Sami Azam

Registered to supervise postgraduate research

20112019
If you made any changes in Pure these will be visible here soon.

Fingerprint Fingerprint is based on mining the text of the person's scientific documents to create an index of weighted terms, which defines the key subjects of each individual researcher.

  • 6 Similar Profiles
Auditory Evoked Potentials Medicine & Life Sciences
Reaction Time Medicine & Life Sciences
Application programs Engineering & Materials Science
Cryptography Engineering & Materials Science
Websites Engineering & Materials Science
Steganography Engineering & Materials Science
Domestic appliances Engineering & Materials Science
Cell Phones Medicine & Life Sciences

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output 2011 2019

  • 17 Conference Paper published in Proceedings
  • 9 Article
  • 1 Chapter
  • 1 Abstract

An Efficient Method for Detecting Fraudulent Transactions Using Classification Algorithms on an Anonymized Credit Card Data Set

Manlangit, S., Azam, S., Shanmugam, B., Kannoorpatti, K., Jonkman, M. & Balasubramaniam, A., 1 Jan 2018, Intelligent Systems Design and Applications - 17th International Conference on Intelligent Systems Design and Applications ISDA 2017. Abraham, A., Muhuri, P., Muda, A. & Gandhi, N. (eds.). Springer-Verlag London Ltd., p. 418-429 12 p. (Advances in Intelligent Systems and Computing; vol. 736)

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in ProceedingsResearchpeer-review

Sampling
Learning systems
Industry

A Novel Approach for Steganography App in Android OS

Gurung, K., Azam, S., Shanmugam, B., Kannoorpatti, K., Jonkman, M. & Balasubramaniam, A., 1 Jan 2018, Intelligent Systems Design and Applications - 17th International Conference on Intelligent Systems Design and Applications ISDA 2017. A, A., N, G., PK, M. & AK, M. (eds.). Germany: Springer-Verlag London Ltd., p. 442-450 9 p. (Advances in Intelligent Systems and Computing; vol. 736)

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in ProceedingsResearchpeer-review

Steganography
Application programs
Cryptography
Discrete cosine transforms
Discrete wavelet transforms

A Review of Ransomware Families and Detection Methods

Chittooparambil, H. J., Shanmugam, B., Azam, S., Kannoorpatti, K., Jonkman, M. & Samy, G. N., 9 Sep 2018, Recent Trends in Data Science and Soft Computing - Proceedings of the 3rd International Conference of Reliable Information and Communication Technology IRICT 2018. Saeed, F., Gazem, N., Mohammed, F. & Busalim, A. (eds.). Cham, Switzerland: Springer, Cham, p. 588-597 10 p. ( Advances in Intelligent Systems and Computing ; vol. 843)

Research output: Chapter in Book/Report/Conference proceedingChapterResearchpeer-review

Malware
Industry

Categorisation of security threats for smart home appliances

Gai, A., Azam, S., Shanmugam, B., Jonkman, M. & De Boer, F., 23 Aug 2018, 2018 International Conference on Computer Communication and Informatics, ICCCI 2018. Coimbatore, India: IEEE, Institute of Electrical and Electronics Engineers, p. 1-5 5 p. 8441213

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in ProceedingsResearchpeer-review

Domestic appliances
Closed circuit television systems
Thermostats
Theaters
Refrigerators

Comparative analysis of different techniques of encryption for secured data transmission

Mota, A. V., Azam, S., Shanmugam, B., Yeo, K. C. & Kannoorpatti, K., 21 Jun 2018, IEEE International Conference on Power, Control, Signals and Instrumentation Engineering, ICPCSI 2017. IEEE, Institute of Electrical and Electronics Engineers, p. 231-237 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in ProceedingsResearchpeer-review

data transmission
Data Transmission
Comparative Analysis
Data communication systems
Encryption