default search action
Suku Nair
Person information
- affiliation: Southern Methodist University, Dallas, Texas, USA
Other persons with a similar name
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c59]Jing Su, Suku Nair, Leo Popokh:
Leveraging Large Language Models for VNF Resource Forecasting. NetSoft 2024: 258-262 - 2023
- [c58]Jing Su, Suku Nair, Leo Popokh:
EdgeGym: A Reinforcement Learning Environment for Constraint-Aware NFV Resource Allocation. ICAIC 2023: 1-7 - [c57]Derek Phanekham, Kylie Jordan, Oliver Zhu, Suku Nair:
Accurate Bulk Throughput Benchmarks Using Reduced Network Resources. NOMS 2023: 1-5 - 2022
- [c56]Michael Lefebvre, Daniel W. Engels, Suku Nair:
On SDPN: Integrating the Software-Defined Perimeter (SDP) and the Software-Defined Network (SDN) Paradigms. CNS 2022: 353-358 - [c55]Suku Nair:
SDP Based Zero-Trust Architectures. IWSPA@CODASPY 2022: 1 - [c54]Jing Su, Suku Nair, Leo Popokh:
Optimal Resource Allocation in SDN/NFV-Enabled Networks via Deep Reinforcement Learning. ComNet 2022: 1-7 - [c53]Derek Phanekham, Suku Nair, Nageswara S. V. Rao, Mike Truty:
Throughput Analytics of Cloud Networks. GLOBECOM 2022: 5553-5558 - 2021
- [j23]Justin C. Wilson, Suku Nair, Sandro Scielzo, Eric C. Larson:
Objective Measures of Cognitive Load Using Deep Multi-Modal Learning: A Use-Case in Aviation. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 5(1): 40:1-40:35 (2021) - [c52]Derek Phanekham, Troy Walker, Suku Nair, Mike Truty, Manasa Chalasani, Rick Jones:
Efficient Batch Scheduling of Large Numbers of Cloud Benchmarks. CloudNet 2021: 157-163 - [c51]Jeffrey Collins II, Suku Nair, Krish Prabhu:
5G Deployment Considerations to Enable Consumer Innovation. ICCE 2021: 1-6 - [c50]Derek Phanekham, Suku Nair, Nageswara S. V. Rao, Mike Truty:
Predicting Throughput of Cloud Network Infrastructure Using Neural Networks. INFOCOM Workshops 2021: 1-6 - [c49]Michael Lefebvre, Suku Nair, Daniel W. Engels, Dwight Horne:
Building a Software Defined Perimeter (SDP) for Network Introspection. NFV-SDN 2021: 91-95 - [c48]Leo Popokh, Jing Su, Suku Nair, Eli V. Olinick:
IllumiCore: Optimization Modeling and Implementation for Efficient VNF Placement. SoftCOM 2021: 1-7 - 2020
- [j22]Dwight Horne, Suku Nair:
A New Privacy-Enhanced Technology for Fair Matchmaking With Identity Linked Wishes. IEEE Syst. J. 14(1): 298-309 (2020) - [c47]Matthew Zaber, Suku Nair:
A framework for automated evaluation of security metrics. ARES 2020: 89:1-89:11
2010 – 2019
- 2017
- [c46]Dwight Horne, Suku Nair:
A Feasibility Evaluation of Fair and Privacy-Enhanced Matchmaking with Identity Linked Wishes. ACISP (2) 2017: 422-434 - 2016
- [c45]Dwight Home, Suku Nair:
The Prom Problem: Fair and privacy-enhanced matchmaking with identity linked wishes. ICCST 2016: 1-8 - 2015
- [c44]Subil Abraham, Suku Nair:
Exploitability analysis using predictive cybersecurity framework. CYBCONF 2015: 317-323 - [c43]Sohail Rafiqi, Chatchai Wangwiwattana, Ephrem Fernandez, Suku Nair, Eric C. Larson:
Work-in-Progress, PupilWare-M: Cognitive Load Estimation Using Unmodified Smartphone Cameras. MASS 2015: 645-650 - [c42]Sohail Rafiqi, Chatchai Wangwiwattana, Jasmine Kim, Ephrem Fernandez, Suku Nair, Eric C. Larson:
PupilWare: towards pervasive cognitive load measurement using commodity devices. PETRA 2015: 42:1-42:8 - [c41]Subil Abraham, Suku Nair:
