Dr. N. Jeyanthi
Dr. N. Jeyanthi
Verified email at vit.ac.in
Title
Cited by
Cited by
Year
Distributed Denial of service Attacks and its effects on Cloud Environment-a Survey
B Prabadevi, N Jeyanthi
The 2014 International Symposium on Networks, Computers and Communications, 1-5, 2014
372014
An enhanced entropy approach to detect and prevent DDoS in cloud environment
N Jeyanthi, NCSN Iyengar, PCM Kumar, A Kannammal
International Journal of Communication Networks and Information Security 5 …, 2013
332013
An Entropy Based Approach to Detect and Distinguish DDoS Attacks from Flash Crowds in VoIP Networks.
N Jeyanthi, NCSN Iyengar
IJ Network Security 14 (5), 257-269, 2012
262012
Packet resonance strategy: a spoof attack detection and prevention mechanism in cloud computing environment
N Jeyanthi, NCSN Iyengar
International Journal of Communication Networks and Information Security 4 …, 2012
242012
Secured multi-cloud virtual infrastructure with improved performance
R Thandeeswaran, S Subhashini, N Jeyanthi, MAS Durai
Cybernetics and Information Technologies 12 (2), 11-22, 2012
192012
Detection of distributed denial of service attacks in cloud computing by identifying spoofed IP
N Jeyanthi, U Barde, M Sravani, V Tiwari, NCSN Iyengar
International Journal of Communication Networks and Distributed Systems 11 …, 2013
172013
RQA based approach to detect and prevent DDoS attacks in VoIP networks
N Jeyanthi, R Thandeeswaran, J Vinithra
Cybernetics and Information Technologies 14 (1), 11-24, 2014
152014
Escape-on-sight: an efficient and scalable mechanism for escaping ddos attacks in cloud computing environment
N Jeyanthi, NCSN Iyengar
Cybernetics and Information Technologies 13 (1), 46-60, 2013
152013
Internet of things (iot) as interconnection of threats (iot)
N Jeyanthi
Security and Privacy in Internet of Things (IoTs), 21-39, 2016
132016
A virtual firewall mechanism using army nodes to protect cloud infrastructure from ddos attacks
N Jeyanthi, PC Mogankumar
Cybernetics and Information Technologies 14 (3), 71-85, 2014
132014
ASCII based cryptography using unique id, matrix multiplication and palindrome number
J Gitanjali, N Jeyanthi, C Ranichandra, M Pounambal
The 2014 International Symposium on Networks, Computers and Communications, 1-3, 2014
132014
Secured document sharing using visual cryptography in cloud data storage
K Brindha, N Jeyanthi
Cybernetics and Information Technologies 15 (4), 111-123, 2015
122015
Reputation based Service for Cloud User Environment
N Jeyanthi, H Shabeeb, MAS Durai, R Thandeeswaran
International Journal of Engineering (IJE) Transactions B: Applications 27 …, 2014
122014
Security Breaches and Threat Prevention in the Internet of Things
N Jeyanthi, R Thandeeswaran
IGI Global, 2017
112017
A survey of trust management in mobile ad hoc networks
R Vijayan, N Jeyanthi
International Journal of Applied Engineering Research 11 (4), 2833-2838, 2016
102016
A study on security threats in cloud
H Shabeeb, N Jeyanthi, N Iyengar
International Journal of Cloud Computing and Services Science (IJ-CLOSER) 1 …, 2012
92012
A framework to mitigate ARP sniffing attacks by cache poisoning
B Prabadevi, N Jeyanthi
International Journal of Advanced Intelligence Paradigms 10 (1-2), 146-159, 2018
82018
Securing Portable Document Format File Using Extended Visual Cryptography to Protect Cloud Data Storage.
K Brindha, N Jeyanthi
IJ Network Security 19 (5), 684-693, 2017
72017
SCT: secured cloud based telemedicine
N Jeyanthi, R Thandeeswaran, H Mcheick
The 2014 International Symposium on Networks, Computers and Communications, 1-4, 2014
72014
RESCUE: three phase authentication to detect and prevent DDoS attacks in cloud computing environment
N Jeyanthi, H Shabeeb, R Thandeeswaran, MAS Durai
International Journal of Engineering, Transaction B: Applications 27 (8 …, 2014
72014
The system can't perform the operation now. Try again later.
Articles 1–20