Follow
G.Jaspher Willsie Kathrine
Title
Cited by
Cited by
Year
Cryptographic and Information Security Approaches for Images and Videos
S Ramakrishnan
CRC Press, 2018
522018
Variants of phishing attacks and their detection techniques
GJW Kathrine, PM Praise, AA Rose, EC Kalaivani
2019 3rd International Conference on Trends in Electronics and Informatics …, 2019
382019
Smart card based time efficient authentication scheme for global grid computing
JWK Gnanaraj, K Ezra, EB Rajsingh
Human-centric Computing and Information Sciences 3, 1-14, 2013
372013
Internet of Things based pest management using natural pesticides for small scale organic gardens
R Venkatesan, GJW Kathrine, K Ramalakshmi
Journal of Computational and Theoretical Nanoscience 15 (9-10), 2742-2747, 2018
312018
Smart card based remote user authentication schemes:A survey
PP G. Jaspher Willsie Kathrine, Dr. A. Kirubakaran
International Conference on modelling, Optimisation and Computing 38, 1318-1326, 2012
25*2012
Cloud security mechanisms for data protection : A survey
GJWK Allen oomen
International Journal of Multimedia and Ubiquitous Engineering 9 (9), 81-90, 2014
24*2014
Dynamic malware attack dataset leveraging virtual machine monitor audit data for the detection of intrusions in cloud
AAR Melvin, GJW Kathrine, SS Ilango, S Vimal, S Rho, NN Xiong, Y Nam
Transactions on Emerging Telecommunications Technologies 33 (4), e4287, 2022
212022
A quest for best: A detailed comparison between drakvuf-vmi-based and cuckoo sandbox-based technique for dynamic malware analysis
AAR Melvin, GJW Kathrine
Intelligence in Big Data Technologies—Beyond the Hype: Proceedings of …, 2021
142021
IOT based smart irrigation system for home based organic garden
M Karunakanth, R Venkatesan, GJW Kathrine
International Journal of Pure and Applied Mathematics 119 (12), 16193-16199, 2018
142018
Job scheduling algorithms in grid computing–survey
GJW Kathrine, MU Ilaghi
International Journal of Engineering Research & Technology 1 (7), 1-5, 2012
122012
Biometric authentication and authorization system for grid security
GJW Kathrine, E Kirubakaran
Int. J. Hybrid Inf. Technol 4, 16, 2011
112011
A secure framework for enhancing user authentication in cloud environment using biometrics
GJW Kathrine
2017 International Conference on Signal Processing and Communication (ICSPC …, 2017
102017
Four-factor based privacy preserving biometric authentication and authorization scheme for enhancing grid security
GJW Kathrine, E Kirubakaran
International Journal of Computer Applications 30 (5), 13-20, 2011
82011
Comparative analysis of subdomain enumeration tools and static code analysis
GJ Kathrine, RT Baby, V Ebenzer
ISSN (Online), 2454-7190, 2020
72020
A comprehensive overview on secure offloading in mobile cloud computing
D Shibin, GJW Kathrine
2017 4th International Conference on Electronics and Communication Systems …, 2017
72017
Packet scheduling algorithms in different wireless networks a survey
JW Kathrine, A Raj
International Journal of Engineering Research & Technology (IJERT) 1 (8), 2012
72012
Support vector machine for classification of autism spectrum disorder based on abnormal structure of corpus callosum
S Jebapriya, D Shibin, JW Kathrine, N Sundar
International Journal of Advanced Computer Science and Applications 10 (9), 2019
62019
Ai for detection of missing person
B Vinavatani, MR Panna, PH Singha, GJW Kathrine
2022 International Conference on Applied Artificial Intelligence and …, 2022
52022
A study about detecting ransomware by using different algorithms
A Bertia, SB Xavier, GJW Kathrine, GM Palmer
2022 International Conference on Applied Artificial Intelligence and …, 2022
52022
The practicality of using virtual machine introspection technique with machine learning algorithms for the detection of intrusions in cloud
A Melvin, GJ Kathrine, JI Johnraja
Proceedings of the First International Conference on Advanced Scientific …, 2021
52021
The system can't perform the operation now. Try again later.
Articles 1–20