Zobrazeno 1 - 10
of 80
pro vyhledávání: '"N. Nithiyanandam"'
Autor:
N, Nithiyanandam1 (AUTHOR), M, Rajesh2 (AUTHOR), Ramachandran, Sitharthan3 (AUTHOR) sithukky@gmail.com, K, Vengatesan2 (AUTHOR), A, Mohamed Imran4 (AUTHOR), C, Dhanamjayulu5 (AUTHOR), Khan, Baseem6 (AUTHOR) baseemkh@hu.edu.et
Publikováno v:
Scientific Reports. 12/15/2023, Vol. 13 Issue 1, p1-14. 14p.
Autor:
A. Sivanesh Kumar, D. Gobinath, P. Vijayakarthik, S. Dhanasekaran, N. Nithiyanandam, V. Jeyalakshmi
Publikováno v:
2022 3rd International Conference on Electronics and Sustainable Communication Systems (ICESC).
Autor:
N. Nithiyanandam, S. Dhanasekaran, A. Sivanesh Kumar, D. Gobinath, P. Vijayakarthik, G. Vinoth Rajkumar, U. Muthuraman
Publikováno v:
2022 3rd International Conference on Electronics and Sustainable Communication Systems (ICESC).
Autor:
P. Vijayakarthik, N. Nithiyanandam, S. Dhanasekaran, A. Sivanesh Kumar, D. Gobinath, S. Maheswari
Publikováno v:
2022 3rd International Conference on Electronics and Sustainable Communication Systems (ICESC).
Autor:
S. Dhanasekaran, P. Vijayakarthik, D. Gobinath, N. Nithiyanandam, A. Sivanesh Kumar, S. Agnes Shifani, U. Muthuraman
Publikováno v:
2022 International Conference on Inventive Computation Technologies (ICICT).
Autor:
A. Sivanesh Kumar, D. Gobinath, N. Nithiyanandam, P. Vijayakarthik, S. Dhanasekaran, G. Vinoth Rajkumar
Publikováno v:
2022 International Conference on Inventive Computation Technologies (ICICT).
Autor:
N. Nithiyanandam, Latha Parthiban
Publikováno v:
International Journal of Speech Technology. 23:343-354
Rapid growth in the development of wireless sensor networks (WSN) in the field of distributed audio signal processing is one of the critical research areas. Intruders can easily track the unprotected audio signals through sinkhole in WSN. To identify
Publikováno v:
Privacy and Security Challenges in Cloud Computing ISBN: 9781003219880
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::edd74e7de57759a4bf59f650ba631a9d
https://doi.org/10.1201/9781003219880-6
https://doi.org/10.1201/9781003219880-6
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
N. Nithiyanandam, P. Latha
Publikováno v:
Journal of Ambient Intelligence and Humanized Computing.
Sinkhole attack in wireless sensor networks (WSN) is most vulnerable attack in WSN that prevents the base station from gathering complete and unmodified data from its origin. A simple authentication mechanism is not adequate to prevent WSN from sinkh