Items where Subject is "Network Security"

Group by: Creators | Item Type
Jump to: C | D | H | I | J | K | L | M | P | S | T
Number of items at this level: 17.

C

Chinnaraj, P (2022) Authenticated Key Agreement Protocol for Secure Communication Establishment in Vehicle-to-Grid Environment With FPGA Implementation. IEEE Transactions on Vehicular Technology, 71 (4). pp. 3470-3479. ISSN 0018-9545

D

Deepa, M and Reba, P and Shanmuha Priya, S and Annalakshmi, H and Mohammed Riyaz, A and Suthindhira, S (2023) Design and Fabrication of Dual band Slotted Microstrip Patch Antenna - 3.5 Ghz and 2.4 Ghz. In: 2023 International Conference on Intelligent Systems for Communication, IoT and Security (ICISCoIS), Coimbatore, India.

H

Hemkiran, S (2020) A review of similarity measures and link prediction models in social networks. International Journal of Computing and Digital Systems, 9 (2). pp. 239-248. ISSN 2210-142X

I

Ilango, P (2021) Design and analysis of behaviour based DDoS detection algorithm for data centres in cloud. Evolutionary Intelligence, 14 (2). pp. 395-404. ISSN 1864-5909

Ilango, P (2019) Research on Security Architecture in Mobile Cloud Computing to Prevent Adaptive Anomaly Attacks. International Journal of Innovative Technology and Exploring Engineering, 8 (6S4). pp. 942-947. ISSN 2278-3075

J

Jothibasu, M and Miruthula, P V and Shree Harini, K (2023) Empowering Smart Farming: Extensive Plant Surveillance and Accurate Pest Identification. In: 2023 International Conference on Intelligent Technologies for Sustainable Electric and Communications Systems (iTech SECOM), Coimbatore, India.

K

Kala, I (2021) Advanced hybrid secure multipath optimized routing in Internet of Things (IoT)‐based WSN. International Journal of Communication Systems, 34 (8): e4782. ISSN 1074-5351

L

Lokesh, S (2024) A cryptographic method to have a secure communication of health care digital data into the cloud. Automatika, 65 (1). pp. 373-386. ISSN 0005-1144

M

Manimegalai, R (2022) BABW: Biometric‐Based Authentication Using DWT and FFNN: Applications of Artificial Intelligence and Soft Computing Techniques. In: Tele‐Healthcare. Wiley, pp. 201-219. ISBN 9781119841937

P

Prabhu, A (2019) Performance Analysis of Encryption Algorithms with Pat-Fish for Cloud Storage Security. In: Lecture Notes in Electrical Engineering. Springer, Singapore, pp. 111-120. ISBN 9789811310584

S

Sankarasubramanian, R S (2021) An Analysis of Remotely Triggered Malware Exploits in Content Management System-Based Web Applications. In: Intelligence in Big Data Technologies—Beyond the Hype. Advances in Intelligent Systems and Computing (1167). Springer, Singapore, pp. 155-168. ISBN 9789811552854

Sankarasubramanian, R S (2022) The Design and Fabrication of Smart Surveillance Robot. In: 2022 4th International Conference on Inventive Research in Computing Applications (ICIRCA), Coimbatore, India.

Sankarasubramanian, R S (2022) Detection and Diagnosis of Fault Using Light-Weighted Midori Blocks. In: Futuristic Communication and Network Technologies. VICFCNT 2020. Lecture Notes in Electrical Engineering (792). Springer, Singapore, pp. 157-166. ISBN 9789811646249

Sankarasubramanian, R S (2022) Encryption and Decryption of Image for Secured Data Transmission. In: Futuristic Communication and Network Technologies. VICFCNT 2020. Lecture Notes in Electrical Engineering (792). Springer, Singapore, pp. 145-155. ISBN 9789811646249

Shabariram, C P and Priya Ponnuswamy, P and Prema, R and Sowmiya Priya, R S (2023) Optimizing Virtual Machine Downtime in Live Migration using the Least Frequently Used Service-based Pre-copy Algorithm. In: 2023 International Conference on Computer Communication and Informatics (ICCCI), Coimbatore, India.

Sumathi, A C and Balasiddharth, D and Arun Prasath, R V and Sheeba, A (2021) Development of functional prototype of PDCP sublayer in 5G NR. In: 12th International Conference on Advances in Computing, Control, and Telecommunication Technologies, ACT 2021, 27 - 28, August 2021, Hyderabad.

T

Thivaharan, S (2023) A resilient group session key authentication methodology for secured peer to peer networks using zero knowledge protocol. Optik, 273. p. 170345. ISSN 00304026

This list was generated on Fri Sep 20 07:06:44 2024 IST.