Zobrazeno 1 - 10
of 96
pro vyhledávání: '"T. Subbulakshmi"'
Publikováno v:
Heritage Science, Vol 12, Iss 1, Pp 1-14 (2024)
Abstract Kolkata, renowned as the City of Joy, boasts a rich tapestry of cultural heritage spanning centuries. Despite the significance of its architectural marvels, accessing comprehensive visual documentation of Kolkata's heritage sites remains a c
Externí odkaz:
https://doaj.org/article/af0b87096f6b497aa09965b4d7dbfe61
Autor:
T. Subbulakshmi, R. Regin Raja
Publikováno v:
ICTACT Journal on Soft Computing, Vol 6, Iss 4, Pp 1281-1286 (2016)
Sentiment denotes a person's opinion or feeling towards a subject that they are discussing about in that conversation. This has been one of the most researched and industrially promising fields in natural language processing. There are several method
Externí odkaz:
https://doaj.org/article/d31182e8b4cf440aac6b29bd2f39e7a2
Autor:
T. Subbulakshmi, P. Parameswaran, C. Parthiban, M. Mariselvi, J. Adlene Anusha, G. Mahalakshmi
Publikováno v:
ICTACT Journal on Communication Technology, Vol 4, Iss 2, Pp 737-743 (2014)
Distributed Denial of Service (DDoS) attacks were considered to be a tremendous threat to the current information security infrastructure. During DDoS attack, multiple malicious hosts that are recruited by the attackers launch a coordinated attack ag
Externí odkaz:
https://doaj.org/article/56e8264373ef4aeba5ffcb1ccc5022b9
Autor:
T. Subbulakshmi, S. Mercy Shalinie
Publikováno v:
ICTACT Journal on Soft Computing, Vol 1, Iss 3, Pp 131-137 (2011)
Masqueraders are a category of intruders who impersonate other people on a computer system and use this entry point to use the information stored in the systems or throw other attacks into the network. This paper focuses on Ensemble Design of a Masqu
Externí odkaz:
https://doaj.org/article/dc84088e7f124898899d418233a13d51
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
K M Balaji, T Subbulakshmi
Publikováno v:
International Journal of e-Collaboration. 18:1-26
Malware analysis and detection are important tasks to be accomplished as malware is getting more and more arduous at every instance. The threats and problems posed by the public around the globe are also rapidly increasing. Detection of zero-day atta
Publikováno v:
Procedia Computer Science. 165:112-118
Flood attacks on a network occur when attackers send a very high volume of traffic to a system. This leads to an exhaustion of resources of the targeted system. Such a system or infrastructure under attack won’t be able to cope up with the services
Autor:
Adrian Nirmal Andrew, T Subbulakshmi, Pranjal Aggarwal, R. Dheekksha, B.S. Rakshana, Bhavyadeep Jagani
Publikováno v:
2021 5th International Conference on Trends in Electronics and Informatics (ICOEI).
Recent research shows that, at least 65% of people reuse and 13% of people use the same password to protect all their accounts and devices. Many users resort to storing all their passwords in a device in plain text or other insecure methods like keep
Autor:
T. Subbulakshmi, B.S. Kiruthika Devi
Publikováno v:
2021 5th International Conference on Intelligent Computing and Control Systems (ICICCS).
Distributed Denial of Service attacks is the predominant targeted cyber-attack on the cloud infrastructure which has now evolved as the persistent and more sophisticated attack. DDoS attack sources share the same bandwidth and communication channel o
Publikováno v:
2021 5th International Conference on Intelligent Computing and Control Systems (ICICCS).
Cloud computing helps in the delivery of various services like storage, servers, and databases, over the internet. Various popular cloud service providers enable customers to access these services with a certain amount of reliability. This reliabilit