Sneha Sudhakaran
Sneha Sudhakaran
Graduate Assistant CCT LSU;CEH;CHFI; PhD Candidate
Verified email at - Homepage
Cited by
Cited by
Programmable logic controller forensics
I Ahmed, S Obermeier, S Sudhakaran, V Roussev
IEEE Security & Privacy 15 (6), 18-24, 2017
A scada system testbed for cybersecurity and forensic research and pedagogy
I Ahmed, V Roussev, W Johnson, S Senthivel, S Sudhakaran
Proceedings of the 2nd Annual Industrial Control System Security Workshop, 1-9, 2016
DroidScraper: a tool for Android in-memory object recovery and reconstruction
A Ali-Gombe, S Sudhakaran, A Case, GG Richard III
22nd International Symposium on Research in Attacks, Intrusions and Defenses …, 2019
AmpleDroid recovering large object files from Android application memory
S Sudhakaran, A Ali-Gombe, A Orgah, A Case, GG Richard
2020 IEEE International Workshop on Information Forensics and Security (WIFS …, 2020
Poster: On Reliability of Userland Memory Forensics
S Sudhakaran, A Ali-Gombe, GG Richard III
Women in Cyber Security (WiCys 2021), 2021
Examining the Impact of Garbage Collection and Process States in Userland Memory Forensics
S Sudhakaran, A Ali-Gombe, G G. Richard III
73rd AAFS Annual Scientific Meeting, 2021
AmpleDroid Recovering Large Objects From Android Application Memory
S Sudhakaran, A Ali-Gombe, A Orgah, A Case, G G Richard III
IEEE WIFS 2020, 2020
POSTER: Non-Moving Large Object Extraction from Process Dumps
S Sudhakaran, A Ali-Gombe, A Case, G G.RichardIII
Women in CyberSecurity(WiCys 2020), 2020
Proving Database Tampering Through In-Memory Object Reconstruction
A Ali-Gombe, S Sudhakaran, A Case, GG Richard III
71st AAFS Annual Scientific Meeting, 2019
A New Cyber Forensic Philosophy for Digital Watermarks in the Context of Copyright Laws
PV Bhattathiripad, S Sudhakaran, R Khalid
Association for Digital Forensics Security and Law, 2015
Use of Machine Learning Techniques for Log Data Analysis
K Muniasamy, S Sudhakaran, M Sethumadhavan
Information Security Education and Awareness- INFOSEC DEPOT, 2014
Comparison in Honda Algorithm and Neural Network for Anti Cruise Collision Avoidance System
SS Nimisha Ajayakumar
International Journal of Digital Application & Contemporary research 3 (1), 2014
An Advanced Approach towards Shadow Detection and Restoration in VHR Images
SS Nishna Soman
International Journal of Engineering Research and Technology 3 (10), 2014
Attack Prediction using Naive Bayes and cost sensitive AdaBoost
S Sudhakaran
Amrita Vishwa Vidyapeetham, 2013
The system can't perform the operation now. Try again later.
Articles 1–14