Dr. N. Jeyanthi
Dr. N. Jeyanthi
Verified email at vit.ac.in
TitleCited byYear
An enhanced entropy approach to detect and prevent DDoS in cloud environment
N Jeyanthi, NCSN Iyengar, PCM Kumar, A Kannammal
International Journal of Communication Networks and Information Security 5 …, 2013
302013
Distributed Denial of service Attacks and its effects on Cloud Environment-a Survey
B Prabadevi, N Jeyanthi
The 2014 International Symposium on Networks, Computers and Communications, 1-5, 2014
252014
Packet resonance strategy: a spoof attack detection and prevention mechanism in cloud computing environment
N Jeyanthi, NCSN Iyengar
International Journal of Communication Networks and Information Security 4 …, 2012
242012
An Entropy Based Approach to Detect and Distinguish DDoS Attacks from Flash Crowds in VoIP Networks.
N Jeyanthi, NCSN Iyengar
IJ Network Security 14 (5), 257-269, 2012
242012
Detection of distributed denial of service attacks in cloud computing by identifying spoofed IP
N Jeyanthi, U Barde, M Sravani, V Tiwari, NCSN Iyengar
International Journal of Communication Networks and Distributed Systems 11 …, 2013
142013
Secured Multi-Cloud Virtual Infrastructure with Improved Performance
R Thandeeswaran, S Subhashini, N Jeyanthi, MAS Durai
Cybernetics and Information Technologies 12 (2), 11-22, 2012
142012
A virtual firewall mechanism using army nodes to protect cloud infrastructure from ddos attacks
N Jeyanthi, PC Mogankumar
Cybernetics and Information Technologies 14 (3), 71-85, 2014
122014
Escape-on-sight: an efficient and scalable mechanism for escaping ddos attacks in cloud computing environment
N Jeyanthi, NCSN Iyengar
Cybernetics and Information Technologies 13 (1), 46-60, 2013
122013
Reputation based Service for Cloud User Environment
N Jeyanthi, H Shabeeb, MAS Durai, R Thandeeswaran
International Journal of Engineering (IJE) Transactions B: Applications 27 …, 2014
112014
RQA based approach to detect and prevent DDoS attacks in VoIP networks
N Jeyanthi, R Thandeeswaran, J Vinithra
Cybernetics and Information Technologies 14 (1), 11-24, 2014
112014
Secured document sharing using visual cryptography in cloud data storage
K Brindha, N Jeyanthi
Cybernetics and Information Technologies 15 (4), 111-123, 2015
102015
ASCII based cryptography using unique id, matrix multiplication and palindrome number
J Gitanjali, N Jeyanthi, C Ranichandra, M Pounambal
The 2014 International Symposium on Networks, Computers and Communications, 1-3, 2014
102014
Internet of things (iot) as interconnection of threats (iot)
N Jeyanthi
Security and Privacy in Internet of Things (IoTs), 21-39, 2016
92016
A study on security threats in cloud
H Shabeeb, N Jeyanthi, N Iyengar
International Journal of Cloud Computing and Services Science (IJ-CLOSER) 1 …, 2012
82012
A survey of trust management in mobile ad hoc networks
R Vijayan, N Jeyanthi
International Journal of Applied Engineering Research 11 (4), 2833-2838, 2016
72016
A Recurrence Quantification Analytical Approach to Detect DDoS Attacks
N Jeyanthi, J Vinithra, R Thandeeswaran, NCSN Iyengar
2011 International Conference on Computational Intelligence and …, 2011
62011
A framework to mitigate ARP Sniffing attacks by Cache Poisoning
B Prabadevi, N Jeyanthi
International Journal of Advanced Intelligence Paradigms 10 (1-2), 146-159, 2018
52018
Security Breaches and Threat Prevention in the Internet of Things
N Jeyanthi, R Thandeeswaran
IGI Global, 2017
52017
Securing cloud data using visual cryptography
K Brindha, N Jeyanthi
International Confernce on Innovation Information in Computing Technologies, 1-5, 2015
52015
SCT: secured cloud based telemedicine
N Jeyanthi, R Thandeeswaran, H Mcheick
The 2014 International Symposium on Networks, Computers and Communications, 1-4, 2014
52014
The system can't perform the operation now. Try again later.
Articles 1–20