Zobrazeno 1 - 10
of 28
pro vyhledávání: '"Kamakoti Veezhinathan"'
Autor:
Kamakoti Veezhinathan
Publikováno v:
Communications of the ACM. 65:48-51
Publikováno v:
IEEE Transactions on Computers. 71:40-52
Publikováno v:
Cyber Security Experimentation and Test Workshop.
Publikováno v:
IEEE Networking Letters. 2:67-70
Spectrum Sharing Data Falsification (SSDF) attacks can cause heavy performance degradation to Cognitive Radio (CR) based Internet of Battlefield Things (IoBT) networks. The challenge in such networks is to handle this security problem real time, in a
Scalable pseudo‐exhaustive methodology for testing and diagnosis in flow‐based microfluidic biochips
Publikováno v:
IET Computers & Digital Techniques. 14:122-131
Microfluidics is an upcoming field of science that is going to be used widely in many safety-critical applications including healthcare, medical research and defence. Hence, technologies for fault testing and fault diagnosis of these chips are of ext
Publikováno v:
IEEE Computer Architecture Letters. 19:9-12
Cache timing attacks are a serious threat to the security of computing systems. It permits sensitive information, such as cryptographic keys, to leak across virtual machines and even to remote servers. Encrypted Address Cache, proposed by CEASER –
Autor:
Sanchari Sen, Vinod Ganesan, Kamakoti Veezhinathan, Anand Raghunathan, Pratyush Kumar, Neel Gala
Publikováno v:
DATE
Deep Neural Networks (DNNs) have transformed the field of artificial intelligence and represent the state-of-the-art in many machine learning tasks. There is considerable interest in using DNNs to realize edge intelligence in highly resource-constrai
Publikováno v:
Advanced Information Networking and Applications ISBN: 9783030440404
AINA
AINA
Network Function Virtualization (NFV) supports enterprises and service providers to build reliable network services in a cost-effective way. Such network services are created by combining one or more Virtual Network Functions (VNFs) hosted in private
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::4f2b1c87525d45d74af1defe680eff3a
https://doi.org/10.1007/978-3-030-44041-1_57
https://doi.org/10.1007/978-3-030-44041-1_57
Autor:
Prasanna Karthik Vairam, Gnanambikai Krishnakumar, Chester Rebeiro, Kamakoti Veezhinathan, Patanjali Slpsk
Publikováno v:
IEEE Embedded Systems Letters. 10:83-86
Illegal memory accesses are a serious security vulnerability that have been exploited on numerous occasions. In this letter, we present Gandalf, a compiler assisted hardware extension for the OpenRISC processor that thwarts all forms of memory-based
Autor:
Chester Rebeiro, Kamakoti Veezhinathan, Prasanna Karthik Vairam, Gargi Mitra, Byrav Ramamurthy
Publikováno v:
IEEE Communications Standards Magazine. 2:45-51
Blockchains are known to provide verifiable tamper-resistant trails of accepted transactions. This guarantee comes at the considerable cost of storage and computational power, thereby restricting its application. Current research has focused on alter