A Novel Architecture for Predictive CyberSecurity Using Non-homogenous Markov Models. TrustCom/BigDataSE/ISPA (1) 2015: 774-781 - [i2]Subil Abraham, Suku Nair:
Predictive Cyber-security Analytics Framework: A non-homogenous Markov model for Security Quantification. CoRR abs/1501.01901 (2015) - [i1]Subil Abraham, Suku Nair:
A Predictive Framework for Cyber Security Analytics using Attack Graphs. CoRR abs/1502.01240 (2015) - 2014
- [c40]Ala Eshmawi, Suku Nair:
Semi-Synthetic Data for Enhanced SMS Spam Detection: [Using Synthetic Minority Oversampling TEchnique SMOTE]. MEDES 2014: 206-212 - [c39]Sohail Rafiqi, Suku Nair, Ephrem Fernandez:
Cognitive and context-aware applications. PETRA 2014: 23:1-23:7 - 2013
- [j21]Ebru Celikel Cankaya, Suku Nair, Hakki C. Cankaya:
Applying error correction codes to achieve security and dependability. Comput. Stand. Interfaces 35(1): 78-86 (2013) - [j20]Suku Nair, Omar Al-Ibrahim, Subil Abraham:
State Machine-Based Security Fusion for Resource-Constrained Environments. IEEE Syst. J. 7(3): 430-441 (2013) - [c38]Ranya Alawadhi, Suku Nair:
A joint scheme for secure and reliable communication in wireless sensor networks. AICCSA 2013: 1 - [c37]Ala Eshmawi, Suku Nair:
Smartphone applications security: Survey of new vectors and solutions. AICCSA 2013: 1-4 - 2011
- [c36]Paul Krier, Sai Seshabhattar, Daniel W. Engels, Suku Nair:
Cloaking RFID tags. CCNC 2011: 1036-1040 - [c35]Omar Al-Ibrahim, Suku Nair:
Security fusion based on state machine compositions. CICS 2011: 39-46 - [c34]Stephen M. Papa, William D. Casper, Suku Nair:
Placement of trust anchors in embedded computer systems. HOST 2011: 111-116 - [c33]Suku Nair, Subil Abraham, Omar Al-Ibrahim:
Security architecture for resource-limited environments. IWCMC 2011: 412-417 - [c32]Omar Al-Ibrahim, Suku Nair:
Cyber-physical security using system-level PUFs. IWCMC 2011: 1672-1676 - [c31]Suku Nair, Subil Abraham, Omar Al-Ibrahim:
Security Fusion: A New Security Architecture for Resource-Constrained Environments. HotSec 2011 - 2010
- [j19]Thomas H. Morris, V. S. S. Nair:
Private computing on public platforms: portable application security. Wirel. Commun. Mob. Comput. 10(7): 942-958 (2010) - [j18]Saeed Abu-Nimeh, Suku Nair:
Circumventing security toolbars and phishing filters via rogue wireless access points. Wirel. Commun. Mob. Comput. 10(8): 1128-1139 (2010) - [c30]Paul Krier, Sai Seshabhattar, Jason Pereira, Daniel W. Engels, Suku Nair:
Lightweight key agreement with key chaining. MASS 2010: 594-599
2000 – 2009
- 2009
- [c29]Saeed Abu-Nimeh, Dario Nappa, Xinlei Wang, Suku Nair:
Distributed Phishing Detection by Applying Variable Selection Using Bayesian Additive Regression Trees. ICC 2009: 1-5 - [c28]Thomas H. Morris, V. S. S. Nair:
Encryption Key Protection for Private Computing on Public Platforms. PerCom Workshops 2009: 1-6 - 2008
- [j17]Padmaraj M. V. Nair, Suku Nair, Marco F. Marchetti, Girish Chiruvolu, Maher Ali:
Bandwidth sensitive fast failure recovery scheme for Metro Ethernet. Comput. Networks 52(8): 1603-1616 (2008) - [c27]Thomas H. Morris, V. S. S. Nair:
Privacy Protected ELF for Private Computing on Public Platforms. ARES 2008: 452-457 - [c26]Saeed Abu-Nimeh, Dario Nappa, Xinlei Wang, Suku Nair:
Bayesian Additive Regression Trees-Based Spam Detection for Enhanced Email Privacy. ARES 2008: 1044-1051 - [c25]Saeed Abu-Nimeh, Dario Nappa, Xinlei Wang, Suku Nair:
