Search

Your search keyword '"Vasaki Ponnusamy"' showing total 80 results

Search Constraints

Start Over You searched for: Author "Vasaki Ponnusamy" Remove constraint Author: "Vasaki Ponnusamy"
80 results on '"Vasaki Ponnusamy"'

Search Results

1. Detecting and Mitigating Botnet Attacks in Software-Defined Networks Using Deep Learning Techniques

2. Internet of things and ransomware: Evolution, mitigation and prevention

3. Protection Schemes for DDoS, ARP Spoofing, and IP Fragmentation Attacks in Smart Factory

4. Extracting Key Factors of Cyber Hygiene Behaviour Among Software Engineers: A Systematic Literature Review

5. An Adaptive and Flexible Brain Energized Full Body Exoskeleton With IoT Edge for Assisting the Paralyzed Patients

6. A Fusion-Based Machine Learning Approach for the Prediction of the Onset of Diabetes

13. IoT Wireless Intrusion Detection and Network Traffic Analysis

14. Intrusion Detection Systems in Internet of Things and Mobile Ad-Hoc Networks

19. A semantic-aware log generation method for network activities

20. Smartphone Security Using Swipe Behavior-based Authentication

21. Extracting Key Factors of Cyber Hygiene Behaviour Among Software Engineers: A Systematic Literature Review

24. A Fusion-Based Machine Learning Approach for the Prediction of the Onset of Diabetes

25. Review on Secure Device to Device Communications in LTE

26. Investigation on IoT Intrusion Detection in Wireless Environment

27. A comparative analysis on traditional wired datasets and the need for wireless datasets for IoT wireless intrusion detection

28. Self-Healing and Green Energy in Wireless Sensor Network

29. Quantitative Analysis of COVID-19 Patients

30. Green Energy in Data Centers Using Internet of Things

31. Telemedicine for Healthier Community Development in Pakistan

32. A Case Study of Investigation of Crime Management System Using ICT

33. Identification of Facilitators and Barriers of ICT Usage in the Education Sector of Pakistan

34. Women Empowerment

35. Mobile Authentication using Hybrid Modalities (MAHM) in Pervasive Computing

36. Hybrid Behavior-based Biometric Authentication Systems (HBAS)

37. Cooperative Device to Device Communications with Network Coding

38. Two-Factor Human Authentication for Mobile Applications

39. A Short Survey: Behavioral Authentication Using Mobile Sensors

40. A Review of Attacks and Countermeasures in Internet of Things and Cyber Physical Systems

41. Analysis of Climate Prediction and Climate Change in Pakistan Using Data Mining Techniques

42. A Survey on Intrusion Detection in Wired and Wireless Network for Future IoT Deployment

43. Mobile Authentication Using Tapping Behavior

44. Democratic Governance

45. Fostering Public-Private Partnership

46. Analyzing the Performance and Efficiency of IT-Compliant Audit Module Using Clustering Methods

47. Cybersecurity Governance on Social Engineering Awareness

48. Information and Communication Technology (ICT) for Intelligent Transportation Systems (ITS)

50. ICT Solutions for Improving Smart Communities in Asia

Catalog

Books, media, physical & digital resources