Items where Subject is "Cyber Security"
- VELS Subject Areas (4343)
- Computer Science (447)
- Cyber Security (21)
- Computer Science (447)
B
Babu, T.G. and Jayalakshmi, V. (2021) The Challenges for Context – Oriented Data Accumulation with Privacy Preserving in Wireless Sensor Networks. 2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC). pp. 866-871.
C
Clementeena, A. and Sripriya, P. (2016) Comparative Study of Algorithms used in CAPTCHA’s and New Finding Set as LCG Algorithm. Indian Journal of Science and Technology, 9 (42). ISSN 0974-6846
G
Gupta, Abhishek and Sahayadhas, Arun and Gupta, Vivek (2021) Proposed Techniques to Design Speed Efficient Data Warehouse Architecture for Fastening Knowledge Discovery Process. In: 2020 IEEE Third International Conference on Artificial Intelligence and Knowledge Engineering (AIKE), Laguna Hills, CA, USA.
J
Jayashree, G. and Priya, Dr. C. (2021) Data Integration with XML ETL Processing. 2020 International Conference on Computer Science, Engineering and Applications (ICCSEA). pp. 1-8.
K
Kannan, M. and William Mary, L. and Priya, C. and Manikandan, R. (2020) Towards Smart City through Virtualized and Computerized Car parking System using Arduino in the Internet of Things. 2020 International Conference on Computer Science, Engineering and Applications (ICCSEA). pp. 1-6.
Kumar, T. N. R. and Srivatsa, S. K. and Murali, S. (2013) Location and Detection of a Text in a Video. In: Proceedings of International Conference on Advances in Computing. Springer, pp. 9-17.
L
Lavanya, M. and Parameswari, R. (2020) A Multiple Linear Regressions Model for Crop Prediction with Adam Optimizer and Neural Network Mlraonn. International Journal of Advanced Computer Science and Applications, 11 (4). ISSN 2158107X
M
Mayilvahanan, P. and CHARLES, AROCKIARAJ A Secure & Hybrid Authentication Protocol of Intrusion Detection System for MANET. International Journal of Engineering and Technology.
Murugan, Suganiya and Selvaraj, Jerritta and Sahayadhas, Arun (2021) Detection and analysis: driver state with electrocardiogram (ECG). Physical and Engineering Sciences in Medicine, 43 (2). pp. 525-537. ISSN 2662-4729
N
Nathiya, T. and Suseendran, G. (2019) An Effective Hybrid Intrusion Detection System for Use in Security Monitoring in the Virtual Network Layer of Cloud Computing Technology. In: Data Management, Analytics and Innovation. Springer Link, pp. 483-497.
Nisha, M. and Jebathangam, J. (2022) Deep KNN Based Text Classification for Cyberbullying Tweet Detection. In: 2022 11th International Conference on System Modeling & Advancement in Research Trends (SMART), Moradabad, India.
Nisha, M. and Jebathangam, J. (2022) A Framework to Detect Crime through Twitter Data in Cyberbullying with EFFDT Model. In: 2022 11th International Conference on System Modeling & Advancement in Research Trends (SMART), Moradabad, India.
P
Piramu Preethika, SK. and Sasi Kumar, A. (2016) EdTAM: Efficient Detection of Theft Android Mobile. Indian Journal of Science and Technology, 9 (44). ISSN 0974-6846
Poongothai, L. and Sharmila, K. (2021) Collating the Exactness of ROI Extraction for a Retinal Detached Eye. In: 2020 9th International Conference System Modeling and Advancement in Research Trends (SMART), Moradabad, India.
R
Rathidevi, R. and Parameswari, R. (2021) Performance Analysis of Small Files in HDFS using Clustering Small Files based on Centroid Algorithm. 2020 Fourth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC). pp. 640-643.
S
Sheela, K. and Priya, C. (2023) Blockchain-based security & privacy for biomedical and healthcare information exchange systems. Materials Today: Proceedings, 81. pp. 641-645. ISSN 22147853
Silvia Priscila, S. and Piramu Preethika, S. K. and Radhakrishnan, Sangeetha and Bagavathi Lakshmi, R. and Sakthivanitha, M. and Mahaveerakannan, R. (2024) Chaotic Map Cryptographic Hash-Blockchain Technology with Supply Chain Management. In: Lecture Notes in Networks and Systems. Springer, pp. 599-612.
Singla, Manish Kumar and Gupta, Jyoti and Nijhawan, Parag and Ganguli, Souvik and Rajest, S. Suman (2021) Development of an Efficient, Cheap, and Flexible IoT-Based Wind Turbine Emulator. Development of an Efficient, Cheap, and Flexible IoT-Based Wind Turbine Emulator. pp. 225-231.
Sudha, C. and Akila, D. (2021) Credit Card Fraud Detection System based on Operational & Transaction features using SVM and Random Forest Classifiers. In: 2021 2nd International Conference on Computation, Automation and Knowledge Management (ICCAKM), Dubai, United Arab Emirates.
Suseendran, G. and Chandrasekaran, E. and Nayyar, Anand (2019) Defending Jellyfish Attack in Mobile Ad hoc Networks via Novel Fuzzy System Rule. In: Data Management, Analytics and Innovation. Springer Link, pp. 437-455.
T
T, Nirmalraj and Jebathangam, J. (2022) Improved Honey Encryption to Protect the Internet users from Various Attacks. In: 2022 3rd International Conference on Electronics and Sustainable Communication Systems (ICESC), Coimbatore, India.