Zobrazeno 1 - 7
of 7
pro vyhledávání: '"C. M. Nalayini"'
Publikováno v:
網際網路技術學刊. 24:023-034
Cyber-attacks are rapidly increasing in the internet era due to the growth of information technology. The distributed denial of service (DDoS) attacks are increasing dramatically due to the distributed services in cloud networks. In this paper, a new
A novel dual optimized IDS to detect DDoS attack in SDN using hyper tuned RFE and deep grid network.
Publikováno v:
Cyber Security & Applications; 2024, Vol. 2, p1-16, 16p
Publikováno v:
Journal of Trends in Computer Science and Smart Technology. 4:96-105
Now-a-days human beings have a tendency to transport in a faster pace which leads to greater street injuries. During night time motors typically tour in more velocity. When an coincidence happens in the course of night it is difficult for the rescue
Publikováno v:
Inventive Computation and Information Technologies ISBN: 9789811974014
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::8bf61f019df18231b87941b50cfe36ea
https://doi.org/10.1007/978-981-19-7402-1_61
https://doi.org/10.1007/978-981-19-7402-1_61
Publikováno v:
Algorithms for Intelligent Systems ISBN: 9789811933103
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::2fe3f2e7c902238d6936cec00af6879b
https://doi.org/10.1007/978-981-19-3311-0_1
https://doi.org/10.1007/978-981-19-3311-0_1
Autor:
C. M. Nalayini, Jeevaa Katiravan
Publikováno v:
International Conference on Computer Networks and Communication Technologies ISBN: 9789811086809
In the recent years, SDN is an emerging architecture that is ideal for today’s application. It is dynamic and also cost-effective in order to deal with the networking application. It consists of two planes, namely data plane and control plane that
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::11040973265ec39539c55e86551aa4b9
https://doi.org/10.1007/978-981-10-8681-6_83
https://doi.org/10.1007/978-981-10-8681-6_83
Publikováno v:
2017 International Conference on Technical Advancements in Computers and Communications (ICTACC).
Authentication is a fundamental trust to any trust oriented computational frameworks and furthermore a basic part in numerous security protocols. This paper gives other option to conventional security inquires and OTP. They are attractive since peopl