Scalable blockchain model using off-chain IPFS storage for healthcare data security and privacy J Jayabalan, N Jeyanthi Journal of Parallel and distributed computing 164, 152-167, 2022 | 188 | 2022 |
Distributed Denial of service Attacks and its effects on Cloud Environment-a Survey B Prabadevi, N Jeyanthi The 2014 International Symposium on Networks, Computers and Communications, 1-5, 2014 | 53 | 2014 |
An enhanced entropy approach to detect and prevent DDoS in cloud environment N Jeyanthi, NCSN Iyengar, PCM Kumar, A Kannammal International Journal of Communication Networks and Information Security 5 …, 2013 | 45 | 2013 |
An Entropy Based Approach to Detect and Distinguish DDoS Attacks from Flash Crowds in VoIP Networks. N Jeyanthi, NCSN Iyengar Int. J. Netw. Secur. 14 (5), 257-269, 2012 | 36 | 2012 |
Packet resonance strategy: a spoof attack detection and prevention mechanism in cloud computing environment N Jeyanthi, NCSN Iyengar International Journal of Communication Networks and Information Security 4 …, 2012 | 29 | 2012 |
A Review on Various Sniffing Attacks and its Mitigation Techniques B Prabadevi, N Jeyanthi Indonesian Journal of Electrical Engineering and Computer Science 12 (3 …, 2018 | 27 | 2018 |
Secured document sharing using visual cryptography in cloud data storage K Brindha, N Jeyanthi Cybernetics and Information Technologies 15 (4), 111-123, 2015 | 27 | 2015 |
Detection of distributed denial of service attacks in cloud computing by identifying spoofed IP N Jeyanthi, U Barde, M Sravani, V Tiwari, NCSN Iyengar International Journal of Communication Networks and Distributed Systems 11 …, 2013 | 26 | 2013 |
A study on distributed consensus protocols and algorithms: the backbone of blockchain networks J Jayabalan, N Jeyanthi 2021 International Conference on Computer Communication and Informatics …, 2021 | 23 | 2021 |
A virtual firewall mechanism using army nodes to protect cloud infrastructure from ddos attacks N Jeyanthi, PC Mogankumar Cybernetics and Information Technologies 14 (3), 71-85, 2014 | 22 | 2014 |
ASCII based cryptography using unique id, matrix multiplication and palindrome number J Gitanjali, N Jeyanthi, C Ranichandra, M Pounambal The 2014 International Symposium on Networks, Computers and Communications, 1-3, 2014 | 21 | 2014 |
Internet of things (IoT) as interconnection of threats (IoT) N Jeyanthi Security and Privacy in Internet of Things (IoTs), 23-42, 2016 | 20 | 2016 |
A survey of trust management in mobile ad hoc networks R Vijayan, N Jeyanthi International Journal of Applied Engineering Research 11 (4), 2833-2838, 2016 | 19 | 2016 |
RQA based approach to detect and prevent DDoS attacks in VoIP networks N Jeyanthi, R Thandeeswaran, J Vinithra Cybernetics and Information Technologies 14 (1), 11-24, 2014 | 19 | 2014 |
Security Breaches and Threat prevention in the Internet of things N Jeyanthi, R Thandeeswaran IGI Global, 2017 | 18 | 2017 |
Secured multi-cloud virtual infrastructure with improved performance R Thandeeswaran, S Subhashini, N Jeyanthi, MAS Durai Cybernetics and information technologies 12 (2), 11-22, 2012 | 18 | 2012 |
An analysis of security solutions for ARP poisoning attacks and its effects on medical computing B Prabadevi, N Jeyanthi, A Abraham International Journal of System Assurance Engineering and Management 11 (1 …, 2020 | 17 | 2020 |
Hybrid encryption model for managing the data security in medical internet of things P Jyotheeswari, N Jeyanthi International Journal of Internet Protocol Technology 13 (1), 25-31, 2020 | 17 | 2020 |
Escape-on-sight: an efficient and scalable mechanism for escaping ddos attacks in cloud computing environment N Jeyanthi, NCSN Iyengar Cybernetics and Information Technologies 13 (1), 46-60, 2013 | 17 | 2013 |
A Review on Privacy Requirements and Application Layer Security in Internet of Things (IoT) KS Sudha, N Jeyanthi Cybernetics and Information Technologies 21 (3), 50-72, 2021 | 16 | 2021 |