Zobrazeno 1 - 10
of 43
pro vyhledávání: '"J S Sodhi"'
Publikováno v:
Data Management, Analytics and Innovation ISBN: 9789819914135
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::baf5c4efe2267a0991b24ef868de3699
https://doi.org/10.1007/978-981-99-1414-2_50
https://doi.org/10.1007/978-981-99-1414-2_50
Publikováno v:
2020 8th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO).
A Distributed Denial of Service (DDoS) attack is an attack that compromised the bandwidth of the whole network by choking down all the available network resources which are publically available, thus makes access to that resource unavailable. The DDo
Publikováno v:
2020 10th International Conference on Cloud Computing, Data Science & Engineering (Confluence).
A Distributed Denial of Service (DDoS) attack is an attack which compromised the bandwidth of the whole network by choking down all the available network resources which are publicly available, thus makes the access of that resource unavailable. The
Publikováno v:
2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT).
Detection of moving object is a challenging task for any video surveillance. Generally, a video surveillance consists of three levels of processing – moving object extraction, recognition and tracking – that further process for decision of the co
Publikováno v:
SSRN Electronic Journal.
Since the end of 2000, there are lot of revolutions occurs in the field of Internet of Things (IoT), that affect tremendously on the world internet infrastructure. Smart Home is a dwelling which incorporates the key electrical appliances of a home co
Publikováno v:
International Journal of Electronic Security and Digital Forensics. 12:99
The idea of smart home existed from 1970's onwards but has come into the knowledge of researchers and data scientist due to the development in the domain of internet of things (IoT) (Kopetz, 2011),...
Publikováno v:
2017 7th International Conference on Cloud Computing, Data Science & Engineering - Confluence.
This paper presents an analytical review about smart home network, their working and technologies from a security standpoint. It highlights various security flaws in a different smart home networks. It clearly explain, why a smart home is such an eas
Publikováno v:
Education and Information Technologies. 21:123-148
An important research area in education and technology is how the learners use e-learning. By exploring the various factors and relationships between them, we can get an insight into the learners' behaviors for delivering tailored e-content required
Autor:
J. S. Sodhi, Isha Mittal
Publikováno v:
International Journal of Computer Applications. 70:49-54
Conversion from some old technology to new technology is requirement for today’s world, our IT industry was started growing up in late 90’s. At that time there were lots of development comes in different industry, banking system had changed drast
Publikováno v:
Proceedings of the International Congress on Information and Communication Technology ISBN: 9789811007668
This research paper is a brief study on social engineering that explores the internet awareness among males and females of different age groups. In our study, we have researched on how an individual shares his/her identity and sensitive information w
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::533ebccb4ac73176afe853304294ed54
https://doi.org/10.1007/978-981-10-0767-5_36
https://doi.org/10.1007/978-981-10-0767-5_36