048 (2021) - [j30]Anthony Overmars, Sitalakshmi Venkatraman:
New Semi-Prime Factorization and Application in Large RSA Key Attacks. J. Cybersecur. Priv. 1(4): 660-674 (2021) - [j29]Sitalakshmi Venkatraman, Anthony Overmars, Minh Thong:
Smart Home Automation - Use Cases of a Secure and Integrated Voice-Control System. Syst. 9(4): 77 (2021) - [j28]Kiran Fahd, Sitalakshmi Venkatraman:
Visualizing risk factors of dementia from scholarly literature using knowledge maps and next-generation data models. Vis. Comput. Ind. Biomed. Art 4(1): 19 (2021) - 2020
- [j27]Suriya Priya R. Asaithambi, Ramanathan Venkatraman, Sitalakshmi Venkatraman:
MOBDA: Microservice-Oriented Big Data Architecture for Smart City Transport Systems. Big Data Cogn. Comput. 4(3): 17 (2020) - [j26]Emilia Bellucci, Sitalakshmi Venkatraman, Andrew Stranieri:
Online dispute resolution in mediating EHR disputes: a case study on the impact of emotional intelligence. Behav. Inf. Technol. 39(10): 1124-1139 (2020) - [j25]Danish Vasan, Mamoun Alazab, Sitalakshmi Venkatraman, Junaid Akram, Zheng Qin:
MTHAEL: Cross-Architecture IoT Malware Detection Based on Neural Network Advanced Ensemble Learning. IEEE Trans. Computers 69(11): 1654-1667 (2020) - [c16]Emilia Bellucci, Sitalakshmi Venkatraman, Andrew Stranieri:
Towards Smart Online Dispute Resolution for Medical Disputes. ACSW 2020: 40:1-40:5 - [c15]Sitalakshmi Venkatraman, Anthony Overmars, Kiran Fahd, Sazia Parvin, Samuel Kaspi:
Security Challenges for Big Data and IoT. BDET 2020: 1-6
2010 – 2019
- 2019
- [j24]R. Vinayakumar, Mamoun Alazab, K. P. Soman, Prabaharan Poornachandran, Ameer Al-Nemrat, Sitalakshmi Venkatraman:
Deep Learning Approach for Intelligent Intrusion Detection System. IEEE Access 7: 41525-41550 (2019) - [j23]R. Vinayakumar, Mamoun Alazab, K. P. Soman, Prabaharan Poornachandran, Sitalakshmi Venkatraman:
Robust Intelligent Malware Detection Using Deep Learning. IEEE Access 7: 46717-46738 (2019) - [j22]James Jin Kang, Kiran Fahd, Sitalakshmi Venkatraman:
An Enhanced Inference Algorithm for Data Sampling Efficiency and Accuracy Using Periodic Beacons and Optimization. Big Data Cogn. Comput. 3(1): 7 (2019) - [j21]Sitalakshmi Venkatraman, Anthony Overmars, Fiona Wahr:
Visualization and Experiential Learning of Mathematics for Data Analytics. Comput. 7(3): 37 (2019) - [j20]Sitalakshmi Venkatraman, Anthony Overmars:
New Method of Prime Factorisation-Based Attacks on RSA Authentication in IoT. Cryptogr. 3(3): 20 (2019) - [j19]Sitalakshmi Venkatraman, Mamoun Alazab, R. Vinayakumar:
A hybrid deep learning image-based analysis for effective malware detection. J. Inf. Secur. Appl. 47: 377-389 (2019) - [j18]Sophia Diana Rozario, Sitalakshmi Venkatraman, Mei-Tai Chu, Adil Abbas:
Dominant Factors for an Effective Selection System: An Australian Education Sector Perspective. Syst. 7(4): 50 (2019) - [c14]Ramanathan Venkatraman, Sitalakshmi Venkatraman:
Big Data Infrastructure, Data Visualisation and Challenges. BDIOT 2019: 13-17 - [c13]Amjad Gawanmeh, Sazia Parvin, Sitalakshmi Venkatraman, Tony de Souza-Daw, James Jin Kang, Samuel Kaspi, Joanna Jackson:
A Framework for Integrating Big Data Security Into Agricultural Supply Chain. BigDataService 2019: 191-194 - [c12]James Jin Kang, Kiran Fahd, Sitalakshmi Venkatraman, Rolando Trujillo-Rasua, Paul S. Haskell-Dowland:
Hybrid Routing for Man-in-the-Middle (MITM) Attack Detection in IoT Networks. ITNAC 2019: 1-6 - 2018
- [j17]James Jin Kang, Kiran Fahd, Sitalakshmi Venkatraman:
Trusted Time-Based Verification Model for Automatic Man-in-the-Middle Attack Detection in Cybersecurity. Cryptogr. 2(4): 38 (2018) - [j16]Sitalakshmi Venkatraman, Mamoun Alazab:
Use of Data Visualisation for Zero-Day Malware Detection. Secur. Commun. Networks 2018: 1728303:1-1728303:13 (2018) - [j15]Sitalakshmi Venkatraman, Ramanathan Venkatraman:
Communities of Practice Approach for Knowledge Management Systems. Syst. 6(4): 36 (2018) - [c11]Andrew Stranieri, Andrew Yatsko, Sitalakshmi Venkatraman, Herbert F. Jelinek:
Data analytics to select markers and cut-off values for clinical scoring. ACSW 2018: 29:1-29:6 - [c10]Sazia Parvin, Amjad Gawanmeh, Sitalakshmi Venkatraman:
Optimised Sensor Based Smart System for Efficient Monitoring of Grain Storage. ICC Workshops 2018: 1-6 - [c9]James Jin Kang, Sitalakshmi Venkatraman:
An Integrated mHealth and Vehicular Sensor Based Alarm System Emergency Alarm Notification System for Long Distance Drivers using Smart Devices and Cloud Networks. ITNAC 2018: 1-6 - 2017
- [j14]Sitalakshmi Venkatraman:
A Proposed Business Intelligent Framework for Recommender Systems. Informatics 4(4): 40 (2017) - 2016
- [j13]Andrew Stranieri, Andrew Yatsko, Herbert F. Jelinek, Sitalakshmi Venkatraman:
Data-analytically derived flexible HbA1c thresholds for type 2 diabetes mellitus diagnostic. Artif. Intell. Res. 5(1): 111-134 (2016) - [j12]Herbert F. Jelinek, Andrew Stranieri, Andrew Yatsko, Sitalakshmi Venkatraman:
Data analytics identify glycated haemoglobin co-markers for type 2 diabetes mellitus diagnosis. Comput. Biol. Medicine 75: 90-97 (2016) - [j11]Sitalakshmi Venkatraman:
Transforming grid to cloud services for multimodal biometrics. Int. J. Comput. Sci. Eng. 13(1): 1-12 (2016) - [j10]Sitalakshmi Venkatraman, Kiran Fahd:
Challenges and Success Factors of ERP Systems in Australian SMEs. Syst. 4(2): 20 (2016) - [c8]Sitalakshmi Venkatraman, Andrew Yatsko, Andrew Stranieri, Herbert F. Jelinek:
Missing Data Imputation for Individualised CVD Diagnostic and Treatment. CinC 2016 - 2015
- [j9]Herbert F. Jelinek, Andrew Yatsko, Andrew Stranieri, Sitalakshmi Venkatraman, Adil M. Bagirov:
Diagnostic with incomplete nominal/discrete data. Artif. Intell. Res. 4(1): 22-35 (2015) - 2014
- [j8]Mamoun Alazab, Md. Shamsul Huda, Jemal H. Abawajy, Md. Rafiqul Islam, John Yearwood, Sitalakshmi Venkatraman, Roderic Broadhurst:
A Hybrid Wrapper-Filter Approach for Malware Detection. J. Networks 9(11): 2878-2891 (2014) - 2013
- [j7]Mamoun Alazab, Sitalakshmi Venkatraman:
Detecting malicious behaviour using supervised learning algorithms of the function calls. Int. J. Electron. Secur. Digit. Forensics 5(2): 90-109 (2013) - [j6]Sitalakshmi Venkatraman:
Software Engineering Research Gaps in the Cloud. J. Inf. Technol. Res. 6(1): 1-19 (2013) - 2012
- [j5]Salah Alhyari, Moutaz Alazab, Sitalakshmi Venkatraman, Mamoun Alazab, Ammar Alazab:
Six Sigma Approach to Improve Quality in E-Services: An Empirical Study in Jordan. Int. J. Electron. Gov. Res. 8(2): 57-74 (2012) - [j4]Rabiu Mukhtar, Ameer Al-Nemrat, Mamoun Alazab, Sitalakshmi Venkatraman, Hamid Jahankhani:
Analysis of firewall log-based detection scenarios for evidence in digital forensics. Int. J. Electron. Secur. Digit. Forensics 4(4): 261-279 (2012) - [c7]Sitalakshmi Venkatraman, Siddhivinayak Kulkarni:
MapReduce neural network framework for efficient content based image retrieval from large datasets in the cloud. HIS 2012: 63-68 - 2011
- [c6]Mamoun Alazab, Sitalakshmi Venkatraman, Paul A. Watters, Moutaz Alazab:
Zero-day Malware Detection based on Supervised Learning Algorithms of API call Signatures. AusDM 2011: 171-182 - [c5]Mamoun Alazab, Sitalakshmi Venkatraman, Paul A. Watters, Moutaz Alazab, Ammar Alazab:
Cybercrime: The Case of Obfuscated Malware. ICGS3/e-Democracy 2011: 204-211
2000 – 2009
- 2009
- [j3]Sitalakshmi Venkatraman, Pak Yoong:
Role of mobile technology in the construction industry - a case study. Int. J. Bus. Inf. Syst. 4(2): 195-209 (2009) - [c4]Mamoun Alazab, Mofakharul Islam, Sitalakshmi Venkatraman:
Towards Automatic Image Segmentation Using Optimised Region Growing Technique. Australasian Conference on Artificial Intelligence 2009: 131-139 - [c3]Sitalakshmi Venkatraman, Siddhivinayak Kulkarni:
Risk-Based Neuro-Grid Architecture for Multimodal Biometrics. SCSS 2009: 51-56 - 2008
- [j2]Sitalakshmi Venkatraman:
Mobile payment implementation: a reference framework. Int. J. Bus. Inf. Syst. 3(3): 252-271 (2008) - [j1]Sitalakshmi Venkatraman, Indika Delpachitra:
Biometrics in banking security: a case study. Inf. Manag. Comput. Secur. 16(4): 415-430 (2008) - 2007
- [c2]Sitalakshmi Venkatraman:
Student-Centred Assessments and their Impact on Learning - An IS Case Study. PACIS 2007: 50 - [c1]Indika Delpachitra, Sitalakshmi Venkatraman:
Biometric-Enabled Solutions in Banking Environments - A Case Study. PACIS 2007: 150
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:20 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint