


default search action
Sabarathinam Chockalingam
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
[j8]Ayush Patil, Biswajeeban Mishra, Sabarathinam Chockalingam
, Sanjay Misra, Petter Kvalvik
:
Securing financial systems through data sovereignty: a systematic review of approaches and regulations. Int. J. Inf. Sec. 24(4): 159 (2025)
[j7]Abraham Berhanu, Sabarathinam Chockalingam
, Jemal H. Abawajy, Shegaw Anagaw Mengiste, Shabbab Ali Algamdi
, Dereje Ashenafi:
A recurrent neural network for network-based intrusion detection. PeerJ Comput. Sci. 11: e3306 (2025)
[c17]Sabarathinam Chockalingam, Sandeep Pirbhulal, Habtamu Abie:
Improving Security and Privacy of Cognitive Digital Twins Through Dynamic Consent for Healthcare and Resilient Societies. HCI (74) 2025: 293-305
[c16]Sabarathinam Chockalingam
, Sandeep Pirbhulal, Sanjay Misra, Petter Kvalvik, Habtamu Abie:
FedTrust: Modelling Adaptive Trust-Risk for IoT-Enabled Federated Decentralized Systems. VTC2025-Spring 2025: 1-6- 2024
[j6]Kousik Barik
, Sanjay Misra
, Luis Fernández-Sanz
, Sabarathinam Chockalingam
:
Enhancing image data security using the APFB model. Connect. Sci. 36(1) (2024)
[j5]Sandeep Pirbhulal, Sabarathinam Chockalingam
, Ankur Shukla, Habtamu Abie
:
IoT cybersecurity in 5G and beyond: a systematic literature review. Int. J. Inf. Sec. 23(4): 2827-2879 (2024)
[c15]Sanjay Misra, Kousik Barik, Petter Kvalvik, Sabarathinam Chockalingam
:
Human-Centric AI for Enhancing Security in Smart City Anomaly Detection. AI4GS 2024: 75-90
[c14]Sandeep Pirbhulal, Sabarathinam Chockalingam
, Habtamu Abie
, Nathan Lau
:
Cognitive Digital Twins for Improving Security in IT-OT Enabled Healthcare Applications. HCI (46) 2024: 153-163
[c13]Sanjay Misra, Kousik Barik
, Harald P.-J. Thunem, Sabarathinam Chockalingam
:
Human Factors and Security in Digital Twins: Challenges and Future Prospects. HCI (45) 2024: 281-295
[c12]Ikwuazom Callistus Tochukwu, Ogwueleka Francisca Nonyelum, Sanjay Misra, Sabarathinam Chockalingam
:
Securing mobile edge computing: A survey on cyber-physical threat mitigation for digital sovereignty. ICDS 2024: 211-220
[c11]Levente Nyusti, Sabarathinam Chockalingam
, Patrick Bours, Terje Bodal:
Detecting Cyber and Physical Attacks Against Mobile Robots Using Machine Learning: An Empirical Study. NordSec 2024: 139-157
[c10]Sabarathinam Chockalingam
, Sandeep Pirbhulal
, Pallavi Kaliyar
, Habtamu Abie
:
Dynamic Safety and Security Risk Assessment in Healthcare and Critical Infrastructures. SUNRISE 2024: 23-42
[c9]Kousik Barik
, Sanjay Misra
, Sabarathinam Chockalingam
:
Cyber Security in Healthcare Systems: A Review of Tools and Attack Mitigation Techniques. SUNRISE 2024: 87-105- 2023
[j4]Sabarathinam Chockalingam
, Wolter Pieters, André M. H. Teixeira
, Pieter H. A. J. M. van Gelder
:
Probability elicitation for Bayesian networks to distinguish between intentional attacks and accidental technical failures. J. Inf. Secur. Appl. 75: 103497 (2023)
[j3]Coralie Esnoul, Ricardo Colomo-Palacios, Eunkyoung Jee, Sabarathinam Chockalingam
, John Eidar Simensen, Doo-Hwan Bae:
Report on the 3rd International Workshop on Engineering and Cybersecurity of Critical Systems (EnCyCriS - 2022). ACM SIGSOFT Softw. Eng. Notes 48(1): 81-84 (2023)
[j2]Coralie Esnoul, Mary Sánchez-Gordón, Eunkyoung Jee, Ricardo Colomo-Palacios, Sabarathinam Chockalingam
, John Eidar Simensen, Doo-Hwan Bae:
Report on the 4th International Workshop on Engineering and Cybersecurity of Critical Systems (EnCyCriS - 2023). ACM SIGSOFT Softw. Eng. Notes 48(4): 41-45 (2023)
[c8]Yonas Zewdu Ayele, Sabarathinam Chockalingam
, Nathan Lau
:
Threat Actors and Methods of Attack to Social Robots in Public Spaces. HCI (35) 2023: 262-273
[c7]Sabarathinam Chockalingam
, Espen Nystad, Coralie Esnoul:
Capability Maturity Models for Targeted Cyber Security Training. HCI (35) 2023: 576-590
[c6]Kayode Yakub Saheed
, Sanjay Misra
, Sabarathinam Chockalingam
:
Autoencoder via DCNN and LSTM Models for Intrusion Detection in Industrial Control Systems of Critical Infrastructures. EnCyCriS@ICSE 2023: 9-16
[c5]Aida Akbarzadeh, Sabarathinam Chockalingam
, Xhesika Ramaj, Lama Amro, Mary Sánchez-Gordón, Vasileios Gkioulos, Ricardo Colomo-Palacios, László Erdodi, Nathan Lau
, Siv Hilde Houmb:
Workshop on Cybersecurity of Critical Infrastructures. Privacy and Identity Management 2023: 325-339- 2021
[j1]Sabarathinam Chockalingam
, Wolter Pieters, André Teixeira, Pieter H. A. J. M. van Gelder
:
Bayesian network model to distinguish between intentional attacks and accidental technical failures: a case study of floodgates. Cybersecur. 4(1): 29 (2021)
[c4]Mohammed Nurul Islam, Ricardo Colomo-Palacios, Sabarathinam Chockalingam
:
Secure Access Service Edge: A Multivocal Literature Review. ICCSA (Workshops) 2021: 188-194
2010 – 2019
- 2018
[c3]Sabarathinam Chockalingam
, Wolter Pieters, André Teixeira, Nima Khakzad
, Pieter H. A. J. M. van Gelder
:
Combining Bayesian Networks and Fishbone Diagrams to Distinguish Between Intentional Attacks and Accidental Technical Failures. GraMSec 2018: 31-50- 2017
[c2]Sabarathinam Chockalingam
, Wolter Pieters, André Teixeira
, Pieter H. A. J. M. van Gelder
:
Bayesian Network Models in Cyber Security: A Systematic Review. NordSec 2017: 105-122
[i2]Sabarathinam Chockalingam, Dina Hadziosmanovic, Wolter Pieters, André Teixeira, Pieter H. A. J. M. van Gelder:
Integrated Safety and Security Risk Assessment Methods: A Survey of Key Characteristics and Applications. CoRR abs/1707.02140 (2017)- 2016
[c1]Sabarathinam Chockalingam
, Dina Hadziosmanovic, Wolter Pieters, André Teixeira
, Pieter H. A. J. M. van Gelder
:
Integrated Safety and Security Risk Assessment Methods: A Survey of Key Characteristics and Applications. CRITIS 2016: 50-62- 2014
[i1]Sabarathinam Chockalingam, Harjinder Singh Lallie:
The Conceptual Idea of Online Social Media Site (SMS) User Account Penetration Testing System. CoRR abs/1409.3037 (2014)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2026-01-31 23:43 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