A distributed architecture for phishing detection using Bayesian Additive Regression Trees. eCrime 2008: 1-10 - [c24]Saeed Abu-Nimeh, Suku Nair:
Bypassing Security Toolbars and Phishing Filters via DNS Poisoning. GLOBECOM 2008: 2001-2006 - [c23]Thomas H. Morris, V. S. S. Nair:
Secure Context Switch for Private Computing on Public Platforms. GLOBECOM 2008: 2159-2163 - [c22]LiGuo Huang, Xu Bai, Suku Nair:
Developing a SSE-CMM-based security risk assessment process for patient-centered healthcare systems. WoSQ@ICSE 2008: 11-16 - 2007
- [c21]Saeed Abu-Nimeh, Dario Nappa, Xinlei Wang, Suku Nair:
A comparison of machine learning techniques for phishing detection. eCrime Researchers Summit 2007: 60-69 - [c20]David Y. Feinstein, V. S. S. Nair, Mitchell A. Thornton:
Advances in Quantum Computing Fault Tolerance and Testing. HASE 2007: 369-370 - [c19]Thomas H. Morris, V. S. S. Nair:
PCPP: On Remote Host Assessment via Naive Bayesian Classification. IPDPS 2007: 1-8 - 2006
- [c18]Saeed Abu-Nimeh, Suku Nair, Marco F. Marchetti:
An Experimental and Industrial Experience: Avoiding Denial of Service via Memory Profiling. AICCSA 2006: 151-158 - [c17]Saeed Abu-Nimeh, Suku Nair, Marco F. Marchetti:
Avoiding Denial of Service via Stress Testing. AICCSA 2006: 300-307 - [c16]George Deprez, M. Padmaraj, Suku Nair:
Distributed fault management protocol for Heterogeneous Networks. AICCSA 2006: 744-747 - [c15]Maher Ali, Girish Chiruvolu, An Ge, M. Padmaraj, Suku Nair, Marco F. Marchetti:
Differentiated Survivability in Ethernet-Based MAN/WAN. AICCSA 2006: 906-910 - [c14]Padmaraj M. V. Nair, Suku Nair, Marco F. Marchetti, Girish Chiruvolu, Maher Ali:
Distributed Restoration Method for Metro Ethernet. ICN/ICONS/MCL 2006: 94 - 2005
- [c13]M. Padmaraj, Suku Nair, Marco F. Marchetti, Girish Chiruvolu, Maher Ali:
Traffic Engineering in Enterprise Ethernet with Multiple Spanning Tree Regions. Systems Communications 2005: 261-266 - 2004
- [j16]Krishnan G. Indiradevi, Suku Nair:
Simulation Based Validation of Authentication Protocols. Trans. SDPS 8(4): 79-98 (2004)
1990 – 1999
- 1999
- [j15]Hakki C. Cankaya, V. S. S. Nair:
Improved survivability analysis for SONET SHRs. Comput. Networks 31(23-24): 2505-2528 (1999) - [j14]Jeffery L. Kennington, V. S. S. Nair, M. H. Rahman:
Optimization Based Algorithms for Finding Minimal Cost Ring Covers in Survivable Networks. Comput. Optim. Appl. 14(2): 219-230 (1999) - [j13]Mitchell A. Thornton, V. S. S. Nair:
Behavioral synthesis of combinational logic using spectral-based heuristics. ACM Trans. Design Autom. Electr. Syst. 4(2): 219-230 (1999) - [j12]Zeyad Alkhalifa, V. S. S. Nair, Narayanan Krishnamurthy, Jacob A. Abraham:
Design and Evaluation of System-Level Checks for On-Line Control Flow Error Detection. IEEE Trans. Parallel Distributed Syst. 10(6): 627-641 (1999) - 1998
- [c12]Hakki C. Cankaya, V. S. S. Nair:
Hierarchical Approach to Performance Analysis of Self-Healing SONET Networks. ICCCN 1998: 362-369 - [c11]Hakki C. Cankaya, V. S. S. Nair:
Accelerated Reliability Analysis for Self-Healing SONET Networks. SIGCOMM 1998: 268-277 - 1997
- [j11]Krishnakumar Pillai, V. S. S. Nair:
Statistical analysis of nonstationary software metrics. Inf. Softw. Technol. 39(5): 363-373 (1997) - [j10]Hyun C. Kim, V. S. S. Nair:
