Zobrazeno 1 - 10
of 348
pro vyhledávání: '"S. Mercy"'
Publikováno v:
IET Networks, Vol 9, Iss 5, Pp 235-246 (2020)
Internet dragged more than half of the world's population into the cyber world. Unfortunately, with the increase in internet transactions, cybercrimes also increase rapidly. With the anonymous structure of the internet, attackers attempt to deceive t
Externí odkaz:
https://doaj.org/article/9af7eb6bba1043f7931795834f17450e
Publikováno v:
IEEE Access, Vol 8, Pp 201087-201097 (2020)
With the advent of the Internet of Things (IoT), there are also major information security risks hidden behind them. There are major information security risks hidden behind them. Attackers can conceal their actual attack locations by spoofing IP add
Externí odkaz:
https://doaj.org/article/90f8512c3b154c238baa3e1ae1663158
Autor:
T. Subbulakshmi, S. Mercy Shalinie
Publikováno v:
ICTACT Journal on Soft Computing, Vol 1, Iss 3, Pp 131-137 (2011)
Masqueraders are a category of intruders who impersonate other people on a computer system and use this entry point to use the information stored in the systems or throw other attacks into the network. This paper focuses on Ensemble Design of a Masqu
Externí odkaz:
https://doaj.org/article/dc84088e7f124898899d418233a13d51
Autor:
S. PADMAVATHI, S. MERCY SHALINIE
Publikováno v:
Journal of Engineering Science and Technology, Vol 5, Iss 3, Pp 332-341 (2010)
Static scheduling is the temporal and spatial mapping of a program to the resources of parallel system. Scheduling algorithms use the Directed Cyclic Graph (DAG) to represent sub-tasks and the precedence constraints of the program to be parallelized.
Externí odkaz:
https://doaj.org/article/9fccf83a70ca45b6a0736099383a7d04
Autor:
V. Akilandeswari, S. Mercy Shalinie
Publikováno v:
International Journal of Distributed Sensor Networks, Vol 10 (2014)
The main objective of this paper is to propose Adaptive Distributed Critical-Care Extensive Response Network (AD-CERN) which includes self-management and self-defense in the network. The proposed network has the following considerations. (1) Dynamic
Externí odkaz:
https://doaj.org/article/462f15a1077b41cbb6b8152af6b51863
Publikováno v:
In Engineering Applications of Artificial Intelligence July 2024 133 Part D
Publikováno v:
In Engineering Applications of Artificial Intelligence September 2023 124
Publikováno v:
In Computers & Security June 2023 129
Publikováno v:
In Process Safety and Environmental Protection September 2022 165:463-474
Publikováno v:
In Computers & Security May 2022 116