Search

Your search keyword '"Selvakumar Mani"' showing total 55 results

Search Constraints

Start Over You searched for: Author "Selvakumar Mani" Remove constraint Author: "Selvakumar Mani" Language english Remove constraint Language: english
55 results on '"Selvakumar Mani"'

Search Results

2. Hybridizing flower pollination algorithm with particle swarm optimization for enhancing the performance of IPv6 intrusion detection system

3. Peer-to-peer botnets: exploring behavioural characteristics and machine/deep learning-based detection

4. Effect of Various Surface Modifications on Characterization of New Natural Cellulosic Fiber from Coconut Tree Secondary Flower Leaf Stalk Fiber (CSF).

5. Dickson polynomial-based secure group authentication scheme for Internet of Things

6. Securing MQTT Ecosystem: Exploring Vulnerabilities, Mitigations, and Future Trajectories

7. Illuminating Healthcare Management: A Comprehensive Review of IoT-Enabled Chronic Disease Monitoring

8. Majority Voting Ensemble Classifier for Detecting Keylogging Attack on Internet of Things

9. Performance evaluation of E-VGG19 model: Enhancing real-time skin cancer detection and classification

10. IoT empowered smart cybersecurity framework for intrusion detection in internet of drones

11. HLD-DDoSDN: High and low-rates dataset-based DDoS attacks against SDN.

12. A systematic literature review of recent lightweight detection approaches leveraging machine and deep learning mechanisms in Internet of Things networks

13. Unveiling the Metaverse: Exploring Emerging Trends, Multifaceted Perspectives, and Future Challenges

14. Uncovering the Cloak: A Systematic Review of Techniques Used to Conceal Phishing Websites

15. Exploring the Potential of Metaverse Technology in Healthcare: Applications, Challenges, and Future Directions

16. A Systematic Literature Review on Security of Vehicular Ad-Hoc Network (VANET) Based on VEINS Framework

17. A Robust Security Scheme Based on Enhanced Symmetric Algorithm for MQTT in the Internet of Things

18. ES-SECS/GEM: An Efficient Security Mechanism for SECS/GEM Communications

19. FC-PA: Fog Computing-Based Pseudonym Authentication Scheme in 5G-Enabled Vehicular Networks

20. Secured‐KDS: Secret key distribution and authentication scheme for resource‐constrained devices

21. An enhanced mechanism for detection of Domain Name System‐based distributed reflection denial of service attacks depending on modified metaheuristic algorithms and adaptive thresholding techniques

22. A Critical Review: Revisiting Phishing Attacks Classification and Analysis of Techniques Employed in Taxonomies

23. MSR-DoS: Modular Square Root-Based Scheme to Resist Denial of Service (DoS) Attacks in 5G-Enabled Vehicular Networks

24. Eth-PSD: A Machine Learning-Based Phishing Scam Detection Approach in Ethereum

25. NDPsec: Neighbor Discovery Protocol Security Mechanism

26. Applicability of Intrusion Detection System on Ethereum Attacks: A Comprehensive Review

27. L-CPPA: Lattice-based conditional privacy-preserving authentication scheme for fog computing with 5G-enabled vehicular system.

28. ECA-VFog: An efficient certificateless authentication scheme for 5G-assisted vehicular fog computing.

29. Heartbeat sound classification using a hybrid adaptive neuro-fuzzy inferences system (ANFIS) and artificial bee colony

30. A Systematic Literature Review on Machine Learning and Deep Learning Approaches for Detecting DDoS Attacks in Software-Defined Networking

31. A Review of Scalability Issues in Software-Defined Exchange Point (SDX) Approaches: State-of-the-Art

32. Towards Identity-Based Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks

33. Security and Privacy Schemes in Vehicular Ad-Hoc Network With Identity-Based Cryptography Approach: A Survey

34. SECS/GEMsec: A Mechanism for Detection and Prevention of Cyber-Attacks on SECS/GEM Communications in Industry 4.0 Landscape

35. Efficient Conditional Privacy Preservation With Mutual Authentication in Vehicular Ad Hoc Networks

36. VPPCS: VANET-Based Privacy-Preserving Communication Scheme

37. LSWBVM: A Lightweight Security Without Using Batch Verification Method Scheme for a Vehicle Ad Hoc Network

38. Machine Learning Techniques to Detect a DDoS Attack in SDN: A Systematic Review

39. Efficient Authentication Scheme for 5G-Enabled Vehicular Networks Using Fog Computing

40. ANAA-Fog: A Novel Anonymous Authentication Scheme for 5G-Enabled Vehicular Fog Computing

41. Comparison of ML/DL Approaches for Detecting DDoS Attacks in SDN

42. Lattice-Based Lightweight Quantum Resistant Scheme in 5G-Enabled Vehicular Networks

43. PeerAmbush: Multi-Layer Perceptron to Detect Peer-to-Peer Botnet

44. Man-in-the-Middle Attacks in Mobile Ad Hoc Networks (MANETs): Analysis and Evaluation

45. CM-CPPA: Chaotic Map-Based Conditional Privacy-Preserving Authentication Scheme in 5G-Enabled Vehicular Networks

46. Chebyshev Polynomial-Based Scheme for Resisting Side-Channel Attacks in 5G-Enabled Vehicular Networks

47. A Secure Pseudonym-Based Conditional Privacy-Preservation Authentication Scheme in Vehicular Ad Hoc Networks

48. Password-Guessing Attack-Aware Authentication Scheme Based on Chinese Remainder Theorem for 5G-Enabled Vehicular Networks

49. SE-CPPA: A Secure and Efficient Conditional Privacy-Preserving Authentication Scheme in Vehicular Ad-Hoc Networks

50. DAD-match; Security technique to prevent denial of service attack on duplicate address detection process in IPv6 link-local network.

Catalog

Books, media, physical & digital resources