Software fault tolerance for distributed object based computing. J. Syst. Softw. 39(2): 103-117 (1997) - [j9]Krishnakumar Pillai, V. S. S. Nair:
A Model for Software Development Effort and Cost Estimation. IEEE Trans. Software Eng. 23(8): 485-497 (1997) - [c10]Zeyad Alkhalifa, V. S. S. Nair:
Design of a Portable Control-Flow Checking Technique. HASE 1997: 120-123 - 1996
- [j8]V. S. S. Nair, Jacob A. Abraham, Prithviraj Banerjee:
Efficient Techniques for the Analysis of Algorithm-Based Fault Tolerance (ABFT) Schemes. IEEE Trans. Computers 45(4): 499-503 (1996) - [j7]Bhanu Kapoor, V. S. S. Nair:
Improving Path Sensitizability of Combinational Circuits. VLSI Design 5(1): 49-57 (1996) - 1995
- [j6]Mitchell A. Thornton, V. S. S. Nair:
Efficient calculation of spectral coefficients and their applications. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 14(11): 1328-1341 (1995) - [c9]Hyun C. Kim, V. S. S. Nair:
Application layer software fault tolerance for distributed object-oriented systems. COMPSAC 1995: 199-204 - [c8]V. S. S. Nair:
Software Fault Tolerance: Has it Arrived Yet? COMPSAC 1995: 390 - 1994
- [j5]Cengiz Erbas, Murat M. Tanik, V. S. S. Nair:
Parallel Memory Allocation and Data Alignment in Simd Machines. Parallel Algorithms Appl. 4(1-2): 139-151 (1994) - [c7]Bhanu Kapoor, V. S. S. Nair:
Area, performance, and sensitizable paths [logic design]. Great Lakes Symposium on VLSI 1994: 222-227 - 1993
- [j4]Gautam Dewan, V. S. S. Nair:
A case for uniform memory access multiprocessors. SIGARCH Comput. Archit. News 21(4): 20-26 (1993) - [c6]Mitchell A. Thornton, V. S. S. Nair:
An iterative combinational logic synthesis technique using spectral information. EURO-DAC 1993: 358-363 - [c5]Sanjay Krishna, Travis Diamond, V. S. S. Nair:
A hierarchical object-oriented approach to fault tolerance in distributed systems. ISSRE 1993: 168-177 - [c4]Cengiz Erbas, Murat M. Tanik, V. S. S. Nair:
A Circulant Matrix Based Approach to Storage Schemes for Parallel Memory Systems. SPDP 1993: 92-99 - 1992
- [j3]V. S. S. Nair, Yatin Vasant Hoskote, Jacob A. Abraham:
Probabilistic Evaluation of On-Line Checks in Fault-Tolerant Multiprocessor Systems. IEEE Trans. Computers 41(5): 532-541 (1992) - 1990
- [b1]Suku Nair:
Analysis and design of algorithm-based fault-tolerant systems. University of Illinois Urbana-Champaign, USA, 1990 - [j2]V. S. S. Nair, Jacob A. Abraham:
Real-Number Codes for Bault-Tolerant Matrix Operations On Processor Arrays. IEEE Trans. Computers 39(4): 426-435 (1990) - [j1]Prithviraj Banerjee, Joseph T. Rahmeh, Craig B. Stunkel, V. S. S. Nair, Kaushik Roy, Vijay Balasubramanian, Jacob A. Abraham:
Algorithm-Based Fault Tolerance on a Hypercube Multiprocessor. IEEE Trans. Computers 39(9): 1132-1145 (1990) - [c3]Suku Nair, Jacob A. Abraham:
Hierarchical design and analysis of fault-tolerant multiprocessor systems using concurrent error detection. FTCS 1990: 130-137
1980 – 1989
- 1988
- [c2]Suku Nair, Jacob A. Abraham:
General linear codes for fault-tolerant matrix operations on processor arrays. FTCS 1988: 180-185 - [c1]Prithviraj Banerjee, Joseph T. Rahmeh, Craig B. Stunkel, V. S. S. Nair, Kaushik Roy, Jacob A. Abraham:
An evaluation of system-level fault tolerance on the Intel hypercube multiprocessor. FTCS 1988: 362-367
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:23 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint