Zobrazeno 1 - 10
of 385
pro vyhledávání: '"Jeyanthi N."'
The Smart home possesses the capability of facilitating home services to their users with the systematic advance in The Internet of Things (IoT) and information and communication technologies (ICT) in recent decades. The home service offered by the s
Externí odkaz:
http://arxiv.org/abs/2402.00568
Autor:
Jayabalan Jayapriya, Jeyanthi N.
Publikováno v:
Cybernetics and Information Technologies, Vol 24, Iss 1, Pp 35-63 (2024)
In today’s world, Electronic Health Records (EHR) are highly segregated and available only within the organization with which the patient is associated. If a patient has to visit another hospital there is no secure way for hospitals to communicate
Externí odkaz:
https://doaj.org/article/82e1a811eebe40d8be8f3b474b9a976d
Publikováno v:
International Journal of Computer Networks & Communications (IJCNC) Vol.11, No.4, July 2019
Sniffing is one of the most prominent causes for most of the attacks in the digitized computing environment. Through various packet analyzers or sniffers available free of cost, the network packets can be captured and analyzed. The sensitive informat
Externí odkaz:
http://arxiv.org/abs/1907.12735
Autor:
Jayabalan, Jayapriya, Jeyanthi, N.
Publikováno v:
In Journal of Parallel and Distributed Computing June 2022 164:152-167
Autor:
Hena M., Jeyanthi N.
Publikováno v:
Cybernetics and Information Technologies, Vol 21, Iss 4, Pp 119-136 (2021)
Apache Hadoop answers the quest of handling Bigdata for most organizations. It offers distributed storage and data analysis via Hadoop Distributed File System (HDFS) and Map-Reduce frameworks. Hadoop depends on third-party security providers like Ker
Externí odkaz:
https://doaj.org/article/2794db9f85c048ffa1e0fd7f932c895b
Autor:
Sudha K. Swapna, Jeyanthi N.
Publikováno v:
Cybernetics and Information Technologies, Vol 21, Iss 3, Pp 50-72 (2021)
Internet of Things (IoT) is the predominant emerging technology that targets on facilitating interconnection of internet-enabled resources. IoT applications concentrate on automating different tasks that facilitate physical objects to act autonomousl
Externí odkaz:
https://doaj.org/article/b8ddcc09538f4095a269019c37324cc7
Publikováno v:
International Journal of Performability Engineering; Jan2024, Vol. 20 Issue 1, p32-39, 8p
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Prabadevi B., Jeyanthi N.
Publikováno v:
Cybernetics and Information Technologies, Vol 18, Iss 4, Pp 75-93 (2018)
Address Resolution Protocol (ARP) cache poisoning results in numerous attacks. A novel mitigation system for ARP cache poisoning presented here avoids ARP cache poisoning attacks by introducing timestamps and counters in the ARP messages and ARP data
Externí odkaz:
https://doaj.org/article/6eb0e581e9ff4d0b9bd170acf43c1567