Search

Your search keyword '"Selvakumar Mani"' showing total 64 results

Search Constraints

Start Over You searched for: Author "Selvakumar Mani" Remove constraint Author: "Selvakumar Mani"
64 results on '"Selvakumar Mani"'

Search Results

2. Hybridizing flower pollination algorithm with particle swarm optimization for enhancing the performance of IPv6 intrusion detection system

4. Peer-to-peer botnets: exploring behavioural characteristics and machine/deep learning-based detection

5. Effect of TiB Addition on Corrosion Behavior of Titanium Composites under Neutral Chloride Solution

6. Dickson polynomial-based secure group authentication scheme for Internet of Things

7. Securing MQTT Ecosystem: Exploring Vulnerabilities, Mitigations, and Future Trajectories

8. Illuminating Healthcare Management: A Comprehensive Review of IoT-Enabled Chronic Disease Monitoring

9. Majority Voting Ensemble Classifier for Detecting Keylogging Attack on Internet of Things

10. Effect of B4C in Ti-6Al-4V matrix on workability behavior of powder metallurgy composites during cold upsetting

11. Performance evaluation of E-VGG19 model: Enhancing real-time skin cancer detection and classification

12. IoT empowered smart cybersecurity framework for intrusion detection in internet of drones

13. Wetting phase transition of grain boundaries and material performance of novel Inconel 718

14. Grain size refinement, texture analysis and effect on the tensile properties of a novel Inconel 718

15. Studies on adhesion strength and corrosion behavior of ZnO-Mg coated on AISI 4140

16. HLD-DDoSDN: High and low-rates dataset-based DDoS attacks against SDN.

17. A systematic literature review of recent lightweight detection approaches leveraging machine and deep learning mechanisms in Internet of Things networks

18. Estimation of distinctive mechanical properties of spark plasma sintered titanium–titanium boride composites through nano-indentation technique

19. Unveiling the Metaverse: Exploring Emerging Trends, Multifaceted Perspectives, and Future Challenges

20. Uncovering the Cloak: A Systematic Review of Techniques Used to Conceal Phishing Websites

21. Exploring the Potential of Metaverse Technology in Healthcare: Applications, Challenges, and Future Directions

22. A Systematic Literature Review on Security of Vehicular Ad-Hoc Network (VANET) Based on VEINS Framework

23. A Robust Security Scheme Based on Enhanced Symmetric Algorithm for MQTT in the Internet of Things

24. ES-SECS/GEM: An Efficient Security Mechanism for SECS/GEM Communications

25. FC-PA: Fog Computing-Based Pseudonym Authentication Scheme in 5G-Enabled Vehicular Networks

26. Secured‐KDS: Secret key distribution and authentication scheme for resource‐constrained devices

27. An enhanced mechanism for detection of Domain Name System‐based distributed reflection denial of service attacks depending on modified metaheuristic algorithms and adaptive thresholding techniques

28. A Critical Review: Revisiting Phishing Attacks Classification and Analysis of Techniques Employed in Taxonomies

29. MSR-DoS: Modular Square Root-Based Scheme to Resist Denial of Service (DoS) Attacks in 5G-Enabled Vehicular Networks

30. Eth-PSD: A Machine Learning-Based Phishing Scam Detection Approach in Ethereum

31. NDPsec: Neighbor Discovery Protocol Security Mechanism

32. Applicability of Intrusion Detection System on Ethereum Attacks: A Comprehensive Review

33. L-CPPA: Lattice-based conditional privacy-preserving authentication scheme for fog computing with 5G-enabled vehicular system.

34. ECA-VFog: An efficient certificateless authentication scheme for 5G-assisted vehicular fog computing.

35. Heartbeat sound classification using a hybrid adaptive neuro-fuzzy inferences system (ANFIS) and artificial bee colony

36. A Systematic Literature Review on Machine Learning and Deep Learning Approaches for Detecting DDoS Attacks in Software-Defined Networking

37. A Review of Scalability Issues in Software-Defined Exchange Point (SDX) Approaches: State-of-the-Art

38. Towards Identity-Based Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks

39. Security and Privacy Schemes in Vehicular Ad-Hoc Network With Identity-Based Cryptography Approach: A Survey

40. SECS/GEMsec: A Mechanism for Detection and Prevention of Cyber-Attacks on SECS/GEM Communications in Industry 4.0 Landscape

41. Efficient Conditional Privacy Preservation With Mutual Authentication in Vehicular Ad Hoc Networks

42. VPPCS: VANET-Based Privacy-Preserving Communication Scheme

43. LSWBVM: A Lightweight Security Without Using Batch Verification Method Scheme for a Vehicle Ad Hoc Network

44. Machine Learning Techniques to Detect a DDoS Attack in SDN: A Systematic Review

45. Efficient Authentication Scheme for 5G-Enabled Vehicular Networks Using Fog Computing

46. ANAA-Fog: A Novel Anonymous Authentication Scheme for 5G-Enabled Vehicular Fog Computing

47. Comparison of ML/DL Approaches for Detecting DDoS Attacks in SDN

48. Lattice-Based Lightweight Quantum Resistant Scheme in 5G-Enabled Vehicular Networks

49. PeerAmbush: Multi-Layer Perceptron to Detect Peer-to-Peer Botnet

50. Man-in-the-Middle Attacks in Mobile Ad Hoc Networks (MANETs): Analysis and Evaluation

Catalog

Books, media, physical & digital resources