Zobrazeno 1 - 5
of 5
pro vyhledávání: '"Manu R. Krishnan"'
Autor:
Aravind M, Sujadevi V G, Manu R Krishnan, Prem Sankar A U, Soumajit Pal, Anu Vazhayil, Geetapriya Sridharan, Prabaharan Poornachandran
Publikováno v:
2022 IEEE 7th International Conference on Recent Advances and Innovations in Engineering (ICRAIE).
Publikováno v:
Advances in Intelligent Systems and Computing ISBN: 9789811031557
FICTA (2)
FICTA (2)
Drive-by-Download is an unintentional download of a malware on to a user system. Detection of drive-by-download based malware infection in a host is a challenging task, due to the stealthy nature of this attack. The user of the system is not aware of
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::1b8481ac005d926586f2609f77e22d79
https://doi.org/10.1007/978-981-10-3156-4_13
https://doi.org/10.1007/978-981-10-3156-4_13
Autor:
Prem Sankar, N. Balagopal, Soumajit Pal, Aravind Ashok, Manu R. Krishnan, Prabaharan Poornachandran
Publikováno v:
Advances in Intelligent Systems and Computing ISBN: 9789811020346
From search engines to e-commerce websites and online video channels to smartphone applications, most of the internet applications use advertising as one of their primary source of revenue generation. Malvertising is the act of distributing malicious
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::3538469e851a725095fdb72f3e8759ad
https://doi.org/10.1007/978-981-10-2035-3_23
https://doi.org/10.1007/978-981-10-2035-3_23
Publikováno v:
ICACCI
Numbers of commodity hardware available today are capable of saturating Gigabit Ethernet networks. The key today is to identify the fact that the hardware is not the bottleneck when it comes to generating traffic workloads at high rates. There are no
Autor:
A. U. Prem Sankar, Prabaharan Poornachandran, R. Sreeram, Aravind Ashok, Manu R. Krishnan, Soumajit Pal
Publikováno v:
ICIT
There has been a rampant surge in compromise of consumer grade small scale routers in the last couple of years. Attackers are able to manipulate the Domain Name Space (DNS) settings of these devices hence making them capable of initiating